


default search action
International Journal of Interdisciplinary Telecommunications and Networking, Volume 11
Volume 11, Number 1, 2019
- Mohammad Reza Ghavidel Aghdam
, Reza Abdolee, Seyed Kamal Seyyedi Sahbari, Behzad Mozaffari Tazehkand:
Non-Gradient Based PDF Approximation for Sensor Selection in Cognitive Sensor Networks. 1-16 - Kuo-Chi Fang, Husnu S. Narman
, Ibrahim Hussein Mwinyi, Wook-Sung Yoo:
PPHA-Popularity Prediction Based High Data Availability for Multimedia Data Center. 17-29 - Elie F. Kfoury
, Julien Saab, Paul Younes, Roger Achkar:
A Self Organizing Map Intrusion Detection System for RPL Protocol Attacks. 30-43 - Pedro Narváez, José Manjarrés
, Winston S. Percybrooks
, Mauricio Pardo, Maria Calle:
Assessing the Level of Physical Activity in the Workplace: A Case Study With Wearable Technology. 44-56 - Ahmed Y. Awad, Seshadri Mohan:
Internet of Things for a Smart Transportation System. 57-70 - Reem Khalid Mahjoub, Khaled Elleithy:
Fault Tolerance Model for Efficient Actor Recovery Paradigm in WSAN. 71-86
Volume 11, Number 2, 2019
- Khashayar Kotobi, Mina Sartipi:
A Novel Congestion Avoidance Algorithm for Autonomous Vehicles Assessed by Queue Modeling. 1-11 - Vemula Manohar Reddy, Min Kyung An
, Hyuk Cho:
An Improved Data Collection Algorithm for Wireless Sensor Networks. 12-23 - Eric E. Petrosky, Alan J. Michaels, Joseph M. Ernst:
A Low Power IoT Medium Access Control for Receiver-Assigned CDMA. 24-41 - Vishwa Teja Alaparthy
, Salvatore D. Morgera:
Modeling an Intrusion Detection System Based on Adaptive Immunology. 42-55
Volume 11, Number 3, 2019
- Hewei Yu, Ziliang Li:
Handover Algorithm to Avoid Duplication Authentication Within or Between Proxy Mobile IPv6 Domains. 1-10 - Hao Wang, Jingfei Jiang:
Accelerating High Throughput Cipher Processing on Supercomputing Platform. 11-22 - Tahreer Mahmood, Seshadri Mohan
:
Factors Influencing the PAPR Performance of OFDM and MIMO-OFDM Systems: A Comparison Study. 23-33 - Omar Sweileh, Mohamed S. Hassan, Hasan Saeed Mir, Mahmoud H. Ismail:
A Switching-Based and Delay-Aware Scheduling Algorithm for Cognitive Radio Networks. 34-48
Volume 11, Number 4, 2019
- Wassim Jerbi
, Abderrahmen Guermazi, Hafedh Trabelsi:
Orphan Node Connected Management in Multi-Hop Clustering-Based Routing Protocols for Wireless Sensor Networks. 1-16 - Mamata Rath
, Bibudhendu Pati
:
Security Assertion of IoT Devices Using Cloud of Things Perception. 17-31 - Mousaab M. Nahas
:
Fiber-Optic Based Solutions for Long-Tunnels Radio Coverage and Surveillance. 32-47 - Ibtihel Baddari
, Mohamed Amine Riahla, Mohamed Mezghiche:
A New AOMDV Lifetime Prolonging Routing Algorithm for Ad-Hoc Networks. 48-62 - Theodoros Mavroeidakos, Nikolaos Tsolis, Dimitrios D. Vergados, Stavros Kotsopoulos:
Attack-Tree Based Risk Assessment on Cloud-Oriented Wireless Body Area Network. 63-79

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.