default search action
International Journal of Internet Protocol Technology, Volume 12
Volume 12, Number 1, 2019
- Sweta Bhattacharya, V. Raju:
Analysis of factors affecting customer satisfaction in e-commerce applications using Condorcet - AHP method. 2-10 - S. Vaithyasubramanian, A. Christy:
ATM PIN generation - a formal mathematical model to generate PIN using regular grammar, context free grammar and recognition through finite state machine, pushdown automata. 11-15 - Andrea Huszti, Norbert Olah:
Security analysis of a cloud authentication protocol using applied pi calculus. 16-25 - C. E. Ait Zaouiat, Adnane Latif:
Improvement of WBAN performances by a hybrid model: design and evaluation of a novel inter-MAC layer exploited in medical applications. 26-34 - Prashant Kharat, Muralidhar Kulkarni:
Modified QUIC protocol for improved network performance and comparison with QUIC and TCP. 35-43 - Liang Tang, Zhichao Wang, Jun Steed Huang, Li Bian:
A general purpose deployment method for wireless mesh network. 44-50 - Zhengxiong Dou, Xiaonan Wang, Yanli Li:
Addressing for 6LoWPAN. 51-60
Volume 12, Number 2, 2019
- Naziha Ali Saoucha, Badr Benmammar:
Bio-inspired approaches for OFDM-based cognitive radio. 61-75 - Junhua Zhang, Yi Zhu, Fangxiong Xiao:
Modelling and analysis of real-time and reliability for WSN-based CPS. 76-84 - Tz-Heng Hsu, Lin-You Wu:
A cloud-fog scalable video streaming architecture for multimedia internet of things devices. 85-96 - Tanapat Anusas-Amornkul, Surawut Moonsin:
The performance and QoE analysis of B2-DASH algorithm. 97-109 - Hung-Chin Jang, Jian-Ting Lin:
Bandwidth management framework for smart homes using SDN: ISP perspective. 110-120
Volume 12, Number 3, 2019
- Ying Li, Lian Xue:
Construction of building fire information monitoring model based on adaptive clustering scheduling. 121-127 - Xian Luo, Rongtao Liao, Guoru Deng, Dangdang Dai, Xiaolan He, Zhixiang Hou:
Real-time reliability allocation algorithm of high-throughput communication channel under strong interference. 128-135 - Qian Gao, Chong Shen, Xiaosi Chen, Kun Zhang:
Weighted moving average-based differential UWB indoor localisation system for high external disturbance environment. 136-143 - Jiwei Qin, Yunpeng Jiang:
Recommender resources based on acquiring user's requirement and exploring user's preference with Word2Vec model in web service. 144-152 - Manish Kalra, Ramesh Chandra Poonia:
Design a new protocol and comparison with B92 protocol for quantum key distribution. 153-156 - Zied Trifa:
Preventing Sybil attacks in chord and Kademlia protocols. 157-166 - Yicheng Mu:
High-speed data aggregation storage query method. 167-172 - Jiefeng Wang:
Network distance education platform control system based on big data. 173-180
Volume 12, Number 4, 2019
- Huawei Wu, Yicheng Li, Yong Kuang, Zhixiang Hou:
Intelligent switching algorithm for mobile communication under non-uniform distribution of scatterers. 181-189 - Moufida Rahmani, Mahfoud Benchaïba:
CRAM: clustering-based resource availability measurement in mobile peer-to-peer systems. 190-204 - Yang Sun, Zuoqin Shi, Ling Zhao, Sumin Li, Zhenshi Zhang, Ronghua Du, Zhixiang Hou:
Analysis of spatial information service composition network based on Ricci curvature. 205-212 - Jinming Zhang:
Research on adaptive recommendation algorithm for big data mining based on Hadoop platform. 213-220 - Min Zhang:
Structural optimisation algorithm of weight correlation analysis for DBN. 221-228 - Jian Gao, Shuyun Niu, Honghai Li, Meng Wang:
The reliability research of V2V based on sample judgment and balanced modulation. 229-235 - Sasikala Chinthakunta, Chigarapalle Shoba Bindu:
Certificateless batch verification protocol to ensure data integrity in multi-cloud using lattices. 236-242
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.