Abstract is missing.
- Spectrum Sensing Performance of Cognitive Radio Optimized by Soft Decision Fusion ThresholdGefan Wang, Xuefei Sun, Chungang Liu. 3-23 [doi]
- Methodology for Characterizing Spectrum Data by Combining Quantitative and Qualitative InformationVaishali Nagpure, Udayan Das, Cynthia Hood. 24-38 [doi]
- Computationally Efficient Look-up-Tables for Behavioral Modelling and Digital Pre-distortion of Multi-standard Wireless SystemsZhaoyang Han, Meabh Loughman, Yiyue Jiang, Rahul Mushini, Miriam Leeser, John Dooley. 39-55 [doi]
- Metaheuristic Optimisation for Radio Interface-Constrained Channel Assignment in a Hybrid Wi-Fi-Dynamic Spectrum Access Wireless Mesh NetworkNatasha Zlobinsky, David L. Johnson 0001, Amit Kumar Mishra, Albert A. Lysko. 56-76 [doi]
- Performance of Cooperative Spectrum Sensing Based on Random Transition of the Primary User in Laplacian NoiseKhushboo Sinha, Y. N. Trivedi. 77-93 [doi]
- Assessment of Spectrum Management Approaches in Offshore Private Industrial 5G NetworksPekka Ojanen, Seppo Yrjölä, Marja Matinmikko-Blue. 94-107 [doi]
- An Eigenvalue Based Cooperative Spectrum Sensing for Multiuser MIMO Cognitive Radio Networks Under Correlated Fading ScenarioAbhishek Kumar 0008, Rajarshi Bhattacharya, Seemanti Saha, Naveen Gupta. 108-119 [doi]
- Low-Profile Frequency Reconfigurable Patch Antennas for Cognitive Radio ApplicationsYasser M. Madany, Hassan M. Elkamchouchi, Sara I. Abd-Elmonieum. 120-127 [doi]
- A Full-Duplex Multicarrier Cooperative Device-to-Device Communications System with MMSE Based RSI CancellationRahul Bajpai, Ronak Soni, Naveen Gupta, Abhishek Kumar 0008. 128-140 [doi]
- Realization and Simulation of Watermarking Algorithm Based on Spread Spectrum and DFTTian Wen, Wanming Liu, Ruiyan Du, Jiangfan Xie. 141-148 [doi]
- The Performance Research of LTE-A Cellular Network Based on Relay and Pass-Through D2D TechnologyLiyan Zhang, Wenbin Zhang, Wenke Li, Jiaqi Su. 149-165 [doi]
- A Survey Channel Estimation for Intelligent Reflecting Surface (IRS)Jiwayria M. S. D. Babiker, Xinlin Huang. 169-180 [doi]
- Minimum Class Variance Thresholding Based on Multi-objective OptimizationLiyong Qiao, Huilong Jin, Chungang Liu, Jia Zhao, Wanming Liu, Ying Liu, Zetong Lei. 183-191 [doi]
- Pedestrian Detection Based on Deep Learning Under the Background of University Epidemic PreventionRuiyan Du, Jia Zhao, Jiangfan Xie, Tian Wen. 192-202 [doi]
- Gesture Recognition Controls Image Style Transfer Based on Improved YOLOV5s AlgorithmJiangfan Xie, Huilong Jin, Tian Wen, Ruiyan Du. 203-212 [doi]
- Detection of Malicious Nodes Using Collaborative Neighbour Monitoring in DSA NetworksAugustine Takyi, Natasha Zlobinsky, Odametey Akuye-Shika, David Johnson, Melissa Densmore. 215-230 [doi]
- Research on Denoising Method in Pseudo-analog Video TransmissionWanning He, Xin-Lin Huang. 231-239 [doi]
- Confidential Communications for Mobile UAV Relaying NetworkChenglan Ji, Zhenyu Na, Zilong Feng. 240-250 [doi]
- Implementation and Performance Analysis of Smart Attendance Checking Using BLE-Based CommunicationsLorenzo Gabriel Alcantara, Alphonso Miguel Taylor Balagtas, Trixia Britania, Sean Kristian Garibay, Joshua Wyndel Uyvico, Nestor Michael C. Tiglao. 253-268 [doi]
- Intra-train Wagon Wireless Channel Connectivity Analysis of Ultra Dense Node DeploymentsImanol Picallo, Hicham Klaina, Peio López-Iturri, José Javier Astrain, Mikel Celaya-Echarri, Leyre Azpilicueta, Ana Vázquez Alejos, Asier Perallos, Agusti Solanas, Francisco Falcone. 269-279 [doi]
- Hardware-Accelerated Blockchain-Based Authentication for the Internet of ThingsJoanne Marie V. Santos, Jeanne Eunice V. Pascua, Nestor Michael C. Tiglao. 283-295 [doi]
- An Investigation of Vulnerabilities in Internet of Health ThingsSaifur Rahman, Tance Suleski, Mohiuddin Ahmed, A. S. M. Kayes. 296-306 [doi]
- Faking Smart Industry: A Honeypot-Driven Approach for Exploring Cyber Security Threat LandscapeS. M. Zia Ur Rashid, Ashfaqul Haq, Sayed Tanimun Hasan, Md. Hasan Furhad, Mohiuddin Ahmed, Abu S. S. M. Barkat Ullah. 307-324 [doi]
- Anonymous Key Agreement and Mutual Authentication Protocol for Smart GridsVincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Salah H. Abbdal Refish, Mustafa A. Al Sibahee, Enas Wahab Abood, Songfeng Lu. 325-340 [doi]
- SAMA: Security-Aware Monitoring Approach for Location Abusing and UAV GPS-Spoofing Attacks on Internet of VehiclesMessaoud Babaghayou, Nabila Labraoui, Ado Adamou Abba Ari, Nasreddine Lagraa, Mohamed Amine Ferrag, Leandros A. Maglaras. 343-360 [doi]