default search action
Transactions on Emerging Telecommunications Technologies, Volume 34
Volume 34, Number 1, January 2023
SURVEY ARTICLES
- Lizhi Yi, Mei Yin, Mehdi Darbandi:
A deep and systematic review of the intrusion detection systems in the fog environment. - Khushboo Jain, Anoop Kumar, Akansha Singh:
Data transmission reduction techniques for improving network lifetime in wireless sensor networks: An up-to-date survey from 2017 to 2022.
RESEARCH ARTICLES
- Shweta Kukade, Mukul S. Sutaone, Rajendrakumar A. Patil:
Uplink transmission with multiuser scheduling in non-stand-alone cellular network using virtual MIMO system. - Drakshayini Melkote NanjundaShetty, Manjunath R. Kounte:
Estimation of Rayleigh flat channel coefficients using deep learning. - Ramamoorthy Karthikeyan, Venkatachalam Balamurugan, Robin Cyriac, B. Sundaravadivazhagan:
COSCO2: AI-augmented evolutionary algorithm based workload prediction framework for sustainable cloud data centers. - Chandini Avula Gopalakrishna, Prabhugoud I. Basarkod:
An efficient lightweight encryption model with re-encryption scheme to create robust blockchain architecture for COVID-19 data. - Viswanadham Baby Koti Lakshmi Aruna, Chitra Ekambaram, Mididoddi Padmaja:
Field programmable gate array implementation of an adaptive filtering based noise reduction and enhanced compression technique for healthcare applications. - Amrutanshu Panigrahi, Ajit Kumar Nayak, Rourab Paul:
Smart contract assisted blockchain based public key infrastructure system. - Peng Wei, Ruimin Lu, Ganhua Ye, Shijun Xie, Ruidong Wang:
Channel synchronization based on deep learning. - Kehinde Oluwasesan Odeyemi, Pius Adewale Owolawi, Oladayo Olufemi Olakanmi:
Secure transmission in smart grid dynamic wide area network by exploiting full-duplex jamming scheme. - Mevlüt Ersoy, Remzi Gürfidan:
Blockchain-based asset storage and service mechanism to metaverse universe: Metarepo. - Samad Fazeli, Soroush Akhlaghi:
On the secrecy rate balancing problem of two-way multiple-input multiple-output relaying networks using rank-1 beamforming strategy. - Uddeshaya Kumar, Manish Garg, Saru Kumari, Dharminder Dharminder:
A construction of post quantum secure and signal leakage resistant authenticated key agreement protocol for mobile communication. - Ahmed Al Amin, Soo Young Shin:
Performance evaluation of cooperative-nonorthogonal multiple access-based improved hybrid simultaneous wireless information and power transfer protocol. - Sulaiman Saleem Patel, Tahmid Quazi:
A multiple-input, multiple-output broadcasting system with space, time, polarization, and labeling diversity. - P. Velmurugadass, S. Dhanasekaran, S. Shasi Anand, V. Vasudevan:
Quality of Service aware secure data transmission model for Internet of Things assisted wireless sensor networks. - Danilo Renato de Assis, Joilson Alves Junior, Emílio Carlos Gomes Wille:
Strategies to increase connectivity and performance of VANETs: Analysis of route lifetime and routing protocol proposal. - Ming Mao, Peng Yi, Tao Hu:
Roadside infrastructure deployment scheme based on Internet of Vehicles information service demand. - Yanfei Xu, Adil Hussein Mohammed:
An energy-aware resource management method in cloud-based Internet of Things using a multi-objective algorithm and crowding distance. - Shuang Yao, Dawei Zhang:
BPRT: A blockchain-based privacy-preserving transaction scheme based on an efficient broadcast encryption with personalized messages. - Mostafa M. Abdelhakam, Mahmoud M. Elmesalawy, Ibrahim I. Ibrahim, Samir G. Sayed:
Two-timescale optimization approach for coordinated multi-point design in unmanned aerial vehicle-assisted cellular networks. - Deepan Nagarajan, Rebekka Balakrishnan:
Intelligent reflecting surface empowered WPCN system over generalized fading channels: Performance analysis and optimization. - Muhammet Kirik, Jehad M. Hamamreh:
A novel interference signal superposition algorithm for providing secrecy to subcarrier number modulation-based orthogonal frequency division multiplexing systems. - Mengtian Wen, Zhe Zhang, Jianxin Chen, Xin Wei, Mingkai Chen:
Power control and resource allocation for return on investment maximization in cross-modal communications. - (Withdrawn) Artificial intelligence framework-based ultra-lightweight communication protocol for prediction of attacks in Internet of Things environment.
Volume 34, Number 2, February 2023
RESEARCH ARTICLES
- Rajasekar Deepa, Revathi Venkataraman:
Efficient target monitoring with fault-tolerant connectivity in wireless sensor networks. - Samayveer Singh, Mohit Kumar, Om Prakash Verma, Rajeev Kumar, Sukhpal Singh Gill:
An IIoT based secure and sustainable smart supply chain system using sensor networks. - Oshin Rawlley, Shashank Gupta:
Artificial intelligence-empowered vision-based self driver assistance system for internet of autonomous vehicles. - Haowei Wu, Fengjiao Huang, Pei Xiao, Ke Fang, Jinglan Ou:
Secrecy satellite-terrestrial downlink transmissions against randomly located eavesdroppers. - Ali Asghar Ansari, Mohsen Eslami, Mohammad Javad Dehghani:
Pricing-based power allocation in cloud radio access network with multiple access technology selection. - Yuan Zhang, Peng Du:
Parallel minimum mean square error equalization for reduced-zero-padding orthogonal time frequency space with the aid of unitary precoding. - Pradheep T. Rajan B, N. Muthukumaran:
Grey neural network channel estimation and RBFNN hybrid precoding schemes for the multi user millimeter wave massive MIMO. - Malathy Navaneetha Krishnan, Revathi Thiyagarajan:
Entropy-based complex proportional assessment for efficient task scheduling in fog computing. - Osama S. Faragallah, Hala S. El-sayed, Mohamed G. El-Mashed:
Hybrid precoding design for MmWave multi-user massive MIMO systems under high mobility. - Vanitha M, Sujatha Jamuna Anand, Radhamani V, N. R. Rajalakshmi:
Dual-channel capsule generation adversarial network based blockchain technology for a secured dynamic optimal routing in mobile ad hoc network. - Adelcio M. de Souza, Caio L. M. P. Plazas, Daniel R. Celino, Murilo Araújo Romero:
Double-RSOA colorless WDM-PON for 5G fronthaul applications. - Chao Liu, Shuai Liu, Amjad Osmani:
An ensemble clustering method based on consistency cluster consensus approach and MapReduce model. - Xin Song, Jiahui Zhu, Runfeng Zhang, Mingjv Peng, Siyang Xu:
Adaptive secure transmission for two-way energy harvesting relay networks with two-sided eavesdropping. - Mohsen Sheikh-Hosseini, Mohammad Hasheminejad, Farhad Rahdari:
Linear precoder design for peak-to-average power ratio reduction of generalized frequency division multiplexing signal using gradient descent methods. - Meet Kumari, Yogendra Narayan, Vivek Arya:
Design and investigation of hybrid PON-FSO system employing modified NZCC code under distinct weather conditions. - Ruidong Wang, Shilian Wang, Wei Zhang:
Joint power and hopping rate adaption against follower jammer based on deep reinforcement learning. - Jun Wu, Pei Li, Jianrong Bao:
Optimal sequential decision rule for cooperative spectrum sensing of CUAVNs. - Haitao Xu, Zhihui Guo, Ziliang Shang, Ji Zhao, Hui Dai:
Edge server placement for offloading real-time statistics tasks of bus passenger.
SURVEY ARTICLES
- Rezwana Ahmed, M. Rezwanul Mahmood, Mohammad Abdul Matin:
Challenges in meeting QoS requirements toward 6G wireless networks: A state of the art survey. - Mohanad Mezher, Amjed Razzaq Alabbas, Muhammad Ilyas:
A survey on state of the inter body radio communication channel: Performance and solutions.
Volume 34, Number 3, March 2023
RESEARCH ARTICLES
- D. Salangai Nayagi, Sivasankari G. G, Vinayakumar Ravi, K. R. Venugopal, Sankar Sennan:
Fault tolerance aware workload resource management technique for real-time workload in heterogeneous computing environment. - Yu Liu, Xin Li, Wei Xu, Shanguo Huang:
Free-space optical communication assisted emergency communication scheme against multiple fiber link failures in low-edge-connected optical networks. - Yining Zhang, Hengsheng Zhang, Xiaokai Liu, Chenglin Zhao, Fangmin Xu:
Digital twin-enabled deep reinforcement learning for joint scheduling of ultra-reliable low latency communication and enhanced mobile broad band: A reliability-guaranteed approach. - Fei Xu, Jianqiang Feng, Zhuoya Zhang, Linpeng Ning, Yuxi Jia:
EdgeMesh: A hybrid distributed training mechanism for heterogeneous edge devices. - Duraimurugan Samiayya, Jayabharathi Ramasamy, Manikandan Gunasekar:
An efficient congestion control in multimedia streaming using adaptive BRR and fuzzy butterfly optimization. - B. Meenakshi, D. Karunkuzhali:
Enhanced Elman spike neural network for cluster head based energy aware routing in WSN. - Michaelraj Kingston Roberts, Jayapratha Thangavel:
An improved optimal energy aware data availability approach for secure clustering and routing in wireless sensor networks. - Uma Meena, Promila Sharma:
An improved blockchain based encryption scheme for secure routing in wireless sensor network using machine learning technique. - Akanksha Srivastava, Gurjit Kaur:
Cooperation and energy harvesting based spectrum sensing schemes for green cognitive radio networks. - Mesut Toka, Eray Güven, Mehmet Akif Durmaz, Günes Karabulut-Kurt, Oguz Kucur:
Performance analyses of TAS/Alamouti-MRC NOMA in dual-hop full-duplex AF relaying networks. - C. Shanmuganathan, K. Boopalan, G. Elangovan, P. J. Sathish Kumar:
Enabling security in MANETs using an efficient cluster based group key management with elliptical curve cryptography in consort with sail fish optimization algorithm. - Zhi Ji:
Maximizing the energy efficiency in intelligent reflecting surface-aided unmanned aerial vehicle data collection system in presence of malicious jammers. - Pramod Kumar Aylapogu, Kiran Kumar Gurrala:
Blind modulation classification in multiple input and output-orthogonal frequency division multiplexing using time-frequency analysis and customized convolutional neural network architecture. - Lijuan Wu, Chaoqin Gan, Zhongsen Xu, Jianqiang Hui:
(Network value)-based adaptive dynamic bandwidth allocation algorithm for 5G network slicing. - Saleh Muhammad Rubai:
Development of hyper-parameter-tuned-recurrent neural network for detection and mitigation of fraudulent resource consumption attack in cloud. - Zheng Guan, Ya Li, Shengqian Yu, Zhijun Yang:
Deep reinforcement learning-based full-duplex link scheduling in federated learning-based computing for IoMT. - Amandeep Kumar, Balwinder Singh Dhaliwal, Damanpreet Singh:
CL-HPWSR: Cross-layer-based energy efficient cluster head selection using hybrid particle swarm wild horse optimizer and stable routing in IoT-enabled smart farming applications. - Bokka Raveendranadh, Sadasivam Tamilselvan:
An accurate attack detection framework based on exponential polynomial kernel-centered deep neural networks in the wireless sensor network. - Xinyang Li, Songjie Yang, Wanting Lyu, Zhongpei Zhang, Xiang Ling:
Hierarchical multi-beam training with the presence of the sub-connected hybrid beamforming architecture.
SURVEY ARTICLE
- Tarek Bouzid, Noureddine Chaib, Mohamed Lahcen Bensaad, Omar Sami Oubbati:
5G network slicing with unmanned aerial vehicles: Taxonomy, survey, and future directions.
Volume 34, Number 4, April 2023
SURVEY ARTICLES
- Wajid Rafique, Abdelhakim Senhaji Hafid, Junaid Qadir:
Developing smart city services using intent-aware recommendation systems: A survey. - Kirandeep Kaur, Arjan Singh, Anju Sharma:
A systematic review on resource provisioning in fog computing.
RESEARCH ARTICLES
- Ilyas Benkhaddra, Abhishek Kumar, Mohamed Ali Setitra, Zine El Abidine Bensalem, Hang Lei:
Prevention of DDoS attacks using an optimized deep learning approach in blockchain technology. - Sapir Nativ Zucker, Itsik Bergel:
Optimal and sub-optimal rate and power allocation for random networks. - Ramalingam Praveen, Parameswaran Pabitha:
Improved Gentry-Halevi's fully homomorphic encryption-based lightweight privacy preserving scheme for securing medical Internet of Things. - G. Kumaresan, K. Devi, S. Shanthi, Balaubramanian Muthusenthil, Samydurai Arumugam:
Hybrid Fuzzy Archimedes-based Light GBM-XGBoost model for distributed task scheduling in mobile edge computing. - Hiral S. Trivedi, Sankita J. Patel:
Key-aggregate searchable encryption with multi-user authorization and keyword untraceability for distributed IoT healthcare systems. - Ipsita Sengupta, Shounak Dasgupta, Abhirup Das Barman:
Index and mode modulated orthogonal frequency division multiplexing with enhanced spectral efficiency. - Chandra Mohan D, B. V. Ramana Reddy:
Enhanced capsule generative adversarial network for spectrum and energy efficiency of cooperative spectrum prediction framework in cognitive radio network. - Hongtao Zhang, Xueyuan Li:
Directional antennas modelling and coverage analysis for UAV networks with blockage effects in urban environment. - Tasneem Alshamaseen, Saud Althunibat, Marwa K. Qaraqe, Haitham Alashaary:
Phase-assisted NOMA based key distribution for IoT networks. - Pravin G. Dhawale, Vikram Kumar Kamboj, S. K. Bath:
A levy flight based strategy to improve the exploitation capability of arithmetic optimization algorithm for engineering global optimization problems. - S. Sumathi, T. K. Ramesh, Zhiguo Ding:
Dynamic user clustering with hybrid beamforming in millimeter wave non-orthogonal multiple access (NOMA) and power allocation using teaching learning based optimization (TLBO). - Zuxia Yuan, Jian Ouyang, Xiaoyu Liu, Pengcheng Kan:
On the performance of uplink NOMA-based satellite-aerial-terrestrial integrated networks. - Reza Gholamrezaei, Ghasem Mirjalily, Sima Emadi:
Learning-based multi-constraint resilient controller placement and assignment in software-defined networks using covering graph.
Volume 34, Number 5, May 2023
RESEARCH ARTICLES
- Naskath Jahangeer:
Fast multicriteria network selection scheme using hybrid of cat swarm optimization and TOPSIS algorithm for optimal handover in VANET. - Adnane Talha, Anas Bouayad, Mohammed Ouçamah Cherkaoui Malki:
A chaos opposition-based dwarf mongoose approach for workflow scheduling in cloud. - Fan Wu, Xiong Li:
Cloud-assisted authentication scheme supporting dynamic pseudo-identity for autonomous vehicles. - Waseem Sheikh:
Jitter-sensitive data communication in emerging wireless networks. - Neerul, Devender Kumar:
Cryptanalysis and improvement of an authentication protocol for wireless sensor networks. - Atena Ebrahimkhani, Bahareh Akhbari:
Shannon meets Stackelberg on the cognitive interference channel part I: A deterministic view. - Jun Wu, Cong Wang, Haoyu Liang:
Bayesian quickest detection-based spectrum sensing for cognitive UAV networks. - Cong Wang, Xiaohang Li, Maode Ma, Tong Zhou, Guangquan Xu, Naixue Xiong, Yiying Zhang:
PSAK: A provably secure authenticated key agreement scheme based on extended Chebyshev chaotic maps for smart grid environments. - Aditya Singh Sengar, Ranjan Gangopadhyay, Soumitra Debnath:
Gaussian mixture model based radio environment mapping for an underlay Device-to-Device network. - Avishek Chakraborty, Gopi Ram, Durbadal Mandal:
Phase center motion based time modulated arrays with preprocessed time schemes for selective harmonic beamforming in B5G communication systems. - Qimiao Zeng, Zhifan Yin, Qing Pan, Yunxiao Ma, Yuan Yu, Yirong Zhuang, Jie Liang, Shujie Yang, Han Xiao:
TVSR-OR: Tile-based 360-degree video streaming over real time streaming protocol with optimized read. - K. Ramya, Senthilselvi Ayothi:
Hybrid dingo and whale optimization algorithm-based optimal load balancing for cloud computing environment. - Jiancong Zhang, Changhao Wang, Shining Li:
Energy efficient federated learning in internet of vehicles: A game theoretic scheme.
RETRACTION
- Retraction: Wajia Li, Design and implementation of music teaching assistant platform based on Internet of Things, J. Transactions on Emerging Telecommunications Technologies. 2019, 30-9.
- Retraction: Daming Li, Wenjian Liu, Lianbing Deng, Bin Qin, Design of multimedia blockchain privacy protection system based on distributed trusted communication, J. Transactions on Emerging Telecommunications Technologies. 2020, 32-2.
Volume 34, Number 6, June 2023
SURVEY ARTICLE
- Seyed Salar Sefati, Simona Halunga:
Ultra-reliability and low-latency communications on the internet of things based on 5G network: Literature review, classification, and future research view.
RESEARCH ARTICLES
- Naveen Kumar, Anwar Ahmad:
Quality of service-aware adaptive radio resource management based on deep federated Q-learning for multi-access edge computing in beyond 5G cloud-radio access network. - Lilatul Ferdouse, Ahmed Shaharyar Khwaja, Alagan Anpalagan, Brad Stimpson, Ali Arad, Isaac Woungang:
Resource allocation and user assignment schemes in cellular supported industrial IoT networks. - Sreya Ghosh, Iti Saha Misra, Tamal Chakraborty:
Improved Quality of Service by canine olfactory route finding algorithm for Vehicular Ad Hoc Network. - Zhenqi Wang, Yi Li, Shaopeng Guan:
A robust-link controller placement model for large-scale software defined networks. - G. Navabharat Reddy, Chinthaginjala Venkata Ravikumar:
Ensemble learning-based channel estimation and hybrid precoding for millimeter-wave massive multiple input multiple output system. - Imran Mohammed, Iain B. Collings, Stephen V. Hanly:
A new connectivity model for unmanned aerial vehicle communications and flying height optimization. - Dauda Ayanda, Shaheen Solwa, Khadeejah A. Abdulsalam:
Eigenfilter-based analysis of uncoded space-time labeling diversity with three transmit antennas in correlated Nakagami-m fading channels. - Mahsa Shirzadian Gilan, Raman Paranjape:
Beam tracking in phased array antenna based on the trajectory classification. - Surjeet Dalal, M. Poongodi, Umesh Kumar Lilhore, Fadl Dahan, Thavavel Vaiyapuri, Ismail Keshta, Sultan Mesfer Aldossary, Amena Mahmoud, Sarita Simaiya:
Optimized LightGBM model for security and privacy issues in cyber-physical systems.
Volume 34, Number 7, July 2023
RESEARCH ARTICLES
- Nishi Yadav, Pabitra Mohan Khilar:
An efficient 3D localization algorithm for compensating stratification effect in underwater acoustic sensor network. - Doaa Gamal, Khaled M. F. Elsayed, Ahmed Hesham Mehana:
Deep SCMA receiver: A low-complexity joint decoder and channel estimator for SCMA over time-varying channels using RNNs. - Yang Zhao, Hao Li, Zhaozhong Liu, Guobin Zhu:
A lightweight CP-ABE scheme in the IEEEP1363 standard with key tracing and verification and its application on the Internet of Vehicles. - Mohamed Amine Ouamri, Mohamed Azni, Daljeet Singh, Waleed Almughalles, Mohammed Saleh Ali Muthanna:
Request delay and survivability optimization for software defined-wide area networking (SD-WAN) using multi-agent deep reinforcement learning. - Xifeng Wang, Hongsong Zhu, Han Xiao, Zan Zhou, Shujie Yang, Limin Sun:
Blockchain-enhanced trust management for mobile edge computing-enabled intelligent vehicular collaboration in the 6G era. - Chaonan Kan, Honghai Wu, Ling Xing, Huahong Ma:
Cooperative caching strategy based mobile vehicle social-aware in internet of vehicles. - R. Josphineleela, Vidyullatha Pellakuri, R. Thanuja, Diana Moses:
Secure Internet of Thing based data communication in blockchain model using novel teaching-learning optimized fuzzy approach. - Kothapalli Ramesh Chandra, Somasekhar Borugadda:
Joint resource allocation and power allocation scheme for MIMO assisted NOMA system. - Burak Ahmet Ozden, Fatih Cogen, Erdogan Aydin:
Mirror activation pattern selection for energy efficient hexagonal QAM aided media-based modulation. - Jun Wu, Jiangtao He, Jipeng Gan, Ze Chen, Jia Zhang, Zehao Chen, Gefei Zhu:
Sequential spectrum sensing against random Byzantine attack in cognitive radio networks. - B. M. R. Manasa, Venugopal P.:
Efficient Channel Estimation in Multiple Input Multiple Output Communication Systems using Hybrid Intelligence-based Deep Learning Model using Horse Dingo Optimizer. - P. Blessed Angelin, S. Wilfred Franklin:
Hyper contour cryptography with master Birch-Brown Paruvala-SLSTM model for enhanced healthcare security.
SURVEY ARTICLES
- Prachi Goyal, Vinay Rishiwal, Ashish Negi:
A comprehensive survey on QoS for video transmission in heterogeneous mobile ad hoc network. - Ravinder Kumar, Amita Malik, Virender Ranga:
Security concerns over IoT routing using emerging technologies: A review.
Volume 34, Number 8, August 2023
SURVEY ARTICLES
- Mohammed Jaber Alam, Md Rahat Hossain, Salahuddin A. Azad, Ritesh Chugh:
An overview of LTE/LTE-A heterogeneous networks for 5G and beyond. - Akram Golmohammadi, Seyed Reza Kamel Tabbakh, Reza Ghaemi:
A review on workflow scheduling and resource allocation algorithms in distributed mobile clouds.
RESEARCH ARTICLES
- (Withdrawn) Multi-objective metaheuristic optimization-based clustering with network slicing technique for Internet of Things-enabled wireless sensor networks in 5G systems.
- Chunfen Hu, Haifei Zhou, Shiyun Lv, Shelesh Krishna Saraswat:
LPB-SPP: Solving the internet of things service placement problem using the learner performance-based behavior algorithm. - Mamatha C. R, M. Ramakrishna:
Integrating interval type-2 fuzzy logic and modified dingo optimization for node ranking and energy efficient MANET. - Meigen Huang, Bi Gong, Xin Zhou, Tao Wang, Yanfeng Wang:
HIC: A high-reliable in-band control network for perception layer of software-defined IoT. - Somaye Jafarali Jassbi, Sahar Teymori:
The improvement of wavefront cellular learning automata for task scheduling in fog computing. - Rajasi Gore, Shashwati Banerjea, Neeraj Tyagi:
An event-driven fusion framework with auto-scaling of edge intelligence for resilient smart applications in developing countries. - Kuldeep Narayan Tripathi, Subhash Chander Sharma:
An optimal trust and secure model using deep metric learning for fog-based VANET. - Alishba Azam, Muhammad Imran, Mudassar Ali, Humayun Zubair Khan, Abdul Wakeel, Muhammad Naeem:
Joint user and throughput maximization in re-configurable intelligent surface assisted beyond 5G/6G networks. - Ahmed F. Tayel, Ahmed Y. Zakariya, Sherif I. Rabia, Ahmed H. Abd El-Malek:
Discrete practical RF energy harvesting models for wireless communication networks. - Zeeshan Ahmad, Adnan Shahid Khan, Kartinah bt Hj Zen, Farhan Ahmad:
MS-ADS: Multistage Spectrogram image-based Anomaly Detection System for IoT security. - Darwin Nesakumar A., Rukmani Devi S., T. M. Inbamalar, Pavithra K. N.:
Byzantine attack detection using optimized dual-channel capsule generative adversarial network for securing cognitive radio network. - Sudesh Kumar, Ram Shringar Raw, Abhishek Bansal, Pawan Singh:
UF-GPSR: Modified geographical routing protocol for flying ad-hoc networks. - Onur Berkay Gamgam, Ezhan Karasan:
Satisfying strict deadlines for cellular Internet of Things through hybrid multiple access.
Volume 34, Number 9, September 2023
SURVEY ARTICLE
- Badal Gami, Manav Agrawal, Deepak Kumar Mishra, Danish Quasim, Pawan Singh Mehra:
Artificial intelligence-based blockchain solutions for intelligent healthcare: A comprehensive review on privacy preserving techniques.
RESEARCH ARTICLES
- Caiyuan Tang, Feng Wang, Chenbin Zhao, Xiuqiang Chen:
IPAPS: An improved public auditing protocol for secure data storage in cloud-based medical storage system. - Farhad Banoori, Jinglun Shi, Khalid Khan, Jehangir Arshad, Xiongying Liu, Sohail Muhammad Noman, Muhammad Irshad:
Energy efficiency augmentation in UWA-OFDM transducer by peak to average power ratio alleviation through hybrid companding approach. - Khaled F. Hayajneh, Ferdos Abualkishik, Khaled Bani-Hani, Hazim Shakhatreh, Zaid Albataineh:
Efficient three-dimensional deployment of multiple unmanned aerial vehicles supporting ground base station toward maximizing served users with heterogeneous quality-of-service requirements. - Yonghua Luo, Qian Ning, Bingcai Chen, Xinzhi Zhou, Linyu Huang:
Software defined network-based multipath state-aware routing with traffic prediction in satellite network. - Han Wang, Hui Li, Qiongwei Ye, Ping Lu, Yong Yang, Peter Han Joo Chong, Xiaoli Chu, Qi Lv, Abla Smahi:
A physical topology for optimizing partition tolerance in consortium blockchains to reach CAP guarantee bound. - Amina Djir, Fatiha Meskine, Mohamed Larbi Tayebi:
Image transmission performance analysis through free space optical communication link using coherent QPSK modulation under various environmental conditions. - Priyanka Gaba, Ram Shringar Raw:
Impact of endorsement policy on the performance of blockchain-based VANET. - Xin Song, Yu Wang, Zhigang Xie, Runfeng Zhang, Siyang Xu:
Dingo-optimization-based task-offloading algorithm in multihop V2V/V2I-enabled networks. - Nikita Mittal, Vidyottama Jain, Selvamuthu Dharmaraja:
Power efficient stochastic modeling for Narrowband Internet of Things devices in 5G networks. - Kiran Khurshid, Muhammad Imran, Abdul Wakeel:
Performance analysis and comparison of approximate detectors with linear detectors in massive MIMO systems under imperfect channel state information. - Mohamed Ali Setitra, Mingyu Fan, Zine El Abidine Bensalem:
An efficient approach to detect distributed denial of service attacks for software defined internet of things combining autoencoder and extreme gradient boosting with feature selection and hyperparameter tuning optimization.
Volume 34, Number 10, October 2023
RESEARCH ARTICLES
- Mohamed Ali Syed Rabiya, Ramalakshmi Ramar, Naskath Jahangeer:
Regular routine aware routing in opportunistic mobile social networks. - Yujian Zhang, Mingde Li, Fei Tong:
Energy-efficient load balancing for divisible tasks on heterogeneous clusters. - Wenqin Zhuang, Yiming Song, Mingkai Chen, Jianxin Chen, Haibo Li:
Content sharing strategy for blind popularity distribution in D2D communications. - Ruiyan Du, Zhiqing Guan, Tian Feng, Fulai Liu:
Hybrid TH precoding with subarray connection for multi-user mmWave MIMO systems. - David Judson, A. Annie Portia, L. G. X. Agnel Livingston:
Low-complexity joint equalization and CFO compensation in uplink SC-FDMA NOMA system under different power allocation strategies. - Rolando Herrero:
Integrating cloud and mist computing to lower latency in IoT topologies. - Sreelakshmi P, Donuru Keerthi, Deepthi P. P.:
User grouping and resource management in efficient NOMA-OMA transmission scheme for infotainment message dissemination in VANETs. - N. V. K. Maha Lakshmi, A. Mallikarjuna Prasad:
Triple-band circularly polarized conformal antenna for vehicular communication applications. - Negar Zabetian, Babak Hossein Khalaj:
Quality of Experience (QoE)-based joint admission control and power allocation with guaranteed data rate. - Sai Satwik Vaddi, T. G. Venkatesh, Ankit Kumar Gupta:
Modeling medium dense cellular network and evaluation of probability of coverage. - Anil Kumar Dubey, N. Ramanjaneyulu, Mala Saraswat, Brammya Ganesan, Govindasamy Chinnaraj, Ninu Preetha Nirmala Sreedharan:
HECC-ABE: A novel blockchain-based IoT healthcare data storage using hybrid cryptography schemes with key optimization by hybrid meta-heuristic algorithm.
SURVEY ARTICLE
- Kamal Kumar Gola, Shikha Arya, Gulista Khan, Chetna Devkar, Nishant Chaurasia:
Security analysis of fog computing environment for ensuring the security and privacy of information.
Volume 34, Number 11, November 2023
EDITORIAL
- Gautam Srivastava, Jerry Chun-Wei Lin, Yudong Zhang:
Future of wireless access technologies and frameworks for internet of things applications.
SURVEY ARTICLE
- Rohit Sharma, Rajeev Arya:
Security threats and measures in the Internet of Things for smart city infrastructure: A state of art.
RESEARCH ARTICLES
- Manik Gupta, Ram Bahadur Patel, Shaily Jain, Hitendra Garg, Bhisham Sharma:
Lightweight branched blockchain security framework for Internet of Vehicles. - Deepak Kumar Sharma, Vidhi Jain, Bhavya Dhingra, Koyel Datta Gupta, Uttam Ghosh, Waleed S. Alnumay:
A novel Hypertuned Prophet based power saving approach for IoT enabled smart homes. - Shalini Dhar, Ashish Khare, Rajani Singh:
Advanced security model for multimedia data sharing in Internet of Things. - Ishita Chakraborty, Prodipto Das, Buddhadeb Pradhan:
An Intelligent Routing for Internet of Things Mesh Networks. - D. Sunitha, Kavitha Rani Balmuri, Rocío Pérez de Prado, Parameshachari Bidare Divakarachari, R. Vijayarangan, K. L. Hemalatha:
Congestion centric multi-objective reptile search algorithm-based clustering and routing in cognitive radio sensor network. - Hamza Sulimani, Akbar Muhammad Sajjad, Wael Y. Alghamdi, Omprakash Kaiwartya, Tony Jan, Simeon Simoff, Mukesh Prasad:
Reinforcement optimization for decentralized service placement policy in IoT-centric fog environment. - Sangjukta Das, Suyel Namasudra:
Lightweight and efficient privacy-preserving mutual authentication scheme to secure Internet of Things-based smart healthcare. - Ishaani Priyadarshini, Pinaki Mohanty, Ahmed Alkhayyat, Rohit Sharma, Sachin Kumar:
SDN and application layer DDoS attacks detection in IoT devices by attention-based Bi-LSTM-CNN. - M. Poongodi, Mounir Hamdi:
Intrusion detection system using distributed multilevel discriminator in GAN for IoT system. - Khalid Mahmood Awan, Madeeha Tariq, Kashif Naseer Qureshi, Thomas Newe, Gwanggil Jeon:
Congestion aware reward based scheme based on delay tolerant networks for emergency evacuation in 6G-based internet of things networks.
EDITORIAL
- Saru Kumari, Hu Xiong, Lyes Khoukhi, Joel J. P. C. Rodrigues:
Safety and security of autonomous vehicles.
RESEARCH ARTICLES
- Chien-Ming Chen, Qingkai Miao, Sachin Kumar, Tsu-Yang Wu:
Privacy-preserving authentication scheme for digital twin-enabled autonomous vehicle environments. - Ganesh Gopal Devarajan, M. Thirunavukkarasan, Sardar Irfanullah Amanullah, Vignesh T., Audithan Sivaraman:
An integrated security approach for vehicular networks in smart cities. - Haiyang Yu, Shuai Liu, Yilong Ren, Yanan Zhao, Han Jiang, Runkun Liu:
Reducing hysteresis and over-smoothing in traffic estimation: A multistream spatial-temporal graph convolutional network. - Yuanjian Zhou, Zhenfu Cao, Xiaolei Dong:
Dynamic identity-based broadcast proxy re-encryption for data sharing in autonomous vehicles. - Yilong Ren, Yuhao Liang, Xiaoyuan Feng, Yanan Zhao, Jiejie Zhao, Haiyang Yu:
A participant selection based vehicle platoon asynchronous federated learning framework. - Binhui Tang, Hai Da, Bochang Wang, Junfeng Wang:
MUDROID: Android malware detection and classification based on permission and behavior for autonomous vehicles. - Sean Joe Taylor, Farhan Ahmad, Hoang Nga Nguyen, Siraj Ahmed Shaikh, Jeremy W. Bryans, Charles Wartnaby:
A comparative analysis of multi-criteria decision methods for secure beacon selection in vehicular platoons.
Volume 34, Number 12, December 2023
RESEARCH ARTICLES
- B. R. Sreenivasa, Husam Lahza, Nandini G, Tawfeeq A. Shawly, Ahmed A. Alsheikhy, K. R. Naveen Kumar, Hassan Fareed M. Lahza:
Social context-aware macroscopic routing scheme for opportunistic network. - Belal Ali, Mark A. Gregory, Shuo Li:
Trust-aware task load balancing in multi-access edge computing based on blockchain and a zero trust security capability framework. - Ruyan Wang, Kang Wang, Yaping Cui, Peng He, Dapeng Wu:
Channel reconfiguration for intelligent reflecting surface-aided vehicular networks. - Syed Waqas Haider Shah, Marwa K. Qaraqe:
Energy-efficient machine type communication in HetNets under statistical QoS guarantees. - Periaswamy Bhanupriya, Ramachandran Balasubramanian:
Intelligent data offloading learning model for autonomous vehicular networks. - Soundararajan S., Vimal Shanmugam, D. Karunkuzhali, Pradeep Kumar S.:
Hybrid Pelican and Archimedes optimization algorithm fostered energy aware task scheduling in heterogeneous virtualized cloud computing. - Muhammad Faraz Hyder, Tasbiha Fatima, Shariq Mahmood Khan, Saadia Arshad:
Countering crossfire DDoS attacks through moving target defense in SDN networks using OpenFlow traffic modification. - Rojin Aslani, Ebrahim Saberinia:
Energy-efficient power control and altitude planning for UAV-based vehicular communications in 5G NR-V2X networks. - Yue Zhong, Jinbo Wen, Junhong Zhang, Jiawen Kang, Yuna Jiang, Yang Zhang, Yanyu Cheng, Yongju Tong:
Blockchain-assisted twin migration for vehicular metaverses: A game theory approach. - Subhankar Ghosh, Anuradha Banerjee, Abu Sufian, Sachin Kumar Gupta, Saeed H. Alsamhi, Abdu Saif:
Efficient selfish node detection using SVM in IoT-MANET environment. - Mousa Alizadeh, Mohammad T. H. Beheshti, Amin Ramezani, Sadegh Bolouki:
An optimized hybrid methodology for short-term traffic forecasting in telecommunication networks. - Nishi Yadav, Pabitra Mohan Khilar:
UASN-3D: An energy efficient localization based on LEACH-BR algorithm (EELBL-BR). - Jun Yang:
NN-based method for regulating electrical impulse firing behavior of semiconductor low-dimensional nanomaterials. - Madhumitha Kulandaivel, Ganesh Kumar, Sathiyamoorthi Velayutham, Sachin Kumar Gupta:
A novel sensitive DDoS attacks against statistical test in network traffic fusion. - Bülent Bilgehan, Özlem Sabuncu:
Optimized blockchain network model for 6G cellular vehicle-to-everything communication.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.