-
Article
Preamble detection for broadband power line communication systems
Power line communication (PLC) systems enable information exchange over existing electric power grids at a low deployment cost. Such systems constitute a crucial component of smart grids. However, PLC is negat...
-
Article
Revenue maximization based joint optimization in mmWave cell-free network: an equivalent decomposition and alternative iteration combined approach
Recently, the ever-increasing demands including higher rate and connection stability have bottlenecked the user experience of the traditional cellular networks. To this end, the Cell-Free (CF) network, which i...
-
Article
Threshold ALOHA with sensing data lookup in low-duty-cycle wireless networks
Slotted ALOHA is a well-known multiple access control protocol that devices use to access a radio channel in wireless networks. Age of information (AoI) is a key network performance indicator that represents t...
-
Article
Prioritization and offloading in P4 switch integrated with NFV
The architecture of integrating Software Defined Networking (SDN) with Network Function Virtualization (NFV) is excellent because the former virtualizes the control plane, and the latter virtualizes the data p...
-
Article
Cost optimization of cloud-edge-fog federated systems with bidirectional offloading: one-hop versus two-hop
Edge and fog computing technologies are akin to cloud computing but operate in closer proximity to users, offering similar services on a more widely distributed and localized scale. To enhance the computing en...
-
Article
Optimization of message delivery reliability and throughput in a DDS-based system with per-publisher sending rate adjustment
Data distribution service (DDS) is a communication middleware that has been widely used in various mission-critical systems. DDS supports a set of attributes and quality of service (QoS) policies that can be t...
-
Article
An end-to-end software-defined network framework and optimal service development model for SAGN
One goal of the sixth generation (6 G) is to extend the communication abilities of a Gbps bitrate, low latency and high reliability to global areas. The Space-Air-Ground Network (SAGN) is a promising scheme. D...
-
Article
Analyzing vertical and horizontal offloading in federated cloud and edge computing systems
Mobile Edge Computing architecture is one of the most promising architectures that can satisfy different quality of Services required by various applications. In this paper, we model mobile edge computing arch...
-
Article
Wireless energy transfer policies for cognitive radio based MAC in energy-constrained IoT networks
Efficient energy transfer is crucial for a green base station with limited energy to replenish the energy of stand-alone devices in the Internet of Things (IoT). Cognitive radio (CR) is critical to satisfying ...
-
Article
Open AccessRSRP difference elimination and motion state classification for fingerprint-based cellular network positioning system
In recent years, the widespread availability of wireless communication has stimulated research of positioning service for cellular networks. Based on the minimization of drive-test introduced in 3GPP R10, it n...
-
Article
Robust adaptive multi-service transmission with hierarchical modulation for OFDM systems in high mobility scenarios
Wireless communications play a key role in intelligent transportation systems for bearing multiple application services with different quality of service (QoS) requirements. Hierarchical modulation (HM) is an ...
-
Article
On-demand ecology-inspired spectrum allocation mechanism for heterogeneous cognitive radio networks
As increasing number of cognitive radio network (CRN) standards are developed in TV White Spaces band with incompatible communication patterns, heterogeneous CRNs coexistence problem could not be avoided. Howe...
-
Article
Distributed space-time coding scheme with differential detection and power allocation for cooperative relay network
By introducing orthogonal space-time coding (STC) scheme in wireless cooperative relay network, two distributed differential STC (DSTC) schemes based on the amplify-and-forward (AF) and decode-and- forward (DF...
-
Article
Secured map reduce computing based on virtual machine using threshold secret sharing and group signature mechanisms in cloud computing environments
Nowadays, cloud computing becomes a popular technology which combines resources of numerous physical computers and servers to perform distributed computing. The main benefit of cloud computing is that this tec...
-
Article
Mobility and QoS oriented 802.11p MAC scheme for vehicle-to-infrastructure communications
Vehicles in Intelligent Transportation System (ITS) can communicate with other vehicles or roadside unit (RSU) within a specific area. In ITS, different services have different requirements of Quality of Servi...
-
Article
On energy-balanced resource scheduling policy optimality for QoS assurance in multi-hop wireless multimedia networks
Energy balancing is an essential issue for scenarios of multi-hop wireless networks powered by batteries, for example, in disaster relief applications. In this paper, we propose a new transmission scheduling p...
-
Article
Hierarchical name system based on hybrid P2P for multimedia networks
Multimedia networks distribute multimedia resources to end users who can enjoy movie, music or photo via this platform. The name system is one of the most important elements in multimedia networks, for it defi...
-
Article
Privacy-aware access control for message exchange in vehicular ad hoc networks
Vehicular ad hoc networks are a promising and increasingly important paradigm. Their applications range from safety enhancement to mobile entertainment services. However, their deployment requires several secu...
-
Article
Performance evaluations of channel estimations in IEEE 802.11p environments
A time-domain (TD) channel estimation (CE) technique is proposed in this paper to enhance the CE performance of IEEE 802.11p standards in cases when the pilot density is insufficient to accurately estimate cha...
-
Article
Reversible data hiding scheme based on dual stegano-images using orientation combinations
This work presents a novel reversible data hiding scheme based on combinations of pixel orientations located at two steganographic images to enhance embedding capacity and preserve good visual quality. Before ...