Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 219, Issue CApr 2024Current Issue
Bibliometrics
Skip Table Of Content Section
editorial
Review Articles
review-article
A survey on privacy-preserving authentication protocols for secure vehicular communication
Abstract

Secure vehicular communication is one of the challenges of vehicular technology. The main goal of vehicular ad hoc networks is to prevent road accidents and collisions by transferring traffic signals and essential information to vehicles ...

review-article
A survey on integrated computing, caching, and communication in the cloud-to-edge continuum
Abstract

Cloud and edge computing have proposed different functionalities to enable multiple applications requiring different communication, computing, and caching (3C) resources. The upcoming futuristic applications (e.g., metaverse, holographic, and ...

Regular Articles
research-article
An efficient and certificateless conditional privacy-preserving authentication and key agreement scheme for smart healthcare
Abstract

Smart healthcare overcomes the limitations of time and space, allowing users to access medical and health services anywhere and anytime, thus improving the quality and efficiency of these services. However, due to its excessive reliance on ...

research-article
Optimization and analysis of air-to-ground wireless link parameters for UAV mounted adaptable Radar Antenna Array
Abstract

Unmanned Aerial Vehicles (UAVs) are rapidly used in a variety of applications such as surveillance, search and rescue operation, delivery, etc. These operations strongly depend on the performance of the air-to-ground (A2G) communication link. ...

research-article
AP-assisted adaptive video streaming in wireless networks with high-density clients
Abstract

Adaptive video streaming over wireless networks has experienced tremendous growth in past few years. In order to guarantee users’ quality of experience (QoE), adaptive bitrate (ABR) algorithms have been extensively studied. With the recent ...

research-article
STI: A self-evolutive traffic identification system for unknown applications based on improved random forest
Abstract

Artificial intelligence technology has proven potential and effective in traffic identification for network management and security. However, the accuracy of its identification is easily influenced by the massive unknown traffic. Given the fact ...

research-article
Comprehensive fault diagnosis in UAV-assisted sensor networks: A three-phase automated approach
Abstract

Ensuring operational safety in an automated working environment is a crucial requirement. In this article, we propose a technique for automated fault diagnosis in unmanned aerial vehicle-based sensor networks (UAV-sensor networks) aimed ...

research-article
Interaction behavior enhanced community detection in online social networks
Abstract

Community detection in online social networks (OSNs) has attracted a great deal of attention in recent years due to its potential prospects in applications such as recommendation systems, spam detection, targeted advertising, etc. However, ...

research-article
Relay selection in Underwater Acoustic Sensor Networks for QoS-based cooperative communication using game theory
Abstract

Underwater Acoustic Sensor Networks (UASN) plays a crucial role in monitoring and transmitting environmental information for marine resource exploration. However, underwater communication faces significant challenges such as signal attenuation, ...

Highlights

  • A novel relay selection strategy for UASN was devised using potential game theory.
  • The feasibility and existence of pure strategy NE in the proposed game were verified.
  • A low-complexity algorithm, QoS-RSIA was proposed to gain ...

research-article
Secrecy outage performance of MIMO-NOMA relay systems with MRT/MRC schemes
Abstract

Non-orthogonal multiple access (NOMA) systems have indicated that they can provide higher spectral efficiency and secrecy capability compared with orthogonal multiple access (OMA) conventional systems. Therefore, the NOMA technique is expected to ...

research-article
Automated aerial assessment for seamless adaptive adhoc restoration in partially collapsed network
Abstract

Disasters often result in widespread infrastructure failures, leading to network blackouts that impede critical information dissemination and hamper search-and-rescue operations. This paper presents a novel methodology for expedited assessment ...

research-article
A novel hardware efficient design for IEEE 802.11ax compliant OFDMA transceiver
Abstract

The introduction of Multi User (MU) communication in IEEE 802.11ax in the frequency domain via MU Orthogonal Frequency Division Multiple Access (MU-OFDMA) and in the spatial domain via MU Multiple Input Multiple Output (MU-MIMO) enables the ...

research-article
LoRa localisation using single mobile gateway
Abstract

Effective use of GPS and mobile networks for localisation in rangeland areas is constrained by their high power consumption and high deployment costs. Long-range (LoRa), a low-power wide area network (LPWAN) technology, can be employed to ...

Highlights

  • It proposes a novel methodology for localisation using a single mobile LoRa gateway.
  • Machine learning is used to map the distance between targets and gateway from RSSI.
  • Three LoRa datasets were collected in semi-line-of-sight ...

research-article
Physical layer security analysis for RIS-aided NOMA systems with non-colluding eavesdroppers
Abstract

Within the realm of sixth-generation (6G) wireless systems, there exist two primary imperatives: establishing massive connections and ensuring robust data transmission security. Therefore, this paper delves into the realm of physical layer ...

research-article
COCKTAIL: Video streaming QoE optimization with chunk replacement and guided learning
Abstract

Adaptive bitrate (ABR) algorithms aim to provide the best user quality of experience (QoE) under fluctuating operating environments. Prior ABR protocols address the QoE maximization problem with a plethora of approximate optimization techniques ...

research-article
Covert communication in hybrid microwave/mmWave UAV-enabled systems with transmission mode selection
Abstract

This paper investigates the covert communication in an air-to-ground (A2G) system, where a UAV (Alice) can adopt the omnidirectional microwave (OM) or directional mmWave (DM) transmission mode to transmit covert data to a ground user (Bob) while ...

research-article
Fairness-oriented multicast routing for distributed interactive applications
Abstract

Facing the challenges of network services on the edge, such as routing considering Quality of Service, is a crucial issue for current networking research efforts. Multicast routing is an essential technique for delivering routing services at a ...

research-article
Benchmarking methodology for IPv4aaS technologies: Comparison of the scalability of the Jool implementation of 464XLAT and MAP-T
Abstract

A novel method is proposed for the performance and scalability measurements of the IPv4-as-a-Service (IPv4aaS) technologies. It works according to the dual Device Under Test (DUT) setup of RFC 8219 and is suitable for benchmarking any of the five ...

research-article
Multi-round transmission and contention protocol in WLANs with multi-packet reception
Abstract

Nowadays, there are many scenarios in Wi-Fi networks where many devices compete for network access via an Access Point to transmit their information. Thus, the ability to separate multiple packets sent simultaneously using advanced digital ...

VSI: NSAI for Smart City
research-article
Enhancement of edge-based surveillance videos based on bilateral filtering
Abstract

Digital pictures are modified during the process of image enhancement to provide outcomes that are more suited for display or additional image analysis. Up to now, many achievements have been made in the field of image enhancement processing. ...

VSI:Intelligent DFS for IoT
research-article
KDSMALL: A lightweight small object detection algorithm based on knowledge distillation
Abstract

With the development of computer vision, small object detection has become a research pain point and difficulty in computer vision. Feature acquisition and accurate localization of small objects are two serious challenges that exist for small ...

Highlights

  • The KDSAMLL algorithm, a lightweight small target detection algorithm, was fused into the YOLOV5s benchmark network test and its mAP metrics improved by 24.5% on the VOC2007+2012 dataset.
  • Knowledge distillation of the teacher–student ...

Comments