Skip to main content
main-content

Wireless Personal Communications OnlineFirst articles

24-11-2022 | Correction

Correction to: Omnidirectional Microstrip MIMO Antenna for Intelligent Vehicle RADAR Communication

Authors:
Somasundaram Mathivanan, A. Rajeswari

24-11-2022

Congestion and Accident Alerts Using Cloud Load Balancing & Random Forest in VANET

The traffic forecast system is critical in intelligent transportation system. Vehicular Ad-hoc Networks will play a significant role in future intelligent transportation system (VANET). On the highways, they give perfect service to the drivers.

Authors:
Smita Singh, Shashi Kant Verma

24-11-2022

Dynamic Picking and Storage Optimization of Robotic Picking Systems

With the development of e-commerce and the improvement of logistics requirements, more and more ‘parts-to-picker’ picking systems begin to replace the inefficient ‘picker-to-parts’ picking systems in various scenarios. As the mainstream …

Authors:
Cheng Chi, Shasha Wu, Delong Xia, Yaohua Wu

24-11-2022

Efficient Routing Protocol for Optimal Route Selection in Cognitive Radio Networks Over IoT Environment

In recent times, Cognitive Radio Networks (CRNS) have been broadly investigated in light of the unceasingly growing demands of the Internet of Things (IoT) applications, paving the path to equipping IoT objects with Cognitive Radio (CR) …

Authors:
Khalid A. Darabkh, Hanan F. Al-Khazaleh, Raed T. Al-Zubi, Sharhabeel H. Alnabelsi, Haythem Bany Salameh

22-11-2022

Deep Learning Based IoT Module for Smart Farming in Different Environmental Conditions

Internet of Things (IoT) is an unavoidable technology evolution in the present era. All most all the domains have accepted IoT in their applications. Recently, IoT is adopted in agriculture as smart farming to collect environmental and crop data.

Authors:
R. Manikandan, G. Ranganathan, V. Bindhu

22-11-2022

Lebesgue Measures Based Power Control Annealing in 5G D2D Networks Under QoS Constraints for IoT Applications

Device-to-device (D2D) communication requires maximization of throughput of D2D user by efficient transmission power control of D2D users in 5G network. We consider a scenario where D2D users are more than the cellular users and discuss the …

Authors:
Saurabh Chandra, Prateek, Rajeev Arya, Ajit Kumar Verma

21-11-2022

CTS-IIoT: Computation of Time Series Data During Index Based De-duplication of Industrial IoT (IIoT) Data in Cloud Environment

In recent times, the exponential boom of industrial data in cloud is witnessed due to dramatic outcome of digitization and smart environment within the industries. Globalization, easy-to-use and availability of data also plays a key role in …

Authors:
S. U. Muthunagai, R. Anitha

16-11-2022

Heterogenous Networks: From Small Cells to 5G NR-U

With the exponential increase in mobile users, mobile data demand has grown tremendously. To meet these demands, cellular operators are constantly innovating to enhance the capacity of cellular systems. Consequently, operators have been reusing …

Authors:
Vanlin Sathya, Srikant Manas Kala, Kalpana Naidu

16-11-2022

An Enhancement in Data Security Using Trellis Algorithm with DNA Sequences in Symmetric DNA Cryptography

In today’s world, most of the things are done online such as online banking, food ordering, car booking, and shopping. It is very difficult to protect the data utilizing the conventional cryptographic and Steganographic approach with the present …

Authors:
K. Rama Devi, E. Bhuvaneswari

15-11-2022

Intrusion Detection Systems for the Internet of Thing: A Survey Study

In recent years, networking systems have witnessed a breakthrough. Due to the advances in network and communication technology, new concepts such as the Internet of Things (IoT) have emerged in network configurations. The IoT framework connects …

Authors:
Heba A. Hassan, Ezz E. Hemdan, Walid El-Shafai, Mona Shokair, Fathi E. Abd El-Samie

15-11-2022

On Developing Framework for Schedulable Priority-Driven Systems: A Futuristic Review

Over time, systems’ real-time data access requirements evolved, e.g., Real-Time Systems and Real-Time Database Systems and their variants. Assigning priorities to tasks/transactions in such a system has always been a critical decision as it forms …

Authors:
Sarvesh Pandey, Udai Shanker

15-11-2022

Breaking Barriers in Conventional Cryptography by Integrating with Quantum Key Distribution

Security techniques based on conventional cryptography assume keys are disseminated prior to secure communications in traditional security mechanisms. The essential function of transmitting and sharing a secret key between two entities is the safe …

Authors:
A. Ahilan, A. Jeyam

14-11-2022

Trust Management Framework and High Energy Efficient Lifetime Management System for MANET using Self-Configurable Cluster Mechanism

The maximum hard side of MANET is that they’re power resource-limited wherein energy cannot be replenished. Our evaluation intention is to give a high power saving management system for MANET. Cluster approaches in MANET make other nodes into …

Authors:
C. Gopala Krishnan, S. Gomathi, G. Aravind Swaminathan, Y. Harold Robinson, A. M. AnushaBamini

12-11-2022

An Improved IoT/RFID-Enabled Object Tracking and Authentication Scheme for Smart Logistics

Smart logistics play a crucial role for rapid industrialization and economic development of the countries. It not only assists in delivering the low cost services to the subscribers but also helps in bringing transparency in the supply chain …

Authors:
Bander A. Alzahrani, Azeem Irshad

10-11-2022

ARPVP: Attack Resilient Position-Based VANET Protocol Using Ant Colony Optimization

The position-based routing of Vehicular Ad hoc Network (VANET) vulnerable to various security attacks because of dependency on computing, control, and communication technologies. The Internet of Things (IoT)-enabled VANET application leads to the …

Authors:
Jyoti R. Maranur, Basavaraj Mathapati

10-11-2022

Mode Selection of Content Delivery at Edge Nodes Based on Learning

Pre-caching at edge nodes may improve resource efficiency for future content-centric cellular networks by bringing contents closer to users. However, which mode (muticast or unicast) should be selected for the efficient delivery of those cached …

Authors:
Yanli Xu, Hao Tang

09-11-2022

A Novel Distributed File System Using Blockchain Metadata

Cluster computing has become an inevitable part of data processing as the huge volume of data being produced from different sources like online social media, IoT, mobiledata, sensor data, black box data and so on increases in an exponentially fast …

Authors:
Deepa S. Kumar, S. Dija, M. D. Sumithra, M. Abdul Rahman, Praseeda B. Nair

08-11-2022

A Survey on Semantic Communications for Intelligent Wireless Networks

Research on intelligent wireless network aims at the development of a human society which is ubiquitous and mobile, simultaneously providing solutions to the coverage, capacity, and computing issues. These networks will focus on provisioning …

Authors:
Sridhar Iyer, Rajashri Khanai, Dattaprasad Torse, Rahul Jashvantbhai Pandya, Khaled M. Rabie, Krishna Pai, Wali Ullah Khan, Zubair Fadlullah

03-11-2022

A Random Waypoint Model for Route Avoidance with Zone Routing Protocol in Wireless Sensor Network

An innovative technique to lower path mistakes is suggested in this research. The method increases network throughput in the following ways: packets are successfully transmitted from source node to destination node without packet loss. In the …

Authors:
P. Vijayalakshmi, K. Selvi, K. Gowsic

03-11-2022

Sonar Data Classification Using Neural Network Trained by Hybrid Dragonfly and Chimp Optimization Algorithms

This paper proposes a hybrid Dragonfly Algorithm (DA) for training Multi-Layer Perceptron Neural Network (MLP NN) to design the classifier for solving complicated problems and distinguishing the real target from liars’ targets in sonar …

Authors:
F. Mousavipour, M. R. Mosavi