[1] Xu Y. J.,Xie H.,Chen Q. B. .2020 .Energy Efficiency Optimization Algorithm for heterogeneous NOMA Networks based on Imperfect CSI. ”Journal on Communications, 41(7) : .
[2] QIU C.,S. LENG C.,Y. YE C. .2015 .Joint switch scheduling and resource allocation algorithm based on energy efficiency in heterogeneous wireless networks. ” Journal of Computer Applications, 35(6) : 1505.
[3] LI G.,Y. XU G.,Q. CHEN G. .2020 .Interference efficiency-based base station selection and power allocation algorithm for multi-cell heterogeneous wireless networks. ” Journal of Electronics & Information Technology, 42(4) : 957-964.
[4] Ji X.,Yang J.,Huang K.,Yi M. .2016 .Physical layer authentication scheme based on hash method. ” Journal of Electronics & Information Technology, 38(11) : 2900-2907.
[5] Al-Azzawi F. F.,Ibrahim M.S. .2023 .HaLow Wi-Fi performance in multi-users and channels environment with MATLAB Simulink,”. International Journal of Communication Networks and Information Security, 15(1) : 9-15.
[6] Taleb A. A. .2023 .Using Minimum Connected Dominating Set for Mobile sink path planning in Wireless Sensor Networks. International Journal of Communication Networks and Information Security, 15(1) : 1-8.
[7] Aljarrah I. A. .2021 .Effect of image degradation on performance of Convolutional Neural Networks. International Journal of Communication Networks and Information Security, 13(2) : 215-219.
[8] Jama A. M.,Khalifa O. O.,Subramaniam N. K. .2021 .Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm. International Journal of Communication Networks and Information Security, 13(2) : 249-257.
[9] Ding Z. G.,Zhang Z.,Li J. .2008 .Improvement of inverse Maximum Matching Word Segmentation Algorithm Based on Hash Structure,” Computer Engineering. , 29(12) : 3208-3211.
[10] Zhenhua D.,Jintao L.,Bo F. .2009 .. Research on RFID Security Authentication Protocol Based on Hash Function,” Journal of Computer Research and Development (in Chinese)., 4 : 583-592.
[11] Maskery M.,Krishnamurthy V.,Zhao Q. .2009 .Decentralized dynamic spectrum access for cognitive radios: Cooperative design of a non-cooperative game. ” IEEE Transactions on Communications, 57(2) : 459-469.
[12] Zhou L.,Wang X.,Tu W.,Muntean G.M.,Geller B. .2010 .Distributed scheduling scheme for video streaming over multi-channel multi-radio multi-hop wireless networks,”. IEEE Journal on Selected Areas in Communications, 28(3) : 409-419.
[13] D.M. Rodríguez ,Rosado A.A.,Publishing IOP,Nov IOP .2019 .Summary of the Internet of Things and its Application in Agroindustrial Production,”. In Journal of Physics: Conference Series, 1409(1) : 012018.
[14] Sharma U.,Gupta D.,Publishing IOP,Jul IOP .2021 .Analyzing the applications of internet of things in hotel industry,”. In Journal of Physics: Conference Series, (1) : 012041.
[15] Molaei F.,Siavoshi H.,Afrouz S.G.,Tenorio V. .2020 .A comprehensive review on internet of things (IoT) and its implications in the mining industry. American Journal of Engineering and Applied Sciences, 13(3) : 499-515.
[16] Hassan Q.F. .2018 .Internet of things A to Z: technologies and applications. , : .
[17] Wang K.,Li H.,Yu F.R. .2016 .Virtual resource allocation in software-defined information-centric cellular networks with device-to-device communications and imperfect CSI,”. IEEE Transactions on Vehicular Technology, 65(12) : 10011-10021.
[18] Meshgi H.,Zhao D.,Zheng R. .2017 .Optimal resource allocation in multicast device-to-device communications underlaying LTE networks. ” IEEE Transactions on Vehicular Technology, 66(9) : 8357-8371.
[19] T.D. Hoang L.B.,Le L.B.,T. L.B. .2015 .Dual decomposition method for energy-efficient resource allocation in D2D communications underlying cellular networks,”. In 2015 IEEE global communications conference (GLOBECOM), : 1-6.
[20] Wu Q.,Li G.Y.,Chen W.,Ng D.W.K. .2017 .Energy-efficient D2D overlaying communications with spectrumpower trading. ” IEEE Transactions on Wireless Communications, 16(7) : 4404-4419.
[21] V. N. I. .2017 .Cisco Cisco visual networking index: forecast and methodology 2016-2021. , : .
[22] Zhou Y.,Chen J.,Kuo Y. .2016 .Cooperative cross-layer resource allocation for self-healing in interworking of WLAN and femtocell systems. ” IEEE Communications Letters, 21(1) : 136-139.
[23] Yu H.W.,Zhang B. .2019 .A hybrid MADM algorithm based on attribute weight and utility value for heterogeneous network selection,” Journal of network and systems management. , 27 : 756-783.
[24] Fakhfakh E.,Hamouda S. .2017 .Optimised Q‐learning for WiFi offloading in dense cellular networks. ” Iet Communications, 11(15) : 2380-2385.
[25] Soleymani B.,Zamani A.,Rastegar S.H.,Shah-Mansouri V. . .“RAT selection based on association. , : .
[26] Srivastava N.,Hinton G.,Krizhevsky A.,I. Sutskever A.,Salakhutdinov R. .2014 .Dropout: a simple way to prevent neural networks from overfitting,”. The journal of machine learning research, 15(1) : 1929-1958.
[27] El Khanboubi Y.,Hanoune M.,El Ghazouani M. .2021 .A new data deletion scheme for a blockchain-based deduplication system in the cloud. International Journal of Communication Networks and Information Security(IJCNIS), 13 : 331-339.
[28] Alqahtani M.A. .2021 .Machine learning techniques for malware detection with challenges and future directions. International Journal of Communication Networks and Information Security(IJCNIS), 13(2) : 258-270.
[29] Goswami H.,Choudhury H. .2021 .Security of IoT in 5G cellular networks: A review of current status, challenges and future directions. International Journal of Communication Networks and Information Security(IJCNIS), 13(2) : 278-289.