


default search action
Wireless Personal Communications, Volume 117
Volume 117, Number 1, March 2021
- Homero Toral-Cruz, Debiao He, Albena Dimitrova Mihovska, Kim-Kwang Raymond Choo
, Muhammad Khurram Khan
:
Reliable and Secure e-Health Networks. 1-6 - Prateek Pandey
, Ratnesh Litoriya
:
Securing E-health Networks from Counterfeit Medicine Penetration Using Blockchain. 7-25 - Saru Kumari
, Km. Renuka:
Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services. 27-45 - Bander A. Alzahrani
, Azeem Irshad
, Aiiad Albeshri
, Khalid Alsubhi:
A Provably Secure and Lightweight Patient-Healthcare Authentication Protocol in Wireless Body Area Networks. 47-69 - Shaohao Xie, Fangguo Zhang
, Rong Cheng:
Security Enhanced RFID Authentication Protocols for Healthcare Environment. 71-86 - Ritu Chauhan, Harleen Kaur
, Victor Chang
:
An Optimized Integrated Framework of Big Data Analytics Managing Security and Privacy in Healthcare Data. 87-108 - Vasileios A. Memos
, Kostas E. Psannis
, Sotirios K. Goudos
, Sofoklis A. Kyriazakos:
An Enhanced and Secure Cloud Infrastructure for e-Health Data Transmission. 109-127 - Reema Goyal
, R. B. Patel, H. S. Bhaduria, Devendra Prasad
:
An Efficient Data Delivery Scheme in WBAN to Deal with Shadow Effect due to Postural Mobility. 129-149 - Napa Rachata, Punnarumol Temdee
:
Mobile-Based Self-Monitoring for Preventing Patients with Type 2 Diabetes Mellitus and Hypertension from Cardiovascular Complication. 151-175 - Djallel Eddine Boubiche
, Samir Athmani, Sabrina Boubiche, Homero Toral-Cruz:
Cybersecurity Issues in Wireless Sensor Networks: Current Challenges and Solutions. 177-213 - Supansa Chaising
, Ramjee Prasad, Punnarumol Temdee
:
Personalized Recommendation Method for Preventing Elderly People from Cardiovascular Disease Complication Using Integrated Objective Distance. 215-233 - Reema Goyal, R. B. Patel, H. S. Bhaduria, Devendra Prasad
:
An Energy Efficient QoS Supported Optimized Transmission Rate Technique in WBANs. 235-260 - John Soldatos
, Sofoklis A. Kyriazakos
, Pouyan Ziafati, Albena Mihovska:
Securing IoT Applications with Smart Objects: Framework and a Socially Assistive Robots Case Study. 261-280
Volume 117, Number 2, March 2021
- Yongjun Sun, Mingzhu Miao
, Zhenzhen Wang, Zujun Liu
:
Resource Allocation Based on Hierarchical Game for D2D Underlaying Communication Cellular Networks. 281-291 - Tripta
, Seemanti Saha
:
Multiband Spectrum Sensing Using Modified Daniell Windowing Technique in Full-Duplex Cognitive Radio Networks: A Performance Study. 293-309 - Yeh Chuang, Fang-Biau Ueng
, Ye-Shun Shen:
A Cyclic Prefix Free Multiple Input Multiple Output Generalized Frequency Division Multiplexing System Design. 311-336 - Jen-Chen Tsai, Jenq-Shiou Leu
, Setya Widyawan Prakosa
, Lo-Chi Hsiao, Ping-Chen Huang, Shih-Yi Yang, Ya-Tieh Huang:
Design and Implementation of an Internet of Healthcare Things System for Respiratory Diseases. 337-353 - Weiwei Xia
, Lianfeng Shen:
Joint Resource Allocation at Edge Cloud Based on Ant Colony Optimization and Genetic Algorithm. 355-386 - Tibin Mathew Thekkil, N. Prabakaran:
Optimization Based Multi-Objective Weighted Clustering For Remote Monitoring System in WSN. 387-404 - Muhammad Bilal
, Rashid Saleem, Aroosa Jabbar, Muhammad Farhan Shafique:
A Miniaturized and Polarization Independent Electromagnetic Shield for C and X-Band Applications. 405-416 - Hong Zhang
, Li He:
Data Mining Method of Sequential Patterns for Vehicle Trajectory Prediction in VANET. 417-429 - Tanima Bhowmik
, Indrajit Banerjee:
An Improved PSOGSA for Clustering and Routing in WSNs. 431-459 - Shakti Raj Chopra
, Akhil Gupta
:
Error Analysis of Grouped Multilevel Space-Time Trellis Coding with the Combined Application of Massive MIMO and Cognitive Radio. 461-482 - Arka Bhowmik, Debashis De
:
mTrust: Call Behavioral Trust Predictive Analytics Using Unsupervised Learning in Mobile Cloud Computing. 483-501 - Abid Naeem, Shahryar Shafique Qurashi, Yousaf Khan
, Sheeraz Ahmed
, Nadeem Safwan:
Fiber to the Home (FTTH) Automation Planning, Its Impact on Customer Satisfaction & Cost-Effectiveness. 503-524 - Abdellah Nabou
, My Driss Laanaoui, Mohammed Ouzzif:
New MPR Computation for Securing OLSR Routing Protocol Against Single Black Hole Attack. 525-544 - S. Prithi, S. Sumathi:
Automata Based Hybrid PSO-GWO Algorithm for Secured Energy Efficient Optimal Routing in Wireless Sensor Network. 545-559 - Sabitha Gauni, C. T. Manimegalai
, K. Murali Krishnan, V. Shreeram, V. V. Arvind, T. V. Nikhil Srinivas:
Design and Analysis of Co-operative Acoustic and Optical Hybrid Communication for Underwater Communication. 561-575 - Abbas Fathtabar, Ali Akbar Khazaei
, Asadallah Ghezelbigloo:
A New Eigen-Structure Based DOA Estimation Method for Wideband Coherent Signals. 577-589 - Sachin Kumar Yadav
, Amanpreet Kaur, Rajesh Khanna
:
Compact Rack Shaped MIMO Dielectric Resonator Antenna with Improved Axial Ratio for UWB Applications. 591-606 - Yufang Yin
, Qiyu Wang, Huijie Zhang, Hong Xu:
A Novel Distributed Sensor Fusion Algorithm for RSSI-Based Location Estimation Using the Unscented Kalman Filter. 607-621 - P. Dharanyadevi, Venkatalakshmi Krishnan:
Effectual Computing Enhanced Aggregator Node B for 5G Vehicular Milieu. 623-636 - Mina Hashemian, Farbod Razzazi
, Houman Zarrabi, Mohammad Shahram Moin:
Semi-supervised and Unsupervised Privacy-Preserving Distributed Transfer Learning Approach in HAR Systems. 637-654 - Licui Zhang, Pengcheng Wang
, Chunxia Zhang:
SC-EEDC: Similarity Based Clustering for Energy Efficient Data Collection in WSN. 655-687 - Ehsan Soleimani-Nasab
, Maryam Abbaspour-Asadollah:
A Framework on the Performance Analysis of Cooperative Wireless Body Area Networks. 689-725 - Arindam Sarkar, Joydeep Dey, Sunil Karforma:
Musically Modified Substitution-Box for Clinical Signals Ciphering in Wireless Telecare Medical Communicating Systems. 727-745 - M. Yuvaraju
, K. A. Pranesh
:
Energy Proficient Hybrid Secure Scheme for Wireless Sensor Networks. 747-767 - Partha Sarathy Banerjee
, Baisakhi Chakraborty
, Utkarsh Anand, Harsh Upadhyay:
Trainable Framework for Information Extraction, Structuring and Summarization of Unstructured Data, Using Modified NER. 769-807 - Motilal Singh Khoirom
, Dolendro Singh Laiphrakpam
, Themrichon Tuithung:
Audio Encryption Using Ameliorated ElGamal Public Key Encryption Over Finite Field. 809-823 - Piyush Rawat
, Siddhartha Chauhan, Rahul Priyadarshi
:
A Novel Heterogeneous Clustering Protocol for Lifetime Maximization of Wireless Sensor Network. 825-841 - Rahul Priyadarshi
, Bharat Gupta:
Area Coverage Optimization in Three-Dimensional Wireless Sensor Network. 843-865 - Wassim Fassi Fihri
, Hassan El Ghazi, Badr Abou El Majd:
A Multi-Objective Particle Swarm Optimization Based Algorithm for Primary User Emulation Attack Detection. 867-886 - Qiu Peng, Weihong Xu:
Crop Nutrition and Computer Vision Technology. 887-899 - Vivek Kanwar
, Ashok Kumar:
Range Free Localization for Three Dimensional Wireless Sensor Networks Using Multi Objective Particle Swarm Optimization. 901-921 - Jayita Saha
, Dip Ghosh, Chandreyee Chowdhury
, Sanghamitra Bandyopadhyay:
Smart Handheld Based Human Activity Recognition Using Multiple Instance Multiple Label Learning. 923-943 - Riki H. Patel
, Arpan Desai
, Trushit Upadhyaya
:
Low-Profile Parallel Mutually Coupled Triple-Band Antenna for Telecommunications Applications. 945-956 - Saida Ibnyaich
, Layla Wakrim
, Moha M'Rabet Hassani:
Nonuniform Semi-patches for Designing an Ultra Wideband PIFA Antenna by Using Genetic Algorithm Optimization. 957-969 - Dheerendra Singh Gangwar
, Sanjeev Tyagi, Sanjay K. Soni:
The Impact of Deployment Pattern and Routing Scheme on the Lifetime in Multi-Sink Wireless Sensor Network. 971-985 - M. V. Ranjith Kumar
, N. Bhalaji
:
Blockchain Based Chameleon Hashing Technique for Privacy Preservation in E-Governance System. 987-1006 - Fatima Bouakkaz
, Makhlouf Derdour
:
Maximizing WSN Life Using Power Efficient Grid-Chain Routing Protocol (PEGCP). 1007-1023 - Negar Najafi Dehaghani, Rasool Sadeghi
, Sayed Mahdi Faghih Imani:
REF: A Novel Forwarding Strategy in Wireless NDN. 1025-1042 - Arunkumar Subramanian, Vinoth Kumar Bojan:
An Integrated Piezoelectric Sensor Based Energy Efficient Transmission Using Base-Station Controlled Dynamic Clustering Protocol. 1043-1058 - Belbergui Chaimaa, Elkamoun Najib, Rachid Hilal:
E-banking Overview: Concepts, Challenges and Solutions. 1059-1078 - Chaudhuri Manoj Kumar Swain
, Susmita Das:
Proposed Prediction Framework for Improving the Accuracy of Path loss Models of WiMAX Network. 1079-1101 - Moumita Deb, Sarbani Roy
:
Enhanced-Pro: A New Enhanced Solar Energy Harvested Prediction Model for Wireless Sensor Networks. 1103-1121 - Nuparam Chauhan
, Surya Prakash Tripathi:
Optimal Admission Control Policy Based on Memetic Algorithm in Distributed Real Time Database System. 1123-1141 - Zhijun Teng, Baohe Pang, Mingyang Sun, Luying Xie, Liwen Guo:
A Malicious Node Identification Strategy with Environmental Parameters Optimization in Wireless Sensor Network. 1143-1162 - P. Kabilamani, C. Gomathy
:
Efficient MRFFT Feedback-Commutator Technique for Handling Data Flow Control in Narrow Band-IOT Based LTE. 1163-1186 - K. V. Praveen, Joe Prathap P. M
:
Energy Efficient Congestion Aware Resource Allocation and Routing Protocol for IoT Network using Hybrid Optimization Techniques. 1187-1207 - L. Gandhimathi
, G. Murugaboopathi:
Mobile Malicious Node Detection Using Mobile Agent in Cluster-Based Wireless Sensor Networks. 1209-1222 - Balasaheb Tarle, Sudarson Jena
:
Ant Lion Optimization Based Medical Data Classification Using Modified Neuro Fuzzy Classifier. 1223-1242 - Hossein Ghaffarian
:
Reducing Search Area in Indoor Localization Applications. 1243-1258 - Satyanarayana Murthy Nimmagadda
:
Enhancement of Efficiency and Performance Gain of Massive MIMO System Using Trial-Based Rider Optimization Algorithm. 1259-1277 - K. Sekar
, K. Suganya Devi
, P. Srinivasan:
Energy Efficient Data Gathering using Spatio-temporal Compressive Sensing for WSNs. 1279-1295 - Pratik Shrivastava, Udai Shanker
:
Prediction Based QoS Management in Replicated DRTDBS. 1297-1318 - Satyasen Panda
:
Spectral Efficiency Optimization of Massive MIMO System Under Channel Varying Conditions. 1319-1335 - Hari Shankar
, Ankush Kansal:
Performance Analysis of MRC Receiver over Fisher Snedecor (F) Composite Fading Channels. 1337-1359 - Chukhu Chunka
, Subhasish Banerjee, Rajat Subhra Goswami:
An Efficient User Authentication and Session Key Agreement in Wireless Sensor Network Using Smart Card. 1361-1385 - T. Ravi Babu
, C. Dharma Raj, V. Adinarayana, K. Murali Krishna:
Estimation of Sparse Channel Using Bayesian Gaussian Mixture and CS-Aided Techniques for Pilot Contaminated Massive MIMO System. 1387-1398 - Surajit Kundu
, Ayan Chatterjee
:
Sharp Triple-Notched Ultra Wideband Antenna with Gain Augmentation Using FSS for Ground Penetrating Radar. 1399-1418 - Urmila Patil, Anju Vijay Kumar Kulkarni, Radhika Menon
, Mithra Venkatesan
:
A Novel AEB-AODV Based AADITHYA Cross Layer Design Hibernation Algorithm for Energy Optimization in WSN. 1419-1439 - Janmoni Borah
, Joyatri Bora:
Energy-Efficient ICI Mitigation with Dynamic and Location-Based Power Allocation in Mobility-Based 5G HetCN. 1441-1457 - Tayyaba Khan, MuhibUr Rahman
:
Wearable Tri-Band Antenna for Switching Between WLAN and Bluetooth for Body Centric Wireless Communication. 1459-1470 - Shailesh Mishra, Garima Srivastava, Sachin Kumar
:
A State-of-the Art Review on Distributed Amplifiers. 1471-1525 - Masoud Heydari, Saeed Roshani
:
Miniaturized Harmonic Suppressed Wilkinson Power Divider using Lumped Components and Resonators. 1527-1536 - Daniel Rodrigues de Luna
, Lívio Carvalho de Sousa, Vicente A. de Sousa Jr.:
Multicarrier Systems Over Underwater Acoustic Channels: A Performance Evaluation. 1537-1555 - Saurabh Jain
, C. Nandhini
, Rajesh Doriya:
ECC-Based Authentication Scheme for Cloud-Based Robots. 1557-1576 - Abderahman Rejeb, John G. Keogh
:
5G Networks in the Value Chain. 1577-1599 - P. V. Bhuvaneshwari, C. Tharini
:
Review on LDPC Codes for Big Data Storage. 1601-1625 - Reeta Bhardwaj, Dinesh Kumar
:
Wavelet-Based Least Common Ancestor Algorithm for Aggregate Query Processing in Energy Aware Wireless Sensor Network. 1627-1643 - M. Prasad
, U. B. Mahadevaswamy:
Quantum Mechanical Effect on Trigate Junctionless FET for Fast Switching Application. 1645-1657 - Pradeepa Parthiban, R. Pushpa Lakshmi:
Violation Detection in Service Level Agreement to Ensure the Privacy in Cloud Community using Chicken Spider Monkey Optimization-Based Deep Belief Network. 1659-1683 - Prashant Sangulagi
, Ashok Sutagundar:
Fuzzy based Load Balancing in Sensor Cloud: Multi-Agent Approach. 1685-1710 - Narasak Boonthep, Kosin Chamnongthai:
Correction to: A Method of Motion‑Estimation‑Based H.264 Video Coding Using Optimal Search‑Range. 1711 - Narasak Boonthep, Kosin Chamnongthai
, Pranithan Phensadsaeng:
Correction to: H.264 Video Coding‑Based Motion Estimation Architecture for Video Broadcasting from a Studio. 1713 - Retraction Note to: Power Budget Analysis of an Ultra-Dense Coherent MB-OFDM WDM Metro-Access Networks. 1715
Volume 117, Number 3, April 2021
- Irfan Anjum
, Aqeel A. Syed, Azhar A. Rizvi:
Independent Code Division Multiple Access in DS-CDMA. 1717-1733 - Nagender Aneja
, Sapna Gambhir:
Recent Advances in Ad-Hoc Social Networking: Key Techniques and Future Research Directions. 1735-1753 - Naveena A. Priyadharsini
, S. Tamil Selvi
:
Adaptive Spectrum Aggregation Regimen for Downlink NR-gNodeB and Device to Device Systems in 5G. 1755-1771 - Hao Lin, Hua Zhang, Hanbing Yan, Huawei Wang, Yijie Shi, Fei Gao, Qiaoyan Wen:
A Secure Online Treatment Blockchain Service. 1773-1795 - Arvind Dhaka, Vidhyacharan Bhaskar, Siddhartha Chauhan, Amita Nandal:
Analysing Outage Probability and Diversity for Matrix Based Shadowed Attenuation in Multipath Fading Environment. 1797-1814 - Pradnya Patil
, Sangeetha Manoharan, Vidhyacharan Bhaskar:
Blockchain for IoT Access Control, Security and Privacy: A Review. 1815-1834 - Vidhyalakshmi M. K.
, E. Poovammal
, Vidhyacharan Bhaskar, J. Sathyanarayanan:
Novel Similarity Metric Learning Using Deep Learning and Root SIFT for Person Re-identification. 1835-1851 - Priti Kumari, Parmeet Kaur
:
Checkpointing Algorithms for Fault-Tolerant Execution of Large-Scale Distributed Applications in Cloud. 1853-1877 - Sumit Kumar
, Shrawan Kumar, Neera Batra:
Optimized Distance Range Free Localization Algorithm for WSN. 1879-1907 - Reena P. Pingale, S. N. Shinde:
Multi-objective Sunflower Based Grey Wolf Optimization Algorithm for Multipath Routing in IoT Network. 1909-1930 - Ayman Khalil
, Nassif Abou Haidar, Georges Bassil, Rabih Chbeir:
Adaptive Resource Management Solution for Ad-Hoc Opportunistic Networks. 1931-1958 - Harekrishna Kumar
, V. K. Tomar:
A Review on Performance Evaluation of Different Low Power SRAM Cells in Nano-Scale Era. 1959-1984 - Ava Tahmasebi, Ahmad Salahi, Mohammad Ali Pourmina
:
A Novel Feature-Based DDoS Detection and Mitigation Scheme in SDN Controller Using Queueing Theory. 1985-2006 - Jamaah Binti Suud, Hushairi Zen, Al-Khalid Othman, Khairuddin Abdul Hamid:
An Empirical Comparison of Encoding Algorithms of the Low Density Parity Check Code for Decode and Forward Protocol Relay System. 2007-2026 - Dan Ye
:
Linear Network Coding for Dynamic Rate Adaptation with Global Resource Tradeoff in Distributed 5G LAA Network. 2027-2039 - Vikas V. Khairnar
, C. K. Ramesha
, Lucy J. Gudino:
A Parasitic Antenna with Independent Pattern, Beamwidth and Polarization Reconfigurability. 2041-2059 - Senthilkumar Muthukrishnan
, Muthukumar Sumathi
, Chinnadurai Veeramani:
Optimal Control of Malware Spreading Model with Tracing and Patching in Wireless Sensor Networks. 2061-2083 - Saeed Roshani
, Mohammad Behdad Jamshidi
, Farzad Mohebi, Sobhan Roshani:
Design and Modeling of a Compact Power Divider with Squared Resonators Using Artificial Intelligence. 2085-2096 - Basheer Ali Sheik
, P. V. Sridevi, P. V. Rama Raju:
Enhancement of Impedance Matching of Rectangular Patch to the Elimination of the Surface Waves. 2097-2114 - Muhammad Kashif Saeed
, Mahmood ul Hassan
, Khalid Mahmood
, Ansar Munir Shah, Jahangir Khan:
Efficient Solution for Connectivity Restoration (ESCR) in Wireless Sensor and Actor-Networks. 2115-2134 - J. Amutha
, Jaiprakash Nagar
, Sandeep Sharma
:
A Distributed Border Surveillance (DBS) System for Rectangular and Circular Region of Interest with Wireless Sensor Networks in Shadowed Environments. 2135-2155 - Bacem Mbarek
, Mouzhi Ge, Tomás Pitner:
Trust-Based Authentication for Smart Home Systems. 2157-2172 - Kalyan Mondal
, Lakhindar Murmu
:
A High Gain Broadband Modified Patch Antenna for ISM band/WLAN/WiMAX Applications. 2173-2192 - Rajiv Ranjan
:
Canonical Huffman Coding Based Image Compression using Wavelet. 2193-2206 - Bin Xia
, Tao Liu, Tian Ding, Zhi-Qiang Wang:
An Improved PSO Localization Algorithm for UWB Sensor Networks. 2207-2223 - Kazem Mirzadi
, Jamshid Bagherzadeh Mohasefi:
An Ultra-Lightweight Mutual Authentication Protocol Based on LPN Problem with Distance Fraud Resistant. 2225-2251 - Puspendu Bikash Saha
, Rajib Kumar Dash
, Dibyendu Ghoshal:
Triple-band Four-port MIMO Antenna with Reduced Mutual Coupling Using Minkowiski-modified Novel Fractal Loop. 2253-2271 - Satyendra Sharma
, Brahmjit Singh:
Network Planning in Deep Fading Area is a Research Challenge. 2273-2284 - Mehtab Singh
, Jyoteesh Malhotra
, Ahmad Atieh, Hala J. El-Khozondar
, Dhasarathan Vigneswaran
:
Performance Investigation of 1.6 Tbps Hybrid WDM-PDM-OFDM-based Free Space Optics Transmission Link. 2285-2309 - Ali El Ksimi, Cherkaoui Leghris:
Contribution to Optimization and Evaluation of IPv6 Signals Based Constrained Devices Networks. 2311-2325 - Veerendra Dakulagi
:
Single Snapshot 2D-DOA Estimation in Wireless Location System. 2327-2339 - Aishwarya Gupta
, Bharat Mahaur:
An Improved DV-maxHop Localization Algorithm for Wireless Sensor Networks. 2341-2357 - Neha Barthwal
, Shashi Kant Verma:
An Optimized Routing Algorithm for Enhancing Scalability of Wireless Sensor Network. 2359-2382 - Nawres Abdelwahed
, Asma Ben Letaifa, Sadok El Asmi:
How User Engagement Metrics Ameliorate the Web QoE? 2383-2402 - Natarajan Yuvaraj
, T. Karthikeyan
, K. Praghash
:
An Improved Task Allocation Scheme in Serverless Computing Using Gray Wolf Optimization (GWO) Based Reinforcement Learning (RIL) Approach. 2403-2421 - T. Suriya Praba
, S. Saravanan, T. Sethukarasi:
An Efficient Energy Aware Semigraph-Based Total Edge Domination Routing Algorithm in Wireless Sensor Networks. 2423-2439 - Tiaojun Zeng, Changzheng Liu
:
A Two-Stage Separation Algorithm for Weak Correlation Source Signals. 2441-2452 - Shoukath Ali K
, Sampath Palaniswami:
Time Domain Channel Estimation for Time and Frequency Selective Millimeter Wave MIMO Hybrid Architectures: Sparse Bayesian Learning-Based Kalman Filter. 2453-2473 - Sudeep Varshney
, Chiranjeev Kumar, Abhishek Swaroop:
Lightning-Based Lion Optimization Algorithm for Monitoring the Pipelines Using Linear Wireless Sensor Network. 2475-2494 - Kethepalli Mallikarjuna
, Bepar Abdul Raheem, Govindaraj Pathanadka
, Sudhakar Mogappair Suriyakumar:
A Simple Shape Descriptor Merging Arithmetical Wrap Around Technique with Absolute Localized Pixel Differences. 2495-2511 - Mustapha Benssalah
, Izza Sarah, Karim Drouiche:
An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things. 2513-2539 - B. Jesvin Veancy
, P. Yogesh:
Fractional Frequency Reuse with Enhanced Scheduling Strategies. 2541-2553 - Mitra Aghadadashfam, A. Ramezani, Mohammad Reza Mosavi
:
A Hardware Implementation for a New Post-correlation Anti-jamming Method. 2555-2574 - Zaheer Abbas
, Muhammad Rizwan Anjum, Muhammad Usman Younus
, Bhawani Shankar Chowdhry:
Monitoring of Gas Distribution Pipelines Network Using Wireless Sensor Networks. 2575-2594 - M. Nava Barathy
, Dejey Dharma
:
A Novel Protein Sequence Alignment-Based Patch Similarity Estimation for Two-Level Data Aggregation in WMSNs. 2595-2633 - M. Nava Barathy
, Dejey Dharma:
Correction to: A Novel Protein Sequence Alignment‑Based Patch Similarity Estimation for Two‑Level Data Aggregation in WMSNs. 2635 - (Withdrawn) RETRACTED ARTICLE: Enhancing the LTE-Based Intelligent Transportation System's Performance. 2637
- (Withdrawn) RETRACTED ARTICLE: A Novel Eye-Shaped Monopole Antenna for Dual Band and Wideband Communication Applications. 2639
Volume 117, Number 4, April 2021
- Chan-Yun Yang, Muhammad Sharif, Sri Devi Ravana
, Anandakumar Haldorai
:
Big Cloud Innovation for Sustainable Wireless Management. 2641-2643 - Deva Priya M.
, M. Sangeetha, A. Christy Jeba Malar, E. Dhivyaprabha, N. Kiruthiga, PL. Rajarajeswari:
Fair Adaptive Cross-Layer Resource Allocation Scheme for IEEE 802.16 Broadband Wireless Networks. 2645-2666 - S. Madhavapandian, P. Maruthupandi:
System Level Protection Against Side-Channel Attack Using High Performance Virtual Secure Circuit for Cryptographic Processor. 2667-2677 - Hanumantharao Bitra
, Palanisamy Ponnusamy
:
Analysis of GSM-SM Over κ -μ, η -μ and α -μ Fading Channels. 2679-2693 - P. Preethi, R. Asokan:
Modelling LSUTE: PKE Schemes for Safeguarding Electronic Healthcare Records Over Cloud Communication Environment. 2695-2711 - R. Dhanagopal
, Balasundaram Muthukumar
:
A Model for Low Power, High Speed and Energy Efficient Early Landslide Detection System Using IoT. 2713-2728 - K. Hariharan, N. R. Rajaan, Peter Pethuru Raj Chelliah, Malini Deepika
:
The Enriched Feature Enhancement Technique for Satellite Image Based on Transforms Using PCNN. 2729-2744 - M. Manojprabu, V. R. Sarma Dhulipala:
Power Aware Hessian Multi-set Canonical Correlations Based Algorithm for Wireless Eeg Sensor Networks. 2745-2756 - (Withdrawn) A Sly Salvage of Semantic Web Content with Insistence of Low Precision and Low Recall. 2757-2780
- C. Chandravathi
, Krishnan Mahadevan
:
Web Based Cross Layer Optimization Technique for Energy Efficient WSN. 2781-2792 - A. Lavanya
, R. Jegatheesan
, K. Vijayakumar
:
Design of Novel Dual Input DC-DC Converter for Energy Harvesting System in IoT Sensor Nodes. 2793-2808 - P. Parthasarathi
, S. Shankar:
Weighted Ternary Tree Approach for Secure Group Communication Among Mobile Applications. 2809-2829 - S. Nithyanantham
, G. Singaravel:
Resource and Cost Aware Glowworm Mapreduce Optimization Based Big Data Processing in Geo Distributed Data Center. 2831-2852 - U. Nagabalan
, N. M. Jothi Swaroopan:
An Improved Single Stage Phase Shifted Control Based AC-DC PFC Converter for Wireless Applications. 2853-2864 - M. Shobana, R. Sabitha, S. Karthik:
Cluster-Based Systematic Data Aggregation Model (CSDAM) for Real-Time Data Processing in Large-Scale WSN. 2865-2883 - J. Raj Kannan, R. Sabitha, S. Karthik, J. Shanthini:
Mouse Movement Pattern Based Analysis of Customer Behavior (CBA-MMP) Using Cloud Data Analytics. 2885-2901 - R. Saravana Ram
, M. Vinoth Kumar, S. Ramamoorthy, Saravana Balaji B.
, T. Rajesh Kumar
:
An Efficient Hybrid Computing Environment to Develop a Confidential and Authenticated IoT Service Model. 2903-2927 - Abu Salim, Rajesh Kumar Tiwari, Sachin Tripathi:
An Efficient Public Auditing Scheme for Cloud Storage with Secure Access Control and Resistance Against DOS Attack by Iniquitous TPA. 2929-2954 - V. Sampath, S. Karthik, R. Sabitha:
Position-Based Adaptive Clustering Model (PACM) for Efficient Data Caching in Vehicular Named Data Networks (VNDN). 2955-2971 - J. Anitha Josephine
, S. Senthilkumar:
Tanimoto Support Vector Regressive Linear Program Boost Based Node Trust Evaluation for Secure Communication in MANET. 2973-2993 - K. Naveen Durai, R. Subha, Anandakumar Haldorai
:
A Novel Method to Detect and Prevent SQLIA Using Ontology to Cloud Web Security. 2995-3014 - Ramesh Chandran, S. Rakesh Kumar, N. Gayathri:
Designing a Locating Scams for Mobile Transaction with the Aid of Operational Activity Analysis in Cloud. 3015-3028 - G. Keerthana, P. Anandan, N. Nandhagopal
:
Enhancing the Robustness and Security Against Various Attacks in a Scale: Free Network. 3029-3050 - M. Subalatha, S. Jayashri, J. Raja, K. Sakthidasan Sankaran:
Low Complexity Maximum Likelihood FBMC QAM for Improved Performance in Longer Delay Channels. 3051-3066 - Prasanna Kumar Godi
, Battula Tirumala Krishna
, Pushpa Kotipalli:
Optimized Pipelined Fast Fourier Transform Using Split and Merge Parallel Processing Units for OFDM. 3067-3089 - (Withdrawn) Skyline Query Optimization for Preferable Product Selection and Recommendation System. 3091-3108
- Sreejith Gopalakrishnan, P. Alli:
Trust Based Approach and Risk Management for IT Systems in Cloud Service Selection. 3109-3127 - Ayoub Alsarhan
, Abdel-Rahman Al-Ghuwairi, Islam T. Almalkawi, Mohammad Alauthman
, Ahmed Al-Dubai:
Machine Learning-Driven Optimization for Intrusion Detection in Smart Vehicular Networks. 3129-3152 - M. Geetha, R. Ganesan
:
CEPRAN-Cooperative Energy Efficient and Priority Based Reliable Routing Protocol with Network Coding for WBAN. 3153-3171 - J. Prakash, N. Sengottaiyan, S. Anbukaruppusamy:
Fuel Consumption and Delay Aware Traffic Scheduling in Vanet Environment. 3173-3191 - T. Prakash, V. Senthil Kumar:
Improvement of Oscillatory Stability in Wide Area Controlled Systems Using Power Injection. 3193-3207 - Pothuri Surendra Varma
, Veena Anand:
Random Forest Learning Based Indoor Localization as an IoT Service for Smart Buildings. 3209-3227 - Ajay Kumar
, Kumar Abhishek
, Xuan Liu
, Anandakumar Haldorai
:
An Efficient Privacy-Preserving ID Centric Authentication in IoT Based Cloud Servers for Sustainable Smart Cities. 3229-3253 - (Withdrawn) Optimized Fuzzy System Dependent Trust Score for Mobile AdHoc Network. 3255-3269
- D. Loganathan
, M. Balasubramani, R. Sabitha:
Energy Aware Efficient Data Aggregation (EAEDAR) with Re-scheduling Mechanism Using Clustering Techniques in Wireless Sensor Networks. 3271-3287 - Sakthidasan Krishnan, S. Vaithyasubramanian
, M. Maragatharajan
:
SAED: Self-adaptive Error Detection Automation for Leveraging Computational Efficiency of HCI Systems. 3289-3307 - Silambarasan Elkana Ebinazer, Nickolas Savarimuthu, S. Mary Saira Bhanu:
ESKEA: Enhanced Symmetric Key Encryption Algorithm Based Secure Data Storage in Cloud Networks with Data Deduplication. 3309-3325 - V. Roopa, K. Malarvizhi, S. Karthik:
Efficient Resource Management on Cloud Using Energy and Power Aware Dynamic Migration (EPADM) of VMs. 3327-3342 - R. Subha, Anandakumar Haldorai
, Arulmurugan Ramu
:
An Optimal Approach to Enhance Context Aware Description Administration Service for Cloud Robots in a Deep Learning Environment. 3343-3358 - Jansi Rani Sella Veluswami
, Karthikeyan Chinnusamy
, Kailash Kumar
, Klinge Villalba-Condori, Suryakanth Mohankumar:
Improvement of Transmission Control Protocol for High Bandwidth Applications. 3359-3379 - S. NagaMallik Raj
, Debnath Bhattacharyya
, Divya Midhunchakkaravarthy, Tai-Hoon Kim:
Multi-hop in Clustering with Mobility Protocol to Save the Energy Utilization in Wireless Sensor Networks. 3381-3395 - R. Gopi, S. T. Suganthi, Rajadevi Ramasamy
, P. Johnpaul, Nebojsa Bacanin
, S. Kannimuthu
:
An Enhanced Green Cloud Based Queue Management (GCQM) System to Optimize Energy Consumption in Mobile Edge Computing. 3397-3419 - Xianfu Lin, Yuzhang Huang:
Short-Term High-Speed Traffic Flow Prediction Based on ARIMA-GARCH-M Model. 3421-3430 - Xinhui Zhao, Qingxian Wang, Zehui Wu, Rui Guo:
Method for Overflow Attack Defense of SDN Network Flow Table Based on Stochastic Differential Equation. 3431-3447 - B. Mohankumar, K. Karuppasamy:
Network Lifetime Improved Optimal Routing in Wireless Sensor Network Environment. 3449-3468 - Min Zhao:
Information Iterative Retrieval of Internet of Things Communication Terminal Based on Symmetric Algorithm. 3469-3485 - J. Britto Dennis, M. Shanmuga Priya:
A Profile-Based Novel Framework for Detecting EDoS Attacks in the Cloud Environment. 3487-3503 - Hongsong Chen
, Yongpeng Zhang, Yongrui Cao, Bharat K. Bhargava:
Security Threats and Defensive Approaches in Machine Learning System Under Big Data Environment. 3505-3525 - Anitha Velu
, Menakadevi Thangavelu
:
Hetero-GCD2RDF: An Interoperable Solution for Geospatial Climatic Data by Deploying Semantic Web Technologies. 3527-3551

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.