Export Citations
A deep learning approach based on Richardson and Gauss–Seidel for massive MIMO detection
Massive multiple‐input multiple‐output (MIMO) systems can improve the spectrum utilization and the system capacity, but this also increases the computational complexity of the signal detection. The existing iterative algorithms can greatly ...
First, RIGS, a hybrid method of RI (Richardson) and GS (Gauss–Seidel), is proposed. Second, in response to the fact that the performance of RIGS is limited by spatially correlated channels, an RIGS‐based deep learning network (RGNet) is proposed to ...
An improved low‐carbon intelligent agriculture system with energy optimization principles using wireless IoT environment
A low‐carbon agricultural plan and intelligent agriculture control system are designed and completed with a green economy to foster the significant expansion of green resources and environmental assets. This research employs a fixed‐effect panel ...
Improved low‐carbon intelligent agriculture system. image image
EWA‐DA‐based resource allocation method for 5G networks
In 5G networks, most D2D work focuses on optimizing system throughput without addressing economic constraints. This article encourages users to exchange resources and apply honest bidding tactics to attain high auction efficiency. This study ...
The throughput maximization, economic issues and truthful bidding are the essential parameters for resource sharing between the cellular user (CU) and Device‐to‐Device (D2D) users in 5G networks. However, most of the literature on D2D focuses on ...
A federated learning privacy framework for missing data inference in environmental crowd sensing
Federated learning (FL) is an attractive solution which holds promise to efficiently realize intelligent privacy‐preserving IoT systems. It does so by training local models at the IoT devices using locally collected data and aggregating these ...
This first part of this study examines the validity of using federated learning (FL) in the context of missing data inference in environmental MCS for ensuring data privacy. However, some intelligent attacks may infer user data from the model updates ...
HTG: A heterogeneous topology aware model to improve cold start in cloud service QoS prediction
The massive deployment of cloud services makes it a significant challenge to guarantee end‐to‐end QoS, QoS prediction is used to address this challenge. Accurate QoS prediction values can help select quality services and sense the network ...
We propose a Heterogeneous Topology aware model based on Graph neural network (HTG) for cloud service QoS prediction. HTG predefines the node information aggregation approach so that graph neural network (GNN) can efficiently capture the invocation ...
Joint switch controlling and subvectors permutation for quadrature index modulation with hybrid constellations
In this paper, the switch and permutation index domains are developed for improving the spectral efficiency (SE) and the reliability of wireless communication. Firstly, a new schematic of quadrature index modulation with hybrid constellation (...
We proposed a new schematic of quadrature index modulation with hybrid constellation to exploit the switch index domain. Furthermore, another new design, jointing permutation index and hybrid constellation for the QIM system (JPQIM‐HC) is proposed to ...
Mutation boosted salp swarm optimizer meets rough set theory: A novel approach to software defect detection
Software defect detection (SDD) is crucial to ensure the reliability of software systems and identify defects in classification. One of the key challenges in defect detection is to select more informative and relevant features from the vast pool ...
Novel Approach: The research introduces a novel approach that combines two powerful techniques, mutation boosted salp swarm optimizer (MBSSO) and Rough Set Theory, for feature selection (FS) in software defect detection (SDD). This hybrid approach ...
DMUST360: Distortion‐aware multicast‐unicast superposed transmission for multiuser 360‐degree video
360‐degree video has gained popularity since it is associated with immersive user experience of virtual reality content. However, providing high‐quality 360‐degree video for a large number of users is difficult, especially in limited bandwidth ...
This article introduced a novel distortion‐aware multicast‐unicast superposed transmission scheme for multiuser 360‐degree video, which combined the advantages of multicast, unicast, and non‐orthogonal multiple access technologies with consideration of ...
Dynamic sliding window‐cooperative spectrum sensing against massive SSDF attack in interweave cognitive internet of things
To improve spectrum utilization, cognitive radio (CR) enables unauthorized internet of thing (IoT) devices to opportunistically access the channel underutilized by the primary user (PU) in a cognitive IoT (CIoT). To this end, cooperative ...
Privacy‐preserving WiFi‐based crowd monitoring
The process of estimating the number of individuals within a defined area, commonly referred to as people counting, is of paramount importance in the realm of safety, security and crisis management. It serves as a crucial tool for accurately ...
Our study focuses on leveraging WiFi fingerprinting, specifically probe request messages, for accurate people counting and crowd monitoring. Our proposed solution incorporates privacy‐preserving measures, such as Bloom filters, to align with evolving ...
QAKA: A novel quantum authentication and key agreement (QAKA) protocol using quantum entanglement for secure communication among IoT devices
The constant evolution of the Internet of Things (IoT) concept involves the idea that all elements in the global network communication are reachable without the need for human intervention. In this context, the paramount concern is security, ...
The proposed quantum authentication and key agreement (QAKA) protocol efficiently resolves mutual authentication and key distribution issues by utilizing quantum cryptography. The formal proof of the proposed protocol is provided using Burrows, Abadi, and ...
DAC‐MD: A privacy preserving drone‐access control scheme for last mile delivery
The service delivery has lately witnessed strides in the form of paradigm shifts from conventional logistics to drone‐oriented supply chain to conserve ecosystem. The use of drones or unmanned aerial vehicles (UAVs) for package deliveries offer ...
Secure drone communication architecture for last mile delivery. image image