default search action
IET Communications, Volume 18
Volume 18, Number 1, January 2024
ORIGINAL RESEARCH
- Cong Xie, Mohammed El-Hajjar, Soon Xin Ng:
Machine learning assisted adaptive LDPC coded system design and analysis. 1-10 - Mohammed S. Elbasheir, Rashid A. Saeed, Salaheldin Edam:
Electromagnetic field exposure boundary analysis at the near field for multi-technology cellular base station site. 11-27 - Qiang Zhang, Hao Yu:
Monte Carlo-based service migration under multiple constraints in mobile edge computing. 28-39 - Ruisi Wu, Wen-Kang Jia:
CSVRF: A CAM-based popularity-aware egress group-caching scheme for SVRF-based packet forward engines. 40-54 - Zhijun Teng, Sian Zhu, Mingzhe Li, Libo Yu, Jinliang Gu, Liwen Guo:
Wireless sensor network security defense strategy based on Bayesian reputation evaluation model. 55-62 - Xiangqun Lu, Hongzhi Zheng, Yaqiong Liu, Hongxing Li, Qingyun Zhou, Tao Li, Hongguang Yang:
Segmentation-enhanced gamma spectrum denoising based on deep learning. 63-80 - Ling Tan, Lei Sun, Boyuan Cao, Jingming Xia, Hai Xu:
Research on weighted energy consumption and delay optimization algorithm based on dual-queue model. 81-95 - Rui Wang, Min Shen, Yun He, Xiangyan Liu:
Joint AP-user association and caching strategy for delivery delay minimization in cell-free massive MIMO systems. 96-109
Volume 18, Number 2, January 2024
ORIGINAL RESEARCH
- Hongrui Nie, Yue Su, Weibo Zhao, Junsheng Mu:
Hybrid traffic scheduling in time-sensitive networking for the support of automotive applications. 111-128 - Yu Hua, Yaru Fu, Qi Zhu:
On the design of cost minimization for D2D-enabled wireless caching networks: A joint recommendation, caching, and routing perspective. 129-144 - Chunzhi Wang, Keguan Wang, Min Li, Feifei Wei, Neal Naixue Xiong:
Chunk2vec: A novel resemblance detection scheme based on Sentence-BERT for post-deduplication delta compression in network transmission. 145-159 - Yaozong Fan, Yu Ma, Peng Pan, Can Yang:
Bat algorithm based semi-distributed resource allocation in ultra-dense networks. 160-175 - Kan Feng, Changliang Yang, Wenqiang Zhu, Kun Li, Ya Chen:
PageRank talent mining algorithm of power system based on cognitive load and DPCNN. 176-186
LETTER
- Esmot Ara Tuli, Rubina Akter, Jae Min Lee, Dong-Seong Kim:
Whale optimization-based PTS scheme for PAPR reduction in UFMC systems. 187-195
Volume 18, Number 3, February 2024
ORIGINAL RESEARCH
- Kusala Kalani Munasinghe, Nishan Dharmaweera, Chamitha de Alwis, Uditha L. Wijewardhana, Rajendran Parthiban:
Impairment-aware resource allocation scheme for elastic optical networks with different service priorities. 197-213 - Yifan Du, Nan Qi, Kewei Wang, Ming Xiao, Wenjing Wang:
Intelligent reflecting surface-assisted UAV inspection system based on transfer learning. 214-224 - Peter O. Akuon:
Error analysis for face coded modulation system. 225-234 - Yuebo Li, Wenjiang Ouyang, Jiawu Miao, Junsheng Mu, Xiaojun Jing:
Joint optimization of sampling point and sensing threshold for spectrum sensing. 235-247 - Mohammad Bayat, Mohammad Mostafavi, Abazar Arabameri:
Towards practical implementation of molecular communication: A cost-effective experimental platform based on the human circulatory system. 248-257 - Aboulfazl Dayyani, Maghsoud Abbaspour:
SybilPSIoT: Preventing Sybil attacks in signed social internet of things based on web of trust and smart contract. 258-269
Volume 18, Number 4, March 2024
ORIGINAL RESEARCH
- Xianghui Xiao, Longsheng Huang, Zhenshan Zhang, Mingxian Huang, Luchang Guan, Yunhao Song:
Data transmission path planning method for wireless sensor network in grounding grid area based on MM-DPS hybrid algorithm. 271-282 - Jing Zhang, Chu-Long Liang, Hong-Xu Gao, He Yan, Hong-Bo Zhu:
On multiple handoff blocking-then-reaccess for opportunistic spectrum access. 283-296 - Ezekia Gilliard, Jinshuo Liu, Ahmed Abubakar Aliyu:
Knowledge graph reasoning for cyber attack detection. 297-308 - Junyu Lin, Libo Feng, Jinli Wang, Fei Qiu, Bei Yu, Jing Cheng, Shaowen Yao:
FGDB-MLPP: A fine-grained data-sharing scheme with blockchain based on multi-level privacy protection. 309-321 - Fengming Yang, Weiran Guo, Jianxin Dai:
Robust beamforming design for passive RIS-assisted NOMA systems. 322-331
Volume 18, Number 5, March 2024
ORIGINAL RESEARCH
- Wanwei Huang, Haobin Tian, Xiaohui Zhang, Min Huang, Song Li, Yuhua Li:
An improved resource allocation method for mapping service function chains based on A3C. 333-343 - Zixiao Yu, Honghong Wang, Kim Un:
Automatic cinematography for body movement involved virtual communication. 344-352 - Ahlem Arfaoui, Maha Cherif, Ridha Bouallegue:
Analysis one-bit DAC for MU massive MIMO downlink via efficient autoencoder based deep learning. 353-364 - Qingqing Tu, Zheng Dong, Xianbing Zou, Ning Wei, Ya Li, Fei Xu:
Dynamic reconfigurable intelligent surface deployment for physical layer security enhancement in mmWave systems. 365-374
Volume 18, Number 6, April 2024
ORIGINAL RESEARCH
- Xin Ma, Kai Yang, Chuanzhen Zhang, Hualing Li, Xin Zheng:
Physical adversarial attack in artificial intelligence of things. 375-385 - Renjie Liao, Shuo Wang:
Malicious domain detection based on semi-supervised learning and parameter optimization. 386-397 - Jianli Xie, Lin Li, Cuiran Li:
A joint resource optimization allocation algorithm for NOMA-D2D communication. 398-408 - Xiaoxuan Wang, Hengyuan Jiao, Qinghe Gao, Yue Wu, Tao Jing, Jin Qian:
Trajectory optimization for maximization of energy efficiency with dynamic cluster and wireless power for UAV-assisted maritime communication. 409-420 - Jiacheng Sui, Yi Li, Hai Huang:
Improved reputation evaluation for reliable federated learning on blockchain. 421-428
Volume 18, Number 7, April 2024
ORIGINAL RESEARCH
- Yidong Jia, Fuhong Lin, Yan Sun:
A novel federated learning aggregation algorithm for AIoT intrusion detection. 429-436 - Qian Bi, Huadong Sun, Cheng Qian, Ke Zhang:
An improved seeds scheme in K-means clustering algorithm for the UAVs control system application. 437-449 - Chao Ren, Gaoxin Lyu, Xianmei Wang, Yao Huang, Wei Li, Lei Sun:
Two-step attribute reduction for AIoT networks. 450-460 - Song Han, Hui Ma, Amir Taherkordi, Dapeng Lan, Yange Chen:
Privacy-preserving data integration scheme in industrial robot system based on fog computing and edge computing. 461-476
Volume 18, Number 8, May 2024
ORIGINAL RESEARCH
- Feng Hu, Hongliu Zhang, ShuTing Chen, Libiao Jin, Jinhao Zhang, Yunfei Feng:
Asymptotic performance of reconfigurable intelligent surface assisted MIMO communication for large systems using random matrix theory. 477-489 - Dongpo Song, Peng Wei, Yongming Fu, Shilian Wang:
Construction of secure adaptive frequency hopping sequence sets based on AES algorithm. 490-502 - Youjun Zeng, Jie Zhou, Youjiang Liu, Tao Cao, Dalong Yang, Yu Liu, Xianhua Shi:
Distributed MA-IDDPG-OLSR based stable routing protocol for unmanned aerial vehicle ad-hoc network. 503-522 - Jie Yan, Bo Zhang, Shi Wang, Hao Lan, Xin Wang:
Burst traffic: Congestion management and performance optimization strategies in heterogeneous cognitive radio networks. 523-533
Volume 18, Number 9, June 2024
REVIEW
- Dengguo Feng, Yu Qin, Wei Feng, Wei Li, Ketong Shang, Hongzhan Ma:
Survey of research on confidential computing. 535-556
ORIGINAL RESEARCH
- Wei Gu, Hongyan Xing, Tianhao Hou:
An effective attention and residual network for malware detection. 557-568 - Abdulrahman Al Ayidh, Mohammed M. Alammar:
Energy efficient RF chains selection based on integrated Hungarian and genetic approaches for uplink cell-free millimetre-wave massive MIMO systems. 569-582 - Ghaffar Raeisi, Mohammad Gholami:
On a class of column-weight 3 decomposable LDPC codes with the analysis of elementary trapping sets. 583-596
Volume 18, Number 10, June 2024
ORIGINAL RESEARCH
- Yihang Du, Yu Zhang, Pengzhi Qian, Panfeng He, Wei Wang, Yifei Chen, Yong Chen:
A back-to-back coordination-based learning scheme for deceiving reactive jammers in distributed networks. 597-611 - Yangyi Zhang, Xinrong Guan, Qingqing Wu, Zhi Ji, Yueming Cai:
Resource allocation and passive beamforming for IRS-assisted short packet systems. 612-618 - Abdolrasoul Sakhaei Gharagezlou, Mahdi Nangir, Nima Imani:
Optimizing secure power allocation in massive MIMO systems with an eavesdropper under imperfect CSI conditions. 619-627 - Ozan Zorlu, Adnan Ozsoy:
A blockchain-based secure framework for data management. 628-653
Volume 18, Number 11, July 2024
Original Research
- Zeyu Yan, Weile Zhang, Fuqiang Li:
Doppler spread analysis for suppressing channel time variation in high-mobility massive MIMO V2V communications. 655-670 - Yunping Mu, Chaochao Yao, Dian Fan, Yongjun Xu, Gongpu Wang, Marjan Milosevic, Bo Ai:
Channel estimation for backscatter communication systems with retrodirective arrays. 671-678 - Arif Hossan, Jahidul Islam:
Secondary cluster head based SEP in heterogeneous WSNs for IoT applications. 679-688 - Chenyu Zhang, Huabing Wu:
A composite spread spectrum sequence for underwater acoustic signal acquisition. 689-700
Volume 18, Number 12, July 2024
Original Research
- Fang Liu, Yuanfang Zheng, Lizhi Chen, Yongxin Feng:
A chaotic time series combined prediction model for improving trend lagging. 701-712 - Minghui Jia, Xiaohu Huang, Fengjun Han, Dequan Yan, Wei Wang, Guochao Zhu, Lin Zhang, Chao Pan, Haifeng Ma, Jidong Wei:
Multi-view synergistic enhanced fault recording data for transmission line fault classification. 713-725 - Hongsheng Chen, Chunhui Wu:
Clustered DTN routing based on sensing node relationship strength. 726-743 - Changqing Ye, Hong Jiang, Chen-Ping Zeng, Haoxin Shi, Zhan-Peng Tang:
Sum-rate maximization for downlink multiuser MISO URLLC system aided by IRS with discrete phase shifters. 744-758
Volume 18, Number 13, August 2024
Original Research
- Mohammed Salah Abood, Hua Wang, Bal S. Virdee, Dongxuan He, Maha Fathy, Abdulganiyu Abdu Yusuf, Omar Jamal, Taha A. Elwi, Mohammad Alibakhshikenari, Lida Kouhalvandi, Ashfaq Ahmad:
Improved 5G network slicing for enhanced QoS against attack in SDN environment using deep learning. 759-777 - Mina Asgarian, Ghasem Mirjalily:
A comparative analysis of two-stage approaches for embedding network function virtualization enabled multicast services. 778-788 - Pooria Tabesh Mehr, Konstantinos Koufos, Karim E. I. Haloui, Mehrdad Dianati:
Low-complexity channel estimation for V2X systems using feed-forward neural networks. 789-798 - Weihao Sun, Hai Wang, Zhen Qin, Zichao Qin:
Joint optimization of deployment, user association, channel, and resource allocation for fairness-aware multi-UAV network. 799-816
Volume 18, Number 14, August 2024
Original Research
- Bo He, Hongji Xu, Wei Ji, Yan Du, Hailiang Xiong, Jun Li:
Reliable communication based on energy spreading transform and iterative detection in MIMO-OFDM systems. 817-826 - Fanghao Xu, Chao Wang, Jiakai Liang, Chenyang Zuo, Keqiang Yue, Wenjun Li:
A knowledge distillation strategy for enhancing the adversarial robustness of lightweight automatic modulation classification models. 827-845 - Nasser Zarbi, Ali Zaeembashi, Nasour Bagheri, Morteza Adeli:
Toward designing a lightweight RFID authentication protocol for constrained environments. 846-859 - Bingyi Xie, Honghui Xu, Daehee Seo, DongMyung Shin, Zhipeng Cai:
KDGAN: Knowledge distillation-based model copyright protection for secure and communication-efficient model publishing. 860-868
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.