Journal of Communications, Volume 15 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



jump to

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 15, Number 1, January 2020

Mahammad A. Safwat:
Performance Evaluation of eICIC Scheme for Small Cell Data Offloading in Heterogeneous Cellular Network. 1-13

Fahd A. Alhaidari
, Ebtesam J. Alqahtani
:
Securing Communication between Fog Computing and IoT Using Constrained Application Protocol (CoAP): A Survey. 14-30

Jeong Gon Kim, Ho Kyung Yu:
Analysis and Comparison of VLC based Pulse Modulation in LiFi Enterprise Standard Environment. 31-37

Abdulwaheed Musa
, Babu Sena Paul:
Dust Particles' Permittivity in Microwave Signal Propagation: A Review. 38-44

S. Rajalakshmi, T. Shankar:
Comparative Analysis of Different NG-PON2 Protection Types Based on FDM. 45-57

Yeon-Gyu Park, Eun-Young Chang, Il-Kyoo Lee, Yan-Ming Cheng:
Analysis of Wi-Fi HaLow Device Interference to LTE User Equipment. 58-64

Afifah Dwi Ramadhani, Prima Kristalina, Amang Sudarsono:
A Weighted Geometric Dilution of Precision-Based Method for Indoor Positioning System. 65-73

Temitope O. Fajemilehin, Abid Yahya
, Kibet Langat
:
Improving Energy Detection in Cognitive Radio Systems Using Machine Learning. 74-80

Shigeto Tajima, Nobuo Funabiki, Teruo Higashino:
Application of IEEE802.11ac/n Link Throughput Estimation Model in Holding Access-Point Assignment Algorithm for Wireless Local-Area Network. 81-87

Salma M. Maher
, Ziad M. Ali, Sameh O. Abdellatif, Mohammad M. Abdellatif
:
Enhancing the Performance of 433 MHz Underwater WSN Using Handover Mechanisms. 88-94

Dmitry Kalistratov:
Image Compression as a Variation Calculus Task. 95-100

Juan Jesús Arenas
, Cesar Soto, Freddy Paz
:
Collaboration Study Case between the Industry and the University: Use of Lightgbm Algorithm for Data Analytics in the Execution History of Scheduled Routines (Job). 101-106

Fatima Sifou, Feda AlShahwan, Adra Hammoud, Mbarek Marwan, Ahmed Hammouch:
Implementing Policy Rules in Attributes Based Access Control with XACML within Cloud-Enabled IoT Environment. 107-112
Volume 15, Number 2, February 2020

Philippe Potier, Christophe Lavallée:
Real-time Iterative Pre-distortion in Commercial DVBS2X Satellite Modulator. 115-121

Saif Hikmat Mousa, Mahamod Ismail, Rosdiadee Nordin, Nor Fadzilah Abdullah:
Effective Wide Spectrum Sharing Techniques Relying on CR Technology toward 5G: A Survey. 122-147

Zhizhong Ding, Ke Cheng, Momiao Zhou, Tian Jiang, Xuewen Guo, Yinling Fu, Zechen Lin:
A MANET System Supporting TDMA and CSMA on One Commercial Network Card. 148-156

Muhammad Ali Jibran, Muhammad Tahir Abbas, Adeel Rafiq, Wang-Cheol Song:
Position Prediction for Routing in Software Defined Internet of Vehicles. 157-163

Yoshiaki Taniguchi
, Kansei Oki:
Simulation Study of Fish Counting by Multiple Scanning Sonars in a Fish Farm. 164-170

Olivier Bouchet, Dominic C. O'Brien, Ravinder Singh, Grahame E. Faulkner, Mir Ghoraishi, Jorge García-Márquez
, Guillaume Vercasson, Marcin Brzozowski, Vladica Sark:
European H2020 Project WORTECS Wireless Mixed Reality Prototyping. 171-177

Sakthibalan P., Devarajan K.:
Enhancing Secrecy Rate of UE with Dynamic Authentication and Access Control in 5G Communication Networks. 178-184

Peng Zhang
:
Research on Optimal Data Selection Technology of Optical Remote Sensing Satellite Images. 185-191

Wenquan Jin, Dohyeun Kim:
Interworking Proxy Based on OCF for Connecting Web Services and IoT Networks. 192-197

Efri Sandi, Rusmono, Aodah Diamah
, Karisma Vinda:
Ultra-wideband Microstrip Array Antenna for 5G Millimeter-wave Applications. 198-204

S. Merlin Gilbert Raj
, G. Josemin Bala, M. L. Merlin Sajin:
2D Discrete Cosine Transform Based Channel Estimation for Single User Millimeter Wave Communication System. 205-213

Subuh Pramono
, Eddy Triyono, Budi Basuki Subagio:
Performance of Leakage Based Precoding Scheme for Minimizing Interference. 214-220
Volume 15, Number 3, March 2020

Sophia Alami-Kamouri, Nabil Moukafih
, Ghizlane Orhanou, Said Elhajji:
Mobile Agent Security Based on Cryptographic Trace and SOS Agent Mechanisms. 221-230

Adeel Rafiq, Asif Mehmood
, Wang-Cheol Song:
Intent-Based Slicing between Containers in SDN Overlay Network. 237-244

Phan Duy Hung
, Vu Van Chin, Nguyen Thanh Chinh
, Ta Duc Tung:
A Flexible Platform for Industrial Applications Based on RS485 Networks. 245-255

Mustafa Maad Hamdi
, Lukman Audah, Sami AbdulJabbar Rashid, Sameer Alani
, Mohammad Abdulrahman Al-Mashhadani
, Ahmed Shamil Mustafa
:
Green Communication Networks Challenges, Opportunities and Future Role. 256-262

Vu Khanh Quy
, Le Ngoc Hung:
A Trade-off between Energy Efficiency and High-Performance in Routing for Mobile Ad hoc Networks. 263-269

Mamatha K. M., Kiran M.:
Firefly Algorithm for Self Organization of Mobile Wireless Sensor Network. 270-275

Farhan Ali
, Yigang He, Guolong Shi, Yongbo Sui, Huan Yuang:
Future Generation Spectrum Standardization for 5G and Internet of Things. 276-282

Soo Hyeong Kang, Jeong Gon Kim:
Spectrum Allocation with Power Controlin LBS Based D2D Cellular Mobile Networks. 283-288

Pendyala V. Muralidhar, S. K. Nayak, Trinath Sahu:
Implementation of Fractional Fourier Transform in Digital Filter Design. 289-302
Volume 15, Number 4, April 2020

Gaspard Gashema
, Dong-Seong Kim:
Optimal Sensing and Interference Suppression in 5G Cognitive Radio Networks. 303-308

Ivaylo Ivanov Atanasov
, Evelina Nikolova Pencheva
, Vladislav G. Vladislavov, Ventsislav G. Trifonov:
An Approach to Open Access to Multimedia Multicast Services at the Network Edge. 309-317

Alfin Hikmaturokhman, Ade Wahyudin
, Winda E. Rinanda, Subuh Pramono
, Arif Hidayat
, Annisa Sarah
:
Analysis of Microwave Network Design Using Back-to-Back Passive Repeaters with the Influence of Interference Based on ITU-T-G821 Standard. 318-324

Md. Mohsin Uddin
, Monica Yasmin, M. Saddam Hossain Khan, Md Istianatur Rahman, Tabassum Islam:
Detecting Bengali Spam SMS Using Recurrent Neural Network. 325-331

Sami AbdulJabbar Rashid, Lukman Audah, Mustafa Maad Hamdi
, Sameer Alani
:
Prediction Based Efficient Multi-hop Clustering Approach with Adaptive Relay Node Selection for VANET. 332-344

Rahul Kumar Verma
, Anubhav Kumar
, Ram Lal Yadava:
Compact Multiband CPW Fed Sub 6 GHz Frequency Reconfigurable Antenna for 5G and Specific UWB Applications. 345-349

Khaled M. Gharaibeh:
The Combined Effect of Various Receiver Nonlinearities on Spectrum Sensing in Cognitive Radio Systems. 350-358

Wella Edli Shabrina, Dodi Wisaksono Sudiharto, Endro Ariyanto
, Muhammad Al Makky
:
The Usage of CDN for Live Video Streaming to Improve QoS. Case Study: 1231 Provider. 359-366

Mohamed Ibrahiem El Hawary, Gihan Gomah Hamza
, Abdelhalim Zekry, Ibrahiem Mohamed Motawie:
FPGA Implementation of Tracking Phase of the GPS Receiver Using XSG. 367-371

Tuyen Phong Truong, Bernard Pottier:
An Approach of Concurrent Communications for Distributed Sensing Networks. 372-378
Volume 15, Number 5, May 2020

Marina Karmy, Shaimaa ElSayed
, Abdelhalim Zekry:
Performance Enhancement of an Indoor Localization System Based on Visible Light Communication Using RSSI / TDOA Hybrid Technique. 379-389

Masato Kikuchi, Takao Okubo:
Building Cyber Resilience through Polycentric Governance. 390-397

Mohd Aizat Mohd Yazid, Ahmad Jazlan, Mohd Zuhaili Mohd Rodzi, Muhammad Afif Husman, Abdul Rahman Afif, Hasan Firdaus M. Zaki, Deepak Kumar
:
Towards the Implementation of Energy Harvesting for IoT Sensor Nodes in an Early Warning Flood Detection System. 398-405

Rajendra Prasad P
, Shivashankar:
Energy Secured Intrusion Detection System and Analysis of Attacks for Mobile Ad-Hoc Networks. 406-414

Saif A. Khudhair, Mandeep Jit Singh:
Review in FBMC to Enhance the Performance of 5G Networks. 415-426

Arata Koike, Yoshiko Sueda:
Defining Quality of Services for Remotely Controlled Robotics Devices under Intermittent Communication Environment. 427-432

Ho Kyung Yu, Sung Hyun Oh, Jeong Gon Kim:
LBS Based Resource Allocation in Ultra-Dense Network with Joint COMP Scenarios. 433-438

Le Ngoc Hung, Vu Khanh Quy
:
A Review: Performance Improvement Routing Protocols for MANETs. 439-446

Krzysztof Hanzel
, Damian Grzechca
, Mateusz Tomczyk, Artur Marciniak:
Multifactorial Fuzzy Logic Distance Correction for UWB Positioning System. 447
Volume 15, Number 6, June 2020

Hatem A. Khater
, Ashraf Elsayed, Noha. El-Shoafy:
Improved Navigation and Guidance System of AUV Using Sensors Fusion. 455-468

Khaled Abdalgader
, Dinesh Kumar Saini
:
Data Streams Scheduling Approach for WiMAX Networks. 469-479

Maneenate Puongmanee, Teerapat Sanguankotchakorn:
General Multi-constrained QoS Routing Using Nonlinear Function and Weighted Metrics. 480-495

Alexander Warsewa
, Julia L. Wagner, Michael Böhm, Oliver Sawodny, Cristina Tarín:
Networked Decentralized Control of Adaptive Structures. 496-502

Eman Serag El Din, Mahammad A. Safwat:
A Novel Algorithm for Optimization of Mobile Network Performance with Self-Organized Network. 503-510

Krzysztof Paszek
, Damian Grzechca
, Mateusz Tomczyk, Artur Marciniak:
UWB Positioning System with the Support of MEMS Sensors for Indoor and Outdoor Environment. 511-518

Syifaul Fuada, Trio Adiono, Fuad Ismail, Erwin Setiawan:
Prototyping the Li-Fi System Based on IEEE 802.15.7 PHY.II.1 Standard Compliance. 519-527

N. Lavanya, T. Shankar:
Energy Efficient Cluster Head Selection Using Squirrel Search Algorithm in Wireless Sensor Networks. 528-536

Sabra A. Saleh, Megat F. Zuhairi, Hassan Dao:
A Comparative Performance Analysis of Manet Routing Protocols in Various Propagation Loss Models Using NS3 Simulator. 537-544
Volume 15, Number 7, July 2020

Zaid Mujaiyid Putra Ahmad Baidowi, Xiaoli Chu
:
An Optimal Energy Efficiency of a Two-tier Network in Control-Data Separation Architecture. 545-550

Halim Berradi, Ahmed Habbani, Nada Mouchfiq, Mohammed Souidi:
Improvement of OLSR Protocol Using the Hello Message Scheme Based on Neighbors Mobility. 551-557

Olusegun O. Omitola
, Viranjay M. Srivastava
:
An Improved Handover Algorithm for LTE-A Femtocell Network. 558-565

Saif H. Alrubaee
, Mahamod Ismail, Mohammed A. Altahrawi, Bara B. Burhan:
Filter Bank Multi-Carrier Modulation Technique for Vehicle-to-Vehicle Communication. 566-571

Khamla NonAlinsavath, Lukito Edi Nugroho, Widyawan, Kazuhiko Hamamoto
:
Indoor Location Tracking System Based on Android Application Using Bluetooth Low Energy Beacons for Ubiquitous Computing Environment. 572-576

Srinivas Samala
, Subhashree Mishra
, Sudhansu Sekhar Singh
:
Spectrum Sensing Techniques in Cognitive Radio Technology: A Review Paper. 577-582

Haider Mohammed Turki Al-Hilfi, Asaad S. Daghal
:
Effects of Varying LTE Link Budget Parameters on MAPL and Cell Range. 583-587

Fernando, Verrel Vadilan Rizky, Yohan, Ford Lumban Gaol, Tanty Oktavia:
The Designing the Smart Parking Finder. 588-595
Volume 15, Number 8, August 2020

Sonali Sen Baidya, Rattikorn Hewett:
Link Discovery Attacks in Software-Defined Networks: Topology Poisoning and Impact Analysis. 596-606

Jasem M. Alostad, Nizar Alkateeb
, Ebraheem Sultan, Hameed K. Ebraheem:
IOUT Enabled Underwater WSN Using Dynamic Adaptive Routing Protocol with Improved Reliability. 607-612

Efe Francis Orumwense, Khaled M. Abo-Al-Ez:
Exploiting TV White Spaces for Smart Grid Communications. 613-618

Farhad Sadeghi Almaloo, Majid Zarie, Mahdi Akbari Allah Abadi, Ghader Mohammadi Aghdash:
Investigation of Coded WOFDM System over Multimode Optical Channels. 619-625

Mert Eygi, Gunes Karabulut-Kurt
:
A Countermeasure against Smart Jamming Attacks on LTE Synchronization Signals. 626-632

Mohammed Ahmed Salem
, Azlan Bin Abdul Aziz, Mohamad Yusoff Alias
:
Cooperative Relay Transmission under Physical Layer Security for Non-Orthogonal Networks. 633-638

Katsuya Atsuta, Satoshi Kouya, Naoshi Sakamoto:
Performance of TCP CUBIC and TCP BBR on IEEE802.11s Mesh Network. 639-645

Bara B. Burhan, Mahamod Ismail, Mohammed A. Altahrawi, Saif H. Alrubaee
:
LTE-V2X System Performance Based on Urban-Low Speed Environment. 646-651
Volume 15, Number 9, September 2020

Lars Kintscher, Sebastian Lawrenz, Hendrik Poschmann
, Priyanka Sharma:
Recycling 4.0 - Digitalization as a Key for the Advanced Circular Economy. 652-660

Amin H. Al-Ka'bi
:
Effect of Polarization on the Performance of Adaptive Antenna Arrays. 661-668

Oleksi S. Bichkov, Volodymyr S. Nakonechnyi, Nataliia V. Lukova-Chuiko, Viktoriia V. Zhebka
, Galina S. Panayotova, Dimitar A. Dimitrov:
Measuring the Effectiveness of a Radio-Identification System. 669-675

Elias Khoza, Chunling Tu
, Pius A. Owolawi:
Decreasing Traffic Congestion in VANETs Using an Improved Hybrid Ant Colony Optimization Algorithm. 676-686

Haider Mohammed Turki Al-Hilfi, Muthanna Jaafar Abbas
:
LTE Capacity Estimation with Changing Different Planning Parameters. 687-692

Naga Raju Challa
, Kala Praveen Bagadi:
Design of Massive Multiuser MIMO System to Mitigate Inter Antenna Interference and Multiuser Interference in 5G Wireless Networks. 693-701

Jeong Gon Kim, Ho Kyung Yu:
Analysis of Pulse Modulation in LC Based Typical Indoor Environment. 702-707

Bara B. Burhan, Mahamod Ismail, Mohammed A. Altahrawi, Saif H. Alrubaee:
LTE-V2X System Performance Based on Urban-Low Speed Environment. 708-713
Volume 15, Number 10, October 2020

Khalid T. Mursi, Yu Zhuang:
Experimental Study of Component-Differentially-Challenged XOR PUFs as Security Primitives for Internet-of-Things. 714-721

Willian A. Dimitrov
, Galina S. Panayotova:
The Impacts of DNS Protocol Security Weaknesses. 722-728

Tengfei Hu, Zhenni Pan, Megumi Saitou, Jiang Liu, Shigeru Shimamoto:
A Triple-Band Antenna Loaded with Reflector Surface for WLAN and 5G Applications. 729-734

Mohammed M. Alani
, Muath Alrammal
, Munir Naveed
:
Implementing IoT Lottery on Data Encryption Standard. 735-740

Michael O'Sullivan
, Leonardo Aniello
, Vladimiro Sassone:
A Methodology to Select Topology Generators for Ad Hoc Mesh Network Simulations. 741-746

Minh Nguyen Hieu, Alexander Andreevich Moldovyan, Nikolay Andreevich Moldovyan, Canh Hoang Ngoc:
A New Method for Designing Post-Quantum Signature Schemes. 747-754

Matimu Caswell Nkuna
, Ebenezer Esenogho
, Reolyn Heymann:
Integrating Smartphone Network Architecture and Data Security Techniques to Mitigate Sharp Practices in Non-Profit Organizations. 755-767

Pushpender Sarao
:
Transmission Power Based Intelligent Model in VANET. 768-775
Volume 15, Number 11, November 2020

Wei Li
, William W. Guo:
The Experimental Study of Performance Impairment of Big Data Processing in Dynamic and Opportunistic Environments. 776-789

Andreas Ahrens, Christoph Lange, Jelena Zascerinska:
Energy Savings by Using Traffic Estimation for Dynamic Capacity Adaptation in Communication Network Operations. 790-795

Rahat Ullah, Hanif Ullah, Zubair Khalid, Hashim Safdar:
Irregular Geometry Based Sectored FFR Scheme for ICI Mitigation in Multicellular Networks. 796-807

Vinh Pham, Eunil Seo, Tai-Myoung Chung:
Lightweight Convolutional Neural Network Based Intrusion Detection System. 808-817

Dickson O. Egbune, Babatunde S. Adejumobi
, Isaac O. A. Omeiza, Frank Ayo Ibikunle
, Adeniyi Olayanju, Ayodele S. Oluwole, Thokozani Shongwe:
Low-complexity Detectors for Cyclic Structured Space-time Block Coded Spatial Modulation over a Slow Rayleigh Fading Channel. 818-825

Jicheng Dong, Wei Zhang, Bowen Yang, Xihong Sang:
WSDSBL Method for Wideband Channel Estimation in Millimeter-Wave MIMO Systems with Lens Antenna Array. 826-832

Elliot O. Omoru, Viranjay M. Srivastava
:
MOSFET Based Absorber for Reflected Signal in 5G Massive MIMO Base Station - A Circuit Perspective. 833-840

Hao Duc Do
, Tran Thai Son, Duc Thanh Chau
:
Speech Separation in the Frequency Domain with Autoencoder. 841-848
Volume 15, Number 12, December 2020

Saif Hikmat Mousa, Mahamod Ismail, Rosdiadee Nordin, Nor Fadzilah Abdullah:
Enhanced Channels Access Methods in HetBands for Single and Multi-RAT Femtocell Networks. 849-865

Virginia Chika Ebhota, Viranjay M. Srivastava
:
An Adaptive Vector Median Filtering Approach to Enhance the Prediction Efficiency of Signal Power Loss. 866-875

Natthanan Promsuk, Attaphongse Taparugssanagorn
:
Long Short Term Memory Network-based Interference Recognition for Industrial Internet of Things. 876-885

Sylvester J. Udoh, Viranjay M. Srivastava
:
Analytical Modeling of Radio Network Performance for 5G (Non-Standalone) and It's Network Connectivity. 886-895

Mustafa Maad Hamdi
, Lukman Audah, Sami AbdulJabbar Rashid, Mahmood Al Shareeda:
Techniques of Early Incident Detection and Traffic Monitoring Centre in VANETs: A Review. 896-904

Wageda Ibrahim El Sobky, Ahmed R. Mahmoud, Ashraf S. Mohra, Talaat A. Elgarf:
Enhancing Hierocrypt-3 Performance by Modifying Its S-Box and Modes of Operations. 905

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






