Skip to main content

Wireless Personal Communications OnlineFirst articles

17-04-2024

A Bilinear Mapping Based Ring Signature Scheme with Batch Verification for Applications in VANETs

Nowadays, the traditional transportation systems are being replaced by the Vehicular Ad-hoc Networks (VANETs) based intelligent transportation system. In VANETs, vehicles communicate by sending messages over the open environment, which leads to …

Authors:
Lalit Negi, Devender Kumar

17-04-2024

Dual-Sense Circularly Polarized Stacked Fractal Slotted Antenna for WLAN/Bluetooth System

A dual-sense stacked circularly polarized (CP) antenna using single feed is proposed for wireless applications (WLAN/Bluetooth). An inclined third iterative F-shaped fractal slot is cut in the first quadrant on the lower driven patch and an added …

Authors:
Sonal Gupta, Shilpee Patil, Chhaya Dalela, Binod Kumar Kanaujia

17-04-2024

Design of Intrusion Detection System Using GA and CNN for MQTT-Based IoT Networks

With the advancement of technology, Internet of Things (IoT) devices are integrated with smart homes, smart cities, intelligent medical systems, industries, smart cars, and many more applications to monitor and control them. These devices are …

Authors:
Asimkiran Dandapat, Bhaskar Mondal

17-04-2024

Advanced Analysis of Bipolar Disorder Through Computer Vision Technology

This research paper focuses on the analysis of Bipolar Disorder (BD) through the application of structural magnetic resonance imaging (MRI) and a supervised learning framework. The primary goal is to identify specific abnormalities in brain cells …

Authors:
G. Wiselin Jiji, A. Muthuraj

17-04-2024

Enhanced Time Slotted LoRaWAN for Node Mobility: A Joint Selection of Data Rate, Time Slot and Channel

Long Range Wide Area Network (LoRaWAN) offers a wide range communication with low power consumption at the cost of low throughput. Although this technology is well suited to IoT applications, it faces scalability and reliability limitations …

Authors:
Hajer Tounsi, Norhane Benkahla, Ye-Qiong Song, Mounir Frikha

17-04-2024

Software Effort Estimation Using Stacked Ensemble Technique and Hybrid Principal Component Regression and Multivariate Adaptive Regression Splines

In today’s rapidly evolving digital market, the demand for faster and more advanced software products requires accurate, cost-effective, and timely solutions. Precise software effort estimation is crucial for successful development. However …

Authors:
A. G. Priya Varshini, K. Anitha Kumari

17-04-2024

Cryptanalysis of a Certificateless Signcryption Scheme for Wireless Sensor Networks in Ubiquitous Healthcare Systems

Recently, Kasyoka et al. (Wirel Pers Commun 118:3349–3366, 2021) presented a new pairing free certificateless signcryption scheme for use in ubiquitous healthcare systems. Kasyoka et al. gave a formal security proof for indistinguishability …

Authors:
Shan Shan, Bo Zhang

17-04-2024 | Research

Augmented and Virtual Reality-Based Cyber Twin Model for Observing Infants in Intensive Care: 6G for Smart Healthcare 4.0 by Machine Learning Techniques

A new paradigm and technology at vanguard of Industry 4.0 revolution is digital twin (DT), which seeks to use virtual counterpart in real time to describe behaviours of physical things. Its expansion has been aided by application of DT in …

Authors:
Huanli Hu, Xueyang Zheng

17-04-2024

Non-invasive cuff free blood pressure and heart rate measurement from photoplethysmography (PPG) signal using machine learning

Measuring the blood pressure (BP) and heart rate (HR) is essential in order to monitor the physiological vital parameters of patients admitted in Intensive care unit (ICU). Development of precise noninvasive measurement devices are encouraged for …

Authors:
Parnasree Chakraborty, C. Tharini

16-04-2024 | Research

DSPHR: A Dynamic SDN-Based Port Hopping Routing Technique for Mitigating SD-WSN Attacks

This study introduces a dynamic SDN-based port hopping routing (DSPHR) technique to enhance the practical security defense of software-defined wireless sensor networks (SD-WSNs) in wireless networks. DSPHR aims to thwart network probe and packet …

Authors:
Joseph Henry Anajemba, Nedal Ababneh, Emir Vajzovic, Yasir Hamid, Artur Koci, Celestine Iwendi

16-04-2024 | Research

Design of Intelligent Software Security System Based on Spark Big Data Computing

With the rapid development of computer science and technology, the Internet has penetrated into various fields of society and economy. However, there are still many unsatisfactory aspects of software security, such as hackers illegally invading …

Authors:
Chong Xu, Jing Li

15-04-2024 | Research

Vector Based Genetic Lavrentyev Paraboloid Network Wireless Sensor Network Lifetime Improvement

In dynamic situations, limited processing power in Wireless Sensor Networks (WSN) makes it difficult to handle network lifetime and coverage. This work proposes a Genetic Lavrentyev Paraboloid Lagrange Support Vector Machine-based (GLPL-SVM) …

Authors:
Neethu Krishna, G. Naveen Sundar, D. Narmadha

15-04-2024

Jeans Substrate Based Circularly Polarized Wearable Dielectric Resonator Antenna

In this paper, circularly polarized rectangular dielectric resonator antenna (RDRA) is proposed for Wearable applications. Jeans material has been used as substrate. Microstrip lines have been used to feed the circuit. The proposed structure has …

Authors:
Mehaboob Mujawar, T. Gunasekaran, Subuh Pramono, Arjuna Muduli

15-04-2024

Efficient Bio-molecules Sequencing Using Multi-Objective Optimization and High-Performance Computing

Reformist approaches to multiple sequence alignment (MSA) needed dropping an MSA at each alignment phase. But it illustrates the evidence of gap scoring rates for exact alignment. In the literature it has three types of sequences; Ribonucleic …

Authors:
Sohan K. Yadav, S. K. Jha, Sudhakar Singh, Pratibha Dixit, Shiv Prakash

15-04-2024

Elderly People Activity Recognition Based on Object Detection Technique Using Jetson Nano

Regular activity monitoring and recognition are closely associated with healthcare benefits. This paper aims to detect the activities of elderly people to support them live independently. This work focuses on developing an elderly people activity …

Authors:
B. A. Mohammed Hashim, R. Amutha

15-04-2024

Opportunistic Control of Dual-Band Half-Circular U-Shape MIMO Design and Analysis for Wireless Applications

Current generation related to wireless and mobile systems can have highly reliable, high coverage, high gain, lightweight, portable, high coverage, compact and high SNR radiators for the non-line of-sight system communication. The technology of …

Authors:
K. Vasu Babu, Gorre Naga Jyothi Sree, B. Chandra Babu Naik, B. Ravi Kumar

15-04-2024

Copy-Move Video Forgery Detection Techniques: A Systematic Survey with Comparisons, Challenges and Future Directions

In the real-world scenario, the digital videos are captured to keep in records the life related memories, security purpose, truthful evidence etc. Due to rise in multimedia technology, the digital videos are mostly posted over social websites and …

Authors:
Gurvinder Singh, Kulbir Singh

15-04-2024

Optimal Control of Computer Virus Spreading Model with Partial Immunization

Nowadays, viruses and worms create the most critical problems in computer security issues. Hence, the spreading behavior of computer viruses and the investigation of their control measures are crucial since they will prevent massive economic …

Authors:
Sumathi Muthukumar, Muthukrishnan Senthilkumar, Chinnadurai Veeramani

13-04-2024

Reconfigurable Intelligent Surfaces Aided Terahertz Communication for 6G: Challenges and Potential Solutions

Recently, reconfigurable intelligent surfaces (RIS) aided design has been introduced for next-generation wireless networks to enhance system performance. Further, Terahertz (THz) communication has emerged as a promising technology to provide …

Authors:
Sanjeev Sharma, Kuntal Deka, Amit Mishra

13-04-2024

A Lightweight Cooperative Intrusion Detection System for RPL-based IoT

The successful deployment of an Intrusion Detection System (IDS) in the Internet of Things (IoT) is subject to two primary criteria: the detection method and the deployment strategy. IDS schemes should take into account that IoT devices often have …

Authors:
Hanane Azzaoui, Akram Zine Eddine Boukhamla, Pericle Perazzo, Mamoun Alazab, Vinayakumar Ravi