Skip to main content

Wireless Personal Communications OnlineFirst articles

Open Access 06-05-2024

Speculative Analysis of Wireless Network by Bibliometrics Tool

An emerging subclass of the wireless network is known as a Delay Tolerant Network (DTN), in this network whenever the contact opportunity occurs sender nodes select the relay node randomly and disseminate the message in the network. The basic …

Authors:
Renu Dalal, Manju Khari, Sanjay Misra

06-05-2024

A Method for Designing Substitution Boxes Based on Chaos with High Nonlinearity

Cryptography aims to design algorithms for the protection of important data transmitted over unsecured networks. These algorithms encrypt the data and render it incomprehensible even if it is captured by enemies. Today’s data encryption standard …

Author:
Fırat Artuğer

06-05-2024

LTE Cell Planning for Resource Allocation in Emergency Communication

The role of information and communication technology infrastructure is very crucial and perhaps most important during and post disaster (DPD) scenarios where thousands of lives are at risk. Communication services are expected to operate …

Authors:
Sanjoy Debnath, Wasim Arif, Debarati Sen, Srimanta Baishya

06-05-2024

Concealed Information Test Using Neuro Evolution of Augmenting Topologies

This research proposal introduces an innovative method for EEG data classification that leverages Genetic Algorithms and Neural Networks, through the Neuro Evolution of Augmented Topologies (NEAT) approach, aimed at distinguishing between innocent …

Authors:
Prajwal Raj, Damodar Reddy Edla, Saidi Reddy Parne

04-05-2024

Priority Queuing Strategy for Self-Overload Control in SIP Servers

The Session Initiation Protocol is an IP based application level signaling protocol. SIP is used for locating end users, establishing, modifying and closing multimedia sessions between end users. SIP uses various overload control techniques out of …

Author:
Kiran Kumar Guduru

04-05-2024

3S-ALDDT: A Triple Security Scheme for Authenticating Lightweight Devices and Securing Data Transmission in Internet of Things

The Internet of Things (IoT) connect and link objects and people for creating, processing and sharing countless information. The use of IoT is widely spread in important life fields like smart farming, by collecting and transferring data from …

Author:
Sarra Cherbal

04-05-2024

A Lightweight Three Dimensional Redeployment Algorithm for Distributed Mobile Wireless Sensor Networks

In recent years, there has been significant growth in mobile wireless sensor networks (WSNs), yet prevailing research has primarily focused on 2D planar deployments, overlooking the importance of three-dimensional (3D) coverage in various …

Authors:
Nadia Boufares, Yosra Ben Saied, Leila Azouz Saidane

04-05-2024

Design Approach and Comparison of Phase Shifter Performance in DOA Estimation System

The paper outlines three types of phase shifter networks utilized in phased array antennas for direction-of-arrival estimation. It compares the mechanical rotation method of antenna array with Butler matrix-based and software-controlled phase …

Author:
Sachin R. Khedekar

04-05-2024

Multi-objective Evolutionary Algorithms for Coverage and Connectivity Aware Relay Node Placement in Cluster-Based Wireless Sensor Networks

Wireless sensor networks (WSNs) have been extensively explored due to their incredible capabilities and ever-growing field of applications. In cluster-based WSNs, cluster heads (CHs) deplete their energy quickly due to the extra workload of data …

Authors:
Subash Harizan, Pratyay Kuila, Anil Kumar, Akhilendra Khare, Harshvardhan Choudhary

04-05-2024

Spectrum Sensing Using Intelligent Reflecting Surfaces with Multi-antennas Energy Harvesting

In this paper, we suggest the use of Intelligent Reflecting Surfaces (IRS) to improve the spectrum sensing process using the energy detector and the throughput of Cognitive Radio Networks (CRN). The Primary Source (PS) harvests energy using the …

Author:
Raed Alhamad

03-05-2024 | Research

Peak-to-Average Power Ratio Reduction of OFDM Systems Towards 6G Communications Using Osprey Optimization Algorithm

The development of 6G communication networks requires increased transmission speeds, extensive data processing capabilities, and minimal communication delays. Orthogonal frequency division multiplexing (OFDM) systems has higher peak-to-average …

Authors:
Sanjeev Sharma, M. Karthikeyan, G. Manoj, R. Mohan Das, C. Shanmugam, U. Arun Kumar

03-05-2024 | Research

Velocious: A Resilient IoT Architecture for 6G Based Intelligent Transportation System with Expeditious Movement Mechanism

The Internet of Things [IoT] has provided fascinating solutions in various fields. As the significant usages of IoT in smart cities incorporate almost all the domains such as healthcare, Vehicle to Vehicle (V2V), Energy sector, home automation …

Authors:
S. Delsi Robinsha, B. Amutha

03-05-2024

An Efficient Security Testing for Android Application Based on Behavior and Activities Using Improved PCA and DNN-KNN Classifier

Privacy and the safety of users are seriously threatened by Android, a mobile operating system that is becoming more and more popular. Due to the single feature selection technique's poor detection effects, the typical machine learning algorithm's …

Authors:
Pawan Kumar, Sukhdip Singh

02-05-2024

A Review and Comparative Analysis of PAPR Reduction Techniques of OFDM System

Multi-carrier (MC) communication technology has numerous advantages over single carrier modulation technology such as it is spectrum efficient. OFDM has a history of continuous development by time. The concept of OFDM is based on dividing the …

Authors:
Sneha Singhal, Dheeraj Kumar Sharma

02-05-2024

Isolation Enhanced Compact Dual-Mode 4-Port MIMO Design Using Slot-Based Switchable DGS Decoupling Filters

A compact MIMO antenna with enhanced isolation and the ability to switch the frequency bands is an attractive candidate for the current multifunctional high-speed portable wireless devices. To achieve this objective, a simple and novel compact …

Authors:
Kabir Das Ayinala, Prasanna Kumar Sahu

02-05-2024

A Hybrid Routing Protocol to Establish Communication in Mobility Cast Using Mobility Pattern

In the opportunistic network, communication between two communities is challenging and time-consuming. A community is made up of several nodes that are grouped together according to distinct behaviors. This attribute is known as the mobility …

Authors:
Ranjeet Kumar Singh, Binod Kumar, Mir Shahnawaz Ahmad

02-05-2024

A New Method for Detecting the Fatigue Using Automated Deep Learning Techniques for Medical Imaging Applications

In the human race, Fatigue may contribute to a decline in efficiency. Fatigue is a risk factor for health and a component of quality degradation. The effects of Fatigue include sleep disorders, depression, and worry, all of which can lead to …

Authors:
Naveen Sundar Gnanadesigan, Grace Angela Abraham Lincoln, Narmadha Dhanasegar, Suresh Muthusamy, Deeba Kannan, Surendiran Balasubramanian, Nebojsa Bacanin, Kishor Kumar Sadasivuni

02-05-2024

U-Slotted Wideband Microstrip Patch Antenna for Ka Band and mmW 5G Applications

5G stands for 5th generation network. It allows to connect people, machines, objects, etc. this paper will be talking about the design of a simple rectangular microstrip patch antenna for Ka bands and mmW applications at 35 GHz as operating …

Authors:
Touko Tcheutou Stephane Borel, Rashmi Priyadarshini

02-05-2024 | Research

Physical Integrated Digital twin-based Interaction Mechanism of Artificial Intelligence Rehabilitation Robots Combining Visual Cognition and Motion Control

Within the evolving landscape of rehabilitation robotics, integrating cyber-physical systems with digital twin generation presents a singular paradigm for enhancing the effectiveness and personalisation in interaction applications. This paper …

Authors:
Ke Tao, Jincan Lei, Jing Huang

02-05-2024

Bot-FFX: A Robust and Efficient Framework for Fast Flux Botnet (FFB) Detection

Fast Flux Botnet (FFB) poses a significant threat as an advanced method employed by cybercriminals for orchestrating distributed malicious attacks. Existing FFB detection systems face challenges such as vulnerability to evasion mechanisms …

Authors:
Femi Emmanuel Ayo, Joseph Bamidele Awotunde, Sakinat Oluwabukonla Folorunso, Ranjit Panigrahi, Amik Garg, Akash Kumar Bhoi