default search action
IET Communications, Volume 18
Volume 18, Number 1, January 2024
ORIGINAL RESEARCH
- Cong Xie, Mohammed El-Hajjar, Soon Xin Ng:
Machine learning assisted adaptive LDPC coded system design and analysis. 1-10 - Mohammed S. Elbasheir, Rashid A. Saeed, Salaheldin Edam:
Electromagnetic field exposure boundary analysis at the near field for multi-technology cellular base station site. 11-27 - Qiang Zhang, Hao Yu:
Monte Carlo-based service migration under multiple constraints in mobile edge computing. 28-39 - Ruisi Wu, Wen-Kang Jia:
CSVRF: A CAM-based popularity-aware egress group-caching scheme for SVRF-based packet forward engines. 40-54 - Zhijun Teng, Sian Zhu, Mingzhe Li, Libo Yu, Jinliang Gu, Liwen Guo:
Wireless sensor network security defense strategy based on Bayesian reputation evaluation model. 55-62 - Xiangqun Lu, Hongzhi Zheng, Yaqiong Liu, Hongxing Li, Qingyun Zhou, Tao Li, Hongguang Yang:
Segmentation-enhanced gamma spectrum denoising based on deep learning. 63-80 - Ling Tan, Lei Sun, Boyuan Cao, Jingming Xia, Hai Xu:
Research on weighted energy consumption and delay optimization algorithm based on dual-queue model. 81-95 - Rui Wang, Min Shen, Yun He, Xiangyan Liu:
Joint AP-user association and caching strategy for delivery delay minimization in cell-free massive MIMO systems. 96-109
Volume 18, Number 2, January 2024
ORIGINAL RESEARCH
- Hongrui Nie, Yue Su, Weibo Zhao, Junsheng Mu:
Hybrid traffic scheduling in time-sensitive networking for the support of automotive applications. 111-128 - Yu Hua, Yaru Fu, Qi Zhu:
On the design of cost minimization for D2D-enabled wireless caching networks: A joint recommendation, caching, and routing perspective. 129-144 - Chunzhi Wang, Keguan Wang, Min Li, Feifei Wei, Neal Naixue Xiong:
Chunk2vec: A novel resemblance detection scheme based on Sentence-BERT for post-deduplication delta compression in network transmission. 145-159 - Yaozong Fan, Yu Ma, Peng Pan, Can Yang:
Bat algorithm based semi-distributed resource allocation in ultra-dense networks. 160-175 - Kan Feng, Changliang Yang, Wenqiang Zhu, Kun Li, Ya Chen:
PageRank talent mining algorithm of power system based on cognitive load and DPCNN. 176-186
LETTER
- Esmot Ara Tuli, Rubina Akter, Jae Min Lee, Dong-Seong Kim:
Whale optimization-based PTS scheme for PAPR reduction in UFMC systems. 187-195
Volume 18, Number 3, February 2024
ORIGINAL RESEARCH
- Kusala Kalani Munasinghe, Nishan Dharmaweera, Chamitha de Alwis, Uditha L. Wijewardhana, Rajendran Parthiban:
Impairment-aware resource allocation scheme for elastic optical networks with different service priorities. 197-213 - Yifan Du, Nan Qi, Kewei Wang, Ming Xiao, Wenjing Wang:
Intelligent reflecting surface-assisted UAV inspection system based on transfer learning. 214-224 - Peter O. Akuon:
Error analysis for face coded modulation system. 225-234 - Yuebo Li, Wenjiang Ouyang, Jiawu Miao, Junsheng Mu, Xiaojun Jing:
Joint optimization of sampling point and sensing threshold for spectrum sensing. 235-247 - Mohammad Bayat, Mohammad Mostafavi, Abazar Arabameri:
Towards practical implementation of molecular communication: A cost-effective experimental platform based on the human circulatory system. 248-257 - Aboulfazl Dayyani, Maghsoud Abbaspour:
SybilPSIoT: Preventing Sybil attacks in signed social internet of things based on web of trust and smart contract. 258-269
Volume 18, Number 4, March 2024
ORIGINAL RESEARCH
- Xianghui Xiao, Longsheng Huang, Zhenshan Zhang, Mingxian Huang, Luchang Guan, Yunhao Song:
Data transmission path planning method for wireless sensor network in grounding grid area based on MM-DPS hybrid algorithm. 271-282 - Jing Zhang, Chu-Long Liang, Hong-Xu Gao, He Yan, Hong-Bo Zhu:
On multiple handoff blocking-then-reaccess for opportunistic spectrum access. 283-296 - Ezekia Gilliard, Jinshuo Liu, Ahmed Abubakar Aliyu:
Knowledge graph reasoning for cyber attack detection. 297-308 - Junyu Lin, Libo Feng, Jinli Wang, Fei Qiu, Bei Yu, Jing Cheng, Shaowen Yao:
FGDB-MLPP: A fine-grained data-sharing scheme with blockchain based on multi-level privacy protection. 309-321 - Fengming Yang, Weiran Guo, Jianxin Dai:
Robust beamforming design for passive RIS-assisted NOMA systems. 322-331
Volume 18, Number 5, March 2024
ORIGINAL RESEARCH
- Wanwei Huang, Haobin Tian, Xiaohui Zhang, Min Huang, Song Li, Yuhua Li:
An improved resource allocation method for mapping service function chains based on A3C. 333-343 - Zixiao Yu, Honghong Wang, Kim Un:
Automatic cinematography for body movement involved virtual communication. 344-352 - Ahlem Arfaoui, Maha Cherif, Ridha Bouallegue:
Analysis one-bit DAC for MU massive MIMO downlink via efficient autoencoder based deep learning. 353-364 - Qingqing Tu, Zheng Dong, Xianbing Zou, Ning Wei, Ya Li, Fei Xu:
Dynamic reconfigurable intelligent surface deployment for physical layer security enhancement in mmWave systems. 365-374
Volume 18, Number 6, April 2024
ORIGINAL RESEARCH
- Xin Ma, Kai Yang, Chuanzhen Zhang, Hualing Li, Xin Zheng:
Physical adversarial attack in artificial intelligence of things. 375-385 - Renjie Liao, Shuo Wang:
Malicious domain detection based on semi-supervised learning and parameter optimization. 386-397 - Jianli Xie, Lin Li, Cuiran Li:
A joint resource optimization allocation algorithm for NOMA-D2D communication. 398-408 - Xiaoxuan Wang, Hengyuan Jiao, Qinghe Gao, Yue Wu, Tao Jing, Jin Qian:
Trajectory optimization for maximization of energy efficiency with dynamic cluster and wireless power for UAV-assisted maritime communication. 409-420 - Jiacheng Sui, Yi Li, Hai Huang:
Improved reputation evaluation for reliable federated learning on blockchain. 421-428
Volume 18, Number 7, April 2024
ORIGINAL RESEARCH
- Yidong Jia, Fuhong Lin, Yan Sun:
A novel federated learning aggregation algorithm for AIoT intrusion detection. 429-436 - Qian Bi, Huadong Sun, Cheng Qian, Ke Zhang:
An improved seeds scheme in K-means clustering algorithm for the UAVs control system application. 437-449 - Chao Ren, Gaoxin Lyu, Xianmei Wang, Yao Huang, Wei Li, Lei Sun:
Two-step attribute reduction for AIoT networks. 450-460 - Song Han, Hui Ma, Amir Taherkordi, Dapeng Lan, Yange Chen:
Privacy-preserving data integration scheme in industrial robot system based on fog computing and edge computing. 461-476
Volume 18, Number 8, May 2024
ORIGINAL RESEARCH
- Feng Hu, Hongliu Zhang, ShuTing Chen, Libiao Jin, Jinhao Zhang, Yunfei Feng:
Asymptotic performance of reconfigurable intelligent surface assisted MIMO communication for large systems using random matrix theory. 477-489 - Dongpo Song, Peng Wei, Yongming Fu, Shilian Wang:
Construction of secure adaptive frequency hopping sequence sets based on AES algorithm. 490-502 - Youjun Zeng, Jie Zhou, Youjiang Liu, Tao Cao, Dalong Yang, Yu Liu, Xianhua Shi:
Distributed MA-IDDPG-OLSR based stable routing protocol for unmanned aerial vehicle ad-hoc network. 503-522 - Jie Yan, Bo Zhang, Shi Wang, Hao Lan, Xin Wang:
Burst traffic: Congestion management and performance optimization strategies in heterogeneous cognitive radio networks. 523-533
Volume 18, Number 9, June 2024
REVIEW
- Dengguo Feng, Yu Qin, Wei Feng, Wei Li, Ketong Shang, Hongzhan Ma:
Survey of research on confidential computing. 535-556
ORIGINAL RESEARCH
- Wei Gu, Hongyan Xing, Tianhao Hou:
An effective attention and residual network for malware detection. 557-568 - Abdulrahman Al Ayidh, Mohammed M. Alammar:
Energy efficient RF chains selection based on integrated Hungarian and genetic approaches for uplink cell-free millimetre-wave massive MIMO systems. 569-582 - Ghaffar Raeisi, Mohammad Gholami:
On a class of column-weight 3 decomposable LDPC codes with the analysis of elementary trapping sets. 583-596
Volume 18, Number 10, June 2024
ORIGINAL RESEARCH
- Yihang Du, Yu Zhang, Pengzhi Qian, Panfeng He, Wei Wang, Yifei Chen, Yong Chen:
A back-to-back coordination-based learning scheme for deceiving reactive jammers in distributed networks. 597-611 - Yangyi Zhang, Xinrong Guan, Qingqing Wu, Zhi Ji, Yueming Cai:
Resource allocation and passive beamforming for IRS-assisted short packet systems. 612-618 - Abdolrasoul Sakhaei Gharagezlou, Mahdi Nangir, Nima Imani:
Optimizing secure power allocation in massive MIMO systems with an eavesdropper under imperfect CSI conditions. 619-627 - Ozan Zorlu, Adnan Ozsoy:
A blockchain-based secure framework for data management. 628-653
Volume 18, Number 11, July 2024
Original Research
- Zeyu Yan, Weile Zhang, Fuqiang Li:
Doppler spread analysis for suppressing channel time variation in high-mobility massive MIMO V2V communications. 655-670 - Yunping Mu, Chaochao Yao, Dian Fan, Yongjun Xu, Gongpu Wang, Marjan Milosevic, Bo Ai:
Channel estimation for backscatter communication systems with retrodirective arrays. 671-678 - Arif Hossan, Jahidul Islam:
Secondary cluster head based SEP in heterogeneous WSNs for IoT applications. 679-688 - Chenyu Zhang, Huabing Wu:
A composite spread spectrum sequence for underwater acoustic signal acquisition. 689-700
Volume 18, Number 12, July 2024
Original Research
- Fang Liu, Yuanfang Zheng, Lizhi Chen, Yongxin Feng:
A chaotic time series combined prediction model for improving trend lagging. 701-712 - Minghui Jia, Xiaohu Huang, Fengjun Han, Dequan Yan, Wei Wang, Guochao Zhu, Lin Zhang, Chao Pan, Haifeng Ma, Jidong Wei:
Multi-view synergistic enhanced fault recording data for transmission line fault classification. 713-725 - Hongsheng Chen, Chunhui Wu:
Clustered DTN routing based on sensing node relationship strength. 726-743 - Changqing Ye, Hong Jiang, Chen-Ping Zeng, Haoxin Shi, Zhan-Peng Tang:
Sum-rate maximization for downlink multiuser MISO URLLC system aided by IRS with discrete phase shifters. 744-758
Volume 18, Number 13, August 2024
Original Research
- Mohammed Salah Abood, Hua Wang, Bal S. Virdee, Dongxuan He, Maha Fathy, Abdulganiyu Abdu Yusuf, Omar Jamal, Taha A. Elwi, Mohammad Alibakhshikenari, Lida Kouhalvandi, Ashfaq Ahmad:
Improved 5G network slicing for enhanced QoS against attack in SDN environment using deep learning. 759-777 - Mina Asgarian, Ghasem Mirjalily:
A comparative analysis of two-stage approaches for embedding network function virtualization enabled multicast services. 778-788 - Pooria Tabesh Mehr, Konstantinos Koufos, Karim E. I. Haloui, Mehrdad Dianati:
Low-complexity channel estimation for V2X systems using feed-forward neural networks. 789-798 - Weihao Sun, Hai Wang, Zhen Qin, Zichao Qin:
Joint optimization of deployment, user association, channel, and resource allocation for fairness-aware multi-UAV network. 799-816
Volume 18, Number 14, August 2024
Original Research
- Bo He, Hongji Xu, Wei Ji, Yan Du, Hailiang Xiong, Jun Li:
Reliable communication based on energy spreading transform and iterative detection in MIMO-OFDM systems. 817-826 - Fanghao Xu, Chao Wang, Jiakai Liang, Chenyang Zuo, Keqiang Yue, Wenjun Li:
A knowledge distillation strategy for enhancing the adversarial robustness of lightweight automatic modulation classification models. 827-845 - Nasser Zarbi, Ali Zaeembashi, Nasour Bagheri, Morteza Adeli:
Toward designing a lightweight RFID authentication protocol for constrained environments. 846-859 - Bingyi Xie, Honghui Xu, Daehee Seo, DongMyung Shin, Zhipeng Cai:
KDGAN: Knowledge distillation-based model copyright protection for secure and communication-efficient model publishing. 860-868
Volume 18, Number 15, September 2024
Original Research
- Ogunlade M. Adegoke, Saheed Lekan Gbadamosi, Babatunde S. Adejumobi, Israel E. Owolabi, Wasiu Adeyemi Oke, Nnamdi I. Nwulu:
Noise modelling and mitigation for broadband in-door power line communication systems. 869-881 - Cheng Wang, Hai Xue, Zhan Huan:
BPNN-based flow classification and admission control for software defined IIoT. 882-896 - Wenqiang Shi, Yingke Lei, Hu Jin, Fei Teng, Caiyi Lou:
Specific emitter identification by wavelet residual network based on attention mechanism. 897-907 - Lin Zhu, Long Tan, Bingxian Li, Huizi Tian:
An optimization scheme for vehicular edge computing based on Lyapunov function and deep reinforcement learning. 908-924
Volume 18, Number 16, October 2024
Original Research
- Shoushuai He, Lei Zhu, Lei Wang, Weijun Zeng, Zhen Qin:
Fine-grained spectrum map inference: A novel approach based on deep residual network. 925-937 - Mahboobeh Eshaghi, Ali Nodehi, Hosein Mohamadi:
A new hybrid genetic algorithm with tabu search for solving the temporal coverage problem using rotating directional sensors. 938-949 - Maha Al-Sharif, Anas Bushnag:
Enhancing cloud security: A study on ensemble learning-based intrusion detection systems. 950-965 - Tianyu Zheng, Chao Xu, Zhengping Li, Chao Nie, Rubin Xu, Minpeng Jiang, LeiLei Li:
BFT-Net: A transformer-based boundary feedback network for kidney tumour segmentation. 966-977
Volume 18, Number 17, October 2024
Original Research
- Jianguo Yao, Ziwei Liu, Xiaoming Wang:
Study of construction of Golomb Costas arrays with ideal autocorrelation properties based on extension field. 979-992 - Roza Banitalebi Dehkordi, Mohsen Mivehchy, Mohammad Farzan Sabahi:
A novel quasi-FM demodulator as AM demodulator for amplitude limited signals. 993-1001 - Yanbing Yang, Jing Lei, Ke Lai:
Dual-mode codeword position index based SCMA with transmit diversity. 1002-1017 - Nisha P. Shetty, Balachandra Muniyal, Leander Melroy Maben, Rithika Jayaraj, Sameer Saxena:
Dynamic Twitter friend grouping based on similarity, interaction, and trust to account for ever-evolving relationships. 1018-1048 - Yukai Liu, Rongke Liu, Qizhi Chen, Ling Zhao:
A high-precision timing and frequency synchronization algorithm for multi-h CPM signals. 1049-1061 - Chidi E. Ngene, Prabhat Thakur, Ghanshyam Singh:
Analysis of interference effect in VL-NOMA network considering signal power parameters performance. 1062-1070 - Oluwaseyi Paul Babalola, Vipin Balyan:
Dimmable constant weight polar-coded non-orthogonal multiple access with orthogonal space-time block coding visible light communication systems. 1071-1078 - Jeta Dobruna, Zana Limani Fazliu, Hëna Maloku, Mojca Volk:
A heuristic approach to energy efficient user association in ultra-dense HetNets using intermittent scheduling strategies. 1079-1088 - Yuchen Shi, Shangdong Liu, Sisi Shao, Yimu Ji, Fei Wu, Tiansheng Gu, Yulu Zheng, Yijun Nie, Zongkai Ji, Cailing Sun, Zeng Chen, Yawei Sun:
Mimic turbo compiled code structure for wireless communication systems. 1089-1106 - Dinh-Minh Vu, Thi Ha La, Nguyen Gia Bach, Eui-Nam Huh, Hoang-Hai Tran:
Enhancing network attack detection across infrastructures: An automatic labeling method and deep learning model with an attention mechanism. 1107-1125 - Enhao Wang, Yunfei Chen, Aïssa Ikhlef, Hongjian Sun:
Dual-user joint sensing and communications with time-divisioned bi-static radar. 1126-1139 - Shuang Li, Jiacheng Wang, Baoguo Yu, Hantong Xing, Shuang Wang:
A deep learning-based approach for pseudo-satellite positioning. 1140-1150
Volume 18, Number 18, November 2024
Original Research
- Zeinab Nazemi Absardi, Reza Javidan:
A predictive SD-WAN traffic management method for IoT networks in multi-datacenters using deep RNN. 1151-1165 - Wu Zheng, Chen Liu, Yunchao Song, Tianbao Gao:
Two stage beamforming and combining scheme for FDD massive MIMO systems with multi-antenna users. 1166-1178 - Haitao Zhao, Zhuoran Xu, Yiyang Ni, Wenxue Sun, Hongbo Zhu, Yaxuan Liu, Zhaoying Mo:
Optimization strategy of UAV-ARIS assisted vehicular communication system. 1179-1190 - Siling Wang, Li Zhang:
Support vector machine-based handover scheme for heterogeneous ultra dense network of high-speed railway. 1191-1204 - Changliang Zheng, Kang Yang, Tielian Fu, Tianle Liu, Mengqi Yang:
Performance of massive MIMO-NOMA systems with low complexity group SIC receivers and low-resolution ADCs. 1205-1219 - Jia Han, Zhiyong Yu, Jian Yang:
A lightweight deep learning architecture for automatic modulation classification of wireless internet of things. 1220-1230 - Shuyi Wang, Haotong Cao, Longxiang Yang:
A hierarchical reinforcement learning approach for energy-aware service function chain dynamic deployment in IoT. 1231-1243 - Rui Wei, Tuanfa Qin, Jinbao Huang, Ying Yang, Junyu Ren, Lei Yang:
Resource allocation scheduling scheme for task migration and offloading in 6G Cybertwin internet of vehicles based on DRL. 1244-1265 - Zhifeng Huang, Feng Ke, Hui Song:
A D2D user pairing algorithm based on motion prediction and power control. 1266-1281 - Peter O. Akuon:
Polarized APSK modulation system with polymorphic SC signals. 1282-1291 - Lei Lan, Zhongpeng Wang, Lijuan Zhang:
A path splitting and pruning strategy on list decoder for PAC codes. 1292-1299 - Jeyavim Sherin R. C., Parkavi Krishnamoorthy:
An innovative model for an enhanced dual intrusion detection system using LZ-JC-DBSCAN, EPRC-RPOA and EG-GELU-GRU. 1300-1318
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.