Journal: Telecommunication Systems

Volume 69, Issue 4

415 -- 429Samira Taheri, Mojtaba Mahdavi, Neda Moghim. A dynamic timing-storage covert channel in vehicular ad hoc networks
431 -- 445Vanga Odelu, Sherali Zeadally, Ashok Kumar Das, Mohammad Wazid, Debiao He. A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks
447 -- 459Muhammad Omer Bin Saeed, Waleed Ejaz, Saad Rehman, Azzedine Zerguine, Alagan Anpalagan, Houbing Song. A unified analytical framework for distributed variable step size LMS algorithms in sensor networks
461 -- 475Ahmed Murkaz, Riaz Hussain, Junaid Ahmed, Muhammad Adil, Babatunji Omoniwa, Adeel Iqbal. An intra-inter-cell device-to-device communication scheme to enhance 5G network throughput with delay modeling
477 -- 487Van Phu Tuan, Hyung Yun Kong. Exploiting cooperative relays to enhance the performance of energy-harvesting systems over Nakagami-m fading channels
489 -- 503José Carlos Marinello Filho, Cristiano Magalhães Panazio, Taufik Abrão. Massive MIMO pilot assignment optimization based on total capacity
505 -- 517Farooq Alam Orakzai, Muhammad Iqbal 0003, Muhammad Naeem 0001, Ayaz Ahmad. Energy efficient joint radio resource management in D2D assisted cellular communication
519 -- 527Xiaolin Liang, Han Xiao, Tingting Lyu, Hao Zhang 0004, Thomas Aaron Gulliver. An improved energy detection receiver for toa estimate in mm-Wave system
529 -- 543Deepak P. M., C. K. Ali. Filter bank SCFDMA: an efficient uplink strategy for future communication systems
545 -- 552Tanee Demeechai, Ravipat Phudpong, Tiwat Pongthavornkamol, Eduard Heidebrecht, Werayuth Wallada, Pornanong Pongpaibool, Siwaluk Siwamogsatham. Novel signal reproduction technique for improvement of UMTS/WCDMA communication jamming

Volume 69, Issue 3

263 -- 271Maram Ahmed Alamri. An efficient cooperative technique for power-constrained multiuser wireless network - "Investigation of cooperation strategies in multiuser wireless network with the power constraint"
273 -- 283Muhammad Afaq Ahmad, Muhammad Waqas, Waleed Ahmad Khan, Zain Ali, Guftaar Ahmad Sardar Sidhu. Resource optimization for dual-hop device to device networks
285 -- 301Susan Dominic, Lillykutty Jacob. Learning algorithms for joint resource block and power allocation in underlay D2D networks
303 -- 319Waixi Liu, Jin Li, Jun Cai, Yu Wang, Xiao-Chu Liu, Shun-Zheng Yu. COD: caching on demand in information-centric networking
321 -- 333Wamberto J. L. Queiroz, Danilo B. T. Almeida, Francisco Madeiro, José Vinícius de Miranda Cardoso, Damião F. L. Pereira, Marcelo S. Alencar. New closed-form expressions for SNR estimates of Nakagami fading channels by the method of moments
335 -- 347Phong Nguyen-Huu, Khuong Ho-Van. Bidirectional relaying with energy harvesting capable relay: outage analysis for Nakagami-m fading
349 -- 364Xiaonan Wang 0001, Hongbin Cheng, Deguang Le. A routing scheme for connecting delay-sensitive urban vehicular networks to the IPv6-based internet
365 -- 379Pawel Laka, Wojciech Mazurczyk. User perspective and security of a new mobile authentication method
381 -- 395Qian Gao 0004, Gang Zhu, Siyu Lin, Yuanxuan Li, Xiao Liu. Robust adaptive multi-service transmission with hierarchical modulation for OFDM systems in high mobility scenarios
397 -- 411Parulpreet Singh, Arun Khosla, Anil Kumar, Mamta Khosla. Computational intelligence based localization of moving target nodes using single anchor node in wireless sensor networks
413 -- 0. Retraction Note to: Improved fast handover method for multiple node by using mobile nodes guide

Volume 69, Issue 2

169 -- 0. Introduction to the special issue on secure communications
171 -- 186Jaafar Almasizadeh, Mohammad Abdollahi Azgomi. A probabilistic model for anonymity analysis of anonymous communication networks
187 -- 205Wei Feng, Yu Qin, Dengguo Feng. Using mobile phones to enhance computing platform trust
207 -- 216Natarajan Venkatachalam, R. Anitha 0002. Steganalysis of BCH code based stego schemes
217 -- 222Zhiwei Wang, Aidong Xia, Mingjun He. ID-based proxy re-signature without pairing
223 -- 235Peyman Taher, Alireza T. Boloorchi, M. H. Samadzadeh. Age-based anonymity: a randomized routing approach to communication unobservability
237 -- 251Jahangir H. Sarker, Ahmed M. Nahhas. A secure wireless mission critical networking system for unmanned aerial vehicle communications
253 -- 262Quanyun Wei, Fang Qi, Zhe Tang. Remove key escrow from the BF and Gentry identity-based encryption with non-interactive key generation

Volume 69, Issue 1

1 -- 25A. A. Zaidan, B. B. Zaidan, Qahtan M. Yas, O. S. Albahri, A. S. Albahri, Mussab Alaa, F. M. Jumaah, Mohammed Talal, Kian Lam Tan, W. L. Shir, C. K. Lim. A survey on communication components for IoT-based technologies in smart homes
27 -- 37Kelvia Aragão Fragoso, Alisson da Conceição Ferreira, Dayse Gonçalves Correia Bandeira, Fábio Alencar Mendonça, Joel J. P. C. Rodrigues, Victor Hugo C. de Albuquerque, Glendo de Freitas Guimarães. A novel remote optical coding for PON monitoring systems using fiber bragg grating
39 -- 50Francisco José García Paramio, Beatriz Sainz de Abajo, Isabel de la Torre Díez, Manuel Pérez Maluenda, Camino Fernández Llamas, Miguel López Coronado, Joel J. P. C. Rodrigues. Implications of the regulation in the implantation process of next generation networks in Spain: analysis in rural versus urban regions
51 -- 59Azadeh Pourkabirian, Mehdi Dehghan Takht Fooladi, Esmaeil Zeinali, Amir Masoud Rahmani. Dynamic resource allocation for OFDMA femtocell networks: a game-theoretic approach
61 -- 76Tugrul Çavdar, Erkan Guler. HyMPRo: a hybrid multi-path routing algorithm for cognitive radio ad hoc networks
77 -- 94Sutikshna Singhdeo, Urmila Bhanja. Design and performance analysis of modified two dimensional Golomb code for optical code division multiple access networks
95 -- 111Damilare Oluwole Akande, Mohd Fadzli Mohd Salleh, Festus Kehinde Ojo. MAC protocol for cooperative networks, design challenges, and implementations: a survey
113 -- 130Chung-Ming Huang, Duy-Tuan Dao, Meng-Shu Chiang. A Bursty Multi-node Handover scheme for mobile internet using the partially Distributed Mobility Management (BMH-DMM) architecture
131 -- 140Yasser Albagory, Omar Said, Mostafa Nofal, Fahad Alraddady. An efficient traffic monitoring and control system using aerial platforms and vertical arrays
141 -- 165Oluwatosin Ahmed Amodu, Mohamed Othman. A survey of hybrid MAC protocols for machine-to-machine communications
167 -- 0. Retracted Article: Performance benefits of regeneration flexibility and modulation convertibility in elastic optical networks