Journal: Telecommunication Systems

Volume 81, Issue 4

503 -- 526Yongbo Sui, Hui Gao. Adaptive echo state network based-channel prediction algorithm for the internet of things based on the IEEE 802.11ah standard
527 -- 537Yanzhi Hu, Tian Tian, Fengbin Zhang, Shiwei Zhang. Improving inadequate coverage of an unmanned aerial vehicle base station: mobility strategies and delay-tolerant service requests
539 -- 547Jesus Cruz-Garza, Alberto Reyna, Luz Idalia Balderas, Marco A. Panduro, Lourdes Y. GarcĂ­a. Dual-band virtual antenna array with time modulation in presence of position perturbations
549 -- 560Gelaye Geresu Gaytare, Ayodeji Olalekan Salau, Berhan Oumer Adame. Interference mitigation technique for self optimizing Picocell indoor LTE-A networks
561 -- 573Weijia Lei, Mengting Zou, Weihan Zhang, Yue Zhang, Hongjiang Lei. Optimization of pre-equalized time reversal security transmission systems assisted with artificial noise
575 -- 590Armin Farhadi Zavleh, Hamidreza Bakhshi. Downlink resource allocation to total system transmit power minimization in SCMA-based systems for cloud-RAN in 5G networks
591 -- 613Noor S. Baqer, Ahmed Shihab Albahri, Hussein A. Mohammed, A. A. Zaidan 0001, Rula A. Amjed, Abbas M. Al-Bakry, Osamah Shihab Albahri, Hassan A. Alsattar, Alhamzah Alnoor, Abdullah Hussein Alamoodi, B. B. Zaidan, Rami Qays Malik, Zahraa Hashim Kareem. Indoor air quality pollutants predicting approach using unified labelling process-based multi-criteria decision making and machine learning techniques
615 -- 623Sadegh Mohammadvaliei, Mohammadali Sebghati, Hassan Zareian. Adaptive modulation and coding using deep recurrent neural network
625 -- 642Angshuman Khan, Rupayan Das. Security aspects of device-to-device (D2D) networks in wireless communication: a comprehensive survey
643 -- 0Tae-Yeun Kim, A. K. Singh, Hoon Ko. Retraction Note to: Modeling for small cell networks in 5G communication environment
645 -- 0. Retraction Note to: Performance analysis of power series based gamma-gamma fading M-ary PSK MIMO/FSO link with atmospheric turbulence and pointing errors

Volume 81, Issue 3

333 -- 340Weimin Kang. A novel shaping pulse in faster-than-Nyquist system
341 -- 355Daniel Kariuki Waweru, Fengfan Yang, Chunli Zhao, Lawrence Muthama Paul, Hongjun Xu. Design of optimized distributed Goppa codes and joint decoding at the destination
357 -- 372Abdullah Ali Bahattab. Designing ROACM routing protocol along with bandwidth allocation using seagull optimization for ad hoc wireless network
373 -- 387Vivek Sethi, Sujata Pal, Avani Vyas, Shweta Jain 0002, Kshirasagar Naik. Energy-and-delay-aware scheduling and load balancing in vehicular fog networks
389 -- 415Rupayan Das, Dinesh Dash, Chandra Bhushan Kumar Yadav. An efficient charging scheme using battery constrained mobile charger in wireless rechargeable sensor networks
417 -- 430Tasnuva Mahjabin, Yang Xiao 0001, Tieshan Li, Mohsen Guizani. Hotlist and stale content update mitigation in local databases for DNS flooding attacks
431 -- 439Maryam Najimi. Altitude and power optimization for vertical heterogeneous networks
441 -- 459S. Jeevanantham, Rebekka B.. Energy-aware neuro-fuzzy routing model for WSN based-IoT
461 -- 474Ke Zhang, Guang Zhang, Xiuwu Yu, Shaohua Hu, Youcui Yuan. WSNs node localization algorithm based on multi-hop distance vector and error correction
475 -- 502Ramin Mohammadi, Sedat Akleylek, Ali Ghaffari, Alireza Shirmarz. Taxonomy of traffic engineering mechanisms in software-defined networks: a survey

Volume 81, Issue 2

175 -- 190Jiabei He, Xuchong Liu, Fan Wu 0003, Chaoyang Chen, Xiong Li 0002. A mutual authentication scheme in VANET providing vehicular anonymity and tracking
191 -- 205Qikun Zhang, Liang Zhu, Kunyuan Zhao, Yimeng Wu, Baohua Jin, Jianyong Li, Yinghui Meng, Sikang Hu. Dynamic permission access control model based on privacy protection
207 -- 224Xiaohu Huang, Dezhi Han, Tien-hsiung Weng, Zhongdai Wu, Bing Han, Junxiang Wang, Mingming Cui, Kuan-Ching Li. A localization algorithm for DV-Hop wireless sensor networks based on manhattan distance
225 -- 240Afsaneh Allahvirdi, Saleh Yousefi, Asghar Asgharian-Sardroud. Placement of dynamic service function chains in partially VNF-enabled networks
241 -- 251Muhammad Usman Younus, Rabia Shafi, Sultan S. Alshamrani. A model for a practical evaluation of a DASH-based rate adaptive algorithm over HTTP
253 -- 267Fabio Cocchi da Silva Eiras, Wagner L. Zucchi. Measuring synchronization precision in mobile sensor networks
269 -- 288Haidar Taki, Chadi Abou-Rjeily. Spectrally efficient IR-UWB pulse designs based on linear combinations of Gaussian Derivatives
289 -- 306Mingxin Liu, Wei Xue, Jincheng Gao, Yidong Xu, Peisong Jia, Wenjian Chen. Optimized baseband Nyquist pulse-based PAPR reduction method for SEFDM systems
307 -- 321Jianbin Xue, Junpeng Li, Qingchun Hu. Joint downlink user power allocation and rate maximization in UAV relay assisted SWIPT-NOMA network
323 -- 332Rana Sedghi, Masoumeh Azghani. Interference suppression in heterogeneous massive MIMO systems with imperfect CSI

Volume 81, Issue 1

1 -- 19Huaying Yin, Hongmei Yang, Saeid Shahmoradi. EATMR: an energy-aware trust algorithm based the AODV protocol and multi-path routing approach in wireless sensor networks
21 -- 0Huaying Yin, Hongmei Yang, Saeid Shahmoradi. Correction to: EATMR: an energy-aware trust algorithm based the AODV protocol and multi-path routing approach in wireless sensor networks
23 -- 39Pooja Chaudhary, Brij B. Gupta, Awadhesh Kumar Singh. Implementing attack detection system using filter-based feature selection methods for fog-enabled IoT networks
41 -- 52Ming Lei, Bin Yu, Xingjun Zhang, Scott Fowler, Bocheng Yu, Peng Wang. Joint power control and user scheduling for backbone-assisted industrial wireless networks with successive interference cancellation
53 -- 66Fatemeh Zardosht, Mostafa Derakhtian, Ali Jamshidi 0001, Hossein Eshaghi. Recognition and elimination of SSDF attackers in cognitive radio networks
67 -- 81Maryam Chinipardaz, Seyed Majid Noorhosseini, Ahmad Sarlak. Inter-cell interference in multi-tier heterogeneous cellular networks: modeling and constraints
83 -- 98Akber Ali Khan, Vinod Kumar, Jangirala Srinivas, Saru Kumari, Mridul Kumar Gupta. RAKS: robust authentication and key agreement scheme for satellite infrastructure
99 -- 114Dengao Li, Yongxin Wen, Shuang Xu, Qiang Wang, Ruiqin Bai, JuMin Zhao. EDChannel: channel prediction of backscatter communication network based on encoder-decoder
115 -- 123Ming Zhao, ZhiPeng Liu, Ling Zhao. Finite field construction for quasi-cyclic LDPC convolutional codes with cyclic 2-D MDS codes
125 -- 173Palak Bagga, Ashok Kumar Das, Vinay Chamola, Mohsen Guizani. Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions