English English | 中文 中文

我們所有的期刊只有英語.

Recent Digital Communications and Networks Articles

Recently published articles from Digital Communications and Networks.

Field test of multi-hop image sensing network prototype on a city-wide scale

May 2019
Xianhui Che | Barry Ip | Zhuge Yan

Wireless multimedia sensor networks drastically stretch the horizon of traditional monitoring and surveillance systems. Most existing research has utilized Zigbee or WiFi as the communication technology....

A time-domain estimation method of rapidly time-varying channels for OFDM-based LTE-R systems

May 2019
Jin-Kyu Choi | Van Duc Nguyen | Hai Nam Nguyen | Van Vinh Duong | Tien Hoa Nguyen | Hanbyeog Cho | Hyun-Kyun Choi | Seong-Gyoon Park

This paper addresses the performance of fast doubly selective fading channel estimation combined with Inter-Carrier Interference (ICI) cancellation for Long Term Evolution (LTE) communication platform...

Application of cognitive radio and interference cancellation in the L-Band based on future air-to-ground communication systems

May 2019
Muthalagu Raja

The Very High Frequency band (VHF) currently used for aeronautical communications is becoming congested, and future Air-to-Ground (A/G) communication will require much greater use of data communications....

High mobility channel estimation method based on improved basis expansion model

May 2019
Jinjin Huang | Yisheng Zhao | Zhixiang Dong | Mengjia Chen | Zhonghui Chen

In this paper, the problem of high mobility channel estimation in the Long-Term Evolution for Railway (LTE-R) communication system is investigated. By using a Basis Expansion Model (BEM), the channel...

A BCH code assisted modified NCO based LSPF-DPLL topology for Nakagami-m, Rayleigh and Rician fading channels

May 2019
Sabyasachi Bhattacharyya | Aradhana Misra | Kandarpa Kumar Sarma

In spite of the rapid developments in communication technologies over the past few decades, which include attractive features offered by the presently used 3G/4G systems, it continues to be a challenge...

A comparative study of name resolution and routing mechanisms in information-centric networks

May 2019
Hang Liu | Koorosh Azhandeh | Xavier de Foy | Robert Gazda

Information-Centric Networking (ICN) is an innovative paradigm for the future internet architecture, which addresses IP network limitations in supporting content distribution and information access...

Percolation analysis of large-scale wireless balloon networks

May 2019
M.D. Nashid Anjum | Honggang Wang | Hua Fang

Recent advancements in wireless technology have tested Wireless Balloon Networks (WBNs) as an ideal solution for the provision of internet facilities in deprived and challenging areas. A few high profile...

Impact of antenna and beam-selection-based sectored relay planning for performance evaluation of 4G LTE-A tri-sectored cell

May 2019
Javaid A. Sheikh | Mehboob-ul- Amin | Shabir A. Parah | G. Mohiuddin Bhat

The deployment of Relay Nodes (RNs) in 4G LTE-A networks, mainly originating from the wireless backhaul link, provides an excellent network planning tool to enhance system performance. Better coordination...

Analytical model of IoT CoAP traffic

May 2019
Rolando Herrero

The Constrained Application Protocol (CoAP) is a mechanism that enables the efficient transmission of information in the context of Wireless Sensor Networks (WSNs) characteristic of the Internet of...

Digital hate content reduction with mobile edge computing: An architecture

Available online 17 May 2019
Naganna Chetty | Sreejith Alathur

Mobile devices with social media applications are the prevalent user equipment to generate and consume digital hate content. The objective of the article is to propose a mobile edge computing architecture...

Analysis of identifiers in IoT platforms

Available online 15 May 2019
Haris Aftab | Komal Gilani | JiEun Lee | Lewis Nkenyereye | SeungMyeong Jeong | JaeSeung Song

The Internet of Things (IoT) provides new opportunities for different IoT platforms connecting various devices together. The need to identify those devices is foremost important to perform any kind...

Private membership test protocol with low communication complexity

Available online 13 May 2019
Sara Ramezanian | Tommi Meskanen | Masoud Naderpour | Ville Junnila | Valtteri Niemi

We introduce a practical method to perform private membership test. In this method, clients are able to test whether an item is in a set controlled by the server, without revealing their query item...

RFHUI: An RFID based human-unmanned aerial vehicle interaction system in an indoor environment

Available online 13 May 2019
Jian Zhang | Zhitao Yu | Xiangyu Wang | Yibo Lyu | Shiwen Mao | Senthilkumar CG. Periaswamy | Justin Patton | Xuyu Wang

In this paper, we present an RFID based human and unmanned aerial vehicle (UAV) interaction system, termed RFHUI, to provide an intuitive and easy-to-operate method to navigate a UAV in an indoor environment....

A new-type of blockchain for secure message exchange in VANET

Available online 26 April 2019
Rakesh Shrestha | Rojeena Bajracharya | Anish P. Shrestha | Seung Yeob Nam

In Vehicular Ad-ho Networks (VANET), collection and dissemination of life-threatening traffic event information by vehicles is of utmost importance. However, the traditional VANET faces several security...

Submillimeter wave communication versus millimeter wave communication

Available online 25 April 2019
Madhuprana Goswami | Hyuck M. Kwon

This paper studies the performance of a submillimeter wave antenna operating between frequencies 0.1 THz and 10 THz with a 4-cyano-4-pentylbiphenyl [5CB] substrate. Since the size and shape of the antenna...

Anonymous data collection scheme for cloud-aided mobile edge networks

Available online 11 April 2019
Anxi Wang | Jian Shen | Chen Wang | Huijie Yang | Dengzhi Liu

With the rapid spread of smart sensors, data collection is becoming more and more important in mobile edge networks (MENs). The collected data can be used in many applications based on the analysis...

Real-time air pollution monitoring with sensors on city bus

Available online 16 March 2019
Sami Kaivonen | Edith Ngai

This paper presents an experimental study on real-time air pollution monitoring using wireless sensors on public transport vehicles. The study is part of the GreenIoT project in Sweden, which utilizes...

Dynamic load balancing with learning model for Sudoku solving system

Available online 15 March 2019
Nattapong Kitsuwan | Praphan Pavarangkoon | Hendro Mulyo Widiyanto | Eiji Oki

This paper proposes a dynamic load balancing with learning model for a Sudoku problem solving system that has multiple workers and multiple solvers. The objective is to minimise the total processing...

The partial side information problem with additional reconstructions

Available online 13 March 2019
Viswanathan Ramachandran

We consider a quadratic Gaussian distributed lossy source coding setup with an additional constraint of identical reconstructions between the encoder and the decoder. The setup consists of two correlated...

Weak harmonic signal detection method in chaotic interference based on extended Kalman filter

February 2019
Chengye Lu | Sheng Wu | Chunxiao Jiang | Jinfeng Hu

The traditional methods of weak harmonic signal detection under strong chaotic interference often suffer from high computational complexity and poor performance. In this paper, an Extended Kalman Filter...

Transient content caching and updating with modified harmony search for Internet of Things

February 2019
Chao Xu | Xijun Wang

Internet of Things (IoT) has emerged as one of the new use cases in the 5th Generation wireless networks. However, the transient nature of the data generated in IoT networks brings great challenges...

Antenna selection for MIMO system based on pattern recognition

February 2019
Ping Yang | Jing Zhu | Yue Xiao | Zhi Chen

This paper proposes a novel Multiple-Input Multiple-Output (MIMO) transmission scheme based on Pattern Recognition (PR), which is termed as the PR aided Transmission Antenna Selection MIMO (PR-TAS aided...

Energy efficient and delay aware ternary-state transceivers for aerial base stations

February 2019
Nahina Islam | Kandeepan Sithamparanathan | Karina Gomez Chavez | James Scott | Hamid Eltom

In recent times, Aerial Base Stations(AeBSs) are being investigated to provide wireless coverage to terrestrial radio terminals. There are many advantages of using aerial platforms to provide wireless...

Enabling intelligence in fog computing to achieve energy and latency reduction

February 2019
Quang Duy La | Mao V. Ngo | Thinh Quang Dinh | Tony Q.S. Quek | Hyundong Shin

Fog computing is an emerging architecture intended for alleviating the network burdens at the cloud and the core network by moving resource-intensive functionalities such as computation, communication,...

Caching resource management of mobile edge network based on Stackelberg game

February 2019
Qiang Li | Changlong Lu | Bin Cao | Qinyu Zhang

Mobile edge caching technology is gaining more and more attention because it can effectively improve the Quality of Experience (QoE) of users and reduce backhaul burden. This paper aims to improve the...

Deep reinforcement learning-based joint task offloading and bandwidth allocation for multi-user mobile edge computing

February 2019
Liang Huang | Xu Feng | Cheng Zhang | Liping Qian | Yuan Wu

The rapid growth of mobile internet services has yielded a variety of computation-intensive applications such as virtual/augmented reality. Mobile Edge Computing (MEC), which enables mobile terminals...

Traffic-driven epidemic spreading and its control strategies

February 2019
Yanqing Wu | Cunlai Pu | Lunbo Li | Gongxuan Zhang

Many epidemics or viruses in real life spread by taking advantage of other dynamic processes, e.g., the computer virus propagates with the transmission of packets. In this paper, we survey the recent...

On the performance of Web Services, Google Cloud Messaging and Firebase Cloud Messaging

Available online 25 February 2019
Guido Albertengo | Fikru G. Debele | Waqar Hassan | Dario Stramandino

Smartphones and other connected devices rely on data services, such as Web Services (WS), Google Cloud Messaging (GCM) and Firebase Cloud Messaging (FCM) to share the information they collect or use....

A systematic literature review of blockchain cyber security

Available online 19 February 2019
Paul J. Taylor | Tooska Dargahi | Ali Dehghantanha | Reza M. Parizi | Kim-Kwang Raymond Choo

Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer through...

Tracing manufacturing processes using blockchain-based token compositions

Available online 11 February 2019
Martin Westerkamp | Friedhelm Victor | Axel Kupper

Supply Chain Traceabiliy is one of the most promising use cases to benefit from blockchain characteristics such as decentralization, immutability and transparency, without requiring to build prior trust...

A multi-layered policy generation and management engine for semantic policy mapping in clouds

Available online 8 February 2019
Faraz Fatemi Moghaddam | Philipp Wieder | Ramin Yahyapour

The long awaited cloud computing concept is a reality now due to the transformation of computer generations. However, security challenges have become the biggest obstacles for the advancement of this...

The effect of propagation delay on the dynamic evolution of the Bitcoin's blockchain

Available online 29 January 2019
Moustapha Ba

In this paper, we interest to the selfish-mine strategy in the Bitcoin blockchain introduced in 2013 by I. Eyal and E. G. Sirer in [1]. This strategy could be used by a colluding pool miners to earn...

NLDA non-linear regression model for preserving data privacy in wireless sensor networks

Available online 19 January 2019
A.L. Sreenivasulu | P.Chenna Reddy

Recently, the application of Wireless Sensor Networks (WSNs) has been increasing rapidly. It requires privacy preserving data aggregation protocols to secure the data from compromisers. Preserving privacy...

An efficient IoT cloud energy consumption based on genetic algorithm

Available online 14 January 2019
Farnoosh Farhadian | Mohammad Mansour Riahi Kashani | Javad Rezazadeh | Reza Farahbakhsh | Kumbesan Sandrasegaran

Cloud computing is a promising technology which enables processing a great amount of data. In a large scale IoT infrastructure, optimum allocation of virtual machines to the physical hosts leads to...

Analysis of radio over fiber system for mitigating Four-Wave Mixing effect

Available online 11 January 2019
Namita Kathpal | Amit Kumar Garg

In this paper, an efficient 8-channel 32Gbps RoF system incorporating Bessel Filter (8/32 RoF-BF) has been demonstrated to reduce the impact of non-linear transmission effects specifically Four-Wave...

Evolution and challenges of DNS-based CDNs

November 2018
Zheng Wang | Jun Huang | Scott Rose

DNS-based server redirecting is considered the most popular means of deploying CDNs. However, with the increasing use of remote DNS, DNS-based CDNs face a great challenge in performance degradation....

A highly sustainable multi-band orthogonal wavelet code division multiplexing UWB communication system for underground mine channel

November 2018
Athar Ravish Khan | Sanjay M. Gulhane

The underground mine channel is highly hostile for communication. A sustainable communication system is required to be integrated as a multipurpose system capable of transferring all types of information...

Design of a novel hybrid intercarrier interference mitigation technique through wavelet implication in an OFDM system

November 2018
Sandeep Sarowa | Harmanjeet Singh | Sunil Agrawal | B.S. Sohi

Orthogonal Frequency Division Multiplexing (OFDM) is the most preferred and widely used multiplexing technique in current wireless environment for sidelining the spectrum scarcity problem by splitting...

Recent advancements in surface plasmon polaritons-plasmonics in subwavelength structures in microwave and terahertz regimes

November 2018
Rana Sadaf Anwar | Huansheng Ning | Lingfeng Mao

This paper presents a review of recent investigational studies on exciting Surface Plasmon Polaritons (SPPs) in MicroWave (MW) and TeraHertZ (THz) regimes by using subwavelength corrugated patterns...

Combinatorial design-based quasi-cyclic LDPC codes with girth eight

November 2018
Sina Vafi | Narges Rezvani Majid

This paper presents a novel regular Quasi-Cyclic (QC) Low Density Parity Check (LDPC) codes with column-weight three and girth at least eight. These are designed on the basis of combinatorial design...

Performance analysis of cognitive radio networks using channel-prediction-probabilities and improved frame structure

November 2018
Prabhat Thakur | Alok Kumar | S. Pandit | G. Singh | S.N. Satashia

This paper focuses on potential issues related to the random selection of a sensing channel that occurs after the prediction phase in a Cognitive Radio Network (CRN). A novel approach (Approach-1) for...

Semi-supervised multi-layered clustering model for intrusion detection

November 2018
Omar Y. Al-Jarrah | Yousof Al-Hammdi | Paul D. Yoo | Sami Muhaidat | Mahmoud Al-Qutayri

A Machine Learning (ML)-based Intrusion Detection and Prevention System (IDPS) requires a large amount of labeled up-to-date training data to effectively detect intrusions and generalize well to novel...

Wireless Sensing for a Solar Power System

Available online 20 November 2018
Su Kyi | Attaphongse Taparugssanagorn

Wireless sensing is an excellent approach for remotely operated solar power system. Not only being able to get the sensor data, such as voltage, current, and temperature, the system can also have a...

Design and analysis of multi-channel drop filter using dual L defected hexagonal photonic crystal ring resonator

Available online 16 November 2018
D. Saranya | Shoba Mohan | A. Rajesh

In this paper, dual L defected hexagonal Photonic Crystal Ring Resonator (PCRR) using Channel Drop Filter (CDF) is designed for Coarse Wavelength Division Multiplexing (CWDM) systems. In this structure,...

Traffic dynamics on multilayer networks

Available online 1 November 2018
Jiexin Wu | Cunlai Pu | Lunbo Li | Guo Cao

Many real-world networks are demonstrated to either have layered network structures in themselves or interconnect with other networks, forming multilayer network structures. In this survey, we give...

Developing a platform to evaluate and assess the security of wearable devices

Available online 30 October 2018
Matthew L. Hale | Kerolos Lotfy | Rose F. Gamble | Charles Walter | Jessica Lin

Operating in a body area network around a smartphone user, wearables serve a variety of commercial, medical and personal uses. Depending on a certain smartphone application, a wearable can capture sensitive...

Share this page: