Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 20 Nov 2024Bibliometrics
research-article
Optimum resource allocation for D2D-assisted wireless network in industrial internet of things: a hypergraph-based clique algorithm
Abstract

Due to the fast development and evolution of technologies like the Internet of Things need for reliable and fast connectivity has also become more prevalent. The use of Device-to-Device communications is a promising technology that can help reduce ...

research-article
Hierarchical coded caching with heterogeneous cache sizes
Abstract

In this paper, we delve into the intricacies of a network architecture enabled by two layers of caches, where users receive their requested content via intermediate helpers connected to a central server. While coded caching in a two-layer ...

research-article
Improved DV-Hop based on parallel compact Willow Catkin Optimization algorithm for 3D nodes localization in WSN
Abstract

Wireless sensor networks (WSNs) play a critical role in environmental sensing and data transmission. However, their performances are often hindered by challenges like localization accuracy and storage capacity. Existing variants of DV-Hop ...

research-article
Joint design of hybrid beamforming and reflection coefficients for reconfigurable intelligent surface aided mmWave communication systems
Abstract

This paper considers a reconfigurable intelligent surface (RIS) aided multi-user multiple-input single-output (MU-MISO) mmWave downlink communication system. The hybrid beamforming (HBF) and the programmable reflecting elements (PREs) are ...

research-article
SIoV-FTFSA-CAOA: a fuzzy trust-based approach for enhancing security and energy efficiency in social internet of vehicles
Abstract

The Social Internet of Vehicles (SIoV) is an emerging network that interconnects vehicles and generates vast amounts of data concerning social relationships, chauffeurs, commuters, as well as surrounding conditions. However, security is a major ...

research-article
Quest: instant questionnaire collection from handshake messages using WLAN
Abstract

A common approach for questionnaire collection is to set up a WLAN and respondents submit answers via specific apps or a web browser. However, much unnecessary background traffic is incurred once a device connects to Wi-Fi, consuming limited ...

research-article
Cloud data access governance and data security using distributed infrastructure with hybrid machine learning architectures
Abstract

To address the concerns about security and privacy in cloud-based data storage, this study proposes a unique approach to secure cloud-based data governance using hybrid machine learning architectures. With the increasing reliance on cloud ...

research-article
Density-based anti-clustering for scheduling D2D communications
Abstract

Wireless link scheduling in device-to-device (D2D) networks is an NP-hard problem. As a solution, multiple supervised deep learning (DL) models have been recently proposed, which depend on the geographical information of D2D pairs. However, such ...

research-article
Full duplex reconfigurable intelligent surfaces system relying on NOMA and wireless power transfer
Abstract

In this article, we analyze the downlink transmission of a wirelessly powered hybrid cooperative non-orthogonal multiple access (C-NOMA) system relying on reconfigurable intelligent surfaces (RIS), where self-interference related to full-duplex (...

research-article
Modulation recognition network compression based on a randomly perturbation convolutional kernel activation mapping method
Abstract

Deep-learning-based automatic modulation recognition techniques have been extensively explored for wireless communication systems, because of their strong feature extraction and classification abilities of deep neural networks. Although the high ...

research-article
OMIBC: optimal modified identity-based cryptography for signcryption and private key extraction using fuzzy model
Abstract

The technological breakthroughs of Internet of thing (IoT) applications in various sectors are nowadays contributing to the development of smart mobile IoT (SM-IoT). Lack of authentication and encryption schemes make SM-IoT more susceptible to ...

research-article
A new intrusion detection system based on SVM–GWO algorithms for Internet of Things
Abstract

Internet of Things (IoT) as an emerging technology is widely used in various applications such as remote healthcare, smart environment, and intelligent transportation systems. It is necessary to address users’ concerns about cost, ease of use, ...

research-article
Multi-cluster MIMO non-orthogonal multiple access for multi-cell systems
Abstract

In this paper, we present a multi-cluster multiple-input multiple-output non-orthogonal multiple access technique to improve spectral efficiency by simultaneously transmitting multiple data streams to multiple clusters in multi-cell systems. This ...

research-article
Enhanced passive optical network system-based VCSEL and PSK electrical modulator for 5th generation
Abstract

The rapid evolution of passive optical network (PON) technologies has been driven by the necessity to accommodate 5th-generation system requirements. This research introduces a PON wavelength division multiplexing-based optical transmitter that is ...

research-article
Energy efficient optimal parent selection with Chameleon Swarm algorithm and non-overlapping backoff algorithm based dynamic slot allocation in wireless body area network
Abstract

Wireless body area networks (WBANs) become prevalent in the realm of medical and non-medical fields with the development of networking, information, and communication technologies. Applications for real-time patient monitoring rapidly create the ...

research-article
High priority space protection (HPP): countdown space-based MAC protocol with enhanced lockdown effect
Abstract

The countdown mechanism is a powerful concept for creating distributed wireless contention protocols and is the key component of the standard IEEE 802.11 Distributed Coordination Function (DCF). This paper defines and analyzes the countdown ...

research-article
Outage analysis of downlink communications in heterogeneous networks under backhaul constraint
Abstract

Employing multi-layer networks represents a promising approach to address the increasing demand for high data rates and efficient congestion control in cellular communication networks. This study focuses on the downlink performance of a two-tier ...

research-article
An adaptive model of optimal traffic flow prediction using adaptive wildfire optimization and spatial pattern super learning
Abstract

Real-time traffic prediction uses past data to anticipate traffic volume. The volume of traffic in the region may be estimated using interpolation and extrapolation from library data by the trend structure. It is based on a prediction model with a ...

research-article
Multi-agent based optimal UAV deployment for throughput maximization in 5 G communications
Abstract

Unmanned aerial vehicle (UAV)-mounted base station is an emerging technology to provide controlled wireless communication for ground users. The high mobility of the UAV adds additional degrees of freedom for optimal deployment, which can ...

research-article
An energy efficient routing algorithm in wireless underground sensor networks
Abstract

There have been various researches regarding routing in wireless sensor networks for many years, but underground wireless communication in complex environments like soil-air or water-air is a new and tough problem for researchers. Replacement of ...

research-article
Employing blockchain and IPFS in WSNs for malicious node detection and efficient data storage
Abstract

The presence of the malicious internet of things (IoT) devices in wireless sensor networks (WSNs), in the underlying work, is identified using a private blockchain and interplanetary file system (IPFS) based system. In the proposed model, the ...

research-article
Modeling of a high gain two stage pHEMT LNA using ANN with Bayesian regularization algorithm
Abstract

This paper presents novel way to achieve fast and accurate Artificial Neural Network (ANN) modeling of Radio Frequency (RF) front end Low Noise Amplifier (LNA). Multilayer perceptron neural network is implemented to model high gain, ultra-low ...

research-article
Asymmetric CPW-fed patch antenna with slits at terahertz applications for 6G wireless communications
Abstract

This paper presents a compact portable patch antenna for 6G wireless communications at terahertz (THz) applications. The asymmetric co-planer waveguide (CPW) fed curved slits are proposed on rectangular microstrip patch antenna to resonate at THz ...

research-article
An improved path loss model for 5G wireless networks in an enclosed hallway
Abstract

Given the disparity in signal transmission properties for both current bandwidths and millimeter wave radio frequencies, the present propagation models used for low frequency range up to few gigahertz are not suitable to be utilized for the path ...

research-article
Optimizing resource allocation for D2D communications with incomplete CSI
Abstract

Device-to-device (D2D) communication is a new technology in cellular networks which enables direct communications between nearby devices. It could reuse the uplink spectrum of the cellular users (CUs) thus will introduce interference. Efficient ...

research-article
Performance evaluation of multiple relay SWIPT enabled cooperative NOMA network in the presence of interference
Abstract

Simultaneous wireless information and power transmission (SWIPT) allows the use of RF signals for both information detection and energy harvesting. Integration of cooperation, NOMA and SWIPT can provide energy-efficient, reliable, and spectral-...

research-article
Link failure handling and controller memory overhead elimination in SDN through source path routing model technique
Abstract

With the basic principle of separating control and data planes, software defined networking (SDN) has emerged as a promising paradigm. The separation generates a variety of scaling concerns (e.g., higher reaction time, overhead on the controller). ...

research-article
A weighted cooperative spectrum sensing strategy for NGSO–GSO downlink communication
Abstract

In this paper, aiming at the spectrum coexistence scenario between non-geostationary satellite orbit (NGSO) and geostationary satellite orbit (GSO) satellite systems, the NGSO network, a secondary system, reuses the spectrum resources of the GSO ...

research-article
Heterogeneous Lifi–Wifi with multipath transmission protocol for effective access point selection and load balancing
Abstract

In recent days, the emerging ideas of hybridized network are used, which isbased on light fidelity (LiFi) and wireless fidelity (WiFi). The merging concept of LiFi and WiFirequires huge coverage area and reduce traffic overload. The classical Load ...

research-article
Block chain espoused adaptive multi-scale dual attention network with quaternion fractional order meixner moments encryption for cyber security in wireless communication network
Abstract

Autonomous driving like subsequent generation cyber-physical system (CPS) with present improvement of wireless communication network, here is a substantial necessity of big data analyzes along greater accurateness and lower delay. Nevertheless, ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.