skip to main content
Volume 128, Issue 3Feb 2023
Reflects downloads up to 17 Oct 2024Bibliometrics
research-article
Secure Routing in MANETS Using Adaptive Cuckoo Search and Entropy Based Signature Authentication
Abstract

MANET (Mobile Ad hoc Network) is a collection of self-organizing mobile nodes that operate independently of centralized administration or existing infrastructure. MANETs are particularly vulnerable to a range of security risks as a result of this ...

research-article
Network Based Detection of IoT Attack Using AIS-IDS Model
Abstract

In recent days Internet of Things attained more familiarity. Although it is a promising technology, it tends to lead to a variety of security issues. Conventional methods such as IoT ecosystem based solutions were not suitable to give dilemmas to ...

research-article
Hybrid Mutualism Mechanism-Inspired Butterfly and Flower Pollination Optimization Algorithm for Lifetime Improving Energy‐Efficient Cluster Head Selection in WSNs
Abstract

Rapid advancement of technologies in Wireless Sensor Networks is attracting maximized attention across the scientific community due to its suitability and diversified coverage in real life applications. WSNs due to their features of resource ...

research-article
Robust and Sparse Dual Tree Complex Wavelet Transform-Based Twin Support Vector Regression for 5G InH and V2I Communications
Abstract

In this article, a robust and sparse Twin Support Vector Regression based on Dual Tree Complex Discrete Wavelet Transform algorithm is proposed and applied to dense 5G InH (Indoor Hotspot) LOS (Line-of-Sight) multipath communications for several ...

research-article
Cluster Routing Algorithm for Ring Based Wireless Sensor Network Using Particle Swarm and Lion Swarm Optimization
Abstract

In order to solve the problem of hot spot caused by uneven energy consumption of nodes and reduce the network energy consumption, a novel Cluster Routing algorithm for ring based wireless sensor networks using Particle Swarm Optimization (PSO) and ...

research-article
Multiservice Provisioning Optical Code Switched Generalized Multiprotocol Label Switching Optical Networks
Abstract

In this paper, we have proposed a Multiservice Provisioning Optical Code Switching (OCS) method for GMPLS networks, which uses Optical-Code-Division-Multiplexing (OCDM) across every lightpath of a wavelength division multiplexing system. We also ...

research-article
Evaluation of Physical Layer Security for UAV-Enabled Wireless Networks over α-κ-μ Fading Channels
Abstract

Unmanned aerial vehicle (UAV)-enabled wireless systems are expected for widespread communication applications in future-generation networks because of their flexible deployment and on-demand mobility. This paper considers a UAV-supported system on ...

research-article
Low Complexity, Pairwise Layered Tabu Search for Large Scale MIMO Detection
Abstract

This paper presents a low complexity pairwise layered tabu search based detection algorithm for a large-scale multiple-input multiple-output system. The proposed algorithm can compute two layers simultaneously and reduce the effective number of ...

research-article
Deep Learning Based IoT Module for Smart Farming in Different Environmental Conditions
Abstract

Internet of Things (IoT) is an unavoidable technology evolution in the present era. All most all the domains have accepted IoT in their applications. Recently, IoT is adopted in agriculture as smart farming to collect environmental and crop data. ...

research-article
Distributed PEP–PDP Architecture for Cloud Databases
Abstract

Cloud computing allows accessing data from anywhere; Cloud databases play an important role in storing requests for access management. These requests require authorization management which has become a crucial area in access control. The request-...

research-article
An Innovative Technique for DDoS Attack Recognition and Deterrence on M-Health Sensitive Data
Abstract

Nowadays Mobile Health (also termed as m-Health) is an essential component of the healthcare sector. The m-healthcare uses different types of digitized devices (laptops, smart phones, tablets) to transfer patient runtime data very quickly among ...

research-article
THz Super-Resolution Imaging in Transmission Technology by Using Butterfly and Pattern Device Samples
Abstract

Recently there has been an increasing demand for terahertz technology, especially in imaging. In the past few decades, the applications of terahertz (THz) imaging technology have seen significant developments in the fields of biology, medical ...

research-article
Object Detection for Night Surveillance Using Ssan Dataset Based Modified Yolo Algorithm in Wireless Communication
Abstract

Night vision greatly affects the efficiency of our vision which we come across daily. In this work we mainly focus on the night vision system to improve the safety and security of people. Research work on night vision is very essential to solve ...

research-article
A Novel Digital Logic for Bit Reversal and Address Generations in FFT Computations
Abstract

The Fast Fourier Transform and Inverse Fast Fourier Transform are high efficient algorithm that have wide a range of Digital Signal Processing (DSP) and telecommunication based applications. The FFT/IFFT structure with any number of complex valued ...

research-article
IoT Routing Attacks Detection Using Machine Learning Algorithms
Abstract

Internet of Things (IoT) is a concept that aims to make the real world more intelligent but susceptible to various attacks. In this paper, we focus on wireless sensor networks (WSNs), as a founding block in the IoT presenting the vulnerability of ...

research-article
Optimized DPMZM Based RoF Link Against Fiber Impairments
Abstract

The demands of emerging wireless communication are higher bandwidth, low latency, high-quality multimedia applications, less environmental impact etc., with cost-effective network implementation. The Radio over Fiber (RoF) link will be the best ...

research-article
On Minimizing TCP Traffic Congestion in Vehicular Internet of Things (VIoT)
Abstract

The performance of end-to-end wireless link congestion control algorithm in the vehicular internet of things network is plagued by the inherent limitations of spurious rate control initiation, slow convergence time, and fairness disparity. In this ...

research-article
N-Dimensional Markov Chain Analysis of the Starvation Issue for IEEE 802.15.6 Slotted Aloha Algorithm
Abstract

The performance of IEEE 802.15.6 standard for wireless body area network (WBAN) has been studied by many researchers and various techniques to improve its performance such as throughput have been proposed. For example, the throughput can be ...

review-article
Power System Reconfiguration in Distribution System for Loss Minimization Using Optimization Techniques: A Review
Abstract

Normally consumers faced so many power interruption problems in the power distribution network. The distribution network is interrupted because of the power loss problems occurs in the power system. Network Reconfiguration (NR) is one of the major ...

research-article
Prediction of Failed Sensor Data Using Deep Learning Techniques for Space Applications
Abstract

Recently, space applications have become complicated for post-flight analysis when a sensor fails. Various scholars have researched many types of research based on fault data prediction in aircraft applications, utilizing numerous deep learning ...

research-article
Congestion Avoidance Using Enhanced Blue Algorithm
Abstract

This paper addresses congestion avoidance using enhanced blue algorithm (EBA) for data transferring in a network. The congestion of data always affects the data transmission on the internet for various applications. For developing data ...

research-article
Wi-ID: WiFi-Based Identification System Using Rock-Paper-Scissors Hand Gestures
Abstract

This paper proposes using a WiFi-based identification system, Wi-ID, to identify users from their unique hand gestures. Hand gestures from the popular game rock-paper-scissors are utilized for the system’s user authentication commands. The whole ...

research-article
An Optimal Cluster Based Intrusion Detection System for Defence Against Attack in Web and Cloud Computing Environments
Abstract

In recent years, the rapid growth of information technology organizations causes ability to meet their demands such as scalability, mobility and flexibility. The security and privacy is a major issue of those organizations that’s why they move the ...

research-article
Emperor Penguin Optimized Q Learning Method for Energy Efficient Opportunistic Routing in Underwater WSN
Abstract

Underwater Wireless Sensor Network (UWSN) is a popular technique for monitoring marine environments. It consists of several acoustic channels, sink nodes, sensor nodes and base stations. Source nodes are deployed at different depth levels of ...

research-article
Design of a Compact Double-Square-Ring-Shaped Dual-Band Antenna for WiMAX/WLAN Applications
Abstract

In this article, a dual band frequency reconfigurable antenna is proposed for WiMAX and WLAN applications. Double-Square-Ring (DSR) shaped radiator is designed to exhibit dual mode operations and PIN diodes are implemented to switch the operating ...

research-article
Data-Prediction Model Based on Stepwise Data Regression Method in Wireless Sensor Network
Abstract

As the popularity of wireless sensor networks (WSNs) is rapidly expanding across businesses and industries, we must make everything around us more intelligent and informative. In such networks, sensor nodes (SNs) serve as the WSN's eyes, obtaining ...

research-article
A New Cryptosystem for Secured Data Communications in Plagiarism Checking Process Using Blockchain Technology
Abstract

Blockchain technology is playing a major role in the process of providing security to the data of different kinds of applications. This technology is considered the verified document of every transaction. Proof of Low Infringement and Plagiarism ...

review-article
Switchable/Tunable Band-Notched Characteristics in UWB and UWB-MIMO Antennas: A Comprehensive Review
Abstract

The objective of this study is to give a deep knowledge on band notched reconfigurability in ultra-wideband (UWB) and ultra-wideband multi-input multi-output (UWB-MIMO) antennas. Reconfigurability over notched bands refers to having switchable and ...

research-article
A Compact Phased Array Antenna for 5G MIMO Applications
Abstract

In this article, a new methodology for applying the phased array antenna method to MIMO technology with the ability to provide improved frequency diversity and isolation properties is discussed. The radiator serves to attenuate sub-3 GHz bands by ...

research-article
FENS: Fog-Enabled Network Slicing in SDN/NFV-Based IoV
Abstract

Modern vehicular networks support various services with variable Quality of Service (QoS) constraints. Two major classes of vehicular applications are identified, namely, safety and non safety services. The former are delay-sensitive while the ...

Comments