default search action
International Journal of Ad Hoc and Ubiquitous Computing, Volume 32
Volume 32, Number 1, 2019
- Mohamed Torky, Ali Meligy, Hani Ibrahim:
A challenge-response mechanism for securing online social networks against social bots. 1-13 - Coert Jordaan, Reza Malekian:
Design of a monitoring and safety system for underground mines using wireless sensor networks. 14-28 - Saifur Rahman Sabuj, Masanori Hamamura:
Signal technique for friend or foe detection of intelligent malicious user in cognitive radio network. 29-42 - Moumita Roy, Chandreyee Chowdhury, Munshi Navid Anjum, Sarmistha Neogy:
Designing secure and reliable mobile agent based system for reliable MANET. 43-58 - G. P. Sunitha, S. M. Dilip Kumar, B. P. Vijay Kumar:
Energy efficient hierarchical multi-path routing protocol to alleviate congestion in WSN. 59-73
Volume 32, Number 2, 2019
- Alamgir Naushad, Ghulam Abbas, Ziaul Haq Abbas, Lei Jiao:
A novel faster failure detection strategy for link connectivity using Hello messaging in mobile ad hoc networks. 75-98 - Pei Xu, Jianguo Wu:
A novel method for time delay prediction in networked control systems. 99-109 - Trupil Limbasiya, Debasis Das, Ram Narayan Yadav:
A reputation-based truthfulness paradigm for multi-hop transmission in cognitive radio networks. 110-118 - Wangjam Niranjan Singh, Ningrinla Marchang, Amar Taggu:
Mitigating SSDF attack using distance-based outlier approach in cognitive radio networks. 119-132 - Muhammad Asad, Muhammad Aslam, Nianmin Yao, Naeem Ayoub, Khalid Ibrahim Qureshi, Ehsan Ullah Munir:
IoT enabled adaptive clustering based energy efficient routing protocol for wireless sensor networks. 133-145
Volume 32, Number 3, 2019
- Nadhir Ben Halima, Hatem Boujemâa:
Throughput of cooperative HARQ protocols for underlay cognitive radio networks using adaptive and fixed transmit power. 147-158 - Vincenzo Catania, Gaetano Carmelo La Delfa, Salvatore Monteleone, Davide Patti, Daniela Ventura, Giuseppe La Torre:
GOOSE: goal oriented orchestration for smart environments. 159-170 - Sonia Sabir, Inayat Ali, Eraj Khan:
H-LPS: a hybrid approach for user's location privacy in location-based services. 171-179 - Jerzy Kaczorek, Bogdan Wiszniewski:
Bilateral multi-issue negotiation of execution contexts by proactive document agents. 180-196 - Wei Peng, Dongyan Chen, Wenhui Sun, Chengdong Li, Guiqing Zhang:
Type-2 fuzzy logic based energy-efficient transceiver resource schedule in multi-radio WSNs. 197-209
Volume 32, Number 4, 2019
- Salima Sabri, Abdelouhab Aloui:
A new approach for the recognition of human activities. 211-223 - Zongyuan Han, Tianyun Shi, Xiaojun Lv, Xinchun Jia, Zhongying Wang, Dong Zhou:
Data gathering maximisation for wireless sensor networks with a mobile sink. 224-235 - Muhammad Faheem, Rizwan Aslam Butt, Basit Raza, Muhammad Waqar Ashraf, Md. Asri Ngadi, Vehbi Cagri Gungor:
A multi-channel distributed routing scheme for smart grid real-time critical event monitoring applications in the perspective of Industry 4.0. 236-256 - Fateh Boutekkouk:
Embedded systems codesign under artificial intelligence perspective: a review. 257-269 - Ahmet Cezayirli:
Secure and remote firmware update of cellular IoT micro devices with limited resources. 270-280
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.