Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 13 Sep 2024Bibliometrics
Skip Table Of Content Section
research-article
WOATCA: A secure and energy aware scheme based on whale optimisation in clustered wireless sensor networks

Clustering is an important method for extending the network life of each node in wireless sensor networks. Owing to the untrustworthy environment, these nodes unintentionally sacrifice their energy and lost their life which is a major challenge and ...

research-article
ICI analysis of hyperbolic FRFT‐FBMC based on optimal order of transform for Internet of Things applications

This study aimed at analysing intercarrier interference (ICI) of filter bank multicarrier signals which are made by hyperbolic fractional Fourier transform, depend on optimum order of transform for the Internet of Things applications. Calculation of ICI ...

research-article
Construction of new codes in term‐rank metric

This study investigates codes in the term‐rank metric. These codes can be used to correct crisscross errors in a (M×N) matrix. These errors can be found in memory chip arrays, in magnetic tape recordings, or in the parallel‐channel system with ...

research-article
Security‐reliability tradeoff for multi‐terminal multi‐mode coexisting systems in the presence of multiple eavesdroppers

In this study, the authors explore a wireless network consisting of multiple smart terminals relying on multi‐mode in the presence of an eavesdropper, where the eavesdropper may be deployed to wiretap the wireless communications deliberately. In general, ...

research-article
Altitude and number optimisation for UAV‐enabled wireless communications

This study considers a downlink power consumption problem for unmanned aerial vehicles (UAVs)‐assisted wireless communications, in which UAVs are used as aerial base stations to provide service for the ground users and equipped with a directional antenna ...

research-article
Joint users selection and beamforming in downlink millimetre‐wave NOMA based on users positioning

In this study, joint users selection and beamforming based on users positioning are proposed for enabling non‐orthogonal multiple access (NOMA) in the millimetre‐wave (mmWave) transmissions. In the proposed scheme, the mmWave users are arranged in ...

research-article
Channel correlation relied grouped spatial modulation for massive MIMO systems

Massive multiple‐input multiple‐output (MIMO) systems with hundreds of correlated antennas at base station are capable of offering abundant spatial resources. When spatial‐domain modulation is applied to these systems, the spatial modulation (SM) using ...

research-article
Coverage analysis of dynamic TDD‐based downlink mmWave network with k−μ shadowed fading and BS heights

In this study, the authors analyse the downlink (DL) performance of dynamic‐time division duplexing (D‐TDD) enabled millimetre‐wave (mmWave) network with different base station (BS) heights using a channel model that incorporates the effect of shadowed ...

research-article
Alternate hybrid precoding algorithm for wideband millimetre wave massive MIMO systems

Hybrid precoding, combining the digital and analogue precoding, is a key enabler to reach a compromise between system performance and hardware complexity in millimetre wave (mmWave) massive multiple‐input multiple‐output (MIMO) systems. Most previous ...

research-article
BER performance of OCDMA system based on optimised 2D PhC passive encoder

This study introduces an accurate design and optimisation of a passive optical code division multiple access (OCDMA) network encoder using the coupled cavity waveguide (CCW) as an optical delay line. Such CCW has the capability of providing more time ...

research-article
Traffic modelling of smart city internet of things architecture

Internet of things (IoT) is one of the modern technologies, developing existing cellular communication networks to the emerging fifth‐generation technology. The traffic modelling of IoT applications is different from the recommended traffic modelling of a ...

research-article
DOA estimation method of electronically controlled beam‐scanning LWA based on ESPRIT algorithm

A novel direction‐of‐arrival (DOA) estimation method based on electronically controlled beam scanning leaky‐wave antenna (LWA) combined with estimation of signal parameters via rotational invariance techniques (ESPRIT) algorithm is proposed. In order to ...

research-article
Secure full duplex OFDM wireless communication based on phase relay between the legitimate nodes

This study proposes a scheme to realise secure orthogonal frequency‐division multiplexing (OFDM) wireless communication between two full duplex nodes—node A and node B. If node A wants to send secret messages to node B, node A and node B transmit the ...

research-article
Algorithm for energy consumption minimisation in wireless sensor network

Wireless sensor network (WSN) consists of spatially distributed miniature size and autonomous nodes along with batteries as a power source. The major bottleneck of WSN is efficient energy utilization. The energy consumption for transmission of signals ...

research-article
Adaptive mesh size (AMS) algorithm for energy efficiency maximisation in underlay D2D communication

The need to maximise energy efficiency (EE) for device‐to‐device (D2D) communication has become an urgent necessity for the fifth‐generation wireless networks. In this study, the power allocation problem is considered for the cellular system underlaid ...

research-article
Reconstruction of C&C channel for P2P botnet

Breaking down botnets has always been a big challenge. The robustness of command and control (C&C) channels is increased, and the detection of botmaster is harder in peer‐to‐peer (P2P) botnets. In this study, the authors proposed a probabilistic method to ...

research-article
Adaptive modulation and frame length method based on Moore state machine in LTE‐R communication system

In this study, the problem of adaptive modulation and frame length (AMFL) is investigated in long‐term evolution for railway (LTE‐R) communication system. By considering the effect of frame length, a novel AMFL strategy based on Moore state machine (MSM) ...

research-article
4‐ary 14/16 modulation code for reducing two‐dimensional inter‐symbol interference

Holographic data storage (HDS) can access data in a short amount of time and can also quickly transmit data because HDS records and reads data in units of pages. Thus HDS is regarded as a promising candidate for future optical recording storage systems. ...

research-article
Cooperative wideband spectrum sensing in cognitive radio based on sparse real‐valued fast Fourier transform

The Cognitive Radio (CR) plays a key role in identifying free bandwidths in the Radio Frequency (RF) spectrum. High‐speed Analog‐to‐Digital Converters are normally applied for spectrum sensing of sideband signals providing several raw data for digital ...

research-article
Optimal bit allocation scheme for distributed detection system with imperfect channels

There are two main classes of decision fusion methods, namely hard decision fusion (HD) and soft decision fusion (SD), in which the number of bits transmitted by each local sensor to the fusion centre (FC) is always same, namely one bit in HD and n (n ≥ 2)...

Subjects

Currently Not Available

Comments