EURASIP Journal on Wireless Communications and Networking

http://link.springer.com/journal/13638

List of Papers (Total 3,289)

Research on perception bias of implementation benefits of urban intelligent transportation system based on big data

Providing convenient and comfortable transportation services for residents is an important part of urban construction, in which the intelligent transportation system (ITS) plays an important role. This study used the big data of urban public transportation in China and the evaluation of ITS in tourism e-commerce website to compare travelers’ perception of urban intelligent...

Outdoor location tracking of mobile devices in cellular networks

This paper presents a technique and experimental validation for anonymous outdoor location tracking of all users residing on a mobile cellular network. The proposed technique does not require any intervention or cooperation on the mobile side but runs completely on the network side, which is useful to automatically monitor traffic, estimate population movements, or detect...

Reliability enhancement in multi-numerology-based 5G new radio using INI-aware scheduling

Multi-numerology waveform-based 5G new radio (NR) systems offer great flexibility for different requirements of users and services. However, there is a new type of problem that is defined as inter-numerology interference (INI) between multiple numerologies. This paper proposes novel scheduling and resource allocation techniques to enhance the overall reliability and also provide...

A routing algorithm for region division based on virtual spider web model

A disjoint multipath routing algorithm based on region division is proposed to resolve problems such as potential “hot area” around the sink node and path instability caused by frequent movement of routing nodes in the mobile wireless sensor network. This paper first improves the regional division model of the whole network by learning from the predation of spiders, and increases...

Station green lighting system based on sensor network

Aiming at the problems of high energy consumption, chaotic lines, and inconsistent lighting sources in many stations, this paper presents a simple, reliable, and convenient station green lighting system based on sensor network. According to the arrival and departure time of the train, the lighting equipment of the corresponding track is automatically closed, which saves the power...

Delay constrained throughput optimization in multi-hop AF relay networks, using limited quantized CSI

In this paper, we analyze the throughput of multi-hop amplify and forward (AF) relay networks in delay-constrained scenario. Using quantized channel state information (CSI), the transmission rates and powers are discretely adapted with individual average power constraint on each node. A sub-gradient projection-based algorithm is utilized, by which there is no need for probability...

On muting mobile terminals for uplink interference mitigation in HetNets—system-level analysis via stochastic geometry

We investigate the performance of a scheduling algorithm where the mobile terminals (MTs) may be turned off if they cause a level of interference greater than a given threshold. This approach, which is referred to as interference aware muting (IAM), may be regarded as an interference-aware scheme that is aimed to reduce the level of interference. We analyze its performance with...

Authentication of satellite navigation signals by wiretap coding and artificial noise

In order to combat the spoofing of global navigation satellite system (GNSS) signals, we propose a novel signal authentication method based on information-theoretic security. In particular, the satellite superimposes to the navigation signal an authentication signal containing a secret authentication message corrupted by artificial noise (AN). We impose the following properties...

Performance analysis of bi-directional relay selection strategy for wireless cooperative communications

This paper proposes a new two-way double-relay selection strategy for wireless cooperative communication systems with its bit error rate (BER) performance analysis. In this work, two relays are first chosen to maximize the overall system performance in terms of BER. Then, either the two-phase or three-phase protocol is performed to achieve two-directional communications between...

Design and implementation of AD9361-based software radio receiver

Existing software radio platforms constructed by discrete devices have many disadvantages, such as high power consumption, high cost, and poor portability. In this study, an AD9361-based software radio communication system was designed on the basis of the zero-IF bandpass sampling software radio structure to solve the poor universality and expansibility problem of traditional...

Realistic propagation effects on wireless sensor networks for landslide management

This paper presents the development of propagation models for wireless sensor networks for landslide management systems. Measurements of path loss in potential areas of landslide occurrence in Thailand were set up. The effect of the vegetation and mountain terrain in the particular area was therefore taken into account regarding the measured path loss. The measurement was carried...

LSH-based private data protection for service quality with big range in distributed educational service recommendations

Service recommendation has become a promising way to extract useful or valuable information from big educational data collected by various sensors and distributed in different platforms. How to protect the private user data in each cluster during recommendation processes is an interesting but challenging problem in the educational domain. A locality-sensitive hashing (LSH...

Utilization and load balancing in fog servers for health applications

With the evolution of fog computing, processing takes place locally in a virtual platform rather than in a centralized cloud server. Fog computing combined with cloud computing is more efficient as fog computing alone does not serve the purpose. Inefficient resource management and load balancing leads to degradation in quality of service as well as energy losses. Traffic overhead...

Friend and POI recommendation based on social trust cluster in location-based social networks

Friend and point-of-interest (POI) recommendation are two primary individual services in location-based social networks (LBSNs). Major social platforms such as Foursquare and Instagram are all capable of recommending friends or POIs to individuals. However, most of these social websites make recommendations only based on similarity, popularity, or geographical influence; social...

Secure-MQTT: an efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for internet of things

The advancements in the domain of Internet of Things (IoT) accelerated the development of new communication technologies. Machine to machine communication in IoT is accomplished with application protocols such as the Constrained Application Protocol and Message Queuing Telemetry Transport (MQTT). The openness of these protocols leads to various types of attacks including DoS...

Fast compression of OFDM channel state information with constant frequency sinusoidal approximation

We propose CSIApx, a very fast and lightweight method to compress the channel state information (CSI) of Wi-Fi networks. CSIApx approximates the CSI vector as the linear combination of a small number of base sinusoids on constant frequencies and uses the complex coefficients of the base sinusoids as the compressed CSI. While it is well-known that the CSI vector can be represented...

Quantitative social relations based on trust routing algorithm in opportunistic social network

The trust model is widely used in the opportunistic social network to solve the problem of malicious nodes and information flooding. The previous method judges whether the node is a cooperative node through the identity authentication, forwarding capability, or common social attribute of the destination node. In real applications, this information does not have integrity and does...

An algorithm for jamming strategy using OMP and MAB

Reinforcement learning (RL) has the advantage of interaction with an environment over time, which is helpful in cognitive jamming research, especially in an electronic warfare-type scenario, in which the communication parameters and jamming effect are unknown to a jammer. In this paper, an algorithm for a jamming strategy using orthogonal matching pursuit (OMP) and multi-armed...

Holographic detection of AIS real-time signals based on sparse representation

To use the existing Automatic Identification System (AIS) shore stations for positioning so that the AIS can be used as an additional land-based positioning system for coastal vessels is a cutting-edge research topic, responding to the call of the International Maritime Organization (IMO). In order to use the ship-borne AIS for positioning function, a holographic detection of AIS...

Cyclostationarity-based DOA estimation algorithms for coherent signals in impulsive noise environments

Estimating direction of arrival (DOA) is important in a variety of practical applications. Conventional cyclostationarity-based coherent DOA estimation algorithms are not robust to non-Gaussian α-stable impulsive noise. Additionally, fractional lower-order statistics (FLOS)-based algorithms are tolerant to impulsive noise; however, they experience performance degradation for...

Recommendation algorithm based on user score probability and project type

The interaction and sharing of data based on network users make network information overexpanded, and “information overload” has become a difficult problem for everyone. The information filtering technology based on recommendation could dig out the needs and hobbies of users from the historical behavior, historical data, and social network and filter out useful resource for users...

Performance bottleneck analysis and resource optimized distribution method for IoT cloud rendering computing system in cyber-enabled applications

This paper analyzes current cloud computing, cloud rendering industry, and related businesses. In this field, cloud system performance lacks unified evaluation criterion. A novel analysis method and a related measure of cloud rendering system performance are presented in this paper. The main paper investigates the number of system concurrent users and average response delay about...

Frequency-domain subcarrier diversity receiver for discrete Hartley transform OFDM systems

In recent years, there has been an increasing interest in the use of the discrete Hartley transform (DHT) for orthogonal frequency-division multiplexing (OFDM). Previous studies have not reported an improvement in bit error rate (BER) when using a DHT-based OFDM without substantial complexity increase due to the fact that the DHT cannot diagonalize a circulant channel matrix but...

A novel dynamic reputation-based source routing protocol for mobile ad hoc networks

Abstract Routing in mobile ad hoc networks is based on the cooperation of the network’s nodes. The presence of selfish nodes that do not cooperate in this task drastically reduces the number of delivered packets. In order to find the better paths that include nodes willing to cooperate, we propose a new routing algorithm based on the reputation of the nodes. In our proposal, each...