default search action
International Journal of Internet Protocol Technology, Volume 15
Volume 15, Number 1, 2022
- Lianguang Mo, Yucai Zhou:
Small area purification and recognition of network intrusion signals based on the second-order matching filter detection. 1-7 - Aditi Bankura, Anirban Kundu:
Policy-based heterogeneous server utilisation using controller framework. 8-28 - Sridhar Iyer:
On the minimisation of resource utilisation for cost reduction in space division multiplexing based elastic optical networks. 29-40 - Ali Abdulrazzaq Khudher, Alhamza Munther, Supriyanto Praptodiyono:
Efficient IPv4-IPv6 translation mechanism for IMS using SIP proxy. 41-52 - Jung-Shyr Wu:
The study of dynamic resource allocation on aggregation of unlicensed spectrum in LTE-A networks. 53-59 - Reyhaneh Rabaninejad, Mahmoud Ahmadian-Attari, Maryam Rajabzadeh Asaar, Mohammad Reza Aref:
Security enhancement of an auditing scheme for shared cloud data. 60-68
Volume 15, Number 2, 2022
- Lianguang Mo, Liang Wei:
Risk assessment method for power grid communication link failure based on fuzzy comprehensive assessment. 69-75 - Hongbing Li, Xiaolong Liu, Meng Huang, Qiang Chen, Liwan Chen:
ICCO: immune clustering-based coverage optimisation algorithm in wireless sensor networks. 76-93 - Amit Kumar Gautam, Rakesh Kumar:
Secure node ID assignment for internet integrated sensor network. 94-106 - Akula Vijaya Krishna, A. Anny Leema:
Efficient routing algorithm for improving the network performance in Internet of Things. 107-115 - Badr Benmammar:
Cognitive decision engine design for cognitive radio networks using gravitational search algorithm and flower pollination algorithm. 116-126 - Rakhee Kallimani, Sridhar Iyer:
Dynamic power management modelling of a wireless sensor node. 127-135
Volume 15, Numbers 3/4, 2022
- K. Mariya Priyadarshini, R. S. Ernest Ravindran, M. Sujatha, K. T. P. S. Kumar:
High-speed pre-accumulator and post-multiplier for convolution neural networks with low power consumption. 139-147 - J. Arthi Jaya Kumari, Muhammad Rukunddin Ghalib:
Congruent fine-grained data mining model for large-scale medical data mining. 148-160 - Sunita S. Patil, T. Senthil Kumaran:
Priority-based SenCar deployment strategy for mobile sink data gathering in WSN. 161-168 - Linjiang Xie, Feilu Hang, Wei Guo, Yao Lv, Wei Ou, C. Chandru Vignesh:
Machine learning-based security active defence model - security active defence technology in the communication network. 169-181 - Akshay Taywade, R. Sasikala:
Processing power sharing using a gadget 'Power Save' for downloading scientific research projects. 182-188 - Anjana S. Chandran:
Blockchain-based system for storage utilisation and secure sharing of EHR data. 189-202 - Ruiwei Chen, Bala Anand Muthu:
Internet of vehicle things communication based on big data analytics integrated internet of things. 203-213 - Ghanshyam Gagged, S. M. Jaishakti:
Secure dynamic bits standard scheme in private cloud environment. 214-225 - Supriya Khaitan, Shrddha Sagar, Rashi Agarwal:
A one-dimensional superior logistic map based-image encryption. 226-235 - Y. R. Sampath Kumar, H. N. Champa:
Enhanced-KNN (M-KNN) based outlier detection and sensor data aggregation for large data streams in the IoT-cloud. 236-249 - Anita Chaudhari, Rajesh Bansode:
Efficient authentication method using binary search tree with multi-gateway in wireless IoT. 250-263
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.