Skip to main content
main-content

Wireless Personal Communications OnlineFirst articles

13-08-2022

A Novel User Grouping Algorithm for Downlink NOMA

Non-orthogonal multiple access (NOMA) is one of the promising radio access techniques for resource allocation improvement in the (5th) generation of cellular networks. Compared to orthogonal multiple access techniques, NOMA offers extra benefits …

Authors:
Navideh Ghafouri, Naser Movahhedinia, Mohammad Reza Khayyambashi

13-08-2022

DOA Estimation Based on Second-Order Difference Co-Array for Coprime Arrays

In this paper A different approach based on the reconstruction of the data covariance matrix is presented. In the presented approach, by vectorization of the reconstructed matrix, the covariance matrix is reconstructed in two steps. Hence an …

Authors:
Ali Sharifzadeh Lari, Dariush Abbasi-Moghadam

11-08-2022

An IoT Low-Cost Smart Farming for Enhancing Irrigation Efficiency of Smallholders Farmers

Nowadays, agriculture faces several challenges in ensuring food safety. Water scarcity is one of the main challenges facing farmers in the rainfed agriculture sector, especially during the summer, leading to severe economic and farm losses.

Authors:
Amine Dahane, Rabaie Benameur, Bouabdellah Kechar

05-08-2022

Analysis of a Low Cost and Low Complexity Adaptive Transmission Scheme for Massive MIMO Systems with Interference

This paper evaluates a low-complexity Multiuser Adaptive Modulation (MAM) scheme for an uplink massive multiple-input and multiple-output (MIMO) systems with maximum-ratio combining (MRC) linear receivers, which requires only slow-varying …

Authors:
Amin Radbord, Mohammed Abdel Hafez, Mohammadreza Amini

03-08-2022

HNMH: A New Hybrid Approach Based on Near Maximum Histogram and LSB Technique for Image Steganography

In this paper, a new histogram-based approach for digital image steganography is introduced. It stems from the idea of utilizing the near maximum values in the image histogram distribution. Conceptually, depending on whether a brightness value …

Authors:
Adnan Sondas, Harun Kurnaz

30-07-2022

Classifying Lung Cancer as Benign and Malignant Nodule Using ANN of Back-Propagation Algorithm and GLCM Feature Extraction on Chest X-Ray Images

Lung cancer is the most suffering disease which is very difficult to identify in advance and it is not easily cure if the stage of cancer becomes more malignant, the lung cancer is similar like other cancers such as breast cancer, colorectal …

Authors:
D. Napoleon, I. Kalaiarasi

28-07-2022

Using I2P (Invisible Internet Protocol) Encrypted Virtual Tunnels for a Secure and Anonymous Communication in VANets: I2P Vehicular Protocol (IVP)

The Invisible Internet Project (I2P) as a secure protocol uses robust mechanisms and strong algorithms to reinforce the security and the anonymity of the communication. However, the difference between internet and VANet in terms of mobility and …

Authors:
Diab Tayeb, Gilg Marc, Lorenz Pascal, Drouhin Frederic

28-07-2022

An Energy-Aware IoT Routing Approach Based on a Swarm Optimization Algorithm and a Clustering Technique

The Internet of Things (IoT) comprises many nodes dispersed around a particular target region, and it has lately been applied in a variety of sectors such as smart cities, farming, climatology, smart metering, waste treatment, and others. Even …

Authors:
Mahyar Sadrishojaei, Nima Jafari Navimipour, Midia Reshadi, Mehdi Hosseinzadeh

28-07-2022

Modeling D2D Underlaying Cellular Network for Hotspot Communications with Poisson Cluster and Hole Processes

This paper develops a new approach to the modeling and analysis of device-to-device (D2D) underlaying multi-tier cellular network for dense hotspot communications, which consists of macro base stations (MBSs), pico BSs (PBSs), femto BSs (FBSs). A …

Authors:
Xiangdong Jia, Zhemin Wei, Zhenchao Hao, Yuhua Ouyang

26-07-2022

DESNN Algorithm for Communication Network Intrusion Detection

Intrusion detection is a crucial technology in the communication network security field. In this paper, a dynamic evolutionary sparse neural network (DESNN) is proposed for intrusion detection, named as DESNN algorithm. Firstly, an ensemble neural …

Authors:
Fulai Liu, Jialiang Xu, Lijie Zhang, Ruiyan Du, Zhibo Su, Aiyi Zhang, Zhongyi Hu

23-07-2022

Analysis of Drone Assisted Network Coded Cooperation for LoS Environments

This paper consider a Drone Assisted Network Coded Cooperation (DA-NCC) scenario for Line of Sight (LoS) channel environments. For analysing the performance of DA-NCC, Decode-and-Forward (DF) protocol is used at the drone and Selection Combining …

Authors:
Pankaj Kumar, Sam Darshi, Samar Shailendra

22-07-2022

Data Fusion Algorithm Based on Classification Adaptive Estimation Weighted Fusion in WSN

Special medical supplies such as blood and vaccines have strict temperature requirements in medical cold storage. In order to improve the stability of the temperature monitoring system in the medical cold storage and solve the problem of low …

Authors:
Dong Yan, Peixue Liu, Xiujie Yue, Penghao Wang, Minghua Liu, Baoshun Li

22-07-2022

Two-Phase Wireless Bandwidth Allocation Scheme Based on Cooperative Game Solutions

Remarkable advancements in embedded systems-on-a-chip have significantly increased the number of smart devices that can operate some applications interactively and autonomously. Several technologies relevant to the expansion of smart mobile …

Author:
Sungwook Kim

Open Access 21-07-2022

Early Stopping Criterion for Recursive Least Squares Training of Behavioural Models

The necessity of the rapid evolution of wireless communications, with continuously increasing demands for higher data rates and capacity Zheng (Big datadriven optimization for mobile networks toward 5g 30:44–51, 2016), is constantly augmenting the …

Authors:
Méabh Loughman, Sinéad Barton, Ronan Farrell, John Dooley

20-07-2022

Performance Analysis of Enhanced AES-128 and Blowfish Algorithms Through Parallel-Pipelined-Memory Techniques

Currently, the advanced encryption standard (AES)-128 algorithm is deployed by the Institute of Electrical and Electronics Engineers standards, and it is widely used to secure wireless communication in various radio frequency bands. This paper …

Authors:
Rafidah Ahmad, Mohamad Faiz Mohamed Omar, Jagadheswaran Rajendran, Widad Ismail

20-07-2022

Evolution and Adoption of Next Generation IoT-Driven Health Care 4.0 Systems

The uprising of Internet of Things (IoT) has dramatically influenced the world’s technology in terms of interoperability, connectivity and interconnectivity with help of smart sensors, devices, objects, data and applications. General population …

Authors:
Deepanshu Arora, Shashank Gupta, Alagan Anpalagan

19-07-2022

A Flexible Dynamic Master–User Look-Up Table Approach for Evaluation of Trigonometric Values

Systems which are computationally complex often include the calculation of sine/cosine values, which frequently uses its Taylor series expansion. For high accuracy the Taylor series expansion becomes computationally intensive. Therefore, the …

Authors:
Piyush Satti, Nikhil Sharma, Gurinder Singh, Bharat Garg

19-07-2022

Performance Modelling and Design Techniques for Efficiency Improvement in On-chip Switched-Capacitor DC-DC Converter

Fundamental charge vector method analysis is a single parameter optimization technique limited to conduction loss assuming all frequency-dependent switching (parasitic) loss negligible. This paper investigates a generalized structure to design …

Authors:
Sunita Saini, Davinder Singh Saini

18-07-2022

Prediction of Channel Utilization with Artificial Neural Networks Model in Mac Layer in Wireless Local Area Networks

The use of channels in WLANs affects data communication. RTS Fragmentation Threshold (RTSFT), Fragmentation Threshold (FT), and Buffer Size (BS) input values; Receiver Channel Utilization% (RCU%) and Transmitter Channel Utilization% (TCU%) affect …

Authors:
Haci Bayram Karakurt, Cemal Kocak, Murat Tolga Ozkan

18-07-2022 | Correction

Correction to: Expanded and Filtered Features Based ELM Model for Thyroid Disease Classification

In this article the affiliation details of Kapil Juneja were incorrectly given.

Author:
Kapil Juneja