![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Mellin transform-based D2D power optimization in 5G-enabled social IoT network
One of the main sources of information dissemination is social networks. Changes in social and Internet of Things (IoT) relationships can affect the quality of service (QoS) of device-to-device (D2D) communica...
-
Article
SSKA: secure symmetric encryption exploiting Kuznyechik algorithm for trustworthy communication
In recent times, there has been a significant surge in research interest in security, driven by the continuous growth of threats and cyber attacks. Recognizing that existing state-of-the-art security schemes m...
-
Article
Efficient resource allocation with dynamic traffic arrivals on D2D communication for beyond 5G networks
Device-to-Device (D2D) communication is an emerging technology for beyond fifth-generation (B5G) networks to support significant features, such as spectrum efficiency, high data rate, and reduced power consump...
-
Article
Optimum resource allocation for D2D-assisted wireless network in industrial internet of things: a hypergraph-based clique algorithm
Due to the fast development and evolution of technologies like the Internet of Things need for reliable and fast connectivity has also become more prevalent. The use of Device-to-Device communications is a pro...
-
Article
Power-aware QoS-centric strategy for ultra reliable low latency communication in 5G beyond wireless networks
Ultra-Reliable Low Latency Communication (URLLC) is mostly used for core services in the fifth generation (5G) and beyond cellular networks. Due to the conflicting demands of low latency and extremely high rel...
-
Article
AI and Blockchain Assisted Framework for Offloading and Resource Allocation in Fog Computing
The role of Internet of Things (IoT) applications has increased tremendously in several areas like healthcare, agriculture, academia, industries, transportation, smart cities, etc. to make human life better. T...
-
Article
Q-learning-based UAV-mounted base station positioning in a disaster scenario for connectivity to the users located at unknown positions
Due to its flexibility, cost-effectiveness, and quick deployment abilities, unmanned aerial vehicle-mounted base station (UmBS) deployment is a promising approach for restoring wireless services in areas devas...
-
Article
Lagrange's multiplier based resource management for energy efficient D2D communication in 5G networks
Device to device communication is the predominantly renowned trait for the 5G network and IoT applications. In the work, proposed novel joint low power/energy efficient resource allocation with mode selection ...
-
Article
Improved hybrid node localization using the wild horse optimization in the underwater environment
This paper introduces an improved DV-hop-based localization technique to solve the link failure problem without using extra hardware during the continuous localization process because of the uncertainty of the...
-
Article
FRAT: a fuzzy rule based adaptive technique for intelligent placement of UAV-mounted base station
Unmanned Aerial Vehicle (UAV)-mounted base stations (UmBSs) are a potential approach for quick wireless service recovery in a scenario where the terrestrial network has collapsed or has not been installed. How...
-
Article
A hybrid approach for cluster head determination of unmanned aerial vehicle in flying ad-hoc networks
In recent years, flying ad hoc networks (FANETs) have witnessed a notable increase in its applications after the onset of the collaborations of the small unmanned aerial vehicles (UAVs). Because of its inheren...
-
Article
T-LOC: RSSI-based, range-free, triangulation assisted localization for convex relaxation with limited node range under uncertainty skew constraint
Triangulation uncertainty is the uncertainty associated when we try to locate an unknown target with the help of three anchor nodes resulting in formation of a triangulated region. Efficient triangulation lead...
-
Article
Price elasticity log-log model for cost optimization in D2D underlay mobile edge computing system
The development of 5G/6G aims to provide high mobile computing with ultra-reliable low latency. The implementation of latency-sensitive computing applications is causing the overall cost management of the netw...
-
Article
Lebesgue Measures Based Power Control Annealing in 5G D2D Networks Under QoS Constraints for IoT Applications
Device-to-device (D2D) communication requires maximization of throughput of D2D user by efficient transmission power control of D2D users in 5G network. We consider a scenario where D2D users are more than the...
-
Chapter
Optimization of Demand Response
The power system grid is expanding at an exponential rate. The load demand has been increasing followed with a rapid change in technology. The renewable energy sources are also increasing their percentage shar...
-
Chapter and Conference Paper
Malicious Sensor Node Extraction from Infested Acoustic Signals in Underwater Wireless Sensor Networks
Existing works in underwater localization depend on acoustic signals for echosounding services. However, echosounders suffer from positioning errors if the underwater nodes report incorrect location due to any...
-
Chapter and Conference Paper
Path Planning of Autonomous Underwater Vehicle Under Malicious Node Effect in Underwater Acoustic Sensor Networks
Autonomous Underwater Vehicles (AUVs) are subject to various perturbations due to the harsh underwater environment. One such effect is the malicious node perturbation. To deal with effective sensor network cov...
-
Chapter and Conference Paper
A Comprehensive Survey for Internet of Things (IoT)-Based Smart City Architecture
With the advent of mobile technology, the modern paradigm of “connected everyday objects” was built over the current network. The tremendous development of networked devices had increased its reach over the pr...
-
Article
Open AccessSecure transmission technique for data in IoT edge computing infrastructure
Nowadays, the utilization of IoT technology has been rapidly increased in various applications such as smart city, smart banking, smart transport, etc. The internet of things allows the user to collect the dat...
-
Article
A sequential approach with machine in ultra-dense 5G D2D networks
This work intends to resource allocation in ultra-dense networks for device-to-device (D2D) communication in the underlying cellular networks. This work proposes, particularly, many-to-many (M2) approach with opt...