English English | 中文 中文

Recent Digital Communications and Networks Articles

Recently published articles from Digital Communications and Networks.

Classification with ensembles and case study on functional magnetic resonance imaging

Available online 28 March 2021
Adnan OM. Abuassba | Zhang Dezheng | Hazrat Ali | Fan Zhang | Khan Ali

Ensemble is a technique to combine base models in a strategic manner to achieve better accuracy rates. Diversity, the combination method, and the selection topology are among the main factors to determine...

Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks

Available online 26 March 2021
Weidong Fang | Wuxiong Zhang | Wei Yang | Zhannan Li | Weiwei Gao | Yinxuan Yang

The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network (WSN). Although the hierarchical routing protocol can effectively cope with large-scale application...

ED-SWE: event detection based on scoring and word embedding in online social networks for the internet of people

Available online 26 March 2021
Xiang Sun | Lu Liu | Ayodeji Ayorinde | John Panneerselvam

-Online social media networks are gaining attention worldwide with an increasing number of people relying on them to connect, communicate and share their daily pertinent event-related information. Event...

Public integrity verification for data sharing in cloud with asynchronous revocation

Available online 25 March 2021
Wei Song | Yu Wu | Yihui Cui | Qilie Liu | Yuan Shen | Zicheng Qiu | Jianjun Yao | Zhiyong Peng

Cloud data sharing service, which allows a group of people to access and modify the shared data, is one of the most popular and efficient working styles in enterprises. Recently, there is an uprising...

Machine learning based real-time visible fatigue crack growth detection

Available online 16 March 2021
Le Zhang | Zhichen Wang | Lei Wang | Zhe Zhang | Xu Chen | Lin Meng

Many large-scale and complex structural components are applied in the aeronautics and automobile industries. However, the repeated alternating or cyclic loads in service tend to cause unexpected fatigue...

A geographic routing protocol based on trunk line in VANETs

Available online 9 March 2021
Chen Chen | Huan Li | Xi’ang Li | Jianlong Zhang | Hong Wei | Hao Wang

A Trunk Line Based Geographic Routing(TLBGR)protocol in Vehicular Ad-hoc Networks (VANETs) is proposed in this paper to solve the problem of data acquisition in the traditional trunk coordinated control...

Security protocol of sensitive high utility itemset hiding in shared IoT environments

Available online 9 March 2021
Gautam Srivastava | Jerry Chun-Wei Lin | Youcef Djenouri | Unil Yun | Chien-Fu Cheng | Guo Lin

As Internet Technology (IT) rapidly grows, it is necessary to protect private and confidential information of collected data from both smart and Internet of Things (IoT) devices. It becomes a necessity...

Towards improving detection performance for malware with correntropy-based deep learning method

Available online 7 March 2021
Xiong Lu | Jianyuan Li | Weiping Wang | Yang Gao | Wenbing Zhao

With the rapid development of Internet of Things (IoT) technologies, the detection and analysis of malware have become a matter of concern in the industrial application of Cyber-Physical System (CPS)...

Energy efficient fuzzy-based DASH adaptation algorithm

February 2021
Moad Mowafi | Eyad Taqieddin | Hiba Al-Dahoud

With the expansive demand for video streaming over mobile networks, it is necessary to adopt schemes that balance the need for high video quality with the available network resources when streaming...

Capacity maximizing in massive MIMO with linear precoding for SSF and LSF channel with perfect CSI

February 2021
Tasher Ali Sheikh | Joyatri Bora | Md. Anwar Hussain

The capacity of a massive MIMO cellular network depends on user and antenna selection algorithms, and also on the acquisition of perfect Channel State Information (CSI). Low computational cost algorithms...

A light-weight on-line action detection with hand trajectories for industrial surveillance

February 2021
Peiyuan Ni | Shilei Lv | Xiaoxiao Zhu | Qixin Cao | Wenguang Zhang

Most of the intelligent surveillances in the industry only care about the safety of the workers. It is meaningful if the camera can know what, where and how the worker has performed the action in real...

Bayonet-corpus: a trajectory prediction method based on bayonet context and bidirectional GRU

February 2021
Mengyang Huang | Menggang Zhu | Yunpeng Xiao | Yanbing Liu

Predicting travel trajectory of vehicles can not only provide personalized services to users, but also have a certain effect on traffic guidance and traffic control. In this paper, we build a Bayonet-Corpus...

Design and optimization of an integrated MEMS gas chamber with high transmissivity

February 2021
Yang Jing | Cheng Yuhua | Yuan Yupeng | Li Xiaofei | Zhang Zuwei | Xu Ming | Wang Dengpan | Mu Jiangdong | Mei Yong | Zhang Yuzhe

Non-Dispersive InfraRed (NDIR) gas sensor is widely used for gas detection in collieries and the gas chemical industry, etc. The performance of the NDIR gas sensor depends on the volume, optical length...

A simple 2D modulation code in single-reader two-track reading BPMR systems

February 2021
Wiparat Busyatras | Chanon Warisarn | Santi Koonkarnkhai | Piya Kovintavewat

A reduction in the track width of magnetic recording systems results in a welcome increase in Areal Density (AD), but can severely deteriorate system performance in the unfortunate appearance of extreme...

An iterative ITI cancellation method for multi-head multi-track bit-patterned magnetic recording systems

February 2021
Santi Koonkarnkhai | Piya Kovintavewat

Bit-Patterned Magnetic Recording (BPMR) is one of the emerging data storage technologies, which promises an Areal Density (AD) of about 4 Tb/in2. However, a major problem practically encountered in...

VRS-DB: preserve confidentiality of users’ data using encryption approach

February 2021
J.S. Rauthan | K.S. Vaisla

We focus on security and privacy problems within a cloud database framework, exploiting the DataBase as a Service (DBaaS). In this framework, an information proprietor drives out its information to...

Identifying influential nodes in social networks via community structure and influence distribution difference

February 2021
Zufan Zhang | Xieliang Li | Chenquan Gan

This paper aims to effectively solve the problem of the influence maximization in social networks. For this purpose, an influence maximization method that can identify influential nodes via the community...

An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation

February 2021
Inam ul haq | Jian Wang | Youwen Zhu | Saad Maqbool

During the past decade, rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices. Service providers have hosted multiple...

Performance analysis of a hybrid optical CDMA/DWDM system against inter-symbol interference and four wave mixing

February 2021
Naif Alsowaidi | Tawfig Eltaif | Mohd Ridzuan Mokhtar

This paper reports the implementation and theoretical model for analyzing an optical CDMA/DWDM hybrid system to reduce two major problems, the Inter-Symbol Interference (ISI) and the Four-Wave Mixing...

Clustering-based label estimation for network anomaly detection

February 2021
Sunhee Baek | Donghwoon Kwon | Sang C. Suh | Hyunjoo Kim | Ikkyun Kim | Jinoh Kim

A substantial body of work has been done to identify network anomalies using supervised and unsupervised learning techniques with their unique strengths and weaknesses. In this work, we propose a new...

Performance evaluation of a two-way relay network with energy harvesting and hardware noises

February 2021
Nguyen Tien Tung | Pham Minh Nam | Phu Tran Tin

In this paper, we propose a Two-Way Cognitive Relay Network (TWCRN) where the secondary users operate on an underlay mode to access the licensed bands. In the proposed protocols, two secondary sources...

SMDP-based sleep policy for base stations in heterogeneous cellular networks

February 2021
Jing Wu | Yun Li | Hongcheng Zhuang | Zhiwen Pan | Guoyin Wang | Yongju Xian

A dense heterogeneous cellular network can effectively increase the system capacity and enhance the network coverage. It is a key technology for the new generation of the mobile communication system....

Joint MAP channel estimation and data detection for OFDM in presence of phase noise from free running and phase locked loop oscillator

February 2021
Kamayani Shrivastav | R.P. Yadav | K.C. Jain

This paper addresses a computationally compact and statistically optimal joint Maximum a Posteriori (MAP) algorithm for channel estimation and data detection in the presence of Phase Noise (PHN) in...

Directional neighbor discovery in mmWave wireless networks

February 2021
Yu Wang | Ticao Zhang | Shiwen Mao | Theodore (Ted) S. Rappaport

The directional neighbor discovery problem, i.e., spatial rendezvous, is a fundamental problem in millimeter wave (mmWave) wireless networks, where directional transmissions are used to overcome the...

Jointly optimizing user clustering, power management, and wireless channel allocation for NOMA-based Internet of Things

February 2021
Xiang Sun | Liangkun Yu | Yin Yang

In order to accommodate the large number of Internet of Things (IoT) connections in mobile networks, Non-Orthogonal Multiple Access (NOMA) has been applied as the resource sharing mechanism in mobile...

Theoretical analysis and comparison of OAM waves generated by three kinds of antenna array

February 2021
Dandan Liu | Liangqi Gui | Ke Chen | Liang Lang | Zixiao Zhang | Han Chen | Lixing Liu | Tao Jiang

Antenna array is one of the methods which can generate Orbital Angular Momentum (OAM) waves. However, OAM waves generated by different antenna arrays have different characteristics of Electric-field...

Research advances on blockchain-as-a-service: architectures, applications and challenges

Available online 20 February 2021
Jie SONG | Pengyi ZHANG | Mohammed ALKUBATI | Yubin BAO | Ge YU

Due to the complexity of blockchain technology, it usually costs too much effort to build, maintain and monitor a blockchain system that supports a targeted application. To this end, the emerging “Blockchain...

Dynamic traffic congestion pricing and electric vehicle charging management system for the internet of vehicles in smart cities

Available online 9 February 2021
Nyothiri Aung | Weidong Zhang | Kashif Sultan | Sahraoui Dhelim | Yibo Ai

The integration of the Internet of Vehicles (IoV) in future smart cities could help solve many traffic-related challenges, such as reducing traffic congestion and traffic accidents. Various congestion...

Performance of mobile networks under composite F fading channels

Available online 12 January 2021
Mustafa K. Shawaqfeh | Osamah S. Badarneh

In this paper, the performance of a mobile wireless communication network operating over the Fisher-Snedecor F composite fading channel is analyzed. Specifically, a multi-antenna base station transmits...

Study on the transaction linkage technique combined with the designated terminal for 5G-enabled IoT

Available online 1 January 2021
Kyungroul Lee | Kangbin Yim

With the growth of the scale of the market for Internet banking and e-commerce, the number of Internet-based financial markets has been increasing. Meanwhile, hacking incidents continuously affect the...

Video transcoding for adaptive bitrate streaming over edge-cloud continuum

Available online 24 December 2020
Guanyu Gao | Yonggang Wen

Video transcoding is to create multiple representations of a video for content adaptation. It is deemed as a core technique in Adaptive BitRate (ABR) streaming. How to manage video transcoding affects...

Unintentional forking analysis in wireless blockchain networks

Available online 19 December 2020
Qilie Liu | Yinyi Xu | Bin Cao | Lei Zhang | Mugen Peng

Forking problem plays a key role in the security issue, which is a major concern in the blockchain system. Although many works studied on the attack strategy, consensus mechanism, privacy-protecting...

SM algorithms based encryption scheme for large genomic data files

Available online 16 December 2020
Yatong Jiang | Tao Shang | Jianwei Liu

With the rapid development of the genomic sequencing technology, the cost of obtaining personal genomic data and analyzing it effectively has been gradually reduced, and the analysis and utilization...

Robot and its living space: A roadmap for robot development based on the view of living space

Available online 10 December 2020
Xiaofeng Cai | Huansheng Ning | Sahraoui Dhelim | Rongjuan Zhou | Tao Zhang | Yang Xu | Yueliang Wan

Robots, as the creation of human, became an irreplaceable component in human society. With the advancement of technologies, robots become more and more intelligent and have been widely used in many...

Deep learning for the internet of things: Potential benefits and use-cases

Available online 8 December 2020
Tausifa Jan Saleem | Mohammad Ahsan Chishti

The massive number of sensors deployed in the Internet of Things (IoT) produce gigantic amounts of data for facilitating a wide range of applications. Deep Learning (DL) would undoubtedly play a role...

A novel nest-based scheduling method for mobile wireless body area networks

November 2020
Zhijun Xie | Guangyan Huang | Roozbeh Zarei | Zhenyan Ji | Hongwu Ye | Jing He

Wireless Body Area Networks (WBANs) comprise various sensors to monitor and collect various vital signals, such as blood pressure, pulse, heartbeat, body temperature, and blood sugar. A dense and mobile...

DVCast: denoising and variable dct for analog visual communications

November 2020
Min Wang | Bin Tan | Dongmei Zhu | Qin Zou

Recently, analog visual transmission has attracted considerable attention owing to its graceful performance degradation for various wireless channels. In this study, we propose a novel analog visual...

The analysis of coverage probability, ASE and EE in heterogeneous ultra-dense networks with power control

November 2020
Qiaoshou Liu | Zhongpei Zhang

The ultra-dense network is a promising technology to increase the network capacity in the forthcoming fifth-generation (5G) mobile communication networks by deploying lots of low power Small Base Stations...

Generating routes for autonomous driving in vehicle-to-infrastructure communications

November 2020
Jianjun Yang | Tinggui Chen | Bryson Payne | Ping Guo | Yanping Zhang | Juan Guo

The study of vehicular networks has attracted considerable interest in academia and the industry. In the broad area, connected vehicles and autonomous driving are technologies based on wireless data...

The detection method of low-rate DoS attack based on multi-feature fusion

November 2020
Liang Liu | Huaiyuan Wang | Zhijun Wu | Meng Yue

As a new type of Denial of Service (DoS) attacks, the Low-rate Denial of Service (LDoS) attacks make the traditional method of detecting Distributed Denial of Service Attack (DDoS) attacks useless due...

An efficient voting based decentralized revocation protocol for vehicular ad hoc networks

November 2020
Miraj Asghar | Lei Pan | Robin Doss

Vehicular Ad-hoc NETworks (VANETs) enable cooperative behaviors in vehicular environments and are seen as an integral component of Intelligent Transportation Systems (ITSs). The security of VANETs is...

An intelligent task offloading algorithm (iTOA) for UAV edge computing network

November 2020
Jienan Chen | Siyu Chen | Siyu Luo | Qi Wang | Bin Cao | Xiaoqian Li

Unmanned Aerial Vehicle (UAV) has emerged as a promising technology for the support of human activities, such as target tracking, disaster rescue, and surveillance. However, these tasks require a large...

Attacks and defences on intelligent connected vehicles: a survey

November 2020
Mahdi Dibaei | Xi Zheng | Kun Jiang | Robert Abbas | Shigang Liu | Yuexin Zhang | Yang Xiang | Shui Yu

Intelligent vehicles are advancing at a fast speed with the improvement of automation and connectivity, which opens up new possibilities for different cyber-attacks, including in-vehicle attacks (e.g.,...

Quanta - A platform for rapid control and monitoring of heterogeneous rbots

November 2020
CH. S. Sankhar Reddy | Anita Agrawal | K.R. Anupama

Rapid prototyping, real-time control and monitoring of various events in robots are crucial requirements for research in the fields of modular and swarm robotics. A large quantities of resources (time,...

Performance analysis and comparison of PoW, PoS and DAG based blockchains

November 2020
Bin Cao | Zhenghui Zhang | Daquan Feng | Shengli Zhang | Lei Zhang | Mugen Peng | Yun Li

In the blockchain, the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks. Various blockchain consensus mechanisms have been proposed....

Enhanced spectrum sensing using a combination of energy detector, matched filter and cyclic prefix

November 2020
Ghassan Alnwaimi | Hatem Boujemaa

In this paper, we propose a sensing scheme based on energy detection, matched filter and cyclic prefix. Both Equal Gain Combining (EGC) and optimal combination of the aforementioned detectors are investigated...

New bounds on the mutual information for discrete constellations and application to wireless channel estimation

November 2020
A. Taufiq Asyhari

The lack of closed-form expressions of the mutual information for discrete constellations has limited its uses for analyzing reliable communication over wireless fading channels. In order to address...

Research on data load balancing technology of massive storage system for wearable devices

Available online 30 November 2020
Shu-jun Liang | Jing Cheng | Jian-wei Zhang

Because of the limited memory of the increasing amount of information in current wearable devices, the processing capacity of the servers in the storage system can not keep up with the speed of information...

Share this page: