Skip to main content

Articles

Page 1 of 82

  1. With the continuous development of mobile edge computing and the improvement of unmanned vehicle technology, unmanned vehicle could handle ever-increasing demands. As a significant application of unmanned vehi...

    Authors: Yu Li, Haonan Feng, Zhankui Peng, Li Zhou and Jian Wan
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:56
  2. With the boom in 5G technology, mobile spatial crowdsourcing has shown great dynamism in industrial mobile communications and edge computing node management. But the traditional crowdsourcing system is not adv...

    Authors: Weize Xu, Hongyue Duan, Xiao Chen, Jie Huang, Deyong Liu and Yichao Chen
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:55
  3. Outsourcing data on cloud storage services has already attracted great attention due to the prospect of rapid data growth and storing efficiencies for customers. The coding-based cloud storage approach can off...

    Authors: Nastaran Chakani, Seyed Masoud Mirrezaei and Ghosheh Abed Hodtani
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:54
  4. Studies on the checked-in point-of-interests have become an important means to learn user’s behavior. Nevertheless, users do not sign in to all visited locations. There are unobserved check-in locations in the...

    Authors: Jun Zeng, Yizhu Zhao, Yang Yu, Min Gao, Wei Zhou and Junhao Wen
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:53
  5. Classification is a fundamental processing task in advanced network systems. This technique is exploited in 5G/6G wireless sensors networks where flow-based processing of the internet packets is highly demande...

    Authors: Mahdi Abbasi, Shobeir Vakilian, Shakoor Vakilian, Mohammad R. Khosravi and Hatam Abdoli
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:52
  6. Forward error correction using soft probability estimates is a central component in modern digital communication receivers and impacts end-to-end system performance. In this work, we introduce EQ-Net: a deep l...

    Authors: Marius Arvinte, Sriram Vishwanath, Ahmed H. Tewfik and Jonathan I. Tamir
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:51
  7. Mobile edge computing (MEC) is considered as a key enabler for the industrial internet of things (IIoT) to cope with the ever-increasing communication and computing demands of nodes. In consideration of the li...

    Authors: Wenjun Huang, Xu Li and Yanan Liang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:50
  8. In a FSS-OFDMA, the OFDM symbol is spread, and the subcarriers are assigned for each user in the frequency band. As the principal subcarrier allocation for each user, localized and interleaved allocations have...

    Authors: Yuta Ida and Takahiro Matsumoto
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:49
  9. Blockchain is a distributed database method of storing electronic information in digital form that makes it challenging to transform, hack, or rogue the system. Each time a new operation transpires on the Bloc...

    Authors: Usman Tariq
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:47
  10. Capacity, reliability, and latency are seen as key requirements of new emerging applications, namely vehicle-to-everything (V2X) and machine-type communication in future cellular networks. D2D communication is...

    Authors: Dariush Moahammad Soleymani, Mohammad Reza Gholami, Giovanni Del Galdo, Jens Mueckenheim and Andreas Mitschele-Thiel
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:46
  11. High speed and low latency have become the development trend of mobile communication network. Orthogonal frequency division multiplexing (OFDM) technology has become the key technology of mobile communication ...

    Authors: Qun Wu, Xiao Zhou, Chengyou Wang and Hai Cao
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:45
  12. This paper considers secure communication in buffer-aided cooperative wireless networks in the presence of one eavesdropper, which can intercept the data transmission from both the source and relay nodes. It i...

    Authors: Jiayu Zhou, Deli Qiao and Haifeng Qian
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:44
  13. The current level of development of the cellular services market, qualitative changes in the means and methods of providing services, and the increased volume and diversity of information circulating in cellul...

    Authors: Jamil S. Al-Azzeh, Roman Odarchenko, Anastasiia Abakumova and Serhii Bondar
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:43
  14. Dangerous driving, e.g., using mobile phone while driving, can result in serious traffic problem and threaten to safety. To efficiently alleviate such problem, in this paper, we design an intelligent monitorin...

    Authors: J. H. Jixu Hou, Xiaofeng Xie, Qian Cai, Zhengjie Deng, Houqun Yang, Hongnian Huang, Xun Wang, Lei Feng and Yizhen Wang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:42
  15. Nowadays, the increasingly complex and changeable marine environment makes the signals received by the underwater sensing equipment not only contain the weak signals radiated by underwater targets but also acc...

    Authors: Hanwen Zhang, Zhen Qin, Yichao Zhang, Dajiang Chen, Ji Gen and Hao Qin
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:41
  16. Medical data involves a large amount of personal information and is highly privacy sensitive. In the age of big data, the increasing informatization of healthcare makes it vital that medical information is sto...

    Authors: Zhijie Sun, Dezhi Han, Dun Li, Xiangsheng Wang, Chin-Chen Chang and Zhongdai Wu
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:40
  17. Network intrusion detection, which takes the extraction and analysis of network traffic features as the main method, plays a vital role in network security protection. The current network traffic feature extra...

    Authors: Ming Li, Dezhi Han, Dun Li, Han Liu and Chin-Chen Chang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:39
  18. Noise and interference are the two most common and basic problems in wireless communication systems. The noise in wireless communication channels has the characteristics of randomness and impulsivity, so the p...

    Authors: Rui Wang, Yi Wang, Yanping Li and Wenming Cao
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:38
  19. Unsupervised federated domain adaptation uses the knowledge from several distributed unlabelled source domains to complete the learning on the unlabelled target domain. Some of the existing methods have limite...

    Authors: Bin Wang, Gang Li, Chao Wu, WeiShan Zhang, Jiehan Zhou and Ye Wei
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:37
  20. Low earth orbit (LEO) satellite communication networks require huge load capacity and information processing speed to carry global communication traffic. Inter-satellite links and the on-board processing are t...

    Authors: Fei Zheng, Chao Wang, Zou Zhou, Zhao Pi and Dongyan Huang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:36
  21. With the development of artificial intelligence, the large-scale access of intelligence equipment with complex heterogeneity will bring unpredictable spectrum limitation and complex interferences to traditiona...

    Authors: Xin Wang, He Pan and Ying Shi
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:35
  22. In multiple users (MU) multiple input multiple output (MIMO) systems, the non-orthogonal multiple access (NOMA) method can provide multiple access. However, a spectrum efficiency of NOMA method is restricted b...

    Authors: Nguyen Thu Phuong, Vu Van Son and Pham Thanh Hiep
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:34
  23. In fast-fading scattering environments such as high-speed rail and low-altitude communications, mobile communication systems need to quickly and robustly estimate and equalize fast-fading, time-varying channel...

    Authors: Shuaijun Li, Hongbing Qiu, Lin Zheng and Chao Yang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:33
  24. The term Block Turbo Code typically refers to the iterative decoding of a serially concatenated two-dimensional systematic block code. This paper introduces a Vector Turbo Code that is irregular but with code ...

    Authors: Abiodun O. Sholiyi and Timothy O’Farrell
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:32
  25. The financial industry is a key to promoting the development of the national economy, and the risk it takes is also the largest hidden risk in the financial market. Therefore, the risk existing in the current ...

    Authors: Tao Liu and Zhongyang Yu
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:31
  26. The copy-move forgery refers to the copying and pasting of a region of the original image into the target region of the same image, which represents a typical tampering method with the characteristics of easy ...

    Authors: Wujian Ye, Qingyuan Zeng, Yihang Peng, Yijun Liu and Chin-Chen Chang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:30
  27. Next location prediction has recently gained great attention from researchers due to its importance in different application areas. Recent growth of location-based service applications has vast domain influenc...

    Authors: Ayele Gobezie Chekol and Marta Sintayehu Fufa
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:29
  28. In recent years, information security has become a prime issue of worldwide concern. To improve the validity and proficiency of the image data hiding approach, a piece of state-of-the-art secret information hi...

    Authors: Yung-Hui Li, Ching-Chun Chang, Guo-Dong Su, Kai-Lin Yang, Muhammad Saqlain Aslam and Yanjun Liu
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:28
  29. Effective symbol detection, channel estimation and decoding of channel codes require an accurate characterization of the noise probability distribution. In many systems, notably the internet of things, noise i...

    Authors: Ce Zheng, Malcolm Egan, Laurent Clavier, Gareth W. Peters and Jean-Marie Gorce
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:27
  30. Motivated by the practical supply chain management of the automobile industry, we study the car sequencing problem (CSP) that minimizes the conflicts occur when sequentially manufacturing cars on an assembly l...

    Authors: Yingjie Yu, Xiaochun Lu, Tao Zhao, Minjiao Cheng, Lin Liu and Wenchao Wei
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:26
  31. Rely on powerful computing resources, a large number of internet of things (IoT) sensors are placed in various locations to sense the environment we live. However, the proliferation of IoT devices has led to t...

    Authors: Quan Zhou, Ronghui Zhang, Fangpei Zhang and Xiaojun Jing
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:25
  32. In the information age, network security has gradually become a potentially huge problem, especially in the medical field, it is essential to ensure the accuracy and safety of images, and patient information n...

    Authors: Tianfu Li, Jingbing Li, Jing Liu, Mengxing Huang, Yen-Wei Chen and Uzair Aslam Bhatti
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:24
  33. In the field of Internet-of-Things (IoT), how to enhance the computation capacity and prolong the life span of massive smart IoT nodes is becoming a more practically important but challenging problem. In this ...

    Authors: Chuangming Zheng and Wengang Zhou
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:23
  34. Data-driven based deep learing has become a key research direction in the field of artificial intelligence. Abundant training data is a guarantee for building efficient and accurate models. However, due to the...

    Authors: Ning Wei, Longzhi Wang, Guanhua Chen, Yirong Wu, Shunfa Sun and Peng Chen
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:22
  35. In the context of big data, the exploration of the application effect of machine learning in intelligent encryption for real-time image text digital information aims to improve the privacy information security...

    Authors: Liang Liu, Melody Gao, Yong Zhang and Yuxiang Wang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:21
  36. With the advent of information era, the issues on video copyright continue to emerge. In the grey industrial chain of piracy, the film industry is suffering a major disaster area. The current protection scheme...

    Authors: Xiangqi Wu, Peng Ma, Zihan Jin, Yuxuan Wu, Wenbao Han and Wei Ou
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:20
  37. One of the most significant study directions is node positioning in wireless sensor networks (WSNs). Because the existing RSSI-based triangle centroid localization technique is susceptible to the surrounding e...

    Authors: Mao Li, Feng Jiang and Cong Pei
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:19
  38. A multiple clustering algorithm based on high-dimensional automatic identification system (AIS) data is proposed to extract the important waypoints in the ship’s navigation trajectory based on selected AIS att...

    Authors: Feiyang Ren, Yi Han, Shaohan Wang and He Jiang
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:18
  39. The three-dimensional target position is vital to automatic driving, which can efficiently detect the geometrical shape of obstacles and achieve automatic environment recognition for both indoor and outdoor sc...

    Authors: Wei Shi, Zuhao Chen, Kun Zhao, Wei Xi, Yuhang Qu, Hui He, Zhenge Guo, Zhe Ma, Xuhui Huang, Peng Wang, Bo Dong and Jizhong Zhao
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:17
  40. The internet of things is a disruptive technology that has been applied as a solution to problems in many fields of monitoring environmental variables. It is supported by technologies such as wireless sensor n...

    Authors: Piñeres-Espitia Gabriel, Shariq Aziz Butt, Estévez-Ortiz Francisco, Cama-Pinto Alejandro and Yassine Maleh
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:16
  41. According to data from the Earth's Volcano and Geological Disaster Reduction Center, a country like Indonesia has experienced many natural disasters, one of which is flooding. Floods are an annual natural disa...

    Authors: Wen-Tsai Sung, Ihzany Vilia Devi and Sung-Jung Hsiao
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:15
  42. This paper is to design a throughput fairness-aware resource allocation scheme for a cognitive backscatter network (CBN), where multiple backscatter devices (BDs) take turns to modulate information on the prim...

    Authors: Xiaona Gao, Liqin Shi and Guangyue Lu
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:12
  43. As the important transmission approach of the perception data, the security and privacy of the perception layer nodes have been paid more and more attention. To evaluate the credibility of the perception nodes...

    Authors: Jing Huang, Hui-Juan Zhang, Shen He, Jia Chen and Zhe-Yuan Sun
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:11
  44. Link adaptation (LA) is the ability to adapt the modulation scheme (MS) and the coding rate of the error correction in accordance with the quality of the radio link. The MS plays an important role in enhancing...

    Authors: Ali Abdulqader Bin-Salem, Tat-Chee Wan, Hamad Naeem, Mohammed Anbar, Sabri M. Hanshi and Abdellah Redjaimia
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:10
  45. It is predicted that the use of unmanned aerial vehicles (UAVs) in communication systems will be more extensive in future generations of wireless telecommunication networks, due to their facilitating advantage...

    Authors: Sedighe Nasrollahi and Seyed Masoud Mirrezaei
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:9
  46. Rain attenuation is considerably noticed in a frequency spectrum above 7-GHz for tropical equatorial regions and in a frequency spectrum higher than 10-GHz for temperate climates. The attenuation prediction me...

    Authors: Eyob Mersha Woldamanuel and Feyisa Debo Diba
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:8
  47. The oceans play an important role in our daily life and they form the lungs of our planet. Subsequently, the world ocean provides so many benefits for humans and the planet including oxygen production, climate...

    Authors: Hussein Baalbaki, Hassan Harb, Ameer Sardar Kwekha Rashid, Ali Jaber, Chady Abou Jaoude, Chamseddine Zaki and Kifah Tout
    Citation: EURASIP Journal on Wireless Communications and Networking 2022 2022:7

Who reads the journal?

Learn more about the impact the EURASIP Journal on Wireless Communications and Networking has worldwide

Annual Journal Metrics

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here