Ausgabe 2/2022
Inhalt (47 Artikel)
A Secured Storage and Communication System for Cloud Using ECC, Polynomial Congruence and DSA
J. Nithisha, P. Jesu Jayarin
A Parallel Turbo Decoder Based on Recurrent Neural Network
Li Zhang, Weihong Fu, Fan Shi, Chunhua Zhou, Yongyuan Liu
Cloud and Big Data Security System’s Review Principles: A Decisive Investigation
KamtaNath Mishra, Vandana Bhattacharjee, Shashwat Saket, Shivam P. Mishra
New Proposed Algorithms for Infrared Video Sequences Non-uniformity Correction
H. I. Ashiba, Nevein Sadic, Emad S. Hassan, Sami El-Dolil, Fathi E. Abd El-Samie
Three Dimensional Measuring Points Locating Algorithm Based Texture-Patched Matrix Completion for Indoor 3D REM Design
Pradipta Maiti, Debjani Mitra
Performance Analysis of Linear and Hybrid Precoding on Massive MIMO System Using Truncated Polynomial Expansion
Sammaiah Thurpati, P. Muthuchidamabaranathan
A Request Redirection Algorithm in Content Delivery Network: Using PROMETHEE Approach
Amin Khansoltani, Shahram Jamali, Reza Fotohi
Knowledge Diffusion of the Internet of Things (IoT): A Main Path Analysis
Abderahman Rejeb, Karim Rejeb, Suhaiza Hanim Mohamad Zailani, Alireza Abdollahi
AI and ML Powered IoT Applications for Energy Management in Electric Vehicles
M. Mathankumar, B. Gunapriya, R. Raja Guru, A. Singaravelan, P. Sanjeevikumar
A Novel Technique for Gateway Selection in Hybrid MANET Using Genetic Algorithm
R. Kushwah, S. Tapaswi, A. Kumar
Heterogenous Server Placement for Delay Sensitive Applications in Green Mobile Edge Computing
Ghazal Jabbari, Negin Chalish, Ali Ghiasian, Amir Khorsandi Koohanestani
An Adaptive Lossly Quantization Technique for Key Extraction Applied in Vehicular Communication
Ibraheem Abdelazeem, Weibin Zhang, Zhenping Zeng, M. S Abdeldime
On the Classification of Modulation Schemes Using Higher Order Statistics and Support Vector Machines
Remziye Büsra Coruk, Bengisu Yalcinkaya Gokdogan, Mohamed Benzaghta, Ali Kara
Design and Analysis of Dual-band Circularly Polarized Hybrid Ring Cylindrical Dielectric Resonator Antenna for Wireless Applications in C and X-Band
Chandravilash Rai, Sanjai Singh, Ashutosh Kumar Singh, Ramesh Kumar Verma
Android Application Design with MIT App Inventor for Bluetooth Based Mobile Robot Control
Ahmet Top, Muammer Gökbulut
Investigating Concurrent-Mode Operation of Dual-Band Class-J/J Power Amplifiers: Analysis and Design Technique
Milad Shariatifar, Mohsen Jalali, Abdolali Abdipour
Investigations on the Design of Compact Flexible Wearable Fractal Patch Antenna for Body Area Networks Applications
Vikas Jain, Balwinder S. Dhaliwal
An Adaptive Fuzzy C Means with Seagull Optimization Algorithm for Analysis of WSNs in Agricultural Field with IoT
D. Karunkuzhali, Balasubramanian Meenakshi, Keerthi Lingam
A Novel Repairable Fountain Codes Scheme Based on Partial Duplication Technique
Anan Zhou, Benshun Yi, Mian Xiang, Laigan Luo
Upgrading Information Security and Protection for Palm-Print Templates
Poonam Poonia, Pawan K. Ajmera
An Improved Modelling of User Clustering for Small Cell Deployment in Heterogeneous Cellular Network
Joyatri Bora, Md. Anwar Hussain
A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids
Huiwen Wang, Liangliang Wang, Mi Wen, Kefei Chen, Yiyuan Luo
Analysis of Phase Noise Issues in Millimeter Wave Systems for 5G Communications
Udayakumar Easwaran, V. Krishnaveni
A Review on Speech Disorders and Processing of Disordered Speech
Audre Arlene Anthony, Chandreshekar Mohan Patil, Jagadeesh Basavaiah
Early Stopping Criterion for Recursive Least Squares Training of Behavioural Models
Méabh Loughman, Sinéad Barton, Ronan Farrell, John Dooley
Biometric-based Remote Mutual Authentication Scheme for Mobile Device
Sheng-Kai Chen, Jenq-Shiou Leu, Wen-Bin Hsieh, Jui-Tang Wang, Tian Song
Mutual Coupling Reduction in Microstrip Patch Antenna Arrays Using Simple Microstrip Resonator
Saeed Roshani, Hanieh Shahveisi
A Comprehensive Survey of Various Approaches on Human Fall Detection for Elderly People
Rohit Parmar, Samir Trapasiya
DESNN Algorithm for Communication Network Intrusion Detection
Fulai Liu, Jialiang Xu, Lijie Zhang, Ruiyan Du, Zhibo Su, Aiyi Zhang, Zhongyi Hu
Trapezoidal Microstrip Patch Antenna Array for Low Frequency Medical Applications
S. Suganthi, P. T. Selvan
Fall Detection Using LSTM and Transfer Learning
Ayesha Butt, Sanam Narejo, Muhammad Rizwan Anjum, Muhammad Usman Yonus, Mashal Memon, Arbab Ali Samejo
Improving Quality of Service for Cell-Edge Users in D2D-Relay Networks
Xuefeng Xing, Jing Cao, Hongtao Zhou
Correction to: Expanded and Filtered Features Based ELM Model for Thyroid Disease Classification
Kapil Juneja
An Efficient Delay Tolerance and Cost-Effective Secure NFV Enabled Multi-casting in Mobile Edge Cloud Networks
Rajasekhar Bandapalle Mulinti, M. Nagendra
Security of an RFID Based Authentication Protocol with Bitwise Operations for Supply Chain
Muhammad Arslan Akram, Adnan Noor Mian
A Novel User Grouping Algorithm for Downlink NOMA
Navideh Ghafouri, Naser Movahhedinia, Mohammad Reza Khayyambashi
Retraction Note: Superwideband Monopole Reconfigurable Antenna with Triple Notched Band Characteristics for Numerous Applications in Wireless System
Sukhbir Singh, Ranjit Varma, Manish Sharma, Shakir Hussain