IET Communications
Volume 14, Issue 12, 28 July 2020
Volumes & issues:
Volume 14, Issue 12
28 July 2020
-
- Author(s): Peichang Zhang ; Jiajun Xu ; Lei Huang ; Bo Zhao ; Shida Zhong
- Source: IET Communications, Volume 14, Issue 12, p. 1841 –1847
- DOI: 10.1049/iet-com.2019.0561
- Type: Article
- + Show details - Hide details
-
p.
1841
–1847
(7)
In this study, the authors address antenna selection (AS)-aided massive multi-user multiple-input-multiple-output (MU-MIMO) system based on maximum signal-to-noise ratio, where imperfect channel state information (CSI), time-varying channel and antenna spatial correlation are considered. More explicitly, a computationally simple training-based channel estimator is firstly employed for obtaining the imperfect down-link CSI. Channel quantisation (CQ) is subsequently introduced by the feedback link which is used for feeding back so-obtained CSI to base station. Time varying coefficient is utilised to characterise channel time variety and antenna spatial correlation is modelled by Kronecker model. Furthermore, the authors derive closed-form ergodic channel capacity of the AS-aided MU-MIMO system with channel estimation error, CQ error and delay feedback, which has not yet been addressed in the state-of-the-art approaches. Simulation results are provided to demonstrate the tightness of their theoretical computations of the ergodic channel capacity.
- Author(s): Suneeta V. Budihal and Rajeshwari M. Banakar
- Source: IET Communications, Volume 14, Issue 12, p. 1848 –1857
- DOI: 10.1049/iet-com.2019.0192
- Type: Article
- + Show details - Hide details
-
p.
1848
–1857
(10)
The paper proposes a framework for traffic based dynamic radio resource allocation to mitigate Inter Cell Interference (ICI) in cooperative communication for LTE MIMO-OFDMA systems using evidence theory. The objective is to address ICI, by dynamic user categorization, resource partitioning and management of radio resources. Through evidence based dynamic categorization of users, dynamic frequency planning and dynamic allocation of resources, spectral efficiency is enhanced by increasing data rate of users. It requires the cell users to be categorized into edge and center users depending on the confidence factor, computed using Dempster Shaffer Combinational Rule (DSCR). A traffic based dynamic Soft Frequency Reuse (SFR) plan is proposed using categorized user information to partition the available resources i.e., subcarrier and associated power. A subset of resources is allocated to identified edge users based on dynamic traffic. The traffic based evidential categorization of users, partitioning of resources provides improved data rate and spectral efficiency of edge users. The allocation of resources is dynamic in the proposed framework, leading to an improvement of spectral efficiency from 6.6 b/s/Hz to 12.4 b/s/Hz in a cell. The proposed methodology adapts to the user traffic in a cell and allocates the resources satisfying maximum users.
- Author(s): Sagar Kavaiya ; Dhaval K Patel ; Yong Liang Guan ; Sumei Sun ; Yoong Choon Chang ; Joanne Mun-Yee Lim
- Source: IET Communications, Volume 14, Issue 12, p. 1858 –1868
- DOI: 10.1049/iet-com.2019.1285
- Type: Article
- + Show details - Hide details
-
p.
1858
–1868
(11)
In this work, energy detection-based spectrum sensing for multiple antenna receiver under the effect of mobility is investigated by considering L number of correlated antenna branches. The authors consider the uniform, exponential and arbitrarily correlation among the antenna branches based on the spacing between them. The moment generating function (MGF) approach is applied to obtain the statistical knowledge of the received signal to noise ratio because the Laplace domain behaviour will help to derive the closed-form expressions using simple algebraic operations. They derived the closed-form expressions for the detection probability over Nakagami-m fading, in terms of Lauricella and Confluent Hypergeometric function for maximal ratio combining (MRC) and equal gain combining (EGC) diversity techniques under the effect of vehicle mobility. Monte-Carlo simulation is carried out to validate the derived analytical expressions. The results show that the degradation in detection performance due to fading correlation can be reduced by choosing the appropriate diversity scheme and by increasing the number of antennas. Furthermore, they also found that at high fading parameter () value, the low value of the probability of false alarm and highly correlated fading, MRC works better than EGC for high relative velocity.
- Author(s): Ajay Kumar and Narayanan Hariharan
- Source: IET Communications, Volume 14, Issue 12, p. 1869 –1882
- DOI: 10.1049/iet-com.2020.0091
- Type: Article
- + Show details - Hide details
-
p.
1869
–1882
(14)
Routing Protocol for Low power lossy network (RPL) is emerged to evade the energy issues in the Internet of Things (IoT) network. Although, RPL noticeably satisfies the requirement of the IoT network, still there exist certain open issues to resolve. This paper addresses the problem of routing overhead, packet losses and load imbalance in RPL based IoT network. These downsides are solved using the proposed Dual Context-based Routing and Load Balancing in RPL based Network (DCRL-RPL). Primarily, we implement the grid construction where the network area is split into a different level of the unequal grid. The ranking based Grid Selection process is executed to select the optimal grid head node in each grid. The grid head node in the network schedules its member node using the Reputation based Scheduling method. The elected grid head classifies the data received from its member using Adam Deep Neural Network (ADNN) to provide better routing performance. Here, the sensitive and non-sensitive data are considered as context for objective function selection. At last, the efficacy of the DCRL-RPL is analyzed using the Network Simulator 3.26 (NS3) tool. From comprehensive validation results, we show that DCRL-RPL acquires better results.
- Author(s): Reza Hooshmand ; Masoumeh Koochak Shooshtari ; Mohammad Reza Aref
- Source: IET Communications, Volume 14, Issue 12, p. 1883 –1893
- DOI: 10.1049/iet-com.2019.0689
- Type: Article
- + Show details - Hide details
-
p.
1883
–1893
(11)
Polar codes are novel and efficient error-correcting codes with low encoding and decoding complexities. These codes have a channel-dependent generator matrix, which is determined by the code dimension, code length and transmission channel parameters. A variant of the McEliece public-key cryptosystem based on polar codes, called the PKC-PC, is studied. Since the structure of the polar codes’ generator matrix depends on the parameters of the channel, the authors have used an efficient approach to conceal their generator matrix. The proposed approach is based on a random selection of rows of the matrix by which a random generator matrix is constructed. Using the characteristics of polar codes and introducing an efficient approach, they could reduce the public and secret key sizes, and computational complexity compared to the McEliece cryptosystem. Moreover, they show that PKC-PC yields an increased security level against conventional attacks as well as possible vulnerabilities to the code-based public-key cryptosystems. Furthermore, they prove the security of the authors’ cryptosystem and show that its security is reduced to solve NP-complete problems, called polar parameterised syndrome decoding and polar parameterised codeword existence.
- Author(s): Yao Zhang ; Meng Zhou ; Haotong Cao ; Yun Liu ; Longxiang Yang ; Hongbo Zhu
- Source: IET Communications, Volume 14, Issue 12, p. 1894 –1901
- DOI: 10.1049/iet-com.2019.0865
- Type: Article
- + Show details - Hide details
-
p.
1894
–1901
(8)
In this study, the uplink performance of cell-free massive multi-input multi-output (mMIMO) system with multi-antenna access points (APs) and users is investigated, assuming low-resolution analogue–digital converters (ADCs) are employed at the APs. By exploiting the additive quantisation noise model, a tight closed-form rate expression is derived. This tractable finding characterises the impacts of the multi-antenna APs and users, the imperfect quantisation error and the channel estimation error. In order to maximise the uplink sum-rate, a joint quantisation bit and power control problem is formulated, subjecting to the backhaul capacity and each user power constraints. The original resource optimisation problem is non-convex and it is decomposed into two sub-problems, namely quantisation bit design and power allocation problem, to alleviate the difficulties. In particular, the resultant two sub-problems can be efficiently determined by utilising the Lagrange Multiplier and sequential convex approximation methods, respectively. Finally, numerical simulations are presented to examine the analytical findings and evaluate the effectiveness of the proposed algorithm.
- Author(s): Guisong Yang ; Zhao Zhang ; Jiangtao Wang ; Xingyu He
- Source: IET Communications, Volume 14, Issue 12, p. 1902 –1909
- DOI: 10.1049/iet-com.2019.0835
- Type: Article
- + Show details - Hide details
-
p.
1902
–1909
(8)
Resourced-constrained task allocation is a fundamental research problem in wireless sensor networks. While existing approaches mainly allocate the task to a single sensor node, this study proposes a novel algorithm, in which tasks are allocated to a pair of collaboratively working sensor nodes based on their intimacy. Specifically, the intimacy level of two nodes is modelled based on their link quality and preference degree. This basic idea is that each node pair should be allocated with a task whose task level (e.g. measured by the computing intensity) could match with the intimacy level of this node pair, so that each task can be executed collaboratively and efficiently. Considering that a node connecting with multiple nodes, it may be allocated with redundant tasks (tasks with the same task level), and these tasks need to be adjusted to avoid redundant task execution. Simulation results show that the proposed algorithm not only can improve the task allocation efficiency but also can balance the network energy consumption.
- Author(s): Denny Kusuma Hendraningrat ; Muhammad Basit Shahab ; Soo Young Shin
- Source: IET Communications, Volume 14, Issue 12, p. 1910 –1917
- DOI: 10.1049/iet-com.2019.0955
- Type: Article
- + Show details - Hide details
-
p.
1910
–1917
(8)
In this study, joint transmission coordinated multi-point (JT-CoMP) is integrated with virtual user pairing based non-orthogonal multiple access (VP-NOMA), termed as JT-CoMP VP-NOMA. JT-CoMP is a multi-cell coordination scheme, where base stations of neighbouring cells coordinate with each other to improve the performance of their common cell edge users (CEUs). On the other hand, VP-NOMA is a one-to-many user pairing scheme in non-orthogonal multiple access (NOMA), where one cell centre user (CCU) within a cell can be paired/multiplexed with multiple CEUs for better spectrum utilisation. The proposed scheme combines both VP-NOMA for enhancing ergodic sum capacity (ESC) within a cell and JT-CoMP for mitigating inter-cell interference (ICI) between neighbouring cells. To demonstrate the achieved performance gains, ESC of a three-cell scenario is analysed as a key performance metric, where each cell contains two users; a CCU and a CEU. Closed-form expressions for ESC of the considered system are derived, and validated through simulations. Furthermore, the analytical and simulation results of JT-CoMP VP-NOMA are compared with orthogonal multiple access, NOMA, and VP-NOMA to show the achieved performance gains. It is shown that the proposed JT-CoMP VP-NOMA outperforms the other schemes in the viewpoint of ESC.
- Author(s): Xuefei Peng and Jiandong Li
- Source: IET Communications, Volume 14, Issue 12, p. 1918 –1924
- DOI: 10.1049/iet-com.2019.0881
- Type: Article
- + Show details - Hide details
-
p.
1918
–1924
(7)
In this study, the authors propose a spectral efficiency maximisation problem in power splitting (PS)-based relaying simultaneous wireless information and power transfer (SWIPT) system with full-duplex (FD) decode-and-forward (DF) ability considering the presence of a direct link. Firstly, the authors establish the system model for PS-based relaying SWIPT system with FD DF ability considering the presence of a direct link. Secondly, they propose an information decoding scheme considering successive interference cancellation and maximal ratio combining techniques. Further, they formulate the spectral efficiency maximisation problem based on the established system. Then, the formulated problem is solved through the proposed iterative PS ratio algorithm, where the designed information scheme is applied. Finally, the better performance of the proposed scheme is demonstrated through a number of simulations.
- Author(s): Cristiane A. Pendeza Martinez ; Fábio Renan Durand ; Taufik Abrao ; Alessandro Goedtel
- Source: IET Communications, Volume 14, Issue 12, p. 1925 –1936
- DOI: 10.1049/iet-com.2019.0908
- Type: Article
- + Show details - Hide details
-
p.
1925
–1936
(12)
This study proposes the deployment of the Hopfield neural network (H-NN) approach to optimally assign power in optical code division multiple access (OCDMA) systems. Figures of merit such as the feasibility of solutions and complexity are compared with the classical power allocation methods found in the literature, such as sequential quadratic programming (SQP) and augmented Lagrangian method. The analysed methods are used to solve constrained non-linear optimisation problems in the context of resource allocation for optical networks, especially to deal with energy efficiency in OCDMA networks. The promising performance-complexity trade-off of the modified H-NN is demonstrated through numerical results performed in comparison with classic methods for general problems in non-linear programming. The evaluation is carried out considering challenging OCDMA networks in which different levels of service quality required were considered for large numbers of optical users. The numerical results demonstrated that the three power allocation methods attain suitable convergence for different network sizes, while both the mH-NN and SQP methods achieve suitable equilibrium with less complexity.
- Author(s): Ahmed A. Basahel ; Islam Md. Rafiqul ; Mohamed Hadi Habaebi ; Suriza A. Zabidi
- Source: IET Communications, Volume 14, Issue 12, p. 1937 –1941
- DOI: 10.1049/iet-com.2018.6238
- Type: Article
- + Show details - Hide details
-
p.
1937
–1941
(5)
Free-space optical (FSO) communication links are point-to-point wireless technologies. It provides high data rates up to a gigabit per second. FSO link availability is easily affected by different weather conditions. Radio-frequency (RF) can be a complimentary link to the FSO link to increase availability. Hybrid FSO/RF is a feasible technology for providing high availability of point-to-point wireless links. In tropical regions, normally RF link is relatively sensitive to rain. Availability prediction of hybrid FSO/RF with the selection of suitable RF is indispensable, especially in tropical regions. In this study, empirical models are proposed to predict the link availability of RF, and hybrid FSO/RF over link ranges up to 5 km. The availability prediction models are based on the long-term statistics of atmospheric attenuations from the tropical climate zone. The RF link availability prediction model is developed for frequency ranges from 10 to 100 GHz using the International Telecommunications Union-Radio (ITU-R) rain attenuation model. It is link distance, fade margin, and radio frequency dependent. The proposed availability models can predict carrier as well as enterprise class availability. The availabilities predicted by proposed models are found to be in good agreement with those estimated by the ITU-R.
- Author(s): Banavath Balaji Naik ; Dhananjay Singh ; Arun B. Samaddar
- Source: IET Communications, Volume 14, Issue 12, p. 1942 –1948
- DOI: 10.1049/iet-com.2019.1149
- Type: Article
- + Show details - Hide details
-
p.
1942
–1948
(7)
Cloud computing and virtualisation are recent approaches to develop minimum energy usage in virtualised cloud data centre (DC) for resource management. One of the major problems faced by cloud DCs is energy consumption which increases the cost of cloud user and environmental influence. Therefore, virtual machine (VM) consolidation is properly proposed in many approaches which reallocate the VMs by VM migration with the objective of minimum energy consumption. Here, VM consolidation based on the Fruit fly Hybridised Cuckoo Search (FHCS) algorithm is proposed to obtain the optimal solution with the help of two objective functions in cloud DC. This FHCS approach efficiently minimises the energy usage and resource depletion in cloud DC. The proposed work comparison is done with Ant Colony System (ACS), Particle Swarm Optimisation (PSO) algorithm and Genetic Algorithm (GA). The simulation conclusion reveals the advantage of the FHCS and VM migration method over existing procedures such as GA, PSO and ACS in terms of energy consumption and resource utilisation. The proposed method achieves 68 Kwh less energy and 72% less resources than existing methods. Simulation results have shown that energy consumption of the proposed method is reduced with less number of active PMs than other conventional approaches.
- Author(s): Siliang Gong ; Xiaoying Liu ; Kechen Zheng ; Xianzhong Tian ; Yi-hua Zhu
- Source: IET Communications, Volume 14, Issue 12, p. 1949 –1956
- DOI: 10.1049/iet-com.2019.0977
- Type: Article
- + Show details - Hide details
-
p.
1949
–1956
(8)
In the energy-harvesting wireless sensor networks (EH-WSNs) with Time division multiple access (TDMA), it is challenging to assign time slots to the nodes because energy shortage causes some nodes unable to transmit in their time slots, resulting in the inefficiency in slot usage and the increase of the data packet delay. To overcome this problem, the slot assignment in TDMA is required to consider energy packet arrivals, where an energy packet is defined as the amount of energy that suffices for one transmission. In this study, the authors investigate the EH-WSN with hybrid energy sources, in which the nodes harvest energy from the fixed inter-arrival time (FIAT) and the random inter-arrival time (RIAT) energy sources. After deriving the slot-hitting ratios (SHRs) of energy packet arrivals for both FIAT and RIAT energy sources, they propose the SHR-based TDMA (SHR-TDMA) scheme. Then, they derive the delay arising from the awaiting slot (DAFAS) and formulate the DAFAS minimisation problem for the SHR-TDMA. Solution to the DAFAS minimisation problem makes the slots optimally assigned according to the characteristics of the energy packet arrivals at the nodes. The simulation results show that the SHR-TDMA outperforms the existing TDMA schemes in terms of DAFAS.
- Author(s): Rahul Jashvantbhai Pandya
- Source: IET Communications, Volume 14, Issue 12, p. 1957 –1967
- DOI: 10.1049/iet-com.2019.1191
- Type: Article
- + Show details - Hide details
-
p.
1957
–1967
(11)
The enormous growth in the number of smartphones, internet usage, and internet of things applications require high data-rate transport platforms. Therefore, spectrally and spatially scalable core optical networks are essential. Moreover, the current generation, field existing networks, consume the conventional (C) band of the single-mode single-core fibres. The recent studies evidence that the increased traffic occupies the complete C band. To overcome this, the spectral and spatial expansion employing multicore (MC), multimode (MM), and multiband (MB, C + L + S) fibre-based spatial division multiplexing (SDM)–elastic optical network (EON) is a promising solution. However, dynamic traffic, complex networking with MC–MM–MB–SDM–EON requires dynamic network solutions. To accomplish this, the authors propose the machine learning (ML) oriented route, core, mode, band, and modulation format aware spectrum assignment. Such resource allocation (RA) reduces the impact of the physical layer impairments, inter core cross-talk, differential mode delay, and mode dependent losses. As per the author's best knowledge, ML-oriented RA for SDM–EON considering the aforementioned parameters is the first investigation. They propose several RA algorithms to reduce the total network cost with increased fibre capacity. Among all, priority-based RA comes out as an optimal solution.
- Author(s): Oluwaseyi P. Babalola ; Olayinka O. Ogundile ; Daniel Jaco J. Versfeld
- Source: IET Communications, Volume 14, Issue 12, p. 1968 –1974
- DOI: 10.1049/iet-com.2019.1008
- Type: Article
- + Show details - Hide details
-
p.
1968
–1974
(7)
Belief propagation (BP) is a soft-decision (SD) decoder that is commonly used to obtain near-optimal decoding performance for linear codes defined over sparse parity-check matrix. Nevertheless, the BP yields poor performance when used in the decoding of algebraic block codes, usually described by a dense parity-check matrix. Hence, enhanced BP decoders transform the parity check matrix of such codes at each iteration for efficient decoding. In this article, the performance of the transformed parity-check matrix of the iterative SD decoder is analysed for the class of binary cyclic codes using a perfect knowledge model (PKM). The PKM computes a list of candidate matrices and selects a baseline parity-check matrix according to a distance metric. The selected matrix is optimal since it minimizes the probability of error over various choices in the list. Results show that, for a given channel condition, the conventional transformed matrix obtained by Gaussian elimination is sub-optimal and does not necessarily contain unitary weighted columns at corresponding columns of the unreliable bits. Moreover, PKM can be used to verify the performances of newly developed iterative SD decoders for binary cyclic codes based on parity-check equations instead of maximum-likelihood decoding.
- Author(s): Prabhjot Singh and Nitin Mittal
- Source: IET Communications, Volume 14, Issue 12, p. 1975 –1991
- DOI: 10.1049/iet-com.2019.1311
- Type: Article
- + Show details - Hide details
-
p.
1975
–1991
(17)
Localisation has become a major attraction of research in recent years in the field of wireless sensor networks (WSNs). It is required for various applications like monitoring of objects placed in indoors and outdoors environments. The main requirement in localisation is to assign a location to each node, since multiple sensor nodes in WSN are used to retrieve information. The aim of this research is to address a WSN localisation problem using various optimisation techniques. The concept of single anchor node placement at the centre of sensing field with its projection using hexagonal pattern is introduced. In this study, a novel hybrid optimisation technique named as dragonfly–firefly algorithm (DA–FA) is proposed. DA is an optimisation algorithm recently suggested based on the dragonfly's static and dynamic swarming behaviour. The suggested hybrid technique combines the exploration capability of explore DA and Firefly algorithm's to exploit to obtain ideal global solutions. To check the effectiveness of DA–FA CEC 2019 benchmark functions are used for comparison with competitive algorithms. DA–FA converges fast and provide optimum solution for most of the benchmark functions. In addition, DA–FA outperforms well in terms of localisation error in comparison to existing localisation solutions.
- Author(s): Mouad Addad and Ali Djebbari
- Source: IET Communications, Volume 14, Issue 12, p. 1992 –1996
- DOI: 10.1049/iet-com.2019.1075
- Type: Article
- + Show details - Hide details
-
p.
1992
–1996
(5)
In this study, the authors consider the effect of multiple access interference (MAI) on the performance of a quasi-synchronous multicarrier direct-sequence code-division multiple access (QS-MC-DS-CDMA) system. An analytical expression of the bit error rate (BER) is derived for a QS-MC-DS-CDMA system over additive white Gaussian noise channel. The BER performance degradation is proportional to the squares of the even correlation function (ECF) and odd correlation function (OCF) of the spreading codes. The obtained results show that the adequate spreading code is a set of binary zero correlation zone sequences with both zero ECF and OCF. The construction of the latter codes remains a challenge for researchers in the field of code design.
- Author(s): Dogan Yildiz and Serap Karagol
- Source: IET Communications, Volume 14, Issue 12, p. 1997 –2006
- DOI: 10.1049/iet-com.2019.1114
- Type: Article
- + Show details - Hide details
-
p.
1997
–2006
(10)
In this study, the audio transmission performance of some block coding methods in wavelet and non-wavelet cases is compared. For this purpose, a communication system has been established in the MATLAB environment for the transmission of the audio signal for 5 s. The comparison of the transmission performance of the block codes was performed separately in different parameters of additive white Gaussian noise, Rician and Rayleigh channels. At the same time, it is determined which discrete wavelet transform (DWT) family is suitable in terms of transmission performance for block coding methods and how DWT level affects transmission performance is investigated. Four DWT families at different levels were applied to the audio signal for linear block coding, Hamming, Cyclic, Bose–Chaudhuri–Hocquenghem, Reed–Solomon, encoded channels, and bit error rate and mean squared error performances were compared.
- Author(s): Alireza Baghaei Pouri and Mohammad Torabi
- Source: IET Communications, Volume 14, Issue 12, p. 2007 –2017
- DOI: 10.1049/iet-com.2019.1368
- Type: Article
- + Show details - Hide details
-
p.
2007
–2017
(11)
In this study, the physical layer (PHY) security performance of orthogonal space-time block coding (OSTBC) employing a coordinate interleaved orthogonal design (CIOD) is analysed and investigated using two metrics: average secrecy capacity and secrecy outage probability. It is shown that the CIOD system is superior than OSTBC in terms of secrecy outage probability. Closed-form expressions for PHY security metrics in OSTBC as well as CIOD are presented and compared. Then, an extended model of CIOD with arbitrary number of antennas is considered. Furthermore, the effects of artificial noise and imperfect channel estimation on PHY security of OSTBC and CIOD systems are investigated. The validity of theoretical expressions is verified by simulation, and it is shown that in practical cases the CIOD system has a better secrecy outage performance than that of the OSTBC system.
- Author(s): Enge Song ; Tian Pan ; Qiang Fu ; Rui Zhang ; Chenhao Jia ; Wendi Cao ; Tao Huang
- Source: IET Communications, Volume 14, Issue 12, p. 2018 –2026
- DOI: 10.1049/iet-com.2019.1229
- Type: Article
- + Show details - Hide details
-
p.
2018
–2026
(9)
The evaluation of the web-browsing quality of experience (QoE) is difficult to complete through traditional methods (e.g. deducing formulas or setting thresholds) due to the diversity of websites and their contents. To evaluate web-browsing QoE through a general way, the authors propose a web QoE evaluation architecture based on machine learning, consisting of two parts: traffic classification sub-system and QoE prediction sub-system. When evaluating user experience, traffic classification sub-system first classifies the packets generated by visiting a website into a flowthrough some fields in the packet header, to model each website separately. The traffic classification accuracy of packets over six websites reaches 96.63%. Then, in the network layer, the traffic metric cumulative traffic volume is generated from the size and arrival time of packets. When a user visits a web page, their regression model predicts the above-the-fold time (ATF) and thus QoE. The output of the regression model is an exact ATF value that is mapped to user experience. In addition, reversing input variables further improves the model, which is evaluated on two popular websites. The QoE prediction results of the improved method for 5400 visits are obtained within 0.0975 s, reaching 0.9 .
Ergodic capacity of antenna selection aided massive multi-user MIMO systems with imperfect CSI in correlated time-varying channels
Evidence-based dynamic radio resource allocation to mitigate inter cell interference employing cooperative communication
On the energy detection performance of multi-antenna correlated receiver for vehicular communication using MGF approach
DCRL-RPL: Dual context-based routing and load balancing in RPL for IoT networks
PKC-PC: A variant of the McEliece public-key cryptosystem based on polar codes
Joint resource optimisation in cell-free massive MIMO with low-resolution ADCs
Task allocation based on node pair intimacy in wireless sensor networks
Virtual user pairing based non-orthogonal multiple access in downlink coordinated multipoint transmissions
Spectral efficiency maximisation of full-duplex enabled relaying SWIPT system with successive interference cancellation and maximal ratio combining
Hopfield learning-based and non-linear programming methods for resource allocation in OCDMA networks
Availability modelling of terrestrial hybrid FSO/RF based on weather statistics from tropical region
FHCS: Hybridised optimisation for virtual machine migration and task scheduling in cloud data center
Slot-hitting ratio-based TDMA schedule for hybrid energy-harvesting wireless sensor networks
Machine learning-oriented resource allocation in C + L + S bands extended SDM–EONs
Baseline parity-check matrix for iterative soft-decision decoding of binary cyclic codes
Efficient localisation approach for WSNs using hybrid DA–FA algorithm
Adequate spreading codes to reduce MAI in quasi-synchronous MC-DS-CDMA system
Comparison of communication performance of block coding methods in different channels using DWT
Physical layer security in space-time block codes from coordinate interleaved orthogonal design
Threshold-oblivious on-line web QoE assessment using neural network-based regression model
Most viewed content
Most cited content for this Journal
-
A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things
- Author(s): Mohammad Kamrul Hasan ; Taher M. Ghazal ; Rashid A. Saeed ; Bishwajeet Pandey ; Hardik Gohel ; Ala’ A. Eshmawi ; S. Abdel‐Khalek ; Hula Mahmoud Alkhassawneh
- Type: Article
-
Compressive sensing-based coprime array direction-of-arrival estimation
- Author(s): Chengwei Zhou ; Yujie Gu ; Yimin D. Zhang ; Zhiguo Shi ; Tao Jin ; Xidong Wu
- Type: Article
-
Massive MIMO: survey and future research topics
- Author(s): Daniel C. Araújo ; Taras Maksymyuk ; André L.F. de Almeida ; Tarcisio Maciel ; João C.M. Mota ; Minho Jo
- Type: Article
-
Performance analysis of non-orthogonal multiple access in downlink cooperative network
- Author(s): Jinjin Men and Jianhua Ge
- Type: Article
-
Non-orthogonal multiple access schemes with partial relay selection
- Author(s): Sunyoung Lee ; Daniel Benevides da Costa ; Quoc-Tuan Vien ; Trung Q. Duong ; Rafael Timóteo de Sousa Jr.
- Type: Article