Skip to main content

Telecommunication Systems OnlineFirst articles


Application of active queue management for real-time adaptive video streaming

Video streaming currently dominates global Internet traffic. Live streaming broadcasts events in real-time, with very different characteristics compared to video-on-demand (VoD), being more sensitive to variations in delay, jitter, and packet …

Wladimir Gonçalves de Morais, Carlos Eduardo Maffini Santos, Carlos Marcelo Pedroso


Medical QoS provisioning for multi-class data in coexisting wireless body area networks

Increase in the popularity of non-invasive health monitoring systems has led to the large deployment of dedicated access points (APs) in a medical environment. Most of the existing literature assumes the wireless body area network (WBAN) …

Emy Mariam George, Lillykutty Jacob


Semi-blind channel estimation based on modified CMA and unitary scrambling for massive MIMO systems

Pilot contamination is one of the main impairments in multi-cell massive Multiple-Input Multiple-Output systems. In order to improve the channel estimation in this context, we propose to use a semi-blind channel estimator based on the constant …

Noura Sellami, Mohamed Siala


Application of word embedding and machine learning in detecting phishing websites

Phishing is an attack whose aim is to gain personal information such as passwords, credit card details etc. from online users by deceiving them through fake websites, emails or any legitimate internet service. There exists many techniques to …

Routhu Srinivasa Rao, Amey Umarekar, Alwyn Roshan Pais


Performance analysis of digital transmission in interference-limited networks

This paper aims at investigating the impact of interference on the performance of a wireless communication system operating over the Fisher–Snedecor $$\mathcal {F}$$ F composite fading channel. In particular, we consider an interference-limited …

Mustafa K. Alshawaqfeh, Osamah S. Badarneh, Fares S. Almehmadi


Secrecy performance analysis of half/full duplex AF/DF relaying in NOMA systems over fading channels

Although the progress in understanding 5G and beyond techniques such as Non-Orthogonal Multiple Access (NOMA) and full-duplex techniques has been overwhelming, still analyzing the security aspects of such systems under different scenarios and …

Nesrine Zaghdoud, Adel Ben Mnaouer, Hatem Boujemaa, Farid Touati


A fair comparison of SAC-OCDMA system configurations based on two dimensional cyclic shift code and spectral direct detection

This paper investigates shortcomings that limit the performance of optical code division multiple access (OCDMA) systems including the low cardinality and data rate as well as the high power at reception. The main drawback for such systems known …

Mohanad Alayedi, Abdelhamid Cherifi, Abdelhak Ferhat Hamida, Hichem Mrabet


Estimation based cyclostationary detection for energy harvesting cooperative cognitive radio network

The two prime dynamics that are steering the future wireless communications are energy efficiency and efficient spectral usage. Energy harvesting (EH) when integrated with cognitive radio (CR) technology guarantees to address the challenges of …

Banani Talukdar, Deepak Kumar, Shanidul Hoque, Wasim Arif


An efficient and secure cipher scheme for MIMO–OFDM systems based on physical layer security

Multiple-input multiple-output orthogonal frequency division multiplexing (MIMO–OFDM) is, currently, the most dominant air interface for wireless communications, and the basic foundation for many network standards, due to its practicality and …

Reem Melki, Hassan N. Noura, Ali Chehab


All-optical 40 channels regenerator based on four-wave mixing

We have proposed a novel multi-channel regeneration scheme for wavelength division multiplexed systems, which is based on four wave mixing in a highly nonlinear fiber. A 40-channel wavelength division multiplexed signal having data rate of 10 Gbps …

Salman Ghafoor, Muhammad Usama Khan, Aamir Gulistan, Ahmad Salman, S. M. Hassan Zaidi


Dynamic link adaptation for filterband multicarrier in networks with diverse service quality and throughput requirements

The fast evolution in wireless communication standards and enhancement in cellular applications has created an exponential rise in the data rate requirement over the past few decades. The next generation wireless standards, therefore, need not …

Amna Javed Tiwana, Muhammad Zeeshan, Tabinda Ashraf, Muhammad Umar Farooq, Kashif Shahzad, Adnan Akhunzada


A low-power and low cost smart streetlight system based on Internet of Things technology

Street lighting, as the most essential and universal component of the urban lighting system, accounts for a large portion of public electricity usage. Therefore, improving street lamps working efficiency is vital for energy savings. This paper …

Jing-jing Zhang, Wei-hua Zeng, Sheng-li Hou, Yu-qi Chen, Lin-yan Guo, Yan-xing Li


A computationally efficient HMAC-based authentication scheme for network coding

One of the major security threats that plague network coding are pollution attacks. Therefore, the ability to authenticate the contents of received packets is a vital requirement of all network coding authentication schemes. One of the most famous …

Tandoh Lawrence, Fagen Li, Ikram Ali, Charles R. Haruna, Michael Y. Kpiebaareh, Tandoh Christopher


Factor graph weight particles aided distributed underwater cooperative positioning algorithm

The growing scale of marine exploration requires high-resolution underwater localization, which necessitates cooperation among underwater network nodes and consideration of the channel complexity and power efficiency. In this paper, we proposed a …

Chengkai Tang, Baoguo Yu, Lingling Zhang, Yi Zhang, Houbing Song


Intelligent and resizable control plane for software defined vehicular network: a deep reinforcement learning approach

Software-defined networking (SDN) has become one of the most promising paradigms to manage large scale networks. Distributing the SDN control proved its performance in terms of resiliency and scalability. However, the choice of the number of …

Karima Smida, Hajer Tounsi, Mounir Frikha


Intra and inter-flow link aggregation in SDN

Link saturation is a problem in computer networks. We propose a link aggregation solution that is robust and solves this problem. The approach consists of creating a virtual link by combining multiple physical interfaces, summing up their …

Ronaldo R. R. Junior, Marcos A. M. Vieira, Luiz F. M. Vieira, Antonio A. F. Loureiro


Wideband hybrid precoding techniques for THz massive MIMO in 6G indoor network deployment

Terahertz (THz) communication is becoming an up-and-coming technology for the future 6G networks as it offers an ultra-wide bandwidth. Appropriate channel models and precoding techniques are indispensable to support the desired coverage and to …

P. Jeyakumar, Arvind Ramesh, S. Srinitha, V. Vishnu, P. Muthuchidambaranathan


An efficient secure key establishment method in cluster-based sensor network

The main issue for the security of wireless sensor networks (WSNs) is how to allow sensor nodes (SNs) to establish and share cryptographic keys in an energy-efficient, storage-efficient, and authentic manner for their secure data transmission.

Akansha Singh, Khushboo Jain


Evaluation of energy consumption in routing protocols for opportunistic networks

Assessments on routing protocols for delay tolerant network (DTN) or opportunistic network considered various metrics such as delivery ratio, overhead and delay, but energy consumption as a metric is not well analyzed. Since the energy aspect is …

Amir Masoud Rahmani, Zahra Hadad Tehrani, Alireza Souri


Performance benefits of regeneration flexibility and modulation convertibility in elastic optical networks

In planning of the elastic optical networks (EONs), the traditional approach of regeneration node(s) number minimization and the assumption of same modulation format over every segment of lightpath results in the (i) utilization of modulation …