Smart all-time vision: The battery-free video communication for urban administration and law enforcement
Available online 1 June 2023
The Chinese government is dedicated to enhancing the level of informatization in administrative law enforcement to ensure fairness and increase credibility. Currently, law enforcement has exposed such...
Share article
Suitability of SDN and MEC to facilitate digital twin communication over LTE-A
Available online 1 June 2023
Haptic is the modality that complements traditional multimedia, i.e., audiovisual, to evolve the next wave of innovation at which the Internet data stream can be exchanged to enable remote skills and...
Share article
A survey on semantic communications: technologies, solutions, applications and challenges
Available online 1 June 2023
Semantic Communications (SC) has emerged as a novel communication paradigm that provides a receiver with meaningful information extracted from the source to maximize information transmission throughput...
Share article
Latency minimization for multiuser computation offloading in fog-radio access networks
Available online 1 June 2023
Recently, the Fog-Radio Access Network (F-RAN) has gained considerable attention, because of its flexible architecture that allows rapid response to user requirements. In this paper, computational offloading...
Share article
Internet of robotic things for mobile robots: concepts, technologies, challenges, applications, and future directions
Available online 29 May 2023
Nowadays, Multi Robotic System (MRS) consisting of different robot shapes, sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world...
Share article
Dynamic adversarial jamming-based reinforcement learning for designing constellations
Available online 23 May 2023
To resist various types of jamming in wireless channels, appropriate constellation modulation is used in wireless communication to ensure a low bit error rate. Due to the complexity and variability...
Share article
A blockchain-based Privacy-Preserving and Collusion-Resistant scheme (PPCR) for double auctions
Available online 23 May 2023
Electronic auctions (e-auctions) remove the physical limitations of traditional auctions and bring this mechanism to the general public. However, most e-auction schemes involve a trusted auctioneer,...
Share article
LOS and NLOS identification in real indoor environment using deep learning approach
Available online 22 May 2023
Visibility conditions between antennas, i.e. Line-of-Sight (LOS) and Non-Line-of-Sight (NLOS) can be crucial in the context of indoor localization, for which detecting the NLOS condition and further...
Share article
Security analysis and secured access design for networks of image remote sensing
Available online 18 May 2023
The secured access is studied in this paper for the network of the image remote sensing. Each sensor in this network encounters the information security when uploading information of the images wirelessly...
Share article
In-band full-duplex MIMO PLC systems for relaying networks
Available online 18 May 2023
In Power Line Communications (PLC), there are regulatory masks that restrict the transmit power spectral density for electromagnetic compatibility reasons, which creates coverage issues despite the...
Share article
Preamble slice orderly queue access scheme in cell-free dense communication systems
Available online 18 May 2023
High reliability applications in dense access scenarios have become one of the main goals of 6G environments. To solve the access collision of dense Machine Type Communication (MTC) devices in cell-free...
Share article
IncEFL: A sharing incentive mechanism for edge-assisted federated learning in industrial IoT
Available online 18 May 2023
As the information sensing and processing capabilities of IoT devices increase, a large amount of data is being generated at the edge of Industrial IoT (IIoT), which has become a strong foundation for...
Share article
Secure beamforming designs for maximizing secrecy sum rate in MISO-NOMA networks
Available online 10 May 2023
In this paper, the application of Non-Orthogonal Multiple Access (NOMA) is investigated in a multiple-input single-output network consisting of multiple legitimate users and a potential eavesdropper....
Share article
A Highly Reliable Encoding and Decoding Communication Framework Based on Semantic Information
Available online 10 May 2023
Increasing research has focused on semantic communication, the goal of which is to convey accurately the meaning instead of transmitting symbols from the sender to the receiver. In this paper, we design...
Share article
Collision-free Parking Recommendation Based on Multi-agent Reinforcement Learning in Vehicular Crowdsensing
Available online 10 May 2023
The recent proliferation of fifth-generation (5G) networks and sixth-generation (6G) networks has given rise to vehicular crowd sensing (VCS) systems which solve parking collisions by effectively incentivizing...
Share article
Share article
Data secure transmission intelligent prediction algorithm for mobile industrial IoT networks
April 2023
Mobile Industrial Internet of Things (IIoT) applications have achieved the explosive growth in recent years. The mobile IIoT has flourished and become the backbone of the industry, laying a solid foundation...
Share article
Share article
Optimal deployment of swarm positions in cooperative interception of multiple UAV swarms
April 2023
In order to prevent the attacker from breaking through the blockade of the interception, deploying multiple Unmanned Aerial Vehicle (UAV) swarms on the interception line is a new combat style. To solve...
Share article
A review of optimization methods for computation offloading in edge computing networks
April 2023
Handling the massive amount of data generated by Smart Mobile Devices (SMDs) is a challenging computational problem. Edge Computing is an emerging computation paradigm that is employed to conquer this...
Share article
3-Multi ranked encryption with enhanced security in cloud computing
April 2023
Searchable Encryption (SE) enables data owners to search remotely stored ciphertexts selectively. A practical model that is closest to real life should be able to handle search queries with multiple...
Share article
Smart contract token-based privacy-preserving access control system for industrial Internet of Things
April 2023
Due to mobile Internet technology's rapid popularization, the Industrial Internet of Things (IIoT) can be seen everywhere in our daily lives. While IIoT brings us much convenience, a series of security...
Share article
Machine learning-enabled MIMO-FBMC communication channel parameter estimation in IIoT: A distributed CS approach
April 2023
Compressed Sensing (CS) is a Machine Learning (ML) method, which can be regarded as a single-layer unsupervised learning method. It mainly emphasizes the sparsity of the model. In this paper, we study...
Share article
Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT
April 2023
Some of the significant new technologies researched in recent studies include BlockChain (BC), Software Defined Networking (SDN), and Smart Industrial Internet of Things (IIoT). All three technologies...
Share article
Smart and collaborative industrial IoT: A federated learning and data space approach
April 2023
Industry 4.0 has become a reality by fusing the Industrial Internet of Things (IIoT) and Artificial Intelligence (AI), providing huge opportunities in the way manufacturing companies operate. However,...
Share article