English English | 中文 中文

Recent Digital Communications and Networks Articles

Recently published articles from Digital Communications and Networks.

Submillimeter wave communication versus millimeter wave communication

Available online 25 April 2019
Madhuprana Goswami | Hyuck M. Kwon

This paper studies the performance of a submillimeter wave antenna operating between frequencies 0.1 THz and 10 THz with a 4-cyano-4-pentylbiphenyl [5CB] substrate. Since the size and shape of the antenna...

Anonymous data collection scheme for cloud-aided mobile edge networks

Available online 11 April 2019
Anxi Wang | Jian Shen | Chen Wang | Huijie Yang | Dengzhi Liu

With the rapid spread of smart sensors, data collection is becoming more and more important in mobile edge networks (MENs). The collected data can be used in many applications based on the analysis...

Real-time air pollution monitoring with sensors on city bus

Available online 16 March 2019
Sami Kaivonen | Edith Ngai

This paper presents an experimental study on real-time air pollution monitoring using wireless sensors on public transport vehicles. The study is part of the GreenIoT project in Sweden, which utilizes...

Dynamic load balancing with learning model for Sudoku solving system

Available online 15 March 2019
Nattapong Kitsuwan | Praphan Pavarangkoon | Hendro Mulyo Widiyanto | Eiji Oki

This paper proposes a dynamic load balancing with learning model for a Sudoku problem solving system that has multiple workers and multiple solvers. The objective is to minimise the total processing...

The partial side information problem with additional reconstructions

Available online 13 March 2019
Viswanathan Ramachandran

We consider a quadratic Gaussian distributed lossy source coding setup with an additional constraint of identical reconstructions between the encoder and the decoder. The setup consists of two correlated...

Weak harmonic signal detection method in chaotic interference based on extended Kalman filter

February 2019
Chengye Lu | Sheng Wu | Chunxiao Jiang | Jinfeng Hu

The traditional methods of weak harmonic signal detection under strong chaotic interference often suffer from high computational complexity and poor performance. In this paper, an Extended Kalman Filter...

Transient content caching and updating with modified harmony search for Internet of Things

February 2019
Chao Xu | Xijun Wang

Internet of Things (IoT) has emerged as one of the new use cases in the 5th Generation wireless networks. However, the transient nature of the data generated in IoT networks brings great challenges...

Antenna selection for MIMO system based on pattern recognition

February 2019
Ping Yang | Jing Zhu | Yue Xiao | Zhi Chen

This paper proposes a novel Multiple-Input Multiple-Output (MIMO) transmission scheme based on Pattern Recognition (PR), which is termed as the PR aided Transmission Antenna Selection MIMO (PR-TAS aided...

Energy efficient and delay aware ternary-state transceivers for aerial base stations

February 2019
Nahina Islam | Kandeepan Sithamparanathan | Karina Gomez Chavez | James Scott | Hamid Eltom

In recent times, Aerial Base Stations(AeBSs) are being investigated to provide wireless coverage to terrestrial radio terminals. There are many advantages of using aerial platforms to provide wireless...

Enabling intelligence in fog computing to achieve energy and latency reduction

February 2019
Quang Duy La | Mao V. Ngo | Thinh Quang Dinh | Tony Q.S. Quek | Hyundong Shin

Fog computing is an emerging architecture intended for alleviating the network burdens at the cloud and the core network by moving resource-intensive functionalities such as computation, communication,...

Caching resource management of mobile edge network based on Stackelberg game

February 2019
Qiang Li | Changlong Lu | Bin Cao | Qinyu Zhang

Mobile edge caching technology is gaining more and more attention because it can effectively improve the Quality of Experience (QoE) of users and reduce backhaul burden. This paper aims to improve the...

Deep reinforcement learning-based joint task offloading and bandwidth allocation for multi-user mobile edge computing

February 2019
Liang Huang | Xu Feng | Cheng Zhang | Liping Qian | Yuan Wu

The rapid growth of mobile internet services has yielded a variety of computation-intensive applications such as virtual/augmented reality. Mobile Edge Computing (MEC), which enables mobile terminals...

Traffic-driven epidemic spreading and its control strategies

February 2019
Yanqing Wu | Cunlai Pu | Lunbo Li | Gongxuan Zhang

Many epidemics or viruses in real life spread by taking advantage of other dynamic processes, e.g., the computer virus propagates with the transmission of packets. In this paper, we survey the recent...

On the performance of Web Services, Google Cloud Messaging and Firebase Cloud Messaging

Available online 25 February 2019
Guido Albertengo | Fikru G. Debele | Waqar Hassan | Dario Stramandino

Smartphones and other connected devices rely on data services, such as Web Services (WS), Google Cloud Messaging (GCM) and Firebase Cloud Messaging (FCM) to share the information they collect or use....

A systematic literature review of blockchain cyber security

Available online 19 February 2019
Paul J. Taylor | Tooska Dargahi | Ali Dehghantanha | Reza M. Parizi | Kim-Kwang Raymond Choo

Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has slowly become one of the most talked about methods for securing data storage and transfer through decentralized,...

Tracing manufacturing processes using blockchain-based token compositions

Available online 11 February 2019
Martin Westerkamp | Friedhelm Victor | Axel Kupper

Supply Chain Traceabiliy is one of the most promising use cases to benefit from blockchain characteristics such as decentralization, immutability and transparency, without requiring to build prior trust...

A multi-layered policy generation and management engine for semantic policy mapping in clouds

Available online 8 February 2019
Faraz Fatemi Moghaddam | Philipp Wieder | Ramin Yahyapour

The long awaited Cloud computing concept is a reality now due to the transformation of computer generations. However, security challenges are most important obstacles for the advancement of this emerging...

The effect of propagation delay on the dynamic evolution of the Bitcoin's blockchain

Available online 29 January 2019
Moustapha Ba

In this paper, we interest to the selfish-mine strategy in the Bitcoin blockchain introduced in 2013 by I. Eyal and E. G. Sirer in [1]. This strategy could be used by a colluding pool miners to earn...

NLDA-non-linear regression model for preserving data privacy in wireless sensor networks

Available online 19 January 2019
A. Sreenivasulu | P.Chenna Reddy

Recently, the applications in the field of wireless sensor networks (WSNs) are increased rapidly. It requires privacy preserving data aggregation protocols to secure the data from the compromisers....

An efficient IoT cloud energy consumption based on genetic algorithm

Available online 14 January 2019
Farnoosh Farhadian | Mohammad Mansour Riahi Kashani | Javad Rezazadeh | Reza Farahbakhsh | Kumbesan Sandrasegaran

Cloud computing is a promising technology which enables processing a great amount of data. In a large scale IoT infrastructure, optimum allocation of virtual machines to the physical hosts leads to...

Analysis of radio over fiber system for mitigating Four-Wave Mixing effect

Available online 11 January 2019
Namita Kathpal | Amit Kumar Garg

In this paper, an efficient 8-channel 32Gbps RoF system incorporating Bessel Filter (8/32 RoF-BF) has been demonstrated to reduce the impact of non-linear transmission effects specifically Four-Wave...

Evolution and challenges of DNS-based CDNs

November 2018
Zheng Wang | Jun Huang | Scott Rose

DNS-based server redirecting is considered the most popular means of deploying CDNs. However, with the increasing use of remote DNS, DNS-based CDNs face a great challenge in performance degradation....

A highly sustainable multi-band orthogonal wavelet code division multiplexing UWB communication system for underground mine channel

November 2018
Athar Ravish Khan | Sanjay M. Gulhane

The underground mine channel is highly hostile for communication. A sustainable communication system is required to be integrated as a multipurpose system capable of transferring all types of information...

Design of a novel hybrid intercarrier interference mitigation technique through wavelet implication in an OFDM system

November 2018
Sandeep Sarowa | Harmanjeet Singh | Sunil Agrawal | B.S. Sohi

Orthogonal Frequency Division Multiplexing (OFDM) is the most preferred and widely used multiplexing technique in current wireless environment for sidelining the spectrum scarcity problem by splitting...

Recent advancements in surface plasmon polaritons-plasmonics in subwavelength structures in microwave and terahertz regimes

November 2018
Rana Sadaf Anwar | Huansheng Ning | Lingfeng Mao

This paper presents a review of recent investigational studies on exciting Surface Plasmon Polaritons (SPPs) in MicroWave (MW) and TeraHertZ (THz) regimes by using subwavelength corrugated patterns...

Combinatorial design-based quasi-cyclic LDPC codes with girth eight

November 2018
Sina Vafi | Narges Rezvani Majid

This paper presents a novel regular Quasi-Cyclic (QC) Low Density Parity Check (LDPC) codes with column-weight three and girth at least eight. These are designed on the basis of combinatorial design...

Performance analysis of cognitive radio networks using channel-prediction-probabilities and improved frame structure

November 2018
Prabhat Thakur | Alok Kumar | S. Pandit | G. Singh | S.N. Satashia

This paper focuses on potential issues related to the random selection of a sensing channel that occurs after the prediction phase in a Cognitive Radio Network (CRN). A novel approach (Approach-1) for...

Semi-supervised multi-layered clustering model for intrusion detection

November 2018
Omar Y. Al-Jarrah | Yousof Al-Hammdi | Paul D. Yoo | Sami Muhaidat | Mahmoud Al-Qutayri

A Machine Learning (ML)-based Intrusion Detection and Prevention System (IDPS) requires a large amount of labeled up-to-date training data to effectively detect intrusions and generalize well to novel...

Wireless Sensing for a Solar Power System

Available online 20 November 2018
Su Kyi | Attaphongse Taparugssanagorn

Wireless sensing is an excellent approach for remotely operated solar power system. Not only being able to get the sensor data, such as voltage, current, and temperature, the system can also have a...

Design and analysis of multi-channel drop filter using dual L defected hexagonal photonic crystal ring resonator

Available online 16 November 2018
D. Saranya | Shoba Mohan | A. Rajesh

In this paper, dual L defected hexagonal Photonic Crystal Ring Resonator (PCRR) using Channel Drop Filter (CDF) is designed for Coarse Wavelength Division Multiplexing (CWDM) systems. In this structure,...

Traffic dynamics on multilayer networks

Available online 1 November 2018
Jiexin Wu | Cunlai Pu | Lunbo Li | Guo Cao

Many real-world networks are demonstrated to either have layered network structures in themselves or interconnect with other networks, forming multilayer network structures. In this survey, we give...

Developing a platform to evaluate and assess the security of wearable devices

Available online 30 October 2018
Matthew L. Hale | Kerolos Lotfy | Rose F. Gamble | Charles Walter | Jessica Lin

Operating in a body area network around a smartphone user, wearables serve a variety of commercial, medical and personal uses. Depending on a certain smartphone application, a wearable can capture sensitive...

Improving signature quality for network application identification

Available online 29 October 2018
Justin Tharp | Sang C. Suh | Hyeonkoo Cho | Jinoh Kim

Network application identification is one of the core elements in network operations and management to provide enhanced network service and security. For accurate identification, an approach using common...

A time-aware searchable encryption scheme for EHRs

Available online 14 September 2018
Yousheng Zhou | Xiaofeng Zhao | Siling Liu | Xingwang Long | Wenjun Luo

Despite the benefits of EHRs (Electronic Health Records), there is a growing concern over the risks of privacy exposure associated with the technologies of EHR storing and transmission. To deal with...

S-transformation based integrated approach for spectrum estimation, storage, and sensing in cognitive radio

Available online 13 September 2018
Pyari Mohan Pradhan | Ganapati Panda

Cognitive Radio (CR) uses the principle of dynamic spectrum allocation to improve the utilization of spectrum bands. The estimation of missing data is essential for maintaining an uninterrupted quality...

Secrecy sum-rate analysis of massive MIMO systems under dual-threat attacks using normalization methods

Available online 12 September 2018
Kishan Neupane | Rami J. Haddad

Massive Multiple Input Multiple Output (MIMO) has been considered as an emerging technology to enhance the spectral and energy efficiency for the upcoming wireless communication systems. This paper...

A data reduction scheme for active authentication of legitimate smartphone owner using informative apps ranking

Available online 12 September 2018
Abdulaziz Alzubaidi | Swarup Roy | Jugal Kalita

Smartphones are vulnerable to fraudulent use despite having strong authentication mechanisms. Active authentication based on behavioral biometrics is a solution to protect the privacy of data in smart...

Middleware technologies for cloud of things: a survey

August 2018
Amirhossein Farahzadi | Pooyan Shams | Javad Rezazadeh | Reza Farahbakhsh

The next wave of communication and applications will rely on new services provided by the Internet of Things which is becoming an important aspect in human and machines future. IoT services are a key...

A new protocol for concurrently allocating licensed spectrum to underlay cognitive users

August 2018
Sabyasachi Chatterjee | Prabir Banerjee | Mita Nasipuri

Cognitive radio technology makes efficient use of the valuable radio frequency spectrum in a non-interfering manner to solve the problem of spectrum scarcity. This paper aims to design a scheme for...

Windowed overlapped frequency domain block filtering approach for direct sequence signal acquisition

August 2018
Ebrahim Karami | Harri Saarnisaari

This study applies a windowed frequency domain overlapped block filtering approach to acquire direct sequence signals. As a novel viewpoint, the windows not only allow pulse shaping without front-end...

Power consumption model of sector breathing based congestion control in mobile network

August 2018
Anwesha Mukherjee | Debashis De | Priti Deb

According to Cooper's law, the number of conversations per location doubles every two and a half years. Therefore, congestion control has become a promising research area. Nowadays small cell deployment...

A blockchain future for internet of things security: a position paper

August 2018
Mandrita Banerjee | Junghee Lee | Kim-Kwang Raymond Choo

Internet of Things (IoT) devices are increasingly being found in civilian and military contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of-Vehicles, Internet-of-Military-Things,...

A routing protocol for urban vehicular ad hoc networks to support non-safety applications

August 2018
S.K. Bhoi | P.M. Khilar | M. Singh | R.R. Sahoo | R.R. Swain

The Urban Vehicular Ad Hoc Network (UVANET) provides non-safety applications like media sharing, internet service, file transfer, gaming, and so on. Routing plays an important role in providing better...

Machine learning for internet of things data analysis: a survey

August 2018
Mohammad Saeid Mahdavinejad | Mohammadreza Rezvan | Mohammadamin Barekatain | Peyman Adibi | Payam Barnaghi | Amit P. Sheth

Rapid developments in hardware, software, and communication technologies have facilitated the emergence of Internet-connected sensory devices that provide observations and data measurements from the...

Analytical model of IoT CoAP traffic

Available online 11 July 2018
Rolando Herrero

The Constrained Application Protocol (CoAP) is a mechanism that enables the efficient transmission of information in the context of Wireless Sensor Networks (WSNs) characteristic of the Internet of...

Design of multi-antenna relaying for OFDM in impulsive noise environment

Available online 23 June 2018
Ahmed El-Mahdy | MennaTullah Seraj-Eldin

A low-complexity multi-antenna relaying scheme is proposed for Orthogonal Frequency Division Multiplexing (OFDM) in the presence of Class-A Impulsive Noise (IN). One way and two way relaying are considered....

Channel estimation and channel tracking for correlated block-fading channels in massive MIMO systems

April 2018
Suresh Dahiya | Arun Kumar Singh

This paper presents a channel estimation and tracking method for correlated block-fading channels in massive MIMO wireless cellular systems. In order to conserve resources, the proposed algorithm requires...

Share this page: