default search action
International Journal of Communication Systems, Volume 31
Volume 31, Number 1, January 2018
- Maryam Borna, Mohammad Hossein Madani:
New methods for enhancing fine acquisition in dual folding algorithm of long pseudo noise codes. - M. Vanidevi, N. Selvaganesan:
Fast iterative WSVT algorithm in WNN minimization problem for multiuser massive MIMO channel estimation. - Ashraf S. Hasan Mahmoud, Ahmad Abo Naser, Marwan H. Abu-Amara, Tarek R. Sheltami, Nidal Nasser:
Software-defined networking approach for enhanced evolved packet core network. - Paulo Régis C. de Araújo, Raimir Holanda Filho, Joel J. P. C. Rodrigues, João Paolo C. M. Oliveira, Stephanie A. Braga:
Middleware for integration of legacy electrical equipment into smart grid infrastructure using wireless sensor networks. - Hung-Yu Chien:
An effective approach to solving large communication overhead issue and strengthening the securities of AKA protocols. - Seyyed Arash Azimi, Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, Mohammad Reza Aref:
Improved impossible differential and biclique cryptanalysis of HIGHT. - Arsalan Ahmad, Andrea Bianco, Hussein Chouman, Daniele DeTommas, Guido Marchetto, Sarosh Tahir, Vittorio Curri:
Merit of hybrid EDFA/Raman amplification in fixed-grid all-optical network exploiting multirate transponders. - Seyed Hossein Hosseini Nazhad, Mohammad Shojafar, Shahaboddin Shamshirband, Mauro Conti:
An efficient routing protocol for the QoS support of large-scale MANETs. - Xiaoying Jia, Neeraj Kumar, Kim-Kwang Raymond Choo, Debiao He:
Efficient revocable ID-based encryption with cloud revocation server. - Meizi Li, Yang Xiang, Bo Zhang, Fazhuan Wei, Qianqian Song:
A novel organizing scheme of single topic user group based on trust chain model in social network. - Simon Rommel, Elizaveta P. Grakhova, Antonio Jurado-Navas, Albert Kh. Sultanov, Juan Jose Vegas Olmos, Idelfonso Tafur Monroy:
Pulse shaping for high data rate ultra-wideband wireless transmission under the Russian spectral emission mask. - Praveen Kumar Singya, Nagendra Kumar, Vimal Bhatia:
Performance analysis of AF OFDM system using multiple relay in presence of nonlinear-PA over inid Nakagami-m fading. - Yun-Shuai Yu, Chih-Heng Ke:
Genetic algorithm-based routing method for enhanced video delivery over software defined networks. - Hadjer Saadi, Rachida Touhami, Mustapha C. E. Yagoub:
TDMA-SDMA-based RFID algorithm for fast detection and efficient collision avoidance. - Nan Zhang, Xiaolong Yang, Min Zhang, Yan Sun, Keping Long:
A genetic algorithm-based task scheduling for cloud resource crowd-funding model. - Kyle Govindasamy, Hongjun Xu, Narushan Pillay:
Space-time block coded spatial modulation with labeling diversity. - Walid El Shafai, S. El-Rabaie, Mohamed M. E. El-Halawany, Fathi E. Abd El-Samie:
Performance evaluation of enhanced error correction algorithms for efficient wireless 3D video communication systems. - Behnam Aghazadeh, Mohammad Torabi:
Performance analysis of multiuser selection diversity in SIMO spectrum sharing systems. - Lin Li, Yanheng Liu, Jian Wang, Tao Wu, Peng Zhou:
Partially observed cross-layer optimization for vehicular communications. - Reza Ghasemi, Ali Safi, Massoud Hadian Dehkordi:
Efficient multisecret sharing scheme using new proposed computational security model. - Himanshu Khanna, Mona Aggarwal, Swaran Ahuja:
Performance analysis of a variable-gain amplify-and-forward relayed mixed RF-FSO system. - Yue-Shan Chang, Chih-Tien Fan, Ruey-Kai Sheu, Syuan-Ru Jhu, Shyan-Ming Yuan:
An agent-based workflow scheduling mechanism with deadline constraint on hybrid cloud environment. - Selasi Kwame Ocansey, Wolali Ametepe, Xiao Wei Li, Changda Wang:
Dynamic searchable encryption with privacy protection for cloud computing. - Do-hyung Kim, Ikjun Yeom, Tae-Jin Lee:
Mitigating tail latency in IEEE 802.11-based networks. - Yung-Tsung Weng, Chi-Huang Shih, Yeh-Kai Chou:
Sliding-window forward error correction using Reed-Solomon code and unequal error protection for real-time streaming video. - Ahmed Al-Baz, Ayman El-Sayed:
A new algorithm for cluster head selection in LEACH protocol for wireless sensor networks. - Houshou Chen, Hsin-Ying Liang, Hung-Chi Chu, Chuan-Bi Lin:
Improving the peak-to-average power ratio of the single-carrier frequency-division multiple access system through the integration of tone injection and tone reservation techniques. - Amanjot Kaur Lamba, Ravi Kumar, Sanjay Sharma:
A coalitional game-based integrated framework for optimal power allocation in multirelay cooperative environment. - Hai Dao Thanh, Michel Morvan, Philippe Gravey:
An efficient network-side path protection scheme in OFDM-based elastic optical networks. - Mohammed W. Baidas, Masoud M. Afghah, Fatemeh Afghah:
Distributed simultaneous wireless information and power transfer in multiuser amplify-and-forward ad hoc wireless networks. - Deepak Rewadkar, Dharmapal Dronacharya Doye:
FGWSO-TAR: Fractional glowworm swarm optimization for traffic aware routing in urban VANET. - Ali Mohammad Saleh, Nadira Parveen, Md. Forkan Uddin:
Optimal scheduling of coordinated multipoint transmissions in cellular networks. - Fatima Mourchid, Abdellatif Kobbane, Jalel Ben-Othman, Mohammed El Koutbi:
CGAM: A community and geography aware mobility model. - Osama S. Younes:
Modeling and performance analysis of a new secure address resolution protocol. - Alberto Carreras Mesa, Mari Carmen Aguayo Torres, Francisco Javier Martin-Vega, Gerardo Gómez, Francisco Blanquez-Casado, Isabel M. Delgado-Luque, José T. Entrambasaguas:
Link abstraction models for multicarrier systems: A logistic regression approach. - Imran Memon, Ling Chen, Qasim Ali Arain, Hina Memon, Gencai Chen:
Pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks.
Volume 31, Number 2, January 2018
- Nastooh Taheri Javan, Masoud Sabaei, Mehdi Dehghan:
To-send-or-not-to-send: An optimal stopping approach to network coding in multi-hop wireless networks. - J. Athena, V. Sumathy, K. Kumar:
An identity attribute-based encryption using elliptic curve digital signature for patient health record maintenance. - Kunwar Pal, Mahesh Chandra Govil, Mushtaq Ahmed:
Slack time-based scheduling scheme for live video streaming in P2P network. - Abdul Rauf Khan, Preetam Kumar:
BER analysis and interference mitigation for GO-OFDMA transmission. - Bhoopendra Kumar, Sanjay Kumar Dhurandher, Isaac Woungang:
A survey of overlay and underlay paradigms in cognitive radio networks. - K. M. Mridula, P. M. Ameer:
Localization under anchor node uncertainty for underwater acoustic sensor networks. - Pang-Wei Tsai, Chu-Sing Yang:
Testbed@TWISC: A network security experiment platform. - Deepika Agrawal, Sudhakar Pandey:
FUCA: Fuzzy-based unequal clustering algorithm to prolong the lifetime of wireless sensor networks. - Meng Yue, Liang Liu, Zhijun Wu, Minxiao Wang:
Identifying LDoS attack traffic based on wavelet energy spectrum and combined neural network. - Subhabrata Banerjee, Sudipta Chattopadhyay:
Evaluation of system performance by adding a fourth dimension to turbo code. - Yuta Ida, Takahiro Matsumoto, Shinya Matsufuji:
Packet splitting and adaptive modulation based on CSI of time domain for decode-and-forward cooperative OFDM systems in different channel model. - Sadiq Ghalib, Rajesh Mishra, Anurag Singh Baghel, Sandeep Sharma:
Routing protocol development for quality of service optimization of video-on-demand system over mobile ad hoc networks. - Li Liu, Shuo Yu, Xiang Wei, Zhaolong Ning:
An improved Apriori-based algorithm for friends recommendation in microblog. - Mehmet Ali Ertürk, Luca Vollero, Muhammed Ali Aydin:
Optimal joint load balancing and EDCA configuration of IEEE 802.11 wireless hotspots. - Weifeng Lu, Siguang Chen, Lijun Yang:
Performance analysis of load balancing in OFDMA cellular networks with inter-cell relay. - Prosanta Gope, SK Hafizul Islam, Mohammad S. Obaidat, Ruhul Amin, Pandi Vijayakumar:
Anonymous and expeditious mobile user authentication scheme for GLOMONET environments.
Volume 31, Number 3, February 2018
- Li Li, Zhaorong Zhou, Yanjun Hu, Tao Jiang, Menghan Wei:
Pricing framework for almost blank subframe scheme in two-tier heterogeneous networks. - Hossein Morshedlou, Mohammad Reza Meybodi:
A new learning automata based approach for increasing utility of service providers. - Muhammad Tahir, Piao Yan, Liu Shuo:
Channel characterization of EM waves propagation at MHz frequency through seawater. - An Li, Yizhu Xu, Yuhao Wang, Lihua Sun:
Artificial noise-aided secure communication in a bidirectional relaying network. - Ambrish Kumar, Parul Garg:
Physical layer security for dual-hop FSO/RF system using generalized ΓΓ/η-μ fading channels. - Harmandar Kaur, Mamta Khosla, Rakesh Kumar Sarin:
Hybrid channel estimation for MIMO relay systems with Doppler offset influences. - Takeshi Takahashi, Bhola Panta, Youki Kadobayashi, Koji Nakao:
Web of cybersecurity: Linking, locating, and discovering structured cybersecurity information. - Luis Rizo Domínguez, David Muñoz Rodríguez, César Vargas Rosales, Julio Cesar Ramírez Pacheco, Rafaela Villalpando Hernandez, Francisco Mendieta-Jimenez:
Internet delay forecasting for correlated and uncorrelated scenarios. - Daya Sagar Gupta, G. P. Biswas:
A novel and efficient lattice-based authenticated key exchange protocol in C-K model. - Adrián Sauco-Gallardo, Unai Fernández-Plazaola, Luis Díez:
On the mobile-to-mobile linear time-variant shallow-water acoustic channel response. - Rizwan Aslam Butt, Sevia Mahdaliza Idrus, Nadiatulhuda Zulkifli, Muhammad Waqar Ashraf:
Comprehensive bandwidth utilization and polling mechanism for XGPON. - Younes Hatri, Ayoub Otmani, Kenza Guenda:
Cryptanalysis of an identity-based authenticated key exchange protocol.
Volume 31, Number 4, March 2018
- Walid El Shafai, S. El-Rabaie, Mohamed M. E. El-Halawany, Fathi E. Abd El-Samie:
Efficient hybrid watermarking schemes for robust and secure 3D-MVC communication. - Tara Nath Subedi, Kim Khoa Nguyen, Mohamed Cheriet:
SDN-based fault-tolerant on-demand and in-advance bandwidth reservation in data center interconnects. - Md. Fazlul Kader, Soo Young Shin:
Performance analysis of cooperative spectrum sharing using non-orthogonal multiple access. - Rajesh Purkait, Sachin Tripathi:
Network condition and application-based data adaptive intelligent message routing in vehicular network. - Rifaqat Ali, Arup Kumar Pal:
An efficient three factor-based authentication scheme in multiserver environment using ECC. - Nitin Goyal, Mayank Dave, Anil Kumar Verma:
A novel fault detection and recovery technique for cluster-based underwater wireless sensor networks. - Anshuman Chhabra, Vidushi Vashishth, Deepak Kumar Sharma:
A fuzzy logic and game theory based adaptive approach for securing opportunistic networks against black hole attacks. - Hovhannes A. Harutyunyan, Meghrig Terzian:
Directional core selection approach and dynamic tree reorganization for delay and delay variation multicast routing. - Ali Asghar Rahmanian, Abbas Horri, Gholamhossein Dastghaibyfard:
Toward a hierarchical and architecture-based virtual machine allocation in cloud data centers. - Anum Ali, Ghalib Asadullah Shah, Muhammad Aslam:
Model for autonomous agents in machine-to-machine navigation networks.
Volume 31, Number 5, March 2018
- You-Chiun Wang, Shih Lee:
Small-cell planning in LTE HetNet to improve energy efficiency. - Jiajun Sun, Ningzhong Liu:
Frugal incentive mechanism in periodic mobile crowdsensing. - Deepnarayan Tiwari, G. R. Gangadharan:
SecCloudSharing: Secure data sharing in public cloud using ciphertext-policy attribute-based proxy re-encryption with revocation. - Muhammed Enes Bayrakdar, Ali Çalhan:
Artificial bee colony-based spectrum handoff algorithm in wireless cognitive radio networks. - Akinlabi Akindeji, Meera K. Joseph:
Optimal deployment of femtocells using cost function. - Chuanhuang Li, Yan Wu, Xiaoyong Yuan, Zhengjun Sun, Weiming Wang, Xiaolin Li, Liang Gong:
Detection and defense of DDoS attack-based on deep learning in OpenFlow-based SDN. - Mininath K. Nighot, Ashok Ghatol, Vilas M. Thakare:
Distributed Energy Efficient Tracking in Hybrid wireless sensor network (DEETH). - Belkacem Benadda, Bilal Beldjilali, Abdelkrim Mankouri, Omar Taleb:
Secure IoT solution for wearable health care applications, case study Electric Imp development platform. - Richelle V. Adams, Arvind Singh:
Analytical models for communication links in emergency management simulation. - Monika Bharti, Rajesh Kumar, Sharad Saxena:
Clustering-based resource discovery on Internet-of-Things. - Xiangbin Yu, Hao Wang, Benben Wen, Tao Li:
Low-complexity energy efficient power allocation scheme for DAS with maximum power constraint. - Jaspreet Singh, Chandra Shekhar Rai:
An efficient load balancing method for ad hoc networks. - Jaime Galán-Jiménez:
Exploiting the control power of SDN during the transition from IP to SDN networks. - Xiaoyu Zhang, Zhijun Wu, Junwei Zhang, Jiusheng Chen:
An adaptive network traffic prediction approach for LDoS attacks detection. - Mehmet Bilim, Nuri Kapucu, Ibrahim Develi:
Application of best relay selection approach to cooperative DF IDMA systems over Rayleigh/Weibull fading channels. - Dariush Abbasinezhad-Mood, Morteza Nikooghadam:
Design and extensive hardware performance analysis of an efficient pairwise key generation scheme for Smart Grid.
Volume 31, Number 6, April 2018
- Martin Wiegand, Saralees Nadarajah:
A series representation for multidimensional Rayleigh distributions. - Parul Puri, Parul Garg:
Sum rate-based relay selection strategy in FSO systems. - Kuldeep Yadav, Sanjay Dhar Roy, Sumit Kundu:
Throughput of cognitive radio networks with improved energy detector under security threats. - Chun-Peng Liu, Chen-Guang He, Wei-Xiao Meng:
Analysis of D2D-pairing scheme based on Voronoi diagram in cellular networks. - Priyanka Rahi, Sanjay Sharma:
Bandwidth allocation and distributed relay selection for multiple-user and multiple-relay cooperative systems using Stackelberg game. - Mohammad Towliat, Seyyed Mohammad Javad Asgari Tabatabaee:
On the time-frequency symbol density of FBMC/QAM systems. - Kuldeep Singh, Anil Kumar Verma:
A fuzzy-based trust model for flying ad hoc networks (FANETs). - Vasantha Sandhya Venu, Damodaram Avula:
Invincible AODV to detect black hole and gray hole attacks in mobile ad hoc networks. - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref:
A provably secure code-based short signature scheme and its nontransferable variant. - Neeraj Garg, Sanjay K. Dhurandher, Petros Nicopolitidis, J. S. Lather:
Efficient mobility prediction scheme for pervasive networks. - Bojan Bakmaz, Zoran S. Bojkovic, Miodrag Bakmaz:
Queuing loss models with more alternative heterogeneous groups. - Dan Li, Julong Lan, Peng Wang:
Joint service function chain deploying and path selection for bandwidth saving and VNF reuse. - Montajab Ghanem, Masoud Sabaei, Mehdi Dehghan:
A novel model for implicit cooperation between primary users and secondary users in cognitive radio-cooperative communication systems. - C. Pavan Kumar, R. Selvakumar:
A novel reliable and secure communication scheme for cognitive radio networks using concatenated kernel codes. - Weiwei Ding, Jin Wang, Xiumin Wang, Kejie Lu, Ruimin Zhao, Yanqin Zhu:
On the optimal flow allocation and information theoretically secure network coding design for multiple multicasts. - Rabia Qadar, Mumraiz Khan Kasi, Sara Ayub, Faisal A. Kakar:
Monte Carlo-based channel estimation and performance evaluation for UWOC links under geometric losses.
Volume 31, Number 7, 10 2018
Editorial
- Kezhi Wang, Qun Jin, Hamid Sharif:
Special issue on communication and computation cooperation (3C): Principles, algorithms and systems.
- Henry Nunoo-Mensah, Kwame Osei Boateng, James D. Gadze:
The adoption of socio- and bio-inspired algorithms for trust models in wireless sensor networks: A survey. - Odilson T. Valle, Gerson F. Budke, Carlos Montez, Ricardo de Moraes, Francisco Vasques:
Experimental assessment of LNC-based cooperative communication schemes using commercial off-the-shelf wireless sensor network nodes. - Zhibin Xie, Qin Shen, Ying Hu, Yinjie Su, Yajun Wang:
The computation and analysis of energy-efficient multirelay and multihop communication scheme in wireless sensor networks. - Aanchal Khatri, Sushil Kumar, Omprakash Kaiwartya, Nauman Aslam, Neeru Meena, Abdul Hanan Abdullah:
Towards green computing in wireless sensor networks: Controlled mobility-aided balanced tree approach. - Tong Wang, Yunfeng Wang, Bingyi Liu, Xibo Wang, Jianfeng Zhang, Azhar Hussain, Peng Wang, Yue Cao:
A novel cross-layer communication protocol for vehicular sensor networks. - Changsheng Wan, Juan Zhang, Daoli Huang:
ACMHS: Efficient access control for mobile health care system. - Xiang Wang, Supeng Leng, Shumao Ou, Quanxin Zhao, Guanhua Qiao:
Energy harvesting and computing enabled data broadcasting in mobile social networks. - Jiangtao Ma, Yaqiong Qiao, Guangwu Hu, Tong Li, Yongzhong Huang, Yanjun Wang, Chaoqin Zhang:
Social account linking via weighted bipartite graph matching. - Peng Liu, Gaochao Xu, Kun Yang, Jiaqi Ge, Zhejun Kuang:
Joint routing and mobile VM selection algorithm in multihop C-RAN networks. - Yuchao Zhang, Ke Xu, Xuelin Shi, Haiyang Wang, Jiangchuan Liu, Yong Wang:
Design, modeling, and analysis of online combinatorial double auction for mobile cloud computing markets. - Jing'an Xue, Jilong Wang, Shengchao Liu, Xiulin Ma, Haibo Wang:
Dissecting persistent instability of web service: A joint perspective of server schedule dynamics and path latency. - Feng Tian, Yue Yu, Tingting Zhao, Dapeng Li, Xuejun Zhang, Zhen Yang:
Energy-efficient power allocation for multi-user MIMO systems with GZI precoding. - Jianxin Dai, Jun Wang, Chonghu Cheng, Zhiliang Huang:
Linear precoding based on nonlinear high-power amplifier in massive MIMO. - Zebiao Shan, Xiaosong Liu, Chunyang Wang, Hongwei Shi, Yaowu Shi:
Joint DOA and Doppler frequency estimation of coherent and/or same-direction signals. - Jie Yang, Ruijie Zhao, Rongfang Song, Jian Xiong, Yan Liang, Wang Luo, Li Xu, Guan Gui:
Variable kernel-based computing algorithms for estimating sparse multipath channels. - Freeha Azmat, Yulin Zhou, Yunfei Chen:
New cooperative strategy for cognitive radios with wireless powered primary users.
Volume 31, Number 8, 25 2018
- Anil Kumar Sutrala, Ashok Kumar Das, Neeraj Kumar, Goutham Reddy Alavalapati, Athanasios V. Vasilakos, Joel J. P. C. Rodrigues:
On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC. - Dong Doan Van, Qingsong Ai:
An efficient in-network caching decision algorithm for Internet of things. - Fatma H. El-Fouly, Rabie A. Ramadan, Mohamed Ibrahim Mahmoud, Moawad I. Dessouky:
Efficient REBTA data reporting algorithm for object tracking in wireless sensor networks. - Sandip Karar, Abhirup Das Barman:
Proactive caching with content-based pricing for cooperative femtocells in two-tier heterogeneous networks. - Mahmud Rasih Çelenlioglu, Mehmet Fatih Tüysüz, Haci Ali Mantar:
An SDN-based scalable routing and resource management model for service provider networks. - Xu Lu, Rongjun Chen, Jun Liu, Lianglun Cheng:
Square partition-based node scheduling algorithm for wireless passive sensor networks. - Sunil Kumar Gautam, Hari Om:
Intrusion detection in RFID system using computational intelligence approach for underground mines. - Kashif Naseer Qureshi, Abdul Hanan Abdullah, Faisal Bashir, Saleem Iqbal, Khalid M. Awan:
Cluster-based data dissemination, cluster head formation under sparse, and dense traffic conditions for vehicular ad hoc networks. - Saeid Akhavan Bitaghsir, Ahmad Khonsari:
Cooperative caching for content dissemination in vehicular networks. - Salma Oudji, Stanis Courrèges, Jean-Noël Paillard, Vahid Meghdadi, Pierre Michel:
Radio interference challenges in a multiprotocol compact RF hardware platform for home and building automation applications. - Saad M. Darwish, Amr G. El-Shnawy:
An intelligent database proactive cache replacement policy for mobile communication system based on genetic programming. - Mostafa Ghobaei-Arani, Ali Asghar Rahmanian, Mahboubeh Shamsi, Abdolreza Rasouli Kenari:
A learning-based approach for virtual machine placement in cloud data centers. - Divya Inbaraj, Muthumeenakshi Kailasam, Radha Sankararajan:
Statistical analysis on ambient RF energy harvesting for low-power wireless applications. - J. Venkata Krishna, G. Apparao Naidu, Niraj Upadhayaya:
A Lion-Whale optimization-based migration of virtual machines for data centers in cloud computing. - Preeti Chandrakar, Hari Om:
An extended ECC-based anonymity-preserving 3-factor remote authentication scheme usable in TMIS. - Seyyed Hossein Seyyedi, Behrouz Minaei-Bidgoli:
Estimator learning automata for feature subset selection in high-dimensional spaces, case study: Email spam detection.
Volume 31, Number 9, June 2018
- Pengpeng Wu, Lin Yao, Chi Lin, Guowei Wu, Mohammad S. Obaidat:
FMD: A DoS mitigation scheme based on flow migration in software-defined networking. - Fei Wu, Wanzhi Ma, Donglin Liu:
Multicast beamforming with LOS self-interference cancellation in full-duplex wireless communications. - Hong Peng, Changran Su, Yu Zhang:
Successive relaying for large MIMO amplify-and-forward relay networks. - Saeed Mehrjoo, Farshad Khunjush:
Distributed semi-adaptive compressive sensing data collection in wireless sensor networks. - Ahmed Ahmim, Makhlouf Derdour, Mohamed Amine Ferrag:
An intrusion detection system based on combining probability predictions of a tree of classifiers. - Laicheng Cao, Yafei Wang, Xiaoye Dong, Yufei Liu, Yangyang Zhang, Xian Guo, Tao Feng:
Multiuser access control searchable privacy-preserving scheme in cloud storage. - Binod Prasad, Sanjay Dhar Roy, Sumit Kundu:
Performance of cognitive relay network with energy harvesting relay under imperfect CSI. - Jafar Boostanpour, Ghosheh Abed Hodtani:
An achievable rate region and a capacity outer bound for 3-user Gaussian multiple access channel with feedback. - Miran Taha, Jaime Lloret, Aree Ali, Laura García:
Adaptive video streaming testbed design for performance study and assessment of QoE. - Hung-Yi Chang, Pi-Chung Wang:
Upgrading service availability of optical networks: A labor force perspective.
Volume 31, Number 10, 10 2018
- Saeed Banaeian Far, Mahdi R. Alagheband:
Provable analysis and improvement of smart card-based anonymous authentication protocols. - Xin Zhao, Lin Yao, Guowei Wu:
ESLD: An efficient and secure link discovery scheme for software-defined networking. - Thathan Sureshkumar, Mani Lingaraj, Bojan Anand, Thathan Premkumar:
Non-dominated sorting particle swarm optimization (NSPSO) and network security policy enforcement for Policy Space Analysis. - Md. Sakhawat Hossen, Md Yeakub Hassan, Faisal Hussain, Salimur Choudhury, Muhammad Mahbub Alam:
Relax online resource allocation algorithms for D2D communication. - Minh-Tuan Thai, Ying-Dar Lin, Yuan-Cheng Lai:
Joint server and network optimization toward load-balanced service chaining. - Renato William R. de Souza, Leonardo R. Moreira, Joel J. P. C. Rodrigues, Rafael R. Moreira, Victor Hugo C. de Albuquerque:
Deploying wireless sensor networks-based smart grid for smart meters monitoring and control. - Somayeh Khosroazad, Ali Abedi, Naaser Neda:
Achieving maximum bit rate in a cognitive radio network with physical layer network coding. - Ali M. Allam:
Improving secret key generation for wireless communications in FDD mode. - Likun Wang, Lin Yao, Zichuan Xu, Guowei Wu, Mohammad S. Obaidat:
CFR: A cooperative link failure recovery scheme in software-defined networks. - Mingzhe Fang, Dandan Wang, Zhenqiang Mi, Mohammad S. Obaidat:
Web service discovery utilizing logical reasoning and semantic similarity. - Seyed Hossein Hosseini Nazhad Ghazani:
Modified Light Weight distributed QoS Algorithm for wide area ad hoc networks. - Walid El Shafai, S. El-Rabaie, Mohamed M. E. El-Halawany, Fathi E. Abd El-Samie:
Proposed dynamic error control techniques for QoS improvement of wireless 3D video transmission. - Addie Irawan, Mohd Falfazli Mat Jusof, Mohammad Fadhil Abas:
Label-QoS switching protocol for quality of service assurance in dynamic swarm robot local network. - Laicheng Cao, Jinbo Zhang, Xiaoye Dong, Chengzhe Xi, Yafei Wang, Yangyang Zhang, Xian Guo, Tao Feng:
A based on blinded CP-ABE searchable encryption cloud storage service scheme. - K. P. Vijayakumar, P. Ganeshkumar, M. Anandaraj, K. Selvaraj, P. Sivakumar:
Fuzzy logic-based jamming detection algorithm for cluster-based wireless sensor network. - Shuming Qiu, Guoai Xu, Yanhui Guo, Miao Zhang:
Cryptanalysis and improvement of 2 mutual authentication schemes for Session Initiation Protocol. - Suzan Shukry, Yasmine Fahmy:
Maximizing the lifetime of energy-constrained cooperative spectrum sensing sensor network. - Isha Pathak, Atul Tripathi, Deo Prakash Vidyarthi:
A model for virtual network embedding using Artificial Bee Colony. - Youness Arjoune, Naima Kaabouch, Hassan El Ghazi, Ahmed Tamtaoui:
A performance comparison of measurement matrices in compressive sensing. - Sohrab Khanmohammadi, Mohammad Samadi Gharajeh:
An intelligent and knowledge-based overlapping clustering protocol for wireless sensor networks. - S. Mohideen Badhusha, B. G. Geetha, Puniethaa Prabhu, R. Vasanthi:
Improved video streaming using MSVC and nonoverlapping zone routing multipath propagation over MANETs. - Selo Sulistyo, Sahirul Alam:
SINR and throughput improvement for VANET using fuzzy power control. - Mouna Gassara, Imen Elbouabidi, Faouzi Zarai, Mohammad S. Obaidat, Kuei-Fang Hsiao:
Deployment and validation of out of band IP traceback approach (OBTA) in wireless mesh network. - Dariush Abbasinezhad-Mood, Morteza Nikooghadam:
Efficient design and hardware implementation of a secure communication scheme for smart grid. - Xinyin Xiang, Xingwen Zhao:
Continuous leakage-resilient IBE in cloud computing. - Haitham Freag, Emad S. Hassan, Sami A. El-Dolil, Moawad I. Dessouky:
PAPR reduction for OFDM-based visible light communication systems using proposed hybrid technique. - Tarun Biswas, Rajat Bhardwaj, Anjan Kumar Ray, Pratyay Kuila:
A novel leader election algorithm based on resources for ring networks. - Christos Bouras, Nikolaos Kanakis, Vasileios Kokkinos, Nikolaos Papachristos, Demosthenes Vouyioukas:
MCS selection exploiting femtocell utilization in multicast transmissions. - Ankit Saxena, Ravi Sindal:
LTE channel throughput assessment and comparison under different terrain. - Bouchra Marzak, Soufiane El Moumni, Elhabib Benlahmar, Addi Ait-Mlouk, Mohamed Talea:
Stable routing protocol based on fuzzy logic system in vehicular ad hoc networks.
Volume 31, Number 11, 25 2018
- Waseem Sheikh:
A resource-tuned QoS multicast routing protocol. - Yi-Fan Tseng, Chun-I Fan, Yan-Fu Cho:
An authenticated re-encryption scheme for secure file transfer in named data networks. - Melike Yigit, Huseyin Ugur Yildiz, Sinan Kurt, Bülent Tavli, Vehbi C. Gungor:
A survey on packet size optimization for terrestrial, underwater, underground, and body area sensor networks. - Francesco Chiti, Romano Fantacci, Andrea Tani:
Efficient network coding techniques for time constrained multicast narrowband power line communications. - Weifan Zhang, Dong Zhang, Danhong Zhu:
Increased network routing efficiency through coordinated Fibbing. - Sungmin Han, Jaeseok Lee, Taesoo Kwon, Ji-Woong Choi:
Performance analysis on DPSK modulation using symbol repetition and interleaving. - Buthanani Dlodlo, Hongjun Xu:
Trellis code-aided high-rate M-QAM space-time labeling diversity using a unitary expansion. - Tahmid Al-Mumit Quazi, Hongjun Xu:
SSD-enhanced uncoded space-time labeling diversity. - Deepak Kumar Sharma, Deepika Kukreja, Pranav Aggarwal, Manpreet Kaur, Ayushee Sachan:
Poisson's probability-based Q-Routing techniques for message forwarding in opportunistic networks. - Gábor Fodor:
Mode selection schemes for unicasting device-to-device communications supported by network coding. - Yamarthy Mallikarjuna Rao, M. V. Subramanyam, K. Satya Prasad:
Cluster-based mobility management algorithms for wireless mesh networks. - Somayeh Khosroazad, Ali Abedi, Naaser Neda:
On scalability of physical layer network coding with modulo-sum mapping over N-way relay channels. - João Lucas Negrão, Taufik Abrão:
Efficient detection in uniform linear and planar arrays MIMO systems under spatial correlated channels. - Marcelo Antonio Marotta, Leonardo Roveda Faganello, Maicon Kist, Lucas Bondan, Juliano Araujo Wickboldt, Lisandro Zambenedetti Granville, Juergen Rochol, Cristiano Bonato Both:
Integrating dynamic spectrum access and device-to-device via cloud radio access networks and cognitive radio. - Yongshun Zhang, Xin Jia:
Adaptive interference suppression for DSSS communications based on compressive sensing. - R. Madhusudhan, Manjunath Hegde, Imran Memon:
A secure and enhanced elliptic curve cryptography-based dynamic authentication scheme using smart card. - Audace Manirabona, Saadi Boudjit:
GATE, a game theory approach on traffic volume aware channel width adaptation for WBAN medical applications. - Imran Memon:
Distance and clustering-based energy-efficient pseudonyms changing strategy over road network. - Chitra Sudhakaran, M. Suganthi:
A novel approach of user existence awareness using adaptive spectrum sensing controllers in emergency-based cognitive radio adhoc networks. - Tingting Hou, Gang Feng, Shuang Qin, Wei Jiang:
Proactive content caching by exploiting transfer learning for mobile edge computing.
Volume 31, Number 12, August 2018
- Chulhee Cho, Tai-Myoung Chung:
A novel architecture of Proxy-LMA mobility management scheme for software-based smart factory networking. - Hossein Mirzadeh Sarcheshmeh, Hossein Khaleghi Bizaki, Sajjad Alizadeh:
PN sequence blind estimation in multiuser DS-CDMA systems with multipath channels based on successive subspace scheme. - Nandkishor P. Karlekar, N. Gomathi:
OW-SVM: Ontology and whale optimization-based support vector machine for privacy-preserved medical data classification in cloud. - Xudong Cheng, Yejun He, Li Zhang, Jian Qiao:
Channel modeling and analysis for multipolarized massive MIMO systems. - Fateme Salehi, Mohammad-Hassan Majidi, Naaser Neda:
Channel estimation based on learning automata for OFDM systems. - Saied Asghari, Nima Jafari Navimipour:
Nature inspired meta-heuristic algorithms for solving the service composition problem in the cloud environments. - Nabajyoti Mazumdar, Hari Om:
Distributed fuzzy approach to unequal clustering and routing algorithm for wireless sensor networks. - Soodeh Amiri-Doomari, Ghasem Mirjalily, Jamshid Abouei:
Joint load balanced stable routing and communication segment assignment in mobile cognitive radio ad-hoc networks. - Ping Wang, Chaojie Zhu, Xiaoping Yang:
A novel AQM algorithm based on feedforward model predictive control. - Taoufik Yeferny, Sabri Allani:
MPC: A RSUs deployment strategy for VANET. - Priyanka Ahlawat, Mayank Dave:
A cost-effective attack matrix based key management scheme with dominance key set for wireless sensor network security. - Mohsin Raza Jafri, Simonetta Balsamo, Andrea Marin, Robert Martin:
Implementation of depth-based routing and its enhancement in AquaSim-Next Generation for underwater wireless sensor networks. - Feiyu Yan, Ji-hong Zhao, Hua Qu, Xiguang Xu:
A joint sensing and transmission power control policy for RF energy harvesting cognitive radio networks. - Qingfeng Jing, Danmei Liu:
Study of atmospheric attenuation characteristics of terahertz wave based on line-by-line integration. - Sulaiman Saleem Patel, Tahmid Al-Mumit Quazi, Hongjun Xu:
Error performance of Uncoded Space Time Labelling Diversity in spatially correlated Nakagami-q channels.
Volume 31, Number 13, 10 2018
- Tanumay Manna, Iti Saha Misra:
A prediction and scheduling framework in centralized cognitive radio network for energy efficient non-real time communication. - Dharmendra Dixit, P. R. Sahu:
Error rate and outage of dual-hop DF relay system with selection combining over Rice fading. - Tan N. Nguyen, Phuong T. Tran, Miroslav Voznák:
Power splitting-based energy-harvesting protocol for wireless-powered communication networks with a bidirectional relay. - Stathis B. Mavridopoulos, Petros Nicopolitidis, Georgios I. Papadimitriou:
Anchor-free distance estimation: A new approach to distance estimation for multihop ad hoc wireless networks. - Mustapha Benssalah, Mustapha Djeddou, Brahim Dahou, Karim Drouiche, Abdelmadjid Maali:
A cooperative Bayesian and lower bound estimation in dynamic framed slotted ALOHA algorithm for RFID systems. - Mehmet Fatih Tüysüz:
Towards providing optimal energy-efficiency and throughput for IEEE 802.11 WLANs. - Hou Deng, Liusheng Huang, Chenkai Yang, Hongli Xu:
Centralized spectrum leasing via cooperative SU assignment in cognitive radio networks. - Constantine A. Kyriakopoulos, Georgios I. Papadimitriou, Petros Nicopolitidis:
Towards energy efficiency in virtual topology design of elastic optical networks. - Fatima Ezzahra Airod, Houda Chafnaji, Ahmed Tamtaoui:
A comparative study of full-duplex relaying schemes for low latency applications. - Shanshan Ji, Xiangdong Jia, Qiaoling Fan, Mangang Xie, Meng Zhou:
Energy-spectrum-efficient three-tier heterogeneous networks with D2D harvesting energy and uplink coverage analysis. - Javid Ali, Raja Wasim Ahmad, Tahir Maqsood, Joel J. P. C. Rodrigues, Nuhman ul Haq, Shahzad Sarwar, Tassawar Iqbal, Sajjad Ahmad Madani:
Network selection in heterogeneous access networks simultaneously satisfying user profile and QoS. - Faissal El Bouanani, Abdelmajid Bessate:
A comparative study on the performance of MIMO-STBC subject to Weibull fading channels. - Jia Hao, Binbin Zhang, Kun Yue, Hao Wu, Jixian Zhang:
Measuring performance degradation of virtual machines based on the Bayesian network with hidden variables. - Sang-Jo Yoo, Anish Prasad Shrestha, Myunghwan Seo, Chul-Hee Han, Minho Park, Kwang-Eog Lee:
Joint spectrum sensing and resource allocation optimization using genetic algorithm for frequency hopping-based cognitive radio networks.
Volume 31, Number 14, 25 2018
- Quoc-Viet Pham, Won-Joo Hwang:
Energy-efficient power control for uplink spectrum-sharing heterogeneous networks. - Min Luo, Aiying Sun, Debiao He, Xiaohong Li:
An efficient and secure 3-factor user-authentication protocol for multiserver environment. - Mohamed Adnan Landolsi:
Novel signals for optimized timing synchronization in direct-sequence spread-spectrum communication systems. - Poonam Verma, Neeta Singh, Mohit Sharma:
Modeling and performance analysis of VI-CRA: A congestion control algorithm for vehicular networks. - Padmasree Challa, Satya Anuradha Mosa:
Performance evaluation and implementation of convolution coded OFDM modem in wireless underwater acoustic communication. - Shao-I Chu:
Secrecy performance analysis of AF relaying with relay selection scheme over Nakagami-m fading channels. - P. M. Shemi, M. G. Jibukumar, M. K. Sabu:
A novel relay selection algorithm using ant colony optimization with artificial noise for secrecy enhancement in cooperative networks. - Thathan Sureshkumar, Mani Lingaraj, Bojan Anand, Thathan Premkumar:
Hybrid firefly bat algorithm (HFBA)-based network security policy enforcement for PSA. - Akinbode A. Olawole, Fambirai Takawira, Olutayo O. Oyerinde:
Channel assignment scheme in clustered multichannel cognitive radio networks with outdated CSI over Rayleigh fading channels. - Rajesh Ramanathan, Velmurugan Periakarupan Gurusamy Sivabalan, Thiruvengadam Sundarajan Jayaraman, Partha Sharathi Mallick:
Spatial modulation and physical layer network coding based bidirectional relay network with transmit antenna selection over Nakagami-m fading channels. - Deepak P. M., C. K. Ali:
Sensitivity of filter bank SCFDMA to carrier frequency offset and its compensation using firefly algorithm. - Sobin C. C., Vaskar Raychoudhury, Snehanshu Saha:
Addressing space-constraint driven selfishness in smart opportunistic environment. - Saad Mehmood Sheikh, Hamza R. Ali, Hafiz Muhammad Asif, Sobia Baig, Asim Ali Khan:
Design of NS3 VLC module and performance analysis of ad hoc network under VLC and Wi-Fi layers. - Nessrine Smaili, Mustapha Djeddou, Arab Azrar:
Pilot contamination mitigation based on antenna subset transmission for mmWave massive MIMO. - Rakesh Ranjan Swain, Pabitra Mohan Khilar, Tirtharaj Dash:
Fault diagnosis and its prediction in wireless sensor networks using regressional learning to achieve fault tolerance.
Volume 31, Number 15, October 2018
- Vankamamidi Srinivasa Naresh, Reddi Sivaranjani, Nistala V. E. S. Murthy:
Provable secure lightweight hyper elliptic curve-based communication system for wireless sensor networks. - Zhengtao Jiang, Ling Liu, Liaojun Pang:
Research on oblivious keyword search protocols with CKA security. - Jianghong Wei, Wenfen Liu, Xuexian Hu:
On the security and improvement of privacy-preserving 3-factor authentication scheme for TMIS. - Majid Shakhsi Dastgahian, Mohammad Naseri Tehrani, Hossein Khoshbin:
The off-grid frequency selective millimeter wave channel estimation. - S. Gokulraj, B. G. Geetha:
Integration of firefly optimization and Pearson service correlation for efficient cloud resource utilization. - Gurpal Singh Chhabra, Varinderpal Singh, Maninder Singh:
Hadoop-based analytic framework for cyber forensics. - Ratish Mohan, Anis Yazidi, Boning Feng, B. John Oommen:
On optimizing firewall performance in dynamic networks by invoking a novel swapping window-based paradigm. - Yin Hoe Ng, Teong Chee Chuah, Ahmadun Nijar Zainal Abidin, Nabihah Hashim, Azhari Asrokin:
Multimode precoding for crosstalk mitigation in ultra-broadband DSL systems. - Kaikai Chi, Xinchen Wei, Yanjun Li, Xianzhong Tian:
Throughput maximization in wireless powered communication networks with minimum node throughput requirement. - Ansar Hashim, Noor M. S.:
Bandwidth utilization efficiency enhancement for OFDM-based WSN. - Guoqing Zhang, Lina Liu, Changjun Zhu, Anxiang Wang, Xiang'an Yan:
The BER theoretical model and properties of SiPM-based receiver for OOK optical communication. - Guangye Li, Shaowei Liu, Hao Li, Weimin Lei, Wei Zhang:
An adaptive retransmission-based multipath transmission mechanism for conversational video. - Qiang He, Xingwei Wang, Min Huang, Yuliang Cai, Chuangchuang Zhang, Lianbo Ma:
An adaptive approach for handling two-dimension influence maximization in social networks. - Ling Hou, Angus Kin Yeung Wong, Kai-Hau Yeung:
Exploring the impact of social properties on routing in cognitive radio networks. - Yuanyuan Chen, Chaoqin Gan, Xingfeng Li, Jian Hua:
Group protection and LAN service scheme utilizing flexible modularization and high efficiency for metro-access network. - Chandrasekaran Ranichandra Dharmaraj, Bala Krushna Tripathy:
Adaptive mechanism for distributed query processing and data loading using the RDF data in the cloud. - Eleftherios Stergiou, John D. Garofalakis:
Quantitative analysis of multilayer switching networks providing multiple internal routes. - Deepak Batham, Dharmendra Singh Yadav, Shashi Prakash:
Survivability using traffic balancing and backup resource reservation in multi-domain optical networks. - Janmoni Borah, Joyatri Bora:
Small-cell intensities for cellular network affected by cell-edge and hotspot. - Thanh-Luan Nguyen, Dinh-Thuan Do:
Power allocation schemes for wireless powered NOMA systems with imperfect CSI: An application in multiple antenna-based relay.
Volume 31, Number 16, 2018
Editorial
- Zhikui Chen, Laurence T. Yang, Petros Nicopolitidis:
Special issue on big data intelligence in communication systems.
- Yuhuai Peng, Xiaojie Wang, Dawei Shen, Wei Yan, Yanhua Fu, Qingxu Deng:
Design and modeling of survivable network planning for software-defined data center networks in smart city. - Yi Yang, Yang Chen, Meilin Wen:
Analysis of instantaneous availability of communication system based on the influence of support equipment. - Fanyu Bu:
An intelligent efficient scheduling algorithm for big data in communication systems. - Xuelong Chen, Feng Ding, Yali Wang:
Knowledge fusion based on the group argumentation theory in Web 2.0 environment. - Te Ma, Feng Ding:
Research on the dynamic effect of the intelligent urban experience to the tourists' two-way internet word-of-mouth. - Majing Su, Hongli Zhang, Md. Zakirul Alam Bhuiyan, Xiaojiang Du, Peng Zhang:
An effective copyright-protected content delivery scheme for P2P file sharing networks. - Haiyun Li, Haifeng Li, Kaibin Wei:
Automatic fast double KNN classification algorithm based on ACC and hierarchical clustering for big data. - Lin Teng, Hang Li, Shoulin Yin:
Modified pyramid dual tree direction filter-based image denoising via curvature scale and nonlocal mean multigrade remnant filter.
Volume 31, Number 17, 2018
- Khaled Ramadan, Moawad I. Dessouky, Mohamed F. Elkordy, Salah S. Elagooz, Fathi E. Abd El-Samie:
Joint low-complexity equalization and carrier frequency offset compensation for underwater acoustic OFDM communication systems with banded-matrix approximation at different channel conditions. - Zhaozheng Li, Weimin Lei:
A service trust evaluation model using clustering fuzzy inference for guiding network service selection. - Karima Chemoun, Marc Gilg, Mourad Laghrouche, Pascal Lorenz:
Evidence theory-based framework for improving automation in home automation system. - Harmandar Kaur, Mamta Khosla, Rakesh Kumar Sarin:
Interval type-2 fuzzy Kalman filter aided individual channel estimation in MIMO relay systems. - Shuang Xu, Xingwei Wang, Min Huang:
Modular and deep QoE/QoS mapping for multimedia services over satellite networks. - Bülent Bilgehan, Stephen Ojo:
Multiplicative based path loss model. - Imran Memon, Hamid Turab Mirza:
MADPTM: Mix zones and dynamic pseudonym trust management system for location privacy. - Lunzhi Deng, Yixian Yang, Ronghai Gao, Yuling Chen:
Certificateless short signature scheme from pairing in the standard model. - Kun Wang, Lei Wang, Minhao Cui:
Trajectory tracking and recovery attacks in VANET systems. - Raghad Ghalib Alsultan, Gölge Ögücü Yetkin:
Mutual coupling suppression of closely spaced microstrip antennas by ladder-shaped conducting wall. - Vahid Kouhdaragh, Daniele Tarchi, Alessandro Vanelli-Coralli:
A reliable, secure, and energy efficient smart grid node allocation algorithm for heterogeneous network scenarios. - Ahmed Nabih Zaki Rashed, Mohamed Salah F. Tabbour:
Best candidate integrated technology for low-noise, high-speed, and wide bandwidth-based transimpedance amplifiers in optical computing systems and optical fiber applications. - Rong Jin, Jiaojiao Li, Xin Tuo, Weiming Wang, Xiaolin Li:
A congestion control method of SDN data center based on reinforcement learning. - Perumal Thanalakshmi, Anitha Ramalingam:
A new code-based designated verifier signature scheme. - Elhadi Mehallel, Djamel Abed, Abdelhani Boukrouche, Abdelkader Medjouri:
PAPR reduction in ECMA-368 UWB communication systems using parametric discrete sliding norm transform. - Deepanramkumar P., Marimuthu Karuppiah, SK Hafizul Islam, Mohammad S. Obaidat:
Secure cognitive radio-based synchronized transmission of 5G signals using massive MIMO-OFDM-ES. - Tran Dinh Hieu, Tran Trung Duy, Seong-Gon Choi:
Secrecy performance of a generalized partial relay selection protocol in underlay cognitive networks. - Ehsan Moeen Taghavi, Ghosheh Abed Hodtani:
Partial feedback impact on achievable rate region in multiple-access relay channels. - Alireza Souri, Amir Masoud Rahmani, Nima Jafari Navimipour:
Formal verification approaches in the web service composition: A comprehensive analysis of the current challenges for future research. - Khyati Shrivastav, Kishore D. Kulat:
Energy efficient scalability of three level hexagonal heterogeneous broad transmission distance protocol (3L-HEXA-HTBTDP) for WSN-IoT networks. - Lianggui Liu, Lingmin Wang, Hui Sun, Huiling Jia:
Social recommendation between urban vehicular social communities. - Sariga Arjunan, Pothula Sujatha, Dhavachelvan Ponnurangam:
F5N-based unequal clustering protocol (F5NUCP) for wireless sensor networks. - Amarjit Malhotra, Sanjay Kumar Dhurandher, Megha Gupta, Bijendra Kumar:
EMCloud: A hierarchical volunteer cloud with explicit mobile devices. - Konstantinos C. Fountoukidis, Christos Kalialakis, Kostas E. Psannis, Katherine Siakavara, Sotirios K. Goudos, Panagiotis G. Sarigiannidis, Mohammad S. Obaidat:
MIMO antenna selection using biogeography-based optimization with nonlinear migration models.
Volume 31, Number 18, December 2018
- Khalid Mahmood, Husnain Naqvi, Bander A. Alzahrani, Zahid Mehmood, Azeem Irshad, Shehzad Ashraf Chaudhry:
An ameliorated two-factor anonymous key exchange authentication protocol for mobile client-server environment. - Shikha Singh, Subhas Chandra Misra:
Migration of PLM systems to cloud. - Ruoyu Zhang, Jiayan Zhang, Yulong Gao, Honglin Zhao:
Distributed compressed sensing-based multiuser channel estimation for frequency-selective hybrid mmWave MIMO system. - Dauda Ayanda, Hongjun Xu, Narushan Pillay:
Uncoded M-ary quadrature amplitude modulation space-time labeling diversity with three transmit antennas. - P. Muneer, Mohammed Al-Rayif, V. P. Thafasal Ijyas:
Low complexity equalization techniques using interference cancellation for SC-FDMA uplink systems under doubly selective channels. - Girraj Sharma, Ritu Sharma:
Joint sensing time and fusion rule threshold optimization for energy efficient CSS in cognitive radio sensor networks. - Mohammad Ariapour:
Effect of primary cores in continuous and discontinuous percolation transition of random graph. - Mohsen Emami, Reza Akbari, Ali Zamani:
Evaluation of mathematical models to estimate end-to-end traffic in a backbone network. - Mehmet Simsek, Arafat Sentürk:
Fast and lightweight detection and filtering method for low-rate TCP targeted distributed denial of service (LDDoS) attacks. - De-gan Zhang, Si Liu, Xiao-huan Liu, Ting Zhang, Yu-ya Cui:
Novel dynamic source routing protocol (DSR) based on genetic algorithm-bacterial foraging optimization (GA-BFO). - Mahsa Hosseinpour, Mohammad Hossein Yaghmaee, Seyed-Amin Hosseini-Seno, Hossein Khosravi Roshkhari, Mohsen Asadi:
Anomaly-based DoS detection and prevention in SIP networks by modeling SIP normal traffic. - Chuangchuang Zhang, Xingwei Wang, Fuliang Li, Min Huang, Qiang He:
Network service chains deployment across multiple SDN domains. - Amit Dvir, Vinh-Thong Ta, Sefi Erlich, Levente Buttyán:
STWSN: A novel secure distributed transport protocol for wireless sensor networks. - Hanho Wang:
Impact of multiple system diversity on throughput in heterogeneous cellular networks.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.