Skip to main content

Articles

Page 25 of 86

  1. With the popularization of smartphones, they have become the main target of malicious applications. In recent years, malware has become a major threat to Android smartphones. Detection for malicious applicatio...

    Authors: Xue Li Hu, Lian Cheng Zhang and Zhen Xing Wang
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:148
  2. Due to the limitation of battery power, processing capacity, and storage, the sensor nodes are easy to be captured, destroyed, or attacked in an open environment. As a result, the security and reliability of d...

    Authors: Yongmei Wang, Min Zhang and Wanneng Shu
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:145
  3. The liquid film damping is one of the main technology for the aerospace, navigation, and machine tool. However, the research on the fine boring is very limited. The paper set up the fine boring squeezed liquid...

    Authors: Qiang Shao, Dong Wang, Ping-shu Ge and Le Wang
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:144
  4. In order to strengthen the scientific management of saline-alkali land and the accurate management of agricultural production, a scientific data governance platform for saline-alkali land was developed. Based ...

    Authors: Maoling Yan, Pingzeng Liu, Fujiang Wen, Chao Zhang, Rui Zhao, Weijie Chen, Xuefei Liu and Yuqi Liu
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:143
  5. Next generation 5G cellular networks are envisioned to accommodate an unprecedented massive amount of Internet of things (IoT) and user devices while providing high aggregate multi-user sum rates and low laten...

    Authors: Sahar Imtiaz, Georgios P. Koudouridis, Hadi Ghauch and James Gross
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:142
  6. In cellular networks, each mobile station adjusts its power level under control of its base station, i.e., through uplink transmit power control, which is essential to reach desired signal-to-interference-plus...

    Authors: Prasanna Herath, Chintha Tellambura and Witold A. Krzymień
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:141
  7. Wireless communication with no range and bandwidth limitations is desired for coordination and information sharing among multiple robots. However, the perfect communication is not available for a few of reason...

    Authors: Xuefeng Dai, Zheping Yan, Jianqi Zhao and Dahui Li
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:140
  8. To predict the scope of support pressure zone in coal mining, this paper focuses on analysis over the features of stress transformation in front of the working face. Based on the fuzzy neural network (FNN) dam...

    Authors: Jianyang Yu and Yuanhui Li
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:139
  9. In a 5G ultra-dense network, dynamic network topology and traffic patterns lead to excessive system overhead and complex radio resource conflicts. The cloud radio access network and the fog computing have the ...

    Authors: Zengxian Chen, Sai Zou, Yuliang Tang, Xiaojiang Du and Mohsen Guizani
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:137
  10. Achieving the fifth-generation (5G) vision will introduce new technology innovations and substantial changes in delivering cutting-edge applications and services in current mobile and cellular networks. The Cl...

    Authors: Dimitrios Pliatsios, Panagiotis Sarigiannidis, Sotirios Goudos and George K. Karagiannidis
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:136
  11. Proxy Mobile IPv6 (PMIPv6) has become a credible member of pertinent research areas. This is attributed mainly to its capability of enabling mobility without imposing constraints or requirements on the mobile ...

    Authors: Safwan M. Ghaleb, Shamala Subramaniam, Zuriati Ahmad Zukarnain and Abdullah Muhammed
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:135

    The Correction to this article has been published in EURASIP Journal on Wireless Communications and Networking 2018 2018:260

  12. Industrial wireless sensor networks (IWSNs) have been widely used in many application scenarios, and data collection is an extremely significant part of IWSNs. Moreover, a mobile sink is widely used in industr...

    Authors: Chuan Zhu, Xiaohan Long, Guangjie Han, Jinfang Jiang and Sai Zhang
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:134
  13. Space-division multiple access (SDMA) utilizes linear precoding to separate users in the spatial domain and relies on fully treating any residual multi-user interference as noise. Non-orthogonal multiple access (...

    Authors: Yijie Mao, Bruno Clerckx and Victor O.K. Li
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:133
  14. To satisfy the rapidly growing requirements of wireless data services recently, fog computing which is as an extension of cloud computing is proposed for offloading the Internet of Things (IoT) data services a...

    Authors: Junjie Yan, Dapeng Wu, Chenlu Zhang, Honggang Wang and Ruyan Wang
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:132
  15. When wireless power transfer (WPT) technology is used to power the sensor networks, it is necessary to increase the transmission power and distance. We strictly deduced two necessary conditions for strong coup...

    Authors: Xian Zhang, Hao Meng, Bin Wei, Songcen Wang and Qingxin Yang
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:131
  16. Moving vehicles have been sensing all kinds of data on the road in which multimedia data possesses a large portion. These data is often forwarded to vehicles in a region of interest or the monitoring center in...

    Authors: Peng Liu, Yue Ding, Tingting Fu, Xingfa Shen and Jianjiang Li
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:130
  17. In this paper, a novel approach towards optimizing users’ rate allocation and price customization in a non-orthogonal multiple access (NOMA) wireless network under quality of service (QoS)-differentiated reque...

    Authors: Panagiotis Vamvakas, Eirini Eleni Tsiropoulou and Symeon Papavassiliou
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:129
  18. Due to the lack of centralized identity management and the broadcast nature of wireless ad hoc networks, identity attacks are always tempting. The attackers can create multiple illegitimate (arbitrary or spoof...

    Authors: Mohammad Faisal, Sohail Abbas and Haseeb Ur Rahman
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:128
  19. The effective classification methods of the small target objects in the no-fly zone are of great significance to ensure safety in the no-fly zone. But, due to the differences of the color and texture for the s...

    Authors: Yu Chen, Hongbing Meng, Xinling Wen, Pengge Ma, Yuxin Qin, Zhengxiang Ma and Zhaoyu Liu
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:127
  20. This paper investigates decoupled beamforming techniques for the distributed multi-input multi-output (MIMO) two-way relay networks (TWRN) with imperfect channel state informations (CSIs). The objective of thi...

    Authors: Wei Duan, Xiaojun Zhu, Li Jin, Wei Wang, Guoan Zhang and Jeaho Choi
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:126
  21. In view of the problems existing in the processing of duck products, such as complicated technology, difficulties in information collection and information linkage, and lack of dedicated information collection...

    Authors: Lining Liu, Pingzeng Liu, Fujiang Wen, Chao Zhang, Rui Zhao, Maoling Yan and Xueru Yu
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:124
  22. A new demapper is presented for communication channels that can be modeled with data-dependent noise on the received symbols. This includes optical and satellite channels with various types of distortion. The ...

    Authors: Kelvin J. Layton, Azam Mehboob, William G. Cowley and Gottfried Lechner
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:123
  23. The rapid growth of traffic demands has posed challenges and difficulties on both the radio access networks (RANs) and the backhaul links. While heterogeneous networks (HetNets) are expected to offer diverse r...

    Authors: Qianbin Chen, Hong Chen, Rong Chai and Dongmei Zhao
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:122
  24. The MAC (medium access control) of CSMA (carrier sense multiple access) is widely used in distributed wireless networks with random node locations. In CSMA MAC, two nodes that are within the range of one anoth...

    Authors: Yuhong Sun, Ruinian Li, Honglu Jiang, Jianchao Zheng and Lina Ni
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:121
  25. With the development of SDN, end-to-end network reservation becomes a reality. Resource reservation can become an online service for network users, and the network faces new challenges on how to allocate users...

    Authors: Rongheng Lin and Zezhou Ye
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:120
  26. A comprehensive framework for design of hexagonal cellular network system in terms of spatial spectral and energy efficiencies is presented. The communication environment in the system is assumed to be Nakagami-m

    Authors: Abdulbaset M. Hamed and Raveendra K. Rao
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:118
  27. Lightweight block ciphers play an indispensable role for the security in the context of pervasive computing. However, the performance of resource-constrained devices can be affected dynamically by the selectio...

    Authors: Chao Pei, Yang Xiao, Wei Liang and Xiaojia Han
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:117
  28. Wireless sensor is an important part of the Internet of Things, which uses solar cells as power supply. Therefore, it is of great significance to study the characteristics of solar cells. In this paper, a new ...

    Authors: Li Cai, Nina Dai and Zefu Tan
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:116
  29. Downlink channel state information (CSI) is critical in a frequency division duplexing (FDD) massive multiple-input multiple-output (MIMO) system. We exploit the reciprocity between uplink and downlink channel...

    Authors: Wei Lu, Yongliang Wang, Qiqing Fang and Shixin Peng
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:115
  30. We propose and analyze minimum selection-generalized selection combining (MS-GSC) at secondary receiver (SR) with maximal ratio combining at eavesdropper (ER) to enhance data security at physical layer. We con...

    Authors: Shilpa Thakur and Ajay Singh
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:114
  31. In order to improve the effectiveness of intrusion detection, an intrusion detection method of the Internet of Things (IoT) is proposed by suppressed fuzzy clustering (SFC) algorithm and principal component an...

    Authors: Liqun Liu, Bing Xu, Xiaoping Zhang and Xianjun Wu
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:113
  32. With the continuous development of satellite navigation, how to make full use of the compatibility and interoperability among the four constellations deserves our deep thinking. Signal acquisition is a critica...

    Authors: Chengjun Guo, Bingyan Xu and Zhong Tian
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:112
  33. A social network is a social structure with a set of social actors and other social interactions between actors. The social network supports a set of methods to explain the structure of whole social entities a...

    Authors: Hongyan Li, Xixi Mao, Chunxue Wu and Fan Yang
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:109
  34. To solve the security problem of industrial Ethernet DNP3 protocol broadcast authentication, the attack vector and security requirements of trusted DNP3 protocol are analysed. First, the paper adopts a trusted...

    Authors: Ye Lu and Tao Feng
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:108
  35. This paper proposes a novel algorithm based on cloud model granulation (CMG) for air quality forecasting. Through data exploration of three different types of monitoring localities in Wuhan City, the determina...

    Authors: Yi Lin, Long Zhao, Haiyan Li and Yu Sun
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:106
  36. In recent years, information retrieval technology is widely used in the medical industry. How to effectively retrieve electronic medical record has become a hot issue in the field of information retrieval. Med...

    Authors: Lijuan Diao, Hong Yan, Fuxue Li, Shoujun Song, Guohua Lei and Feng Wang
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:105
  37. A joint radar and wireless communication (RadCom) fusion system is an important trend for future intelligent transportation, such as the Internet of Vehicles (IOV). However, traditional joint orthogonal freque...

    Authors: Yixuan Huang, Su Hu, Shiyong Ma, Qu Luo, Dan Huang, Yuan Gao and Rong Shi
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:104
  38. Traditionally, mobile ad hoc networks (MANET) and hybrid optical-wireless networks, also known as fiber-wireless (FiWi), have been considered disjointly and independently, with no synergic management solutions...

    Authors: Paolo Bellavista, Carlo Giannelli, Thomas Lagkas and Panagiotis Sarigiannidis
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:103
  39. Due to the limited energy of the sensor nodes, the unreasonable clustering routing algorithm will cause node premature death and low utilization of energy efficiency in wireless sensor network (WSN). In Adapti...

    Authors: Jinyu Ma, Shubin Wang, Chen Meng, Yanhong Ge and Jingtao Du
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:102
  40. Reasonable scheduling of flexible job shop is key to improve production efficiency and economic benefits; in order to solve the problem in flexible job shop scheduling problem, a novel flexible job shop schedu...

    Authors: Rui Zeng and Yingyan Wang
    Citation: EURASIP Journal on Wireless Communications and Networking 2018 2018:101

Who reads the journal?

Learn more about the impact the EURASIP Journal on Wireless Communications and Networking has worldwide

Annual Journal Metrics

  • 2022 Citation Impact
    2.6 - 2-year Impact Factor
    2.5 - 5-year Impact Factor
    1.098 - SNIP (Source Normalized Impact per Paper)
    0.985 - SJR (SCImago Journal Rank)

    2023 Speed
    23 days submission to first editorial decision for all manuscripts (Median)
    157 days submission to accept (Median)

    2023 Usage 
    1,226,841 downloads
    99 Altmetric mentions 

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here