- Editorial
Recent Advances on Cellular D2D Communications
- Boon-Chong Seet,
- Syed Faraz Hasan and
- Peter Han-Joo Chong
Device-to-device (D2D) communications have attracted a great deal of attention fromresearchers in recent years.[...]
January 2018 - 10 articles
Device-to-device (D2D) communications have attracted a great deal of attention fromresearchers in recent years.[...]
The unexpected change in user equipment (UE) velocity is recognized as the primary explanation for poor handover quality. In order to resolve this issue, while limiting ping-pong (PP) events we carefully and dynamically optimized handover parameters...
Peer review is an essential part in the publication process, ensuring that Future Internet maintains high quality standards for its published papers.[...]
Remote areas with sparse population, disaster areas in the aftermath, and refugee camps all require communication that is not forthcoming from commercial vendors. Numerous communication system options are available, but with widely varying cost and e...
Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN) has thus been developed by allowing...
Scientific workflow applications are collections of several structured activities and fine-grained computational tasks. Scientific workflow scheduling in cloud computing is a challenging research topic due to its distinctive features. In cloud enviro...
Device-to-device (D2D) communication is an essential part of the future fifth generation (5G) system that can be seen as a “network of networks,” consisting of multiple seamlessly-integrated radio access technologies (RATs). Public safety communicati...
In recent years, virtual learning environments are gaining more and more momentum, considering both the technologies deployed in their support and the sheer number of terminals directly or indirectly interacting with them. This essentially means that...
As more and more items are tagged with RFID (Radio Frequency Identification) tags, grouping-proof technology is widely utilized to provide a coexistence evidence for a group of related items. Due to the wireless channel used in RFID systems, a securi...
Wide-spread deployment of Wireless Sensor Networks (WSN) necessitates special attention to security issues, amongst which Sybil attacks are the most important ones. As a core to Sybil attacks, malicious nodes try to disrupt network operations by crea...