![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
126 Result(s)
-
Article
Open AccessSum-rate maximization for a distributed space-time block code-aided cooperative NOMA with energy harvesting
In this paper, we exploit the spatial and transmission diversities in cooperative non-orthogonal multiple access (C-NOMA) networks to improve the system sum-rate. To achieve this, we propose a user-pairing sch...
-
Article
Open AccessLoad based dynamic channel allocation model to enhance the performance of device-to-device communication in WPAN
The modern communication network has advanced to such an extent that it is now possible for devices within a wireless personal area network (WPAN) to communicate among themselves directly. However, the limited...
-
Article
Open AccessSymbol detection based on a novel discrete harmony search algorithm in MIMO-FBMC/OQAM system
Due to its high spectral efficiency and various other advantages, filter bank multicarrier/offset quadrate amplitude modulation (FBMC/OQAM) has long been considered as a candidate waveform for the fifth genera...
-
Article
Open AccessUAV-enabled software defined data collection from an adaptive WSN
Unmanned aerial vehicle (UAV)-based data gathering from wireless sensor networks is one of the recent research topics that has currently attracted research interest. One of the challenges for the UAV-aided WSN...
-
Article
Open AccessAn analytical approach for modelling unmanned aerial vehicles and base station interaction for disaster recovery scenarios
Unmanned Aerial Vehicles (UAVs) are an emerging technology with the potential to be used in various sectors for various applications and services. In wireless networking, UAVs can be used as a vital part of th...
-
Article
Open AccessCorrection to: Performance analysis of inverse successive interference cancellation in NOMA-based communications
-
Article
Open AccessPerformance analysis of inverse successive interference cancellation in NOMA-based communications
Non-orthogonal multiple access (NOMA) is a promising solution to enhance the spectral efficiency of sixth generation (6G) networks. NOMA enables multiple users to be concurrently served, relying on superpositi...
-
Article
Open AccessStratospheric platform applications: reduced cognitive load for multimedia and education
The proliferation of computing solutions in future communication networks leads to the occurrence of cognitive visual overstimulation (CVO). CVO occurrence arises in multimedia content editing and provisioning...
-
Article
Open AccessPolarization adaptation to improve cell border area bitrates and system capacity in small cells
The target of this paper is to show the impact of polarization adaptation on the received signal quality in an outdoor small-cell deployment scenario. The signal-to-interference ratio (SIR) is the key factor i...
-
Article
Open AccessAn efficient deep neural network channel state estimator for OFDM wireless systems
Channel state estimation (CSE) is essential for orthogonal frequency division multiplexing (OFDM) wireless systems to deal with multipath channel fading. To attain a high data rate with the use of OFDM technol...
-
Article
Open AccessInfrared and visible image fusion in a rolling guided filtering framework based on deep feature extraction
To preserve rich detail information and high contrast, a novel image fusion algorithm is proposed based on rolling-guided filtering combined with deep feature extraction. Firstly, input images are filtered to ...
-
Article
Open AccessA Compact Dual-polarized Probe-fed UWB Antenna System for Breast Cancer Detection Applications
This article proposes an electrically small, probe-fed Ultra-Wideband (UWB) monopole antenna on a slotted truncated ground plane for breast cancer detection. The physical footprint of the proposed antenna elem...
-
Article
Open AccessA new derivation of the Nakagami-m distribution as a composite of the Rayleigh distribution
Mobile communications systems are affected by what is known as fading, which is a well-known problem largely studied for decades. The direct consequence of fading is the complete loss of signal (or a large dec...
-
Article
Open AccessDetection of malicious URLs using machine learning
The detection of fraudulent URLs that lead to malicious websites using addresses similar to those of legitimate websites is a key form of defense against phishing attacks. Currently, in the case of Internet of...
-
Article
Open AccessUpdated exploration of the Tor network: advertising, availability and protocols of onion services
The Tor network is known for its opaque characteristics and involvement in illicit activities, motivating to shed light on the exposure, lifetime, and functionalities of onion services. This study focuses on t...
-
Article
Open AccessPP-based 24 GHz wearable antenna
A wearable millimetre-wave radar antenna operating in 24.05–24.25 GHz for imaging applications in collision avoidance to assist visually impaired people is presented. Non-uniform excitation for the series end-...
-
Article
Open AccessAn endogenous intelligent architecture for wireless communication networks
The challenges posed by the future wireless communication network, which will be a huge system with more complex structures, diverse functions, and massive communication ends, will be addressed by intelligent ...
-
Article
Open AccessMitigating communications threats in decentralized federated learning through moving target defense
The rise of Decentralized Federated Learning (DFL) has enabled the training of machine learning models across federated participants, fostering decentralized model aggregation and reducing dependence on a serv...
-
Article
Open AccessImpact of neural cyberattacks on a realistic neuronal topology from the primary visual cortex of mice
Brain-computer interfaces (BCIs) are widely used in medical scenarios to treat neurological conditions, such as Parkinson’s disease or epilepsy, when a pharmacological approach is ineffective. Despite their ad...
-
Article
Open AccessOn the use of MiniCPS for conducting rigorous security experiments in Software-Defined Industrial Control Systems
Software-Defined Networking (SDN) offers a global view over the network and the ability of centrally and dynamically managing network flows, making them ideal for creating security threat detection and mitigat...