Skip to main content

Telecommunication Systems OnlineFirst articles

01.06.2024

Performance enhancement of an inter-satellite optical wireless communication link carrying 16 channels

Inter-satellite optical wireless communication (IsOWC) is frequently utilized for fast data transmission between various far away satellites in free space. Thousands of users are connected via broad-area applications that use network topologies …

verfasst von:
Nawroz Ibrahim Hamadamen

01.06.2024

A novel algorithm for the development of a multipath protocol for routing and energy efficient in IoT with varying density

Data transmission from sensor nodes is the biggest problem for IoT networks. Overusing communication power shortens node lifespans. Thus, network issues including QoS, security, network heterogeneity, congestion avoidance, reliable routing, and …

verfasst von:
Radwan S. Abujassar

28.05.2024

Threshold ALOHA with sensing data lookup in low-duty-cycle wireless networks

Slotted ALOHA is a well-known multiple access control protocol that devices use to access a radio channel in wireless networks. Age of information (AoI) is a key network performance indicator that represents the elapsed time between the time data …

verfasst von:
Show-Shiow Tzeng, Ying-Jen Lin, Yun-Ti Lin

28.05.2024

Deployment algorithms of multi-UAV-BS networks with frequency reuse and power optimization

Deploying unmanned aerial vehicle base stations (UAV-BSs) to provide wireless access for terrestrial users is an alternative solution in emergency scenarios. Due to the dynamic nature of UAV-BSs and strong line-of-sight (LoS) transmission …

verfasst von:
Yanzhi Hu, Chunyuan Tian, Dawei Ma, Zhiyong Shi, Fengbin Zhang

28.05.2024

VPIR: an efficient verifiable private information retrieval scheme resisting malicious cloud server

Private information retrieval, which allows users to securely retrieve information stored in a single server or multiple servers without disclosing any query content to the server, has attracted much attention in recent years. However, most of the …

verfasst von:
Wenqi Zhang, Shuai Shang, Haolin Wang, Ziwen Cai, Yun Zhao, Xiong Li

23.05.2024

Transmission scheduling of P2P real-time communication based on restless multi-armed bandit

In this paper, we consider a transmission scheduling problem of the point-to-point (P2P) real-time communication over fading channel. Specifically, we assume each transmission task with a strict time delay arrives into the system randomly, we …

verfasst von:
Ting Wu, Shikun Tian, Shengda Tang

Open Access 22.05.2024

Machine learning-based methods for MCS prediction in 5G networks

In the ever-evolving landscape of wireless communication systems, including fifth-generation (5G) networks and beyond (B5G), accurate Modulation and Coding Scheme (MCS) prediction is crucial for optimizing data transmission efficiency and quality …

verfasst von:
Lefteris Tsipi, Michail Karavolos, Grigorios Papaioannou, Maria Volakaki, Demosthenes Vouyioukas

20.05.2024

Security, information, and structure characterization of Tor: a survey

Content on the World Wide Web that is not indexable by standard search engines defines a category called the deep Web. Dark networks are a subset of the deep Web. They provide services of great interest to users who seek online anonymity during …

verfasst von:
Mahdieh Zabihimayvan, Reza Sadeghi, Derek Doran

18.05.2024

Communication coverage maximization in stadium environments using UAVs

Maximizing the communication coverage with the minimum number of unmanned aerial vehicles (UAVs) in a telecommunication system is investigated in this paper. In particular, the problem of maximizing the coverage area in stadium environments using …

verfasst von:
Hamid Jafaripour, Mohammad Fathi, Ali Shariatpanah

15.05.2024

Joint block sparse signal recovery-based active user detection in 5G cloud radio access networks

The Cloud Radio Access Network (C-RAN) is a state-of-the-art system paradigm that simultaneously improves spectral and energy efficiency. Capacity constraints of the fronthaul links connecting Remote Radio Heads (RRH) to the Cloud Unit are notable …

verfasst von:
Mehdi Torabnezhad, Mohammadreza Zahabi

13.05.2024

Dynamical modelling and cost optimization of a 5G base station for energy conservation using feedback retrial queue with sleeping strategy

Dense network deployment is now being evaluated as one of the viable solutions to meet the capacity and connectivity requirements of the fifth-generation (5G) cellular system. The goal of 5G cellular networks is to offer clients with faster …

verfasst von:
R. Harini, K. Indhira

09.05.2024

Smart remote sensing network for disaster management: an overview

Remote sensing technology is a vital component of disaster management, poised to revolutionize how we safeguard lives and property through enhanced prediction, mitigation, and recovery efforts. Disaster management hinges on continuous monitoring …

verfasst von:
Rami Ahmad

08.05.2024

Deep optimized hybrid beamforming intelligent reflecting surface assisted UM-MIMO THz communication for 6G broad band connectivity

For 6G communications, the Ultra Massive Multiple Input Multiple Output (UM-MIMO) systems with Intelligent Reflecting Surface (IRS) assistance are capable since they can efficiently get beyond the limitations of restricted blockage and coverage.

verfasst von:
Ranjitham Govindasamy, Sathish Kumar Nagarajan, Jamuna Rani Muthu, Purushothaman Annadurai

06.05.2024

Tripartite evolutionary game in the process of network attack and defense

At present, confrontations in cyberspace are becoming increasingly fierce, and network attacks and defenses have become the main form of confrontation between parties in cyberspace. The maximum benefit can be obtained by using scientific …

verfasst von:
Zigang Chen, Chaochao Fan, Tao Leng, Long Chen, Yuhong Liu, Xiaoyong Li, Dongfeng Yuan

27.04.2024

A novel adaptive watermark embedding approach for enhancing security of biometric voice/speech systems

In this paper, we propose a novel watermarking method in order to enhance the security in biometric voice/speech transmission systems basing on sub-sampling, discrete cosine transform (DCT) and adaptive watermark embedding. To improve …

verfasst von:
Slami Saadi, Ahmed Merrad

23.04.2024

Data fusion algorithm of wireless sensor network based on clustering and fuzzy logic

In order to reduce network energy consumption and prolong the network lifetime in wireless sensor networks, a data fusion algorithm named CFLDF is proposed. Firstly, upon completion of the arrangement of network nodes, network clustering is …

verfasst von:
Xiuwu Yu, Wei Peng, Ke Zhang, Zixiang Zhou, Yong Liu

20.04.2024

Instantaneous and average throughput optimization using reconfigurable intelligent surfaces with solar energy harvesting

In this paper, we optimize the instantaneous and average throughput when wireless communications uses Reconfigurable Intelligent Surfaces (RIS) and the source harvests power from sun using a Photo-Voltaic (PV) system. Instantaneous throughput …

verfasst von:
Faisal Alanazi

17.04.2024

FPGA-based hardware accelerator for SIC in uplink NOMA networks

Non-Orthogonal Multiple Access (NOMA) is an emerging multiple access scheme for the fifth-generation (5G) and beyond 5G mobile communications. Since NOMA supports a massive number of users simultaneously in a single time/frequency resource block …

verfasst von:
Sreenu Sunkaraboina, Kalpana Naidu

16.04.2024

Prioritization and offloading in P4 switch integrated with NFV

The architecture of integrating Software Defined Networking (SDN) with Network Function Virtualization (NFV) is excellent because the former virtualizes the control plane, and the latter virtualizes the data plane. As Programming …

verfasst von:
Farhin Faiza Neha, Yuan-Cheng Lai, Md. Shohrab Hossain, Ying-Dar Lin

16.04.2024

Optimized precoding for massive MU-MIMO systems with KLDA dimension reduction and RNN-crossover GBO algorithm

Nowadays the communication of massive multi-user multiple-input multiple-output (MU-MIMO) takes an important role in wireless systems, as they facilitate the ultra-reliable transmission of data and high performance. In order to sustain massive …

verfasst von:
Srividhya Ramanathan, M. Anto Bennet