Journal: Telecommunication Systems

Volume 82, Issue 4

435 -- 449Kang Liu, Guanghui Zhang, Xue Chen, Qing Liu, Linyu Peng, Liu Yurui. Android malware detection based on sensitive patterns
451 -- 463Kai-Sheng Hsu, Chung-An Shen. The design of a configurable and low-latency packet parsing system for communication networks
465 -- 486Zainab H. Ali, Hesham Arafat Ali. Energy-efficient routing protocol on public roads using real-time traffic information
487 -- 498Yiwen Zhang, Ruixia Cheng. Joint trajectory and power design for UAV-enabled cooperative jamming in two-way secure communication
499 -- 508Tianwei Han, Meiyu Fu, Meiling Zhang, Guijun Hu. Puncturing scheme for polar codes based on channel reliability estimation
509 -- 526Adam Raja Basha. Reconfigurable design of hybrid MIMO detection scheme for spatially multiplexed MIMO system

Volume 82, Issue 3

345 -- 362Zahra Rashidi, Vesal Hakami. Distributed content placement in cache-enabled small cell networks in the presence of malicious users
363 -- 379Dalia N. Elsheakh, Soha A. Alsherif, Angie R. Eldamak. Textile monopole sensors for breast cancer detection
381 -- 401V. Deepa, M. Haridass, Selvamuthu Dharmaraja, Priyanka Kalita. Analysis of energy efficiency of small cell base station in 4G/5G networks
403 -- 418Haibin Sun, Dong Wang, Hongxing Li, Ziran Meng. An improved DV-Hop algorithm based on PSO and Modified DE algorithm
419 -- 433Zhaosen Shi, Zeyu Yang, Alzubair Hassan, Fagen Li, Xuyang Ding. A privacy preserving federated learning scheme using homomorphic encryption and secret sharing

Volume 82, Issue 2

175 -- 191Chol Jong, Yong-Chun Kim, Jun Ho So, Kumchol Ri. QoS and energy-efficiency aware scheduling and resource allocation scheme in LTE-A uplink systems
193 -- 209Ramin Ramazanzadeh, Nahideh Derakhshanfard. Fuzzy assisted dynamic message replication and routing in delay tolerant networks
211 -- 227Angelos Skoufis, Georgios Chatzithanasis, Georgia Dede, Evangelia FIliopoulou, Thomas Kamalakis, Christos Michalakelis. Technoeconomic assessment of an FTTH network investment in the Greek telecommunications market
229 -- 244Anupama Mishra, Neena Gupta, Brij B. Gupta. Defensive mechanism against DDoS attack based on feature selection and multi-classifier algorithms
245 -- 275Tamer Ahmed Farrag, M. A. Farag, Rizk Masoud Rizk-Allah, Aboul Ella Hassanien, Mostafa A. Elhosseini. An improved parallel processing-based strawberry optimization algorithm for drone placement
277 -- 289Shilpi, Arvind Kumar. A localization algorithm using reliable anchor pair selection and Jaya algorithm for wireless sensor networks
291 -- 299Narathep Phruksahiran. Improvement of source localization via cellular network using machine learning approach
301 -- 313Ching-Chun Chang, Xu Wang 0027, Sisheng Chen, Hitoshi Kiya, Isao Echizen. On the predictability in reversible steganography
315 -- 344Kumar Prateek, Nitish Kumar Ojha, Fahiem Altaf, Soumyadev Maity. Quantum secured 6G technology-based applications in Internet of Everything

Volume 82, Issue 1

1 -- 2Muhammad Khurram Khan. AI-enabled transformations in telecommunications industry
3 -- 26Sivaraman Eswaran, Prasad B. Honnavalli. Private 5G networks: a survey on enabling technologies, deployment models, use cases and research directions
27 -- 43Hajar Kavusi, Keivan Maghooli, Siamak Haghipour. A novel and smarter model to authenticate and identify people intelligently for security purposes
45 -- 59Michaelraj Kingston Roberts, Poonkodi Ramasamy. An improved high performance clustering based routing protocol for wireless sensor networks in IoT
61 -- 90Ritesh Sur Chowdhury, Jayant Kumar Sadhu, Chandrima Thakur, Sudipta Chattopadhyay. Performance analysis and optimization of a hybrid TSR-PSR protocol for AF, DF and hybrid AF-DF relaying under Weibull fading
91 -- 100Mushtaq Ahmad, Muhammad Awais 0004, Muhammad Naeem 0001, Muhammad Altaf, Muhammad Iqbal 0003, Muhammad Abrar. Radio resource management for device to device communication using S and V shaped transfer functions
101 -- 114Achour Achroufene. RSSI-based Hybrid Centroid-K-Nearest Neighbors localization method
115 -- 123Fatma Rouissi, A. J. Han Vinck, Adel Ghazel. Statistical analysis of the Middleton Class-A noise effects on multi-carrier OFDM-based communication system
125 -- 140Qiu-yu Zhang, Fu-jiu Xu. Encrypted speech authentication and recovery scheme based on fragile watermarking
141 -- 159Rohit Kumar Gupta, Saubhik Kumar, Rajiv Misra. Resource allocation for UAV-assisted 5G mMTC slicing networks using deep reinforcement learning
161 -- 174Yousef Ali Abohamra, M. Reza Soleymani, Yousef R. Shayan, Jalal Abdulsayed Srar. Beamforming based algorithm for 5G applications