


default search action
IET Networks, Volume 9
Volume 9, Number 1, 2020
- Fei Wang, Changchun Qin:
Secure resource allocation for green two-way relay networks with mutually untrusted relay and mobile users. 1-6 - Juan Zhao, Guihui Xie, Dongming Li, Mailing Song:
Improved GMM-based method for target detection. 7-11 - Rajendran Muthukkumar
, D. Manimegalai:
Distributed coalition formation game for enhancing cooperative spectrum sensing in cognitive radio ad hoc networks. 12-22 - Zakia Berber, Samir Kameche, Elhadj Benkhelifa:
Design of integer-N PLL frequency synthesiser for E-band frequency for high phase noise performance in 5G communication systems. 23-28 - Qingbo Du, Faming Yin, Zongchen Li
:
Base station traffic prediction using XGBoost-LSTM with feature enhancement. 29-37 - Yanli Li, Xiaonan Wang:
Green content communications in 6LoWPAN. 38-42
Volume 9, Number 2, 2020
- Bhisham Sharma
, Mohammad S. Obaidat:
Comparative analysis of IoT based products, technology and integration of IoT with cloud computing. 43-47 - Samaneh Hoghooghi, Reza Javidan:
Proposing a new method for improving RPL to support mobility in the Internet of things. 48-55 - Weijing Wang
, Guoxiang Tong:
Multi-path unequal clustering protocol based on ant colony algorithm in wireless sensor networks. 56-63 - V. Ramasamy, B. Gomathy
, Joy Lal Sarkar
, Chhabi Rani Panigrahi
, Bibudhendu Pati
, Abhishek Majumder
:
EMC2: an emergency management system using mobile cloud computing. 64-73 - Parimala Venkata Krishna
, Vankadara Saritha, Mohammad S. Obaidat:
E2CA-SM: an energy-efficient channel allocation with sleep mode for base station in fifth-generation-based cellular network systems. 74-82 - Deepak Kr. Sharma
, Swati Singh, Vishakha Gautam, Shubham Kumaram, Mehul Sharma, Shrid Pant
:
Ant Router: An efficient routing protocol for social opportunistic networks using ant routing. 83-93
Volume 9, Number 3, 2020
- Zhengxiong Dou, Xiaonan Wang:
Ethernet-based access cloud. 95-101 - Guo-Ming Sung, Yen-Shih Shen, Chih-Ping Yu, Cheng-Syuan Jian:
Two-port-two-port SI between RS485 and Ethernet with an FIFO queue for efficient PC-to-PC communication. 102-109 - Rakesh Ranjan Swain
, Tirtharaj Dash
, Pabitra Mohan Khilar:
Lightweight approach to automated fault diagnosis in WSNs. 110-119 - Monika Roopak
, Gui Yun Tian, Jonathon A. Chambers:
Multi-objective-based feature selection for DDoS attack detection in IoT networks. 120-127 - Ehsan Kharati
, Mohammad Khalily Dermany
, Hamidreza Karmajani:
Increasing the amount of collected data using network coding and continuous movement of mobile sinks in wireless sensor networks. 128-138 - Xian Liu:
Optimisation of the duplex D2D network: a deep learning approach. 139-144
Volume 9, Number 4, 2020
- Hitesh Mohapatra
, Amiya Kumar Rath:
Survey on fault tolerance-based clustering evolution in WSN. 145-155 - Shun-Ping Chung, Hui-Yu Pai, Chia-Hsin Lin, Guan-Ting Lin:
Performance analysis of the pending interest table in the cellular network with reservation and retrials. 156-164 - Hamza Hammami, Sadok Ben Yahia
, Mohammad S. Obaidat:
Scalable and efficient authentication scheme for secure smart grid communication. 165-169 - Radhika Gour
, Anshul Tyagi:
Cluster oriented resource allocation and power optimisation for D2D network in cellular communications. 170-179 - Quynh Tu Ngo
, Duc Ngoc Minh Dang
, Quan Le Trung:
Extreme power saving directional MAC protocol in IEEE 802.11ah networks. 180-188 - Kapil Netaji Vhatkar, Girish P. Bhole:
Particle swarm optimisation with grey wolf optimisation for optimal container resource allocation in cloud. 189-199 - Hankiz Yilahun, Kudret Abdurahman, Seyyare Imam, Askar Hamdulla:
Automatic extraction of Uyghur domain concepts based on multi-feature for ontology extension. 200-205
Volume 9, Number 5, September 2020
- Guest Editorial: Selected Papers from the Ubiquitous Clouds and Cognitive Communication Networks (UCCCN 2019). 207-208
- Pradeep Sudhakaran
, Chidambaranathan Malathy:
Authorisation, attack detection and avoidance framework for IoT devices. 209-214 - Sivaraman Eswaran
, Daniel Dominic, Jayapandian Natarajan
, Prasad B. Honnavalli
:
Augmented intelligent water drops optimisation model for virtual machine placement in cloud environment. 215-222 - K. Sridharan
, G. Komarasamy
, S. Daniel Madan Raja
:
Hadoop framework for efficient sentiment classification using trees. 223-228 - Padakandla Chenna Praveen Kumar
, Polipalli Trinatha Rao:
Design of reconfigurable circularly polarised double folded inverted-L antenna with rectangular ground plane using HFSS. 229-234 - Vijayalakshmi Murugesan
, S. Mercy Shalinie, Ming-Hour Yang, Raja Meenakshi U.:
Web phishing detection techniques: a survey on the state-of-the-art, taxonomy and future directions. 235-246 - Raad S. Alhumaima, Saib Thiab Alwan, Riyadh Khlf Ahmed
:
Mitigating X2-AP interface cost using quantum teleportation. 247-254 - Ramachandira Moorthy Buvanesvari, Kanagaraj Suresh Joseph:
RBFNN: a radial basis function neural network model for detecting and mitigating the cache pollution attacks in named data networking. 255-261 - Shuan He, Wei Wang:
QoE-aware Q-learning resource allocation for NOMA wireless multimedia communications. 262-269 - David Aondoakaa, John Cosmas, Stephen Swift:
Exploiting heterogeneity for cost efficient 5G base station deployment using meta-heuristics. 270-275
Volume 9, Number 6, November 2020
- Guest Editorial: Intelligent Computing: a Promising Network Computing Paradigm. 277-278
- B. S. Shylaja, R. Bhaskar
:
Rough-set and machine learning-based approach for optimised virtual machine utilisation in cloud computing. 279-283 - Whai-En Chen
, Chia-Hung Liu
:
High-performance user plane function (UPF) for the next generation core networks. 284-289 - Jianneng Chen, Zhen-Jie Huang
, Yu-Ping Zhou, Fumin Zou, Chien-Ming Chen
, Jimmy Ming-Tai Wu, Tsu-Yang Wu
:
Efficient certificate-based aggregate signature scheme for vehicular ad hoc networks. 290-297 - Yize Yang
, Hong-yong Yang, Yuling Li:
Finite-time convergence of group flocking for multi-agent systems with mismatched/matched disturbances. 298-304 - Dang Huynh-Van
, Quan Le Trung:
SD-IoTR: an SDN-based Internet of Things reprogramming framework. 305-314 - Devender Kumar, Satish Chand, Bijendra Kumar:
Cryptanalysis and improvement of a user authentication scheme for wireless sensor networks using chaotic maps. 315-325 - Khiet Thanh Bui
, Hung Dac Ho
, Tran Vu Pham
, Hung Cong Tran:
Virtual machines migration game approach for multi-tier application in infrastructure as a service cloud computing. 326-337 - Ko-Tsung Chu, Hua-Ting Hsu, Jyh-Jian Sheu, Wei-Pang Yang, Cheng-Chi Lee
:
Effective spam filter based on a hybrid method of header checking and content parsing. 338-347 - Bhushan Yelure, Shefali Sonavane
:
ACO-IBR: a modified intersection-based routing approach for the VANET. 348-359 - Ridhima Mehta
:
Multi-objective design of energy harvesting enabled wireless networks based on evolutionary genetic optimisation. 360-366 - Ali Ghiasian:
Impact of TCAM size on power efficiency in a network of OpenFlow switches. 367-371 - Jun Li, Xingyu He
, Dan Zhao, Guisong Yang, Daojing He
, Sammy Chan:
Delay-aware and cost-efficient probabilistic transmission for opportunistic networks. 372-377

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.