-
Symbol detection based on a novel discrete harmony search algorithm in MIMO-FBMC/OQAM system Wireless Netw. (IF 3.0) Pub Date : 2024-03-17
Abstract Due to its high spectral efficiency and various other advantages, filter bank multicarrier/offset quadrate amplitude modulation (FBMC/OQAM) has long been considered as a candidate waveform for the fifth generation (5G) and beyond telecommunication technologies. On the other hand, it is possible to both increase the data rate and alleviate the channel fading effects by using the multiple-input
-
A distributed relay selection using a fuzzy-BCM based decision making strategy for multi-hop data dissemination in VANETs Wireless Netw. (IF 3.0) Pub Date : 2024-03-15
Abstract In urban Vehicular Ad-hoc Networks (VANETs), disseminating traffic data efficiently is challenging due to the dynamic and complex nature of the network. Multi-hop-based broadcasting approaches are commonly used to address this issue. However, selecting the optimal relay nodes poses a challenge and directly impacts network performance. Existing relay selection strategies, such as beacon-based
-
NLOS error mitigation in TOA systems Wireless Netw. (IF 3.0) Pub Date : 2024-03-15
Abstract To address the problem of low indoor positioning accuracy in time-of-arrival systems in the non-line-of-sight (NLOS) environments, we proposed an optimized positioning algorithm based on semidefinite programming (SDP). This algorithm reduces the NLOS error through a novelty method. Compared with the original SDP algorithm, we optimized the algorithm’s objective function by avoiding its dependence
-
Multi-component signal separation based on ALSAE Wireless Netw. (IF 3.0) Pub Date : 2024-03-13
Abstract Most research in the field of radar signal processing focuses on the use of time-frequency images (TFIs) to distinguish between different signal types. However, most studies have only examined the TFIs of a single signal, making it challenging to analyze and process the simultaneous reception of multiple signal components. This study proposes the use of adversarial latent separation auto encoder
-
Longitudinal tear detection method for conveyor belt based on multi-mode fusion Wireless Netw. (IF 3.0) Pub Date : 2024-03-13 Yimin Wang, Yuhong Du, Changyun Miao, Di Miao, Yao Zheng, Dengjie Yang
-
M-EOS: modified-equilibrium optimization-based stacked CNN for insider threat detection Wireless Netw. (IF 3.0) Pub Date : 2024-03-10 A. Anju, M. Krishnamurthy
Insider threats remain a serious anxiety for organizations, government agencies, and businesses. Normally, the most hazardous cyber attacks are formed by trusted insiders and not by malicious outsiders. The malicious behaviors resulting from unplanned or planned mishandling of resources, data, networks, and systems of an organization constitute an insider threat. The unsupervised behavioral anomaly
-
SEACDSC: secure and energy-aware clustering based on discrete sand cat swarm optimization for IoT-enabled WSN applications Wireless Netw. (IF 3.0) Pub Date : 2024-03-09 Walid Osamy, Ahmed M. Khedr, Ahmed A. Elsawy, P. V. Pravija Raj, Ahmed Aziz
-
Mobile anchor node assisted node collaborative localization based on light reflection in WSN Wireless Netw. (IF 3.0) Pub Date : 2024-03-09 Minghua Wang, Chang Huang
-
Privacy-preserving V2I communication and secure authentication using ECC with physical unclonable function Wireless Netw. (IF 3.0) Pub Date : 2024-03-08 Iqra Nawaz, Munam Ali Shah, Abid Khan, Seunggil Jeon
-
Design of miniaturized ultra-wide stopband lowpass-bandpass diplexer using hexagon-shaped resonators Wireless Netw. (IF 3.0) Pub Date : 2024-03-08 Ali-Reza Zarghami, Mohsen Hayati, Sepehr Zarghami
-
Generative channel estimation for intelligent reflecting surface-aided wireless communication Wireless Netw. (IF 3.0) Pub Date : 2024-03-07
Abstract Intelligent reflecting surface (IRS) has emerged as a viable technology to enhance the spectral efficiency of wireless communication systems by intelligently controlling wireless signal propagation. In wireless communication governed by the IRS, the acquisition of channel state information (CSI) is essential for designing the optimal beamforming. However, acquiring the CSI is difficult as
-
An anonymous mutual authentication and key agreement scheme in WMSN using physiological data Wireless Netw. (IF 3.0) Pub Date : 2024-03-06 Shanvendra Rai, Rituparna Paul, Subhasish Banerjee, Preetisudha Meher
-
-
Multi-objective optimized multi-path and multi-hop routing based on hybrid optimization algorithm in wireless sensor networks Wireless Netw. (IF 3.0) Pub Date : 2024-03-05 Madhav Singh, Laxmi Shrivastava
-
An efficient surrogate-assisted Taguchi salp swarm algorithm and its application for intrusion detection Wireless Netw. (IF 3.0) Pub Date : 2024-03-01 Shu-Chuan Chu, Xu Yuan, Jeng-Shyang Pan, Tsu-Yang Wu, Fengting Yan
-
Distributed energy-efficient wireless sensing and information fusion via event-driven and state-rank activation Wireless Netw. (IF 3.0) Pub Date : 2024-03-01 Juteng Fu, Xiang Ma, Hang Yu, Keren Dai
-
MH-SIA: multi-objective handover using swarm intelligence algorithm for future wireless communication system Wireless Netw. (IF 3.0) Pub Date : 2024-02-29
Abstract Heterogeneous networks are needed to meet user demands as wireless network demand rises. Network mobility management is crucial. Mobility management challenges are related to handover solutions to decrease call/packet losses in such networks. The handover is one of the most critical parts of mobility management in the Long-Term Evolution of Advanced (LTE-A) system, which relies on handover
-
Exploring machine learning solutions for overcoming challenges in IoT-based wireless sensor network routing: a comprehensive review Wireless Netw. (IF 3.0) Pub Date : 2024-02-29
Abstract An industry-wide paradigm change has been sparked by the growth of Internet of Things (IoT)-based Wireless Sensor Networks (WSNs), which has made reliable and effective routing methods necessary. This thorough analysis looks at how Machine Learning (ML) techniques may be used to solve the problems that come with WSN routing. A summary of standard routing algorithms and an examination of their
-
Secure shortest distance queries over encrypted graph in cloud computing Wireless Netw. (IF 3.0) Pub Date : 2024-02-29
Abstract Graph databases have received increased interests as many applications are handled as graph problems. Shortest distance queries are one of the fundamental operations and have been studied for recent years. To ensure the data and query privacy, researchers have introduced some secure graph encryption schemes which support the shortest distance queries on a large-scale graph database. Unfortunately
-
An adaptive trust system for misbehavior detection in wireless sensor networks Wireless Netw. (IF 3.0) Pub Date : 2024-02-28
Abstract Trust management has been shown to be an effective technique for protecting networks from malicious nodes and ensuring wireless sensor network (WSN) security. A number of trust systems have been proposed, but most of them are not adaptative to the current state of network security and the intensity of the attacks to which they are subjected, especially in the case of collaborative attacks
-
Performance evaluation of OFDMA and aggregation downlink stateless service disciplines in Wi-Fi networks Wireless Netw. (IF 3.0) Pub Date : 2024-02-27 Anh Tuan Giang, Anthony Busson
-
Quad element luna-shaped UWB-MIMO antenna with improved isolation and gain using novel decoupling networks Wireless Netw. (IF 3.0) Pub Date : 2024-02-26
Abstract The research article outlines the evolution of a quad-element Luna-shaped UWB MIMO with enhanced isolation and gain using novel decoupling networks. The described MIMO module is tailored on a FR4 substrate of area 45 × 45 mm2 (0.378 λ0 × 0.378 λ0), where λ0 is estimated at 2.52 GHz, and 7 mm (0.0588 λ0) element to element separation between the radiators. It has 4 Luna-shaped radiators. The
-
A healthcare application based on IoT devices Wireless Netw. (IF 3.0) Pub Date : 2024-02-26 Yamna Ghoul, Omar Naifar
-
Fast monte-carlo clustering for signal separation of RFID collision tags at physical layer Wireless Netw. (IF 3.0) Pub Date : 2024-02-26 Yu Zeng, Hongwei Ding, Haifeng Wu
-
Updated exploration of the Tor network: advertising, availability and protocols of onion services Wireless Netw. (IF 3.0) Pub Date : 2024-02-25
Abstract The Tor network is known for its opaque characteristics and involvement in illicit activities, motivating to shed light on the exposure, lifetime, and functionalities of onion services. This study focuses on the appearance of Tor links in online advertising and monitors the connectivity status and protocols of the collected onion domains through the Tor network over 105 days. Out of 54,602
-
Dual-band RF energy harvesting for low-power IoT devices Wireless Netw. (IF 3.0) Pub Date : 2024-02-24 Jumin Zhao, Jiajian Song, Deng-ao Li, Yajun Li, Jie Cheng
-
Load based dynamic channel allocation model to enhance the performance of device-to-device communication in WPAN Wireless Netw. (IF 3.0) Pub Date : 2024-02-22 J. Logeshwaran, R. N. Shanmugasundaram, Jaime Lloret
-
Heterogeneous Lifi–Wifi with multipath transmission protocol for effective access point selection and load balancing Wireless Netw. (IF 3.0) Pub Date : 2024-02-21 R. Arunkumar, B. Thanasekhar
-
Impactless association methods for wi-fi based time-sensitive networks Wireless Netw. (IF 3.0) Pub Date : 2024-02-21 Pablo Avila-Campos, Jetmir Haxhibeqiri, Ingrid Moerman, Xianjun Jiao, Jeroen Hoebeke
-
Block chain espoused adaptive multi-scale dual attention network with quaternion fractional order meixner moments encryption for cyber security in wireless communication network Wireless Netw. (IF 3.0) Pub Date : 2024-02-21 S. Soundararajan, B. Nithya, N. Nithya, T. Vignesh
-
A weighted cooperative spectrum sensing strategy for NGSO–GSO downlink communication Wireless Netw. (IF 3.0) Pub Date : 2024-02-20 Xiaoyan Zhang, Chao Tang, Yueyun Chen
-
Beam prediction and tracking mechanism with enhanced LSTM for mmWave aerial base station Wireless Netw. (IF 3.0) Pub Date : 2024-02-16
Abstract By combining millimeter wave (mmWave) with abundant spectral resources and advanced directional beamforming technology, mmWave aerial base stations (mAeBSs) can provide high-speed services to users on the ground while reducing interference to existing terrestrial networks. Due to the mobility of users and the corresponding changes of other environmental factors, the beam misalignment between
-
Link failure handling and controller memory overhead elimination in SDN through source path routing model technique Wireless Netw. (IF 3.0) Pub Date : 2024-02-16 P. Golda Jeyasheeli, V. Nahshon Vanahpeter, M. Dhanush Holla
-
Performance evaluation of multiple relay SWIPT enabled cooperative NOMA network in the presence of interference Wireless Netw. (IF 3.0) Pub Date : 2024-02-15 Mahrukh Liaqat, Kamarul Ariffin Noordin, Tarik Abdul Latef, Kaharudin Dimyati, Talha Younas, Faizan Qamar, Zhiguo Ding
-
Optimizing resource allocation for D2D communications with incomplete CSI Wireless Netw. (IF 3.0) Pub Date : 2024-02-14 Jun Xu, Dejun Yang
-
An improved path loss model for 5G wireless networks in an enclosed hallway Wireless Netw. (IF 3.0) Pub Date : 2024-02-13 Tolulope T. Oladimeji, Pradeep Kumar, Mohamed Elmezughi
-
Asymmetric CPW-fed patch antenna with slits at terahertz applications for 6G wireless communications Wireless Netw. (IF 3.0) Pub Date : 2024-02-12
Abstract This paper presents a compact portable patch antenna for 6G wireless communications at terahertz (THz) applications. The asymmetric co-planer waveguide (CPW) fed curved slits are proposed on rectangular microstrip patch antenna to resonate at THz applications. The asymmetric CPW-fed antenna is designed to be 50 μm thick on FR-4 substrate with 500 × 500 µm2 rectangular substrate with gold plating
-
MF-Informer for long-term QoS prediction in edge-cloud collaboration environments Wireless Netw. (IF 3.0) Pub Date : 2024-02-09 Min Wang, Zixu Wang, Shikai Tang
-
Edge-enabled anomaly detection and information completion for social network knowledge graphs Wireless Netw. (IF 3.0) Pub Date : 2024-02-09 Fan Lu, Huaibin Qin, Quan Qi
-
Modeling of a high gain two stage pHEMT LNA using ANN with Bayesian regularization algorithm Wireless Netw. (IF 3.0) Pub Date : 2024-02-08 Vignesh Thangaraj, Srie Vidhya Janani Elangeswaran, Bhuvaneshwari Subburaman, Jayshri Kulkarni
-
Employing blockchain and IPFS in WSNs for malicious node detection and efficient data storage Wireless Netw. (IF 3.0) Pub Date : 2024-02-08
Abstract The presence of the malicious internet of things (IoT) devices in wireless sensor networks (WSNs), in the underlying work, is identified using a private blockchain and interplanetary file system (IPFS) based system. In the proposed model, the registration of IoT devices is being done via the IoT device manager. After registration, the IoT devices send a request to get services from the IoT
-
An adaptive model of optimal traffic flow prediction using adaptive wildfire optimization and spatial pattern super learning Wireless Netw. (IF 3.0) Pub Date : 2024-02-03 Rishabh Jain, Sunita Dhingra, Kamaldeep Joshi, Amit Grover
-
An energy efficient routing algorithm in wireless underground sensor networks Wireless Netw. (IF 3.0) Pub Date : 2024-02-06 Mai Ha Thi, Tran Tuan Toan, Nguyen Tran Quoc Vinh, Dang Thanh Hai, Tran Manh Tuan, Le Hoang Son
-
A high-capacity slicing PBFT protocol based on reputation evaluation model Wireless Netw. (IF 3.0) Pub Date : 2024-02-04
Abstract Consortium blockchains, characterized by regulated blockchain technologies with limited authorization management, have gained popularity in various domains, including supply chain, Internet of Things (IoT), justice, and education, and have now become an integral part of production life. Ensuring information consistency in blockchains, the practical byzantine fault tolerance (PBFT) consensus
-
Multi-agent based optimal UAV deployment for throughput maximization in 5 G communications Wireless Netw. (IF 3.0) Pub Date : 2024-02-04
Abstract Unmanned aerial vehicle (UAV)-mounted base station is an emerging technology to provide controlled wireless communication for ground users. The high mobility of the UAV adds additional degrees of freedom for optimal deployment, which can significantly improve the the achievable rate. Therefore, the optimal deployment of multiple-UAV is one of the critical challenges in UAV-assisted communication
-
Energy efficient optimal parent selection with Chameleon Swarm algorithm and non-overlapping backoff algorithm based dynamic slot allocation in wireless body area network Wireless Netw. (IF 3.0) Pub Date : 2024-02-02 Illapu Sankara Srinivasa Rao, N. R. Rajalakshmi
-
High priority space protection (HPP): countdown space-based MAC protocol with enhanced lockdown effect Wireless Netw. (IF 3.0) Pub Date : 2024-02-02 Ivan Kedžo, Ante Kristić, Vesna Pekić, Ivana Zulim
-
Outage analysis of downlink communications in heterogeneous networks under backhaul constraint Wireless Netw. (IF 3.0) Pub Date : 2024-02-02 Reyhaneh Allahyari, Zolfa Zeinalpour-Yazdi, Ali Akbar Tadaion
-
A new intrusion detection system based on SVM–GWO algorithms for Internet of Things Wireless Netw. (IF 3.0) Pub Date : 2024-02-01 Hamed Ghasemi, Shahram Babaie
-
Multi-cluster MIMO non-orthogonal multiple access for multi-cell systems Wireless Netw. (IF 3.0) Pub Date : 2024-02-01 Changyong Shin
-
Enhanced passive optical network system-based VCSEL and PSK electrical modulator for 5th generation Wireless Netw. (IF 3.0) Pub Date : 2024-02-01
Abstract The rapid evolution of passive optical network (PON) technologies has been driven by the necessity to accommodate 5th-generation system requirements. This research introduces a PON wavelength division multiplexing-based optical transmitter that is improved in both fiber link and bit rate. The transmitter is designed to connect many clients to a single-mode optical fiber. The optical transmitter
-
A machine learning-based analytical intelligence system for forecasting demand of new products based on chlorophyll: a hybrid approach Wireless Netw. (IF 3.0) Pub Date : 2024-01-31 Roman Rodriguez-Aguilar, Jose Antonio Marmolejo-Saucedo, Eduardo Garcia-Llamas, Miriam Rodríguez-Aguilar, Liliana Marmolejo-Saucedo
-
OMIBC: optimal modified identity-based cryptography for signcryption and private key extraction using fuzzy model Wireless Netw. (IF 3.0) Pub Date : 2024-01-30 Sumithra Alagarsamy, Vijayalakshmi Nagarajan, M. M. Yamuna Devi
-
Novel energy consumption and reduces number of transmission attempts (ECRTA) model for heterogeneous wireless muti-hop network Wireless Netw. (IF 3.0) Pub Date : 2024-01-29 V. Samuthira Pandi, E. Sivajothi, P. R. Therasa, R. Shalini Rajan
-
Transfer and online learning for IP maliciousness prediction in a concept drift scenario Wireless Netw. (IF 3.0) Pub Date : 2024-01-28 David Escudero García, Noemí DeCastro-García
-
Mitigating communications threats in decentralized federated learning through moving target defense Wireless Netw. (IF 3.0) Pub Date : 2024-01-28
Abstract The rise of Decentralized Federated Learning (DFL) has enabled the training of machine learning models across federated participants, fostering decentralized model aggregation and reducing dependence on a server. However, this approach introduces unique communication security challenges that have yet to be thoroughly addressed in the literature. These challenges primarily originate from the
-
Full duplex reconfigurable intelligent surfaces system relying on NOMA and wireless power transfer Wireless Netw. (IF 3.0) Pub Date : 2024-01-27 Minh-Sang Van Nguyen, Dinh-Thuan Do, Phu Tran Tin, Agbotiname Lucky Imoize, Vinoth Babu Kumaravelu
-
Modulation recognition network compression based on a randomly perturbation convolutional kernel activation mapping method Wireless Netw. (IF 3.0) Pub Date : 2024-01-27 Chengqiang Zhao, Jiashu Zhang, Fan Ni
-
Density-based anti-clustering for scheduling D2D communications Wireless Netw. (IF 3.0) Pub Date : 2024-01-27
Abstract Wireless link scheduling in device-to-device (D2D) networks is an NP-hard problem. As a solution, multiple supervised deep learning (DL) models have been recently proposed, which depend on the geographical information of D2D pairs. However, such DL models require labeled training data. In this paper, we focus on unsupervised learning of scheduling. More specifically, this paper proposes using
-
Cloud data access governance and data security using distributed infrastructure with hybrid machine learning architectures Wireless Netw. (IF 3.0) Pub Date : 2024-01-26 C. Tamizshelvan, V. Vijayalakshmi