International Journal of Communication Systems

Cover image for Vol. 30 Issue 11

Edited By: Professor Mohammad S. Obaidat

Impact Factor: 1.066

ISI Journal Citation Reports © Ranking: 2016: 73/89 (Telecommunications); 189/260 (Engineering Electrical & Electronic)

Online ISSN: 1099-1131

Recently Published Issues

See all

The International Journal of Communication Systems

The International Journal of Communication Systems provides a forum for R&D, open to researchers from all types of institutions and organisations worldwide, aimed at the increasingly important area of communication technology. The Journal's emphasis is particularly on the issues impacting behaviour at the system, service and management levels. Published twelve times a year, it provides coverage of advances that have a significant potential to impact the immense technical and commercial opportunities in the communications sector.

Click here to learn more about this journal.

Recently Published Articles

  1. A family of diffusion normalized subband adaptive filter algorithms over distributed networks

    Mohammad Shams Esfand Abadi and Mohammad Saeed Shafiee

    Version of Record online: 23 JUN 2017 | DOI: 10.1002/dac.3348

    Thumbnail image of graphical abstract

    This research introduced a family of diffusion normalized subband adaptive filter (DNSAF) algorithms based on the general formalism. The performance of the proposed algorithms was compared in convergence speed, steady-state error, and computational complexity features in stationary and nonstationary environments. Also, the general convergence analysis of these algorithms was presented based on the spatial-temporal energy conservation relation, and theoretical expressions for transient and steady-state performance were established in these environments.

  2. Evaluating intrusion prevention systems with evasions

    Mikko Särelä, Tomi Kyöstilä, Timo Kiravuo and Jukka Manner

    Version of Record online: 22 JUN 2017 | DOI: 10.1002/dac.3339

    Thumbnail image of graphical abstract

    Evasion techniques enable an attack to pass an intrusion prevention system unnoticed. We evaluated 10 IPS, running 4 million well-known attacks with evasions against each device. Each system lets a significant amount of attacks pass through.

  3. A survey on deployment techniques, localization algorithms, and research challenges for underwater acoustic sensor networks

    Gurkan Tuna and V. Cagri Gungor

    Version of Record online: 22 JUN 2017 | DOI: 10.1002/dac.3350

    Thumbnail image of graphical abstract

    In UASNs, deployment and localization are 2 of the most fundamental and important tasks. However, due to the unpredictable and unique characteristics of underwater wireless communications, a number of challenges, such as large propagation delay, limited communication bandwidth, and high bit error rate, are faced when deploying UASNs and localizing nodes. In this paper, a survey of existing UASN deployment techniques and localization algorithms is given. In addition, research challenges and open research issues are presented.

  4. An integrity verification scheme of completeness and zero-knowledge for multi-Cloud storage

    Laicheng Cao, Wenwen He, Yufei Liu, Xian Guo and Tao Feng

    Version of Record online: 19 JUN 2017 | DOI: 10.1002/dac.3324

    Thumbnail image of graphical abstract

    Here is an integrality verification of completeness and zero-knowledge property scheme for multi-Cloud environment. It supports the dynamic updates to users data, such as data modification, data insertion, and data deletion; meanwhile, it can resist the forgery attacks and has the completeness and zero-knowledge property.

  5. New cooperative strategy for cognitive radios with wireless powered primary users

    Freeha Azmat, Yulin Zhou and Yunfei Chen

    Version of Record online: 19 JUN 2017 | DOI: 10.1002/dac.3355

    Thumbnail image of graphical abstract

    This paper proposes a new cooperative strategy between cognitive radios and primary users. In the new strategy, cognitive radios transmit data when the primary users are harvesting energy. Numerical results show that primary users have energy gains, while cognitive radios have throughput gain using this strategy.

SEARCH

SEARCH BY CITATION