Skip to main content

Wireless Personal Communications OnlineFirst articles

20.04.2024

A Strategic Approach for Robust Dysarthric Speech Recognition

The development of a system to recognize the speeches of standard speakers has been in practice for many decades. Research development is still progressing to implement a strategy to identify the speeches uttered by people with hearing …

verfasst von:
A. Revathi, N. Sasikaladevi, D. Arunprasanth, Rengarajan Amirtharajan

20.04.2024

An Adaptable Algorithm for Optimizing Bus Line Distribution Using the Clustering Method

The current fleet of cars requires reevaluation, upgrades, and replacement in response to the expanding human population, the increase in urban traffic volume, and the elevated levels of air pollution attributed to vehicular emissions. In densely …

verfasst von:
Fatemeh Sheikhi, Amir Masoud Rahmani

19.04.2024

Pigeon Navigation Influenced Economic Route Construction for Smooth Data Transmission in IoT

Wireless Sensor networks are the basic infrastructure of the Internet of Things (IoT), where energy conservation is an important network design parameter. For reducing energy consumption and increasing the network's operational lifetime, it is …

verfasst von:
Jacob John

17.04.2024

A Bilinear Mapping Based Ring Signature Scheme with Batch Verification for Applications in VANETs

Nowadays, the traditional transportation systems are being replaced by the Vehicular Ad-hoc Networks (VANETs) based intelligent transportation system. In VANETs, vehicles communicate by sending messages over the open environment, which leads to …

verfasst von:
Lalit Negi, Devender Kumar

17.04.2024

Dual-Sense Circularly Polarized Stacked Fractal Slotted Antenna for WLAN/Bluetooth System

A dual-sense stacked circularly polarized (CP) antenna using single feed is proposed for wireless applications (WLAN/Bluetooth). An inclined third iterative F-shaped fractal slot is cut in the first quadrant on the lower driven patch and an added …

verfasst von:
Sonal Gupta, Shilpee Patil, Chhaya Dalela, Binod Kumar Kanaujia

17.04.2024

Design of Intrusion Detection System Using GA and CNN for MQTT-Based IoT Networks

With the advancement of technology, Internet of Things (IoT) devices are integrated with smart homes, smart cities, intelligent medical systems, industries, smart cars, and many more applications to monitor and control them. These devices are …

verfasst von:
Asimkiran Dandapat, Bhaskar Mondal

17.04.2024

Advanced Analysis of Bipolar Disorder Through Computer Vision Technology

This research paper focuses on the analysis of Bipolar Disorder (BD) through the application of structural magnetic resonance imaging (MRI) and a supervised learning framework. The primary goal is to identify specific abnormalities in brain cells …

verfasst von:
G. Wiselin Jiji, A. Muthuraj

17.04.2024

Enhanced Time Slotted LoRaWAN for Node Mobility: A Joint Selection of Data Rate, Time Slot and Channel

Long Range Wide Area Network (LoRaWAN) offers a wide range communication with low power consumption at the cost of low throughput. Although this technology is well suited to IoT applications, it faces scalability and reliability limitations …

verfasst von:
Hajer Tounsi, Norhane Benkahla, Ye-Qiong Song, Mounir Frikha

17.04.2024

Software Effort Estimation Using Stacked Ensemble Technique and Hybrid Principal Component Regression and Multivariate Adaptive Regression Splines

In today’s rapidly evolving digital market, the demand for faster and more advanced software products requires accurate, cost-effective, and timely solutions. Precise software effort estimation is crucial for successful development. However …

verfasst von:
A. G. Priya Varshini, K. Anitha Kumari

17.04.2024

Cryptanalysis of a Certificateless Signcryption Scheme for Wireless Sensor Networks in Ubiquitous Healthcare Systems

Recently, Kasyoka et al. (Wirel Pers Commun 118:3349–3366, 2021) presented a new pairing free certificateless signcryption scheme for use in ubiquitous healthcare systems. Kasyoka et al. gave a formal security proof for indistinguishability …

verfasst von:
Shan Shan, Bo Zhang

17.04.2024 | Research

Augmented and Virtual Reality-Based Cyber Twin Model for Observing Infants in Intensive Care: 6G for Smart Healthcare 4.0 by Machine Learning Techniques

A new paradigm and technology at vanguard of Industry 4.0 revolution is digital twin (DT), which seeks to use virtual counterpart in real time to describe behaviours of physical things. Its expansion has been aided by application of DT in …

verfasst von:
Huanli Hu, Xueyang Zheng

17.04.2024

Non-invasive cuff free blood pressure and heart rate measurement from photoplethysmography (PPG) signal using machine learning

Measuring the blood pressure (BP) and heart rate (HR) is essential in order to monitor the physiological vital parameters of patients admitted in Intensive care unit (ICU). Development of precise noninvasive measurement devices are encouraged for …

verfasst von:
Parnasree Chakraborty, C. Tharini

16.04.2024 | Research

DSPHR: A Dynamic SDN-Based Port Hopping Routing Technique for Mitigating SD-WSN Attacks

This study introduces a dynamic SDN-based port hopping routing (DSPHR) technique to enhance the practical security defense of software-defined wireless sensor networks (SD-WSNs) in wireless networks. DSPHR aims to thwart network probe and packet …

verfasst von:
Joseph Henry Anajemba, Nedal Ababneh, Emir Vajzovic, Yasir Hamid, Artur Koci, Celestine Iwendi

16.04.2024 | Research

Design of Intelligent Software Security System Based on Spark Big Data Computing

With the rapid development of computer science and technology, the Internet has penetrated into various fields of society and economy. However, there are still many unsatisfactory aspects of software security, such as hackers illegally invading …

verfasst von:
Chong Xu, Jing Li

15.04.2024 | Research

Vector Based Genetic Lavrentyev Paraboloid Network Wireless Sensor Network Lifetime Improvement

In dynamic situations, limited processing power in Wireless Sensor Networks (WSN) makes it difficult to handle network lifetime and coverage. This work proposes a Genetic Lavrentyev Paraboloid Lagrange Support Vector Machine-based (GLPL-SVM) …

verfasst von:
Neethu Krishna, G. Naveen Sundar, D. Narmadha

15.04.2024

Jeans Substrate Based Circularly Polarized Wearable Dielectric Resonator Antenna

In this paper, circularly polarized rectangular dielectric resonator antenna (RDRA) is proposed for Wearable applications. Jeans material has been used as substrate. Microstrip lines have been used to feed the circuit. The proposed structure has …

verfasst von:
Mehaboob Mujawar, T. Gunasekaran, Subuh Pramono, Arjuna Muduli

15.04.2024

Elderly People Activity Recognition Based on Object Detection Technique Using Jetson Nano

Regular activity monitoring and recognition are closely associated with healthcare benefits. This paper aims to detect the activities of elderly people to support them live independently. This work focuses on developing an elderly people activity …

verfasst von:
B. A. Mohammed Hashim, R. Amutha

15.04.2024

Opportunistic Control of Dual-Band Half-Circular U-Shape MIMO Design and Analysis for Wireless Applications

Current generation related to wireless and mobile systems can have highly reliable, high coverage, high gain, lightweight, portable, high coverage, compact and high SNR radiators for the non-line of-sight system communication. The technology of …

verfasst von:
K. Vasu Babu, Gorre Naga Jyothi Sree, B. Chandra Babu Naik, B. Ravi Kumar

15.04.2024

Optimal Control of Computer Virus Spreading Model with Partial Immunization

Nowadays, viruses and worms create the most critical problems in computer security issues. Hence, the spreading behavior of computer viruses and the investigation of their control measures are crucial since they will prevent massive economic …

verfasst von:
Sumathi Muthukumar, Muthukrishnan Senthilkumar, Chinnadurai Veeramani

13.04.2024

A Lightweight Cooperative Intrusion Detection System for RPL-based IoT

The successful deployment of an Intrusion Detection System (IDS) in the Internet of Things (IoT) is subject to two primary criteria: the detection method and the deployment strategy. IDS schemes should take into account that IoT devices often have …

verfasst von:
Hanane Azzaoui, Akram Zine Eddine Boukhamla, Pericle Perazzo, Mamoun Alazab, Vinayakumar Ravi