default search action
International Journal of Ad Hoc and Ubiquitous Computing, Volume 41
Volume 41, Number 1, 2022
- C. K. Deena Merit, M. Haridass:
A simulation study on the necessity of working breakdown in a state dependent bulk arrival queue with disaster and optional re-service. 1-15 - Radhakrishnan Maivizhi, Palanichamy Yogesh:
Identity-based secure data aggregation in big data wireless sensor networks. 16-28 - Tong-Ying Juang, Chih-Shun Hsu, Yuh-Shyan Chen, Wan-Chun Chen:
A concurrent prediction of criminal law charge and sentence using twin convolutional neural networks. 29-43 - Khodadad Jalali Rad, Abbas Mirzaei:
Hierarchical capacity management and load balancing for HetNets using multi-layer optimisation methods. 44-57 - A. Smruthy, M. Suchetha:
A novel optimised apnea classification with AA-CNN method by utilising the EDR and ECG features. 58-67
Volume 41, Number 2, 2022
- Peng Gao, Xiao Yue, Wei Chen, Weidong Fang, Zijian Tian, Fan Zhang:
A state-of-the-art review on person re-identification with deep learning. 69-91 - Haibin Sun, Dijing Pan:
Research on optimisation of energy efficient routing protocol based on LEACH. 92-107 - Aruru Sai Kumar, T. V. K. Hanumantha Rao, B. Naresh Kumar Reddy:
Performance and communication energy constrained embedded benchmark for fault tolerant core mapping onto NoC architectures. 108-117 - Subhrajyoti Deb, Bubu Bhuyan, Nirmalya Kar, K. Sudheer Reddy:
Colour image encryption using an improved version of stream cipher and chaos. 118-133
Volume 41, Number 3, 2022
- Shivani Jain, R. Padmavathy:
Lattice-based lightweight cryptosystem. 135-146 - Govindasamy Chinnaraj, Arokiasamy Antonidoss:
Hybrid meta-heuristic-based inventory management using block chain technology in cloud sector. 147-169 - Khyati Chopra:
Intercept analysis with threshold-based diversity reception for cognitive network. 170-180 - Bimal Kumar Meher, Ruhul Amin:
A location-based multi-factor authentication scheme for mobile devices. 181-190 - Abd El Heq Silem, Hajer Taktak, Faouzi Moussa:
User interests profiling using fuzzy regression tree. 191-203
Volume 41, Number 4, 2022
- Pulkit Singh, K. Abhimanyu Kumar Patro, Bibhudendra Acharya, Rahul Kumar Chaurasiya:
Efficient hardware architectures of Lilliput lightweight algorithm for image encryption. 205-220 - Wei-Che Liang, Chih-Min Chao, Chih-Yu Lin, Chun-Chao Yeh:
Transmission range determination and antenna deployment to recognise fitness actions using Wi-Fi signals. 221-231 - Sangeetha Rajaram, Satyanarayana Vollala, Ramasubramanian Natarajan:
ERMAP: ECC-based robust mutual authentication protocol for smart grid communication with AVISPA simulations. 232-245 - Yekta Turk:
Indoor performance analysis of URLLC service for industrial IoT. 246-255 - Sajal Sarkar:
Mobility aware and reliable multipath routing protocol for MANETs. 256-269
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.