Abstract is missing.
- CoMP Transmission Approach for Seamless Connectivity in Vehicular Network through CRAN ArchitectureSameer Kumar Singh, Nishant Gupta, Arnav Hari, Rohit Singh 0008, Brijesh Kumbhani. 1-3 [doi]
- Federated Learning-based Base Station Selection on 3D LiDAR Data for Beyond 5G CommunicationsThushan Sivalingam, Anupma Sharma, Vimal Bhatia, Nandana Rajatheva, Sanjeev Sharma 0001, Kuntal Deka. 1-6 [doi]
- Digital Twin Modelling of Cascaded Amplifiers in the COSMOS TestbedRishu Raj, Shuang Xie, Zehao Wang, Tingjun Chen, Daniel C. Kilper. 1-6 [doi]
- Uncovering Network Vulnerabilities and Conducting Digital Forensics Analysis for IoT Device Security in 6GShams Tabrez Siddiqui, Mohammad Shahid Kamal, Khalid Ali Qidwai, Md Imran Alam, Haneef Khan, Malik Zaib Alam, Ishan Budhiraja, Sandeep Chintham. 1-6 [doi]
- Relationship between Noise addition and Compression based methods for Differential Privacy in Multi-Agent SystemsPuspanjali Ghoshal, Ashok Singh Sairam. 1-3 [doi]
- Towards obtaining SEP via Orthogonality of Projection Matrix in massive MIMO NetworksGopal Chamarthi, Adarsh Patel, Rameshwar Pratap. 1-3 [doi]
- Enhancing Performance of SM-MIMO VLC System using Liquid Crystal-Based SurfacesRahul Prakash Singh, Ajeet Singh Shekhawat, Kunal Agham, Yatindra Nath Singh. 1-3 [doi]
- PSO based UAV Localization for Interference Coordination in Cellular NetworkAkshita Jindal, Manish Kumar, Abhishek Jindal. 1-6 [doi]
- Performance Evaluation of MEC-enabled Fiber To The Room ArchitectureAndrea Marotta, Koteswararao Kondepu, Carlo Centofanti, S. Arnaout, Abhishek Bhattacharyya, Claudia Rinaldi, Fabio Graziosi, Dajana Cassioli. 1-3 [doi]
- Ensemble Learning-based Sybil Attacks Detection in Smart Meter NetworkAnakhi Hazarika, Abhinav Kumar 0001. 1-6 [doi]
- ML-Assisted Resource Allocation Outage Probability: Simple, Closed-Form ApproximationsRashika Raina, Nidhi Simmons, David E. Simmons, Michel Daoud Yacoub. 1-6 [doi]
- Energy-Efficient THz NOMA-Enabled Small Cells Underlaying Macrocell Using Reinforcement LearningVarun Kumar, Ishan Budhiraja, Akansha Singh, Rajat Chaudhary, Srinivas Aluvala. 1-6 [doi]
- Minimum detectible signal measurement setup with RF signal transmission through lossless fiber linksTaniza Roy, Meena D, Senthil Rengarajan, Azeez P. 1-5 [doi]
- Investigation of Cloud Forensic Incidents in Cloud Architecture for 6G NetworksMalik Zaib Alam, Asif Ali Khan, Adeel Ahmad, Haneef Khan, Mohammad Rafeek Khan, Ishan Budhiraja, Nagendra Yasmani. 1-6 [doi]
- Personalized Federated Learning based Intrusion Detection Approach for MetaverseGurpreet Singh, P. Rajalakshmi, Yong Xiang. 1-6 [doi]
- DRL-Based Transmission Design for Distributed STAR-RIS-aided CommunicationsRiya Yadav, Sravani Kurma, Sandeep Kumar Singh, Chih-Peng Li, Mayur Parate. 1-6 [doi]
- Energy Efficiency And Fault Tolerance In Open RAN And Future InternetSaish Urumkar, Byrav Ramamurthy, Sachin Sharma 0001. 1-3 [doi]
- On Maximizing the Channel Gain for an IRS-aided Indoor VLC System with BlockagesPooja Kumari, Md Zaid, Anand Singh, Vivek Ashok Bohara, Anand Srivastava. 1-6 [doi]
- Optical RIS Empowered Hybrid RF-VLC V2X Communication Systems: A Promising New Frontier for Smart Transportation ApplicationsGurinder Singh 0003, Tathagat Pal, Vivek Ashok Bohara, Anand Srivastava. 120-125 [doi]
- SOTA: Stochastic On-Time Arrival Path Prediction and Dynamic Programming for Criticality Aware Mobile Healthcare SystemHimanshu Singh 0003, Moirangthem Biken Singh, Akash Patel, Ajay Pratap. 148-153 [doi]
- Criticality-Driven Scheduling for UAV-Assisted Remote Health Monitoring SystemMoirangthem Biken Singh, Himanshu Singh 0003, Ajay Pratap. 159-164 [doi]
- Efficient Public Data Auditing Scheme for Healthcare Systems using ECC-Based Attribute-Based Signature in Cloud StorageVasudev Chakka, Divyanth Pavuluri, Karthik Kumar Reddy Sagili, Shreyas Akkaladevi, Sourabh Bhaskar, Shriniwas Patil, Keyur Parmar. 171-176 [doi]
- OptiTuneD: An Optimized Framework for Zero-Day DNS Tunnel Detection Using N-GramsNeha Sharma, Mayank Swarnkar. 177-182 [doi]
- Performance Analysis of Active Intelligent Reflecting Surface-Assisted System: BER and Sum-Rate EvaluationSanjeev Sharma, Kuntal Deka, Cédric Adjih, Alok Kumar 0001. 218-223 [doi]
- Energy Efficient Workflow Scheduling Algorithm for Latency-Sensitive Applications using Cloud-Fog CollaborationPrashant Shukla, Sudhakar Pandey. 252-257 [doi]
- Improving Energy Efficiency In Open RAN Through Dynamic CPU SchedulingSaish Urumkar, Byrav Ramamurthy, Sachin Sharma 0001. 288-293 [doi]
- SDN-Based Seamless Mobility Management for B5G Services in High-Speed RailwaysAmar Sinha, Venkanna Uduthalapally, Debanjan Das, Rajarshi Mahapatra. 294-299 [doi]
- Performance of Orthogonal and Non-Orthogonal Space Time Block Code Through the Underwater Wireless Optical ChannelsRamavath Prasad Naik, M. A. N. S. Raghavendra, Udupi Shripathi Acharya, C. S. Savidhan Shetty. 373-378 [doi]
- On Performance Evaluation of Channel Codes over Satellite ChannelsShubham Srivastava, Adrish Banerjee, Abhishek Kumar Gupta. 379-384 [doi]
- Blind Estimation of Polar Encoder ParametersAman Gupta, Swaminathan R. 385-390 [doi]
- Robust Linear Decentralized Estimation in IoT Networks Relying on Imperfect CSIKunwar Pritiraj Rajput, M. R. Bhavani Shankar. 402-407 [doi]
- Direction of Arrival Estimation using Uniform Linear Sensor Array with Salp Swarm OptimizerP. Geetha, Satyasai Jagannath Nanda, Rajendra Prasad Yadav. 408-413 [doi]
- Performance Analysis of RIS-Aided Two-Way Communications Under Hardware Impairments and Rayleigh FadingSuneel Yadav, Radhika Gour, George C. Alexandropoulos, Devendra Singh Gurjar. 473-478 [doi]
- Effects of Imperfect CSI and Imperfect SIC on Artificial Noise Assisted Precoded Multiuser Secure NOMA-GSMShekhar Pratap Singh, Pyari Mohan Pradhan. 491-496 [doi]
- TSDSI Standards Driven Implementation of Smart Radio EnvironmentAmit K. Shrivastava, Satish Kumar, Khushboo Sahu, Bhavesh Sonwani, Dixit Sharma, Dipti S. Srivastava, Navneet Garg 0001, Arzad Alam Kherani, Vimal Bhatia, Soumava Mukherjee, Samrat Mukhopadhyay, Priyanka Das 0001, Rajarshi Mahapatra, Debanjan Das, Brejesh Lall. 497-502 [doi]
- IoT Driven Smart Greenhouse: A Cost-Effective and User-Centric Automation Solution For AgricultureIshtiaque Ahmed Toke, Mahir Mohammad Faisal Rahman, Md Fahad Monir, Tarem Ahmed, Khondkar Ayaz Rabbani. 503-508 [doi]
- A Proof-of-Concept Demonstration of Hybrid Li-Fi/Wi-Fi Network on a Prototype TestbedSaswati Paramita, Anand Srivastava, Vivek Ashok Bohara, Abhijit Mitra, Hari Ramamoorthy M, Hari Krishna Atluri, Arumugam Paventhan. 509-514 [doi]
- Distributed Weighted Fuzzy C-Means Clustering for Wireless Sensor Network Data AnalysisAnita Panwar, Satyasai Jagannath Nanda. 521-526 [doi]
- OptFog: Optimized Mobility-Aware Task Offloading and Migration Model for Fog NetworksMehbub Alam, Rakesh Matam, Ferdous Ahmed Barbhuiya. 539-544 [doi]
- Energy Optimization in B5G Networks with Predictive Allocation of Base Stations in Edge Server PlacementVaibhav Tiwari, Diptendu Sinha Roy, Chandrasen Pandey. 604-609 [doi]
- Performance Analysis of Cache Enabled Wireless NOMA Ultra Dense Networks Using PPPNavneet Garg 0001, Abhinav Singh Parihar, Vimal Bhatia. 622-626 [doi]
- Impact of Nonlinear Power Amplifier on BER Performance of OTFS ModulationSanjeev Sharma 0001, Amit Singh, Kuntal Deka, Cédric Adjih. 627-632 [doi]
- Minimizing Outage Probability and BER using Cooperative NOMA in Dual Base Station SystemsNirbhay Tyagi, Abdul Rahim V. C, Chris Prema S. 633-638 [doi]
- Towards Sustainable Economic Zones with UAV-assisted Real-time Energy Replenishment in Wireless Rechargeable Sensor NetworksRiya Goyal, Abhinav Tomar, Gaurav Singal. 662-667 [doi]
- Error Analysis of Molecular Communications System with Hybrid Channel Transmission SchemeNihit Bhatnagar, Sandeep Joshi. 668-673 [doi]
- Reliable key generation for authentication and encryption using RO PUF on FPGAManav Shah, Parul Sindhwad, Faruk Kazi 0001. 686-689 [doi]
- MPS: Multihop Path Selection method for Vehicular Fog ComputingNiharika Keshari, Anchal Yadav, Dinesh Singh. 720-725 [doi]
- Optimizing UAV Swarm Communication in Urban Scenarios: An Enhanced Fuzzy LEACH Algorithm Based ApproachShayan Majumder, Sandeep Joshi. 726-731 [doi]
- Detecting toxic comments from highly skewed social media dataAbhradeep Datta, B. Monish Kumar, Ashok Singh Sairam. 744-749 [doi]
- A Post-Quantum End-to-End Encryption ProtocolShashvat Sharma, Meenakshi Tripathi, Harish Kumar Sahu, Ashish Karan. 756-761 [doi]
- Outage and Ergodic Capacity Analysis in UAV-RIS Assisted NOMA-D2D NetworkSayanti Ghosh, Abhijit Bhowmick, Sanjay Dhar Roy, Sumit Kundu. 762-767 [doi]
- In-motion Underwater Sidescan Sonar Image Segmentation using Dynamic NSGA-II AlgorithmAakansha Agarwal, Satyasai Jagannath Nanda. 784-789 [doi]