default search action
Wireless Personal Communications, Volume 127
Volume 127, Number 1, November 2022
- Tanvi Sood, Kanika Sharma:
A Novelistic GSA and CSA Based Optimization for Energy-Efficient Routing Using Multiple Sinks in HWSNs Under Critical Scenarios. 1-37 - Thavavel Vaiyapuri, Velmurugan Subbiah Parvathy, V. Manikandan, N. Krishnaraj, Deepak Gupta, K. Shankar:
A Novel Hybrid Optimization for Cluster-Based Routing Protocol in Information-Centric Wireless Sensor Networks for IoT Based Mobile Edge Computing. 39-62 - P. Sruthi, K. Sahadevaiah:
A Novel Efficient Heuristic Based Localization Paradigm in Wireless Sensor Network. 63-83 - G. Amudha:
Dilated Transaction Access and Retrieval: Improving the Information Retrieval of Blockchain-Assimilated Internet of Things Transactions. 85-105 - M. Senthil Raja, L. Arun Raj:
Detection of Malicious Profiles and Protecting Users in Online Social Networks. 107-124 - Minhang Ma, Zhen Han:
Symmetric Algorithm for Direction Tracking of Dribble Directional Shooting. 125-140 - Feifei Wang, Haifeng Hu:
Symmetric Algorithm for Detection of Coverage Hole in Wireless Sensor Network. 141-158 - Ashutosh Sharma, Lokesh Tharani:
Ant Colony Based Node Disjoint Local Repair in Multipath Routing in MANET Network. 159-186 - Arslan Khalid, Faizan Rashid, Umair Tahir, Hafiz M. Asif, Fadi M. Al-Turjman:
Multi-carrier Visible Light Communication System Using Enhanced Sub-carrier Index Modulation and Discrete Wavelet Transform. 187-215 - Sathish A. P. Kumar, A. Suresh, S. Raj Anand, K. Chokkanathan, M. Vijayasarathy:
Hybridization of Mean Shift Clustering and Deep Packet Inspected Classification for Network Traffic Analysis. 217-233 - P. Mahalakshmi, N. Sabiyath Fatima:
Ensembling of text and images using Deep Convolutional Neural Networks for Intelligent Information Retrieval. 235-253 - Azath Mubarakali:
An Efficient Authentication Scheme Using Blockchain Technology for Wireless Sensor Networks. 255-269 - Shiyao Qin, Ruiming Wang, Deyi Fu:
Research on Wind Turbines Fault Diagnosis Technology Based on CMS Data Feature Extraction. 271-291 - K. Sornalakshmi, G. Vadivu:
Dynamic Auto Reconfiguration of Operator Placement in Wireless Distributed Stream Processing Systems. 293-318 - Aldosary Saad:
Hybrid Secure Equivalent Computing Model for Distributed Computing Applications. 319-339 - Wentian Cai, Huijun Yao:
A Secure Transmission Method of Network Communication Data Based on Symmetric Key Encryption Algorithm. 341-352 - Ming Li:
Automatic Encryption Method of Sensor Network Capture Data Based on Symmetric Algorithm. 353-367 - Hongjing Bi:
Aggregation Encryption Method of Social Network Privacy Data Based on Matrix Decomposition Algorithm. 369-383 - Sunil Kumar, Korhan Cengiz, S. Vimal, Annamalai Suresh:
Energy Efficient Resource Migration Based Load Balance Mechanism for High Traffic Applications IoT. 385-403 - Jie Zhang, Jinguang Sun, Hua He:
Detection and Location for Network Hidden Threat Information Based on Improved MSCKF Algorithm. 405-418 - Ankit Agarwal, Manju Khari, Rajiv Singh:
Detection of DDOS Attack using Deep Learning Model in Cloud Storage Application. 419-439 - Ying Liu, Qianchao Sun, Ashutosh Sharma, Amit Sharma, Gaurav Dhiman:
Line Monitoring and Identification Based on Roadmap Towards Edge Computing. 441-464 - J. Omana, Moorthi Madhavan:
Predictive Analysis and Prognostic Approach of Diabetes Prediction with Machine Learning Techniques. 465-478 - K. Lakshmi Narayanan, R. Santhana Krishnan, Eanoch Golden Julie, Y. Harold Robinson, Vimal Shanmuganathan:
Machine Learning Based Detection and a Novel EC-BRTT Algorithm Based Prevention of DoS Attacks in Wireless Sensor Networks. 479-503 - Yuvaraja Teekaraman, Hariprasath Manoharan:
Implementation of Cognitive Radio Model for Agricultural Applications Using Hybrid Algorithms. 505-522 - Y. Harold Robinson, S. Vimal, Eanoch Golden Julie, K. Lakshmi Narayanan, Seungmin Rho:
3-Dimensional Manifold and Machine Learning Based Localization Algorithm for Wireless Sensor Networks. 523-541 - Wenwen Liu, Haolan Wu, Fei Yu, Qiang Wei:
Design of Information Security Access System in the Power Grid Based on Improved Bayesian Algorithm. 543-559 - Yanlong Zhu:
Edge Defect Detection of Network Image by the Application of Modal Symmetry. 561-576 - Shahana Gajala Qureshi, Shishir Kumar Shandilya:
Novel Fuzzy Based Crow Search Optimization Algorithm for Secure Node-to-Node Data Transmission in WSN. 577-597 - Jie Zhang, Jinguang Sun, Hua He:
Clustering Detection Method of Network Intrusion Feature Based on Support Vector Machine and LCA Block Algorithm. 599-613 - Liwei Zhang:
Predictive Analysis of Machine Learning Error Classification Based on Bayesian Network. 615-634 - M. Raja, S. Dhanasekaran, V. Vasudevan:
Opposition Based Joint Grey Wolf-Whale Optimization Algorithm Based Attribute Based Encryption in Secure Wireless Communication. 635-655 - M. Raja, S. Dhanasekaran, V. Vasudevan:
Correction to: Opposition Based Joint Grey Wolf‑Whale Optimization Algorithm Based Attribute Based Encryption in Secure Wireless Communication. 657 - Rana Muhammad Waseem, Farrukh Zeeshan Khan, Muneer Ahmad, Anum Naseem, N. Z. Jhanjhi, Uttam Ghosh:
Performance Evaluation of AOMDV on Realistic and Efficient VANet Simulations. 659-678 - Sathish A. P. Kumar, Resmi R. Nair, E. Kannan, A. Suresh, S. Raj Anand:
Intelligent Vehicle Parking System (IVPS) Using Wireless Sensor Networks. 679-694 - Dayal Kumar Behera, Madhabananda Das, Subhra Swetanisha, Janmenjoy Nayak, S. Vimal, Bighnaraj Naik:
Follower Link Prediction Using the XGBoost Classification Model with Multiple Graph Features. 695-714 - Feslin Anish Mon Solomon, S. Godfrey Winster, R. Ramesh:
Trust Model for IoT Using Cluster Analysis: A Centralized Approach. 715-736 - R. Krishnamoorthy, I. D. Soubache, Shafali Jain:
Wireless Communication Based Evaluation of Power Consumption for Constrained Energy System. 737-748 - Roy Setiawan, Rama Koteswara Rao Ganga, Priya Velayutham, Kumaravel Thangavel, Dilip Kumar Sharma, Regin Rajan, Sujatha Krishnamoorthy, Sudhakar Sengan:
Encrypted Network Traffic Classification and Resource Allocation with Deep Learning in Software Defined Network. 749-765 - Tu N. Nguyen, Vinh V. Le, Shao-I Chu, Bing-Hong Liu, Yao-Chuan Hsu:
Secure Localization Algorithms Against Localization Attacks in Wireless Sensor Networks. 767-792 - G. Vasukidevi, T. Sethukarasi:
BBSSE: Blockchain-Based Safe Storage, Secure Sharing and Energy Scheme for Smart Grid Network. 793-814 - Fahad Ghalib Abdulkadhim, Zhang Yi, Ameer N. Onaizah, Furkan Rabee, Abbas M. Ali Al-muqarm:
Optimizing the Roadside Unit Deployment Mechanism in VANET with Efficient Protocol to Prevent Data Loss. 815-843 - Renze Luo, Guodong Li, Shunli Fan, Fatemeh Safara:
Location-Based Explosion Detection in Wireless Optical Pressure Sensor Networks Using Bat Optimization Algorithm. 845-868 - Abdulrahman Saad Alqahtani:
Expectation Maximization Method for Effective Detection and Tracking of Object Using Machine Learning Technique for Secure Wireless Communication. 869-880 - Yafei Wang:
Detection for Nodes Intrusion of Compressed Transmission Data Based on Fuzzy Analytic Hierarchy Process. 881-896
Volume 127, Number 2, November 2022
- ShanGuo Lv, Hongli Chen:
Security Protection Technology in Multi-Attribute Data Transmission Based on Fuzzy Genetic Algorithm. 897-917 - Jingkuang Liu, Lemei Yan, Dong Wang:
A Hybrid Blockchain Model for Trusted Data of Supply Chain Finance. 919-943 - Bo Fang:
Method for Quickly Identifying Mine Water Inrush Using Convolutional Neural Network in Coal Mine Safety Mining. 945-962 - Anil Kumar Budati, George Ghinea, S. N. V. Ganesh:
Novel Aninath Computation Detection Algorithm to Identify the UAV Users in 5G Networks. 963-978 - R. Bala Krishnan, N. Rajesh Kumar, N. R. Raajan, G. Manikandan, A. Srinivasan, D. Narasimhan:
An Approach for Attaining Content Confidentiality on Medical Images Through Image Encryption with Steganography. 979-995 - B. Ida Seraphim, E. Poovammal:
Adversarial Attack by Inducing Drift in Streaming Data. 997-1021 - Smriti Sachan, Rohit Sharma, Amit Sehgal:
SINR Based Energy Optimization Schemes for 5G Vehicular Sensor Networks. 1023-1043 - Deep Kumar Bangotra, Yashwant Singh, Arvind Selwal, Nagesh Kumar, Pradeep Kumar Singh:
A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks. 1045-1066 - Mukesh Soni, Dileep Kumar Singh:
LAKA: Lightweight Authentication and Key Agreement Protocol for Internet of Things Based Wireless Body Area Network. 1067-1084 - Arthur A. M. Teodoro, Otávio S. M. Gomes, Muhammad Saadi, Bruno A. Silva, Renata Lopes Rosa, Demóstenes Z. Rodríguez:
An FPGA-Based Performance Evaluation of Artificial Neural Network Architecture Algorithm for IoT. 1085-1116 - Gang Li, Mingle Zhou, Zhengqian Feng, Min Li, Hui Jiang:
Research on Key Influencing Factors of E-Government Cloud Service Satisfaction. 1117-1135 - M. Kirankumar, M. Santhi:
Accomplishment of Reversible Logic Gates in WSN Environment by Patternization. 1137-1155 - Nanditha Boddu, Veeramallu Boba, Ramesh Vatambeti:
A Novel Georouting Potency based Optimum Spider Monkey Approach for Avoiding Congestion in Energy Efficient Mobile Ad-hoc Network. 1157-1186 - Selvakumar S, S. S. Manivannan:
A Spectrum Defragmentation Algorithm Using Jellyfish Optimization Technique in Elastic Optical Network (EON). 1187-1205 - Bingjun Wan, Chengwei Xu, Rajendra Prasad Mahapatra, P. Selvaraj:
Understanding the Cyber-Physical System in International Stadiums for Security in the Network from Cyber-Attacks and Adversaries using AI. 1207-1224 - Dhiren P. Bhagat:
Tracking of Moving Target in Wireless Sensor Network with Improved Network Life Time Using PSO. 1225-1239 - V. Jyothi, M. V. Subramanyam:
An Enhanced Routing Technique to Improve the Network Lifetime of Cognitive Sensor Network. 1241-1264 - Libin Liu, Zhiyuan Sun:
Flow Control in Network Media Information Transmission Based on Differential Evolution Algorithm. 1265-1282 - Jeyasudha Jeyaraj, Usha Gopal:
An Intelligent Centrality Measures for Influential Node Detection in COVID-19 Environment. 1283-1309 - Satheesh Narayanasami, Rajasekhar Butta, Rajeshkumar Govindaraj, Surendra Singh Choudhary, Dilip Kumar Sharma, Anjana Poonia, Sudhakar Sengan, Pankaj Dadheech, Neeraj Kumar Shukla, Rajesh Verma:
An Enhanced Trust-Based Kalman Filter Route Optimization Technique for Wireless Sensor Networks. 1311-1329 - Bei He:
Algorithm to Enhance Security of Dynamic Data Migration in Optical Fiber Network. 1331-1339 - Weina He, Yafei Wang, Dongliang Xia:
Fuzzy Integration Algorithm of Big Data in Peer-to-Peer Communication Network Based on Deep Learning. 1341-1357 - B. Sowmiya, E. Poovammal:
A Heuristic K-Anonymity Based Privacy Preserving for Student Management Hyperledger Fabric blockchain. 1359-1376 - Venu Madhav Kuthadi, Rajalakshmi Selvaraj, S. Baskar, P. Mohamed Shakeel, Abhishek Ranjan:
Optimized Energy Management Model on Data Distributing Framework of Wireless Sensor Network in IoT System. 1377-1403 - Fawad Masood, Maha Driss, Wadii Boulila, Jawad Ahmad, Sadaqat ur Rehman, Sana Ullah Jan, Abdullah Qayyum, William J. Buchanan:
A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations. 1405-1432 - Qiheng Sun, Lanxia Zhang:
Bilateral Matching Model Between R & D Personnel and Project Manager Based on Ant Colony Optimization. 1433-1451 - Muhammad Hassaan Anwar, Saeid Ghafouri, Sukhpal Singh Gill, Joseph Doyle:
Recommender System for Optimal Distributed Deep Learning in Cloud Datacenters. 1453-1477 - K. Subramanian, S. Shanmugavel:
A Complete Continuous Target Coverage Model for Emerging Applications of Wireless Sensor Network Using Termite Flies Optimization Algorithm. 1479-1501 - Yichun Dong:
Design of an Automatic Detection System for Abnormal Communication Data Packets of Electronic Equipment. 1503-1516 - T. Rubesh Kumar, Moorthi Madhavan:
Hybrid Fabric Wearable Antenna Design and Evaluation for High Speed 5G Applications. 1517-1528 - Xuemei Wang, Jiajun Zhang:
An Algorithm of Video Image Fault-Tolerant Coding Transmission Based on OFDM Technology. 1529-1546 - Yingying Liu, Yisen Wang:
Adaptive Data Transmission Method Based on Mean Fuzzy Algorithm in Ad Hoc Networks. 1547-1564 - Inderjeet Kaur, E. Laxmi Lydia, Vinay Kumar Nassa, Bhanu Shrestha, Jamel Nebhen, Sharaf J. Malebary, Gyanendra Prasad Joshi:
Generative Adversarial Networks with Quantum Optimization Model for Mobile Edge Computing in IoT Big Data. 1565-1585 - M. Gayathri, C. Malathy:
Fisher-Yates Chaotic Shuffling Based Visual Cryptography Scheme for Multimodal Biometric Authentication. 1587-1614 - Amit Kishor, Chinmay Chakraborty:
Artificial Intelligence and Internet of Things Based Healthcare 4.0 Monitoring System. 1615-1631 - Lanfang Jia:
Algorithm Design of Multi-channel Weak Signal Detection and Synchronous Acquisition in Communication Network. 1633-1645 - Jayagopalan Santhosh, P. Balamurugan, G. Arulkumaran, Manickam Baskar, R. Velumani:
Image Driven Multi Feature Plant Management with FDE Based Smart Agriculture with Improved Security in Wireless Sensor Networks. 1647-1663 - Liren Zou:
Detection Method of DC Microgrid Network Attack Based on Two-level and Multi-segment Model. 1665-1681 - Amit Kishor, Chinmay Chakraborty:
Task Offloading in Fog Computing for Using Smart Ant Colony Optimization. 1683-1704 - Abdulrahman Saad Alqahtani, Khaled Ali Abuhasel, Mohammed M. Alquraish:
A Novel Decentralized Analytical Methodology for Cyber Physical Networks Attack Detection. 1705-1716 - N. Sree Divya, Veeramallu Bobba, Ramesh Vatambeti:
An Adaptive Cluster based Vehicular Routing Protocol for Secure Communication. 1717-1736 - Roy Setiawan, Vidya Sagar Ponnam, Sudhakar Sengan, Mamoona Anam, Chidambaram Subbiah, Khongdet Phasinam, Manikandan Vairaven, Selvakumar Ponnusamy:
Certain Investigation of Fake News Detection from Facebook and Twitter Using Artificial Intelligence Approach. 1737-1762 - Satheesh Narayanasami, Sudhakar Sengan, Saira Khurram, Farrukh Arslan, SureshKumar Murugaiyan, Regin Rajan, Vijayakumar Peroumal, Anil Kumar Dubey, Sujatha Srinivasan, Dilip Kumar Sharma:
Biological Feature Selection and Classification Techniques for Intrusion Detection on BAT. 1763-1785 - Hasnain Ali Almashhadani, Xiaoheng Deng, Suhaib N. Abdul Latif, Mohammed M. Ibrahim, Ali Hussien Alshammari:
An Edge-Computing Based Task-Unloading Technique with Privacy Protection for Internet of Connected Vehicles. 1787-1808 - C. Santhanakrishnan, K. Annapurani, S. Pradeep, T. Senthilkumar, M. Ramya:
Physical Features Based Authentication Technique and Key Management for IoT Networks. 1809-1825 - Muhammad Junaid, Sajid Ali, Isma Farah Siddiqui, Choon-Sung Nam, Nawab Muhammad Faseeh Qureshi, Jaehyoun Kim, Dong Ryeol Shin:
Correction to: Performance Evaluation of Data-driven Intelligent Algorithms for Big data Ecosystem. 1827
Volume 127, Number 3, December 2022
- Mididoddi Padmaja, Shitharth Selvarajan, K. Prasuna, Abhay Chaturvedi, Pravin Kshirsagar, A. Vani:
Grow of Artificial Intelligence to Challenge Security in IoT Application. 1829-1845 - T. Balachander, M. B. Mukesh Krishnan:
Carrier Frequency Offset (CFO) Synchronization and Peak Average Power Ratio (PAPR) Minimization for Energy Efficient Cognitive Radio Network (CRN) for 5G Wireless Communication. 1847-1867 - Prateek Sikka, Abhijit R. Asati, Chandra Shekhar:
Area, Speed and Power Optimized Implementation of a Band-Pass FIR Filter Using High-Level Synthesis. 1869-1878 - M. Selvakumar, B. Sudhakar:
Energy Efficient Clustering with Secure Routing Protocol Using Hybrid Evolutionary Algorithms for Mobile Adhoc Networks. 1879-1897 - Ashish Khanna, Poonam Rani, Tariq Hussain Sheikh, Deepak Gupta, Vineet Kansal, Joel J. P. C. Rodrigues:
Blockchain-Based Security Enhancement and Spectrum Sensing in Cognitive Radio Network. 1899-1921 - S. Venkatasubramanian, A. Suhasini, C. Vennila:
An Efficient Route Optimization Using Ticket-ID Based Routing Management System (T-ID BRM). 1923-1942 - Pronaya Bhattacharya, Sudeep Tanwar, Umesh Bodkhe, Ashwani Kumar, Neeraj Kumar:
EVBlocks: A Blockchain-Based Secure Energy Trading Scheme for Electric Vehicles underlying 5G-V2X Ecosystems. 1943-1983 - C. Mohanadevi, S. Selvakumar:
A Qos-Aware, Hybrid Particle Swarm Optimization-Cuckoo Search Clustering Based Multipath Routing in Wireless Sensor Networks. 1985-2001 - Beledha Santhosh Kumar, Polipalli Trinatha Rao:
An Optimal Emperor Penguin Optimization Based Enhanced Flower Pollination Algorithm in WSN for Fault Diagnosis and Prolong Network Lifespan. 2003-2020 - Ashish Khanna, Poonam Rani, Puneet Garg, Prakash Kumar Singh, Aditya Khamparia:
An Enhanced Crow Search Inspired Feature Selection Technique for Intrusion Detection Based Wireless Network System. 2021-2038 - Ashish Khanna, Poonam Rani, Puneet Garg, Prakash Kumar Singh, Aditya Khamparia:
Correction to: An Enhanced Crow Search Inspired Feature Selection Technique for Intrusion Detection Based Wireless Network System. 2039 - Mukesh Soni, Gaurav Dhiman, Brajendra Singh Rajput, Rajan Patel, Nitesh Kumar Tejra:
Energy-Effective and Secure Data Transfer Scheme for Mobile Nodes in Smart City Applications. 2041-2061 - Yi-Cheng Shen, Te-Chun Hsia, Ching-Hsien Hsu:
Software Optimization in Ultrasound Imaging Technique Using Improved Deep Belief Learning Network on the Internet of Medical Things Platform. 2063-2081 - Sangeeta Sa, Arunanshu Mahapatro:
Role-Based Channel Hopping Algorithm for a Cognitive Radio Network in Asynchronous Environment. 2083-2102 - S. Raamakirtinan, L. M. Jenila Livingston:
Identifying Influential Spreaders in Complex Networks Based on Weighted Mixed Degree Decomposition Method. 2103-2119 - Yuan Xiwen:
Design of Voice Recognition Acoustic Compression System Based on Neural Network. 2121-2139 - Yang He, Bai-sheng Nie, Jianhui Zhang, Priyan Malarvizhi Kumar, BalaAnand Muthu:
Fault Detection and Diagnosis of Cyber-Physical System Using the Computer Vision and Image Processing. 2141-2160 - Sita Kumari Kotha, Meesala Shobha Rani, Bharat Subedi, Anilkumar Chunduru, Aravind Karrothu, Bipana Neupane, Sathishkumar V. E.:
A Comprehensive Review on Secure Data Sharing in Cloud Environment. 2161-2188 - T. Balachander, M. B. Mukesh Krishnan:
Efficient Utilization of Cooperative Spectrum Sensing (CSS) in Cognitive Radio Network (CRN) Using Non-orthogonal Multiple Access (NOMA). 2189-2210 - M. Girija, P. Manickam, M. Ramaswami:
FibGeoPresent: A Highly Secured and Geographic Coordinate System Based Authenticated Lightweight Block Cipher for Smart System. 2211-2228 - Vadivel Ramasamy, SudalaiMuthu Thalavai Pillai:
Cauchy Particle Swarm Optimization (CPSO) Based Migrations of Tasks in a Virtual Machine. 2229-2246 - P. Savaridassan, G. Maragatham:
Integrated Deep Auto-Encoder and Q-Learning-Based Scheme to Detect Anomalies and Supporting Forensics in Cloud Computing Environments. 2247-2265 - V. Nallarasan, Kottilingam Kottursamy:
Cognitive Radio Jamming Attack Detection Using an Autoencoder for CRIoT Network. 2267-2283 - Rudranath Banerjee, Sourav De, Shouvik Dey:
WTAOF-ILPB Based Feature Learning and LFSSOA-RBFNN Based Classification for Facial Micro-Expression Recognition. 2285-2304 - G. Saranya, A. Pravin:
Hybrid Global Sensitivity Analysis Based Optimal Attribute Selection Using Classification Techniques by Machine Learning Algorithm. 2305-2324 - Parameshwaran Ramalingam, R. Thanuja, R. Bhavani, Gopalakrishnan Lakshminarayanan:
An Efficient Lossless Telemetry Data Compression and Fault Analysis System Using 2SMLZ and CMOW-DLNN. 2325-2345 - U. Padmavathi, Narendran Rajagopalan:
Blockchain Enabled Emperor Penguin Optimizer Based Encryption Technique for Secure Image Management System. 2347-2364 - A. Saritha, B. Ramasubba Reddy, A. Suresh Babu:
QEMDD: Quantum Inspired Ensemble Model to Detect and Mitigate DDoS Attacks at Various Layers of SDN Architecture. 2365-2390 - R. Uthra, D. Suchitra:
A Fuzzy Based Improved Control Strategy of Dynamic Voltage Restorer for Low Voltage and High Voltage Ride Through Compensation for Variable Speed Hybrid Energy System. 2391-2415 - M. Revathi, V. V. Ramalingam, B. Amutha:
A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework. 2417-2441 - Juan Wang, Fang Liu:
Computer-Assisted Collaborative Learning for Enhancing Students Intellectual Ability Using Machine Learning Techniques. 2443-2460 - Haider Mehraj, Ajaz Hussain Mir:
Robust Multimodal Biometric System Based on Feature Level Fusion of Optimiseddeepnet Features. 2461-2482 - K. Sita Kumari, Sarita Samal, Ruby Mishra, Gunashekhar Madiraju, M. Nazargi Mahabob, Anil Bangalore Shivappa:
Diagnosing COVID-19 from CT Image of Lung Segmentation & Classification with Deep Learning Based on Convolutional Neural Networks. 2483-2499 - P. Sachidhanandam, P. Balasubramanie:
Elevated Ensemble Dynamic Energy-Aware Routing Optimization Based Energy Management and Network Lifetime Improvement in WSN. 2501-2513 - Mallikarjuna Nandi, K. Anusha:
An Optimized and Hybrid Energy Aware Routing Model for Effective Detection of Flooding Attacks in a Manet Environment. 2515-2533 - Neeraj Kumar, Abhishek Mishra:
EEDLNN Algorithm for Assessing the Vulnerability in Railway Network with Respect to Passengers and Trains. 2535-2552 - Archana Shirke, M. M. Chandane:
Performance Modelling and Analysis of IoT Based Edge Computing Policies. 2553-2568 - M. S. Abirami, B. Vennila, K. Suganthi, Sarthak Kawatra, Anuja Vaishnava:
Detection of Choroidal Neovascularization (CNV) in Retina OCT Images Using VGG16 and DenseNet CNN. 2569-2583 - S. Karthigaiveni, R. Pandeeswari, S. Deivalakshmi:
Miniaturized MIMO Antenna with Complementary Split Ring Resonators Loaded Superstrate for X-band Applications. 2585-2603 - Purnima Lala Mehta, Ambuj Kumar, Bilal Muhammad, Ramjee Prasad:
A Technological and Business Perspective on Connected Drones for 6G and Beyond Mobile Wireless Communications. 2605-2624 - Tayeb Diab, Marc Gilg, Pascal Lorenz, Frédéric Drouhin:
Using I2P (Invisible Internet Protocol) Encrypted Virtual Tunnels for a Secure and Anonymous Communication in VANets: I2P Vehicular Protocol (IVP). 2625-2644 - Tayeb Diab, Marc Gilg, Pascal Lorenz, Frédéric Drouhin:
Correction to: Using I2P (Invisible Internet Protocol) Encrypted Virtual Tunnels for a Secure and Anonymous Communication in VANets: I2P Vehicular Protocol (IVP). 2645 - Masoud Khodaverdizadeh, Afrooz Haghbin, Farbod Razzazi:
Improving the Performance of HF Radio Networks in the Presence of Interference through Automatic Link Establishment with Frequency Hopping Technique. 2647-2666 - Sriram Arumugam, Sangeetha Manoharan, Vidhyacharan Bhaskar, P. Sandeep Kumar:
A Comprehensive Review on Automotive Antennas for Short Range Radar Communications. 2667-2694 - Mohamed Shalaby, Mohamed Shahein, Mona Shokair:
Mathematical Analysis and Performance Evaluation of the Cell-Free mMIMO Networks Based on Cognitive Relays. 2695-2708
Volume 127, Number 4, December 2022
- Prachi Gupta, Vishal Gupta:
Linear 1 × 4 Microstrip Antenna Array Using Slotted Circular Patch for 5G Communication Applications. 2709-2725 - T. A. Balarajuswamy, R. Nakkeeran:
Efficiency Enhancement of Reconfigurable SIW Antenna for Millimeter-Wave Applications. 2727-2742 - M. S. Saranya, P. Geetha:
Multi-View Clothing Image Segmentation Using the Iterative Triclass Thresholding Technique. 2743-2759 - Deivanai Gurusamy, Galane Diriba:
Sensor Network and Energy Harvesting Solutions Towards Water Quality Monitoring in Developing Countries. 2761-2779 - Mini Arora, Ashok Pal:
A Deep Learning Approach to Accurately Predict the κ-Coverage Probability in Wireless Sensor Networks. 2781-2798 - Seyedeh Maedeh Mirmohseni, Chunming Tang, Amir Javadpour:
FPSO-GA: A Fuzzy Metaheuristic Load Balancing Algorithm to Reduce Energy Consumption in Cloud Networks. 2799-2821 - Monika, Dipali Bansal, Abhiruchi Passi:
Image Forgery Detection and Localization Using Block Based and Key-Point Based Feature Matching Forensic Investigation. 2823-2839 - Gaurav Aggarwal:
Social Communication Disorder Outside Intellectual Disability? A Review and Classification Approach to Receptive and Expressive Communication in Intellectual Disability. 2841-2858 - Dong Yan, Peixue Liu, Xiujie Yue, Penghao Wang, Minghua Liu, Baoshun Li:
Data Fusion Algorithm Based on Classification Adaptive Estimation Weighted Fusion in WSN. 2859-2871 - Aashiq Banu S, B. K. Murthy, G. Bindu Sai, Sowmya Gali, Kalluru Hemaswitha, Rengarajan Amirtharajan:
Telugu DNA for Safe Delivery: A Secured Text Communication. 2873-2889 - Ketavath Kumar Naik, Ravi Kumar Palla, Sriram Sandhya Rani, B. V. S. Sailaja:
Design of Compact Bow-Tie Patch Antenna with Defected Concentric Rings on Ground for Wireless Communications. 2891-2903 - Neda Solari Esfehani, Hamid Haj Seyyed Javadi:
A High Resilience and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Networks. 2905-2934 - Piyush Jain, Natarajan Jayanthi, M. Lakshmanan:
Closed Form Expressions of AC and SER for Double GG Fading Distribution under EGC Scheme in FSO Communication System. 2935-2954 - G. Pius Agbulu, G. Joselin Retna Kumar, Asokan Vimala Juliet, S. Adurrashid Hassan:
PECDF-CMRP: A Power-Efficient Compressive Data Fusion and Cluster-Based Multi-hop Relay-Assisted Routing Protocol for IoT Sensor Networks. 2955-2977 - Yijun Yang, Xiayan Zhang:
A Novel Hash Function Based on Multi-iterative Parallel Structure. 2979-2996 - M. Maria Dominic Savio, T. Deepa:
Design of Energy Efficient Multiplier with Approximate Computing on Scalable Compressor for Error-Resilient Image Contrast Enhancement. 2997-3013 - Shruti Goel, Rakhee Kulshrestha:
Dependability-Based Analysis for Ultra-reliable Communication in Heterogeneous Traffic Cognitive Radio Networks with Spectrum Reservation. 3015-3039 - Shaik Karimullah, D. Vishnu Vardhan, Vidhyacharan Bhaskar:
An Improved Harmony Search Approach for Block Placement for VLSI Design Automation. 3041-3059 - Sungwook Kim:
Two-Phase Wireless Bandwidth Allocation Scheme Based on Cooperative Game Solutions. 3061-3077 - Maryam Farahbakhsh, Meisam Nesary Moghadam:
Multi-class Multipath Routing Protocol for Low Power and Lossy Networks, with Energy Balanced Optimal Rate Assignment. 3079-3096 - Lahcen Sellak, Lahcen Aguni, Samira Chabaa, Saida Ibnyaich, Abdelouhab Zeroual, Atmane Baddou:
Modeling and Designing of a Compact Single Band PIFA Antenna for Wireless Application Using Artificial Neural Network. 3097-3117 - Valarmathi Marudhai, Shanthi Prince, Shayna Kumari:
Design and Simulation of Physical Layer Security for Next Generation Intelligent Optical Networks. 3119-3138 - Hassan Harb, Chady Abou Jaoude, David Laiymani, Abdallah Makhoul, Chamseddine Zaki, Layla Tannoury:
A Multi-Tier Data Prediction Mechanism for the Internet of Things Networks. 3139-3172 - Amine Dahane, Rabaie Benameur, Kechar Bouabdellah:
An IoT Low-Cost Smart Farming for Enhancing Irrigation Efficiency of Smallholders Farmers. 3173-3210 - Rakesh Ranjan Swain, Tirtharaj Dash, Pabitra Mohan Khilar:
Automated Fault Diagnosis in Wireless Sensor Networks: A Comprehensive Survey. 3211-3243 - Xiangdong Jia, Zhemin Wei, Zhenchao Hao, Yuhua Ouyang:
Modeling D2D Underlaying Cellular Network for Hotspot Communications with Poisson Cluster and Hole Processes. 3245-3297 - K. Gavaskar, D. Malathi, G. Ravivarma, V. Krithika Devi, M. Megala, S. Megaraj Begam:
A Variant of Long Multiplication Design with Low Power and Area Using Modified 7: 3 Compressor for Biomedical Applications. 3299-3319 - Riad Aouabed, Fouzi Semchedine, Aboubekeur Hamdi-Cherif:
A Wake-up Radio-Based Energy-Efficient Multi-Hop Clustering Protocol for WSNs. 3321-3346 - Akhilesh Verma, Anshdha Gupta, Mohammad Akbar, Arun Kumar Yadav, Divakar Yadav:
Presentation Attack Detection Using Referential Quality Metrics and Minutiae Count. 3347-3361 - Sammaiah Thurpati, P. Muthuchidambaranathan:
Design of Hybrid Precoding for Millimeter-Wave Massive MIMO System. 3363-3377 - Sunita Saini, Davinder Singh Saini:
Performance Modelling and Design Techniques for Efficiency Improvement in On-chip Switched-Capacitor DC-DC Converter. 3379-3405 - Somasundaram Mathivanan, A. Rajeswari:
Omnidirectional Microstrip MIMO Antenna for Intelligent Vehicle RADAR Communication. 3407-3421 - Somasundaram Mathivanan, A. Rajeswari:
Correction to: Omnidirectional Microstrip MIMO Antenna for Intelligent Vehicle RADAR Communication. 3423 - Piyush Satti, Nikhil Sharma, Gurinder Singh, Bharat Garg:
A Flexible Dynamic Master-User Look-Up Table Approach for Evaluation of Trigonometric Values. 3425-3434 - Mohd Javed Khan, Ram Chandra Singh Chauhan, Indrasen Singh:
Comparative Analysis of Full Duplex and Half Duplex Relay for High-Speed Vehicular Scenario. 3435-3448 - Mahyar Sadrishojaei, Nima Jafari Navimipour, Midia Reshadi, Mehdi Hosseinzadeh:
An Energy-Aware IoT Routing Approach Based on a Swarm Optimization Algorithm and a Clustering Technique. 3449-3465 - Mohd Shariq, Karan Singh:
A Secure and Lightweight RFID-Enabled Protocol for IoT Healthcare Environment: A Vector Space Based Approach. 3467-3491 - Pankaj Kumar, Sam Darshi, Samar Shailendra:
Analysis of Drone Assisted Network Coded Cooperation for LoS Environments. 3493-3510 - Robbi Rahim, Manikandan Ramachandran, Prassanna Jayachandran, Hariharan Kalyanaraman, Vidhyacharan Bhaskar, Ambeshwar Kumar:
Holistic Feistel Authenticated Learning-Based Authorization for Protecting the Internet of Things from Cyber Attacks. 3511-3532 - Deepanshu Arora, Shashank Gupta, Alagan Anpalagan:
Evolution and Adoption of Next Generation IoT-Driven Health Care 4.0 Systems. 3533-3613 - Rafidah Ahmad, Mohamad Faiz Mohamed Omar, Jagadheswaran Rajendran, Widad Ismail:
Performance Analysis of Enhanced AES-128 and Blowfish Algorithms Through Parallel-Pipelined-Memory Techniques. 3615-3635 - Banani Talukdar, Deepak Kumar, Wasim Arif:
Performance Analysis of a Prediction-Sensing Based Cooperative Energy Harvesting CRN Over Rician Fading Channels. 3637-3658 - Sourav Roy, Ujjal Chakraborty:
Frequency Reconfigurable Wearable Low-Cost Multi Band Antenna for WLAN and ISM Band Application. 3659-3675 - Ravilla Dilli:
Hybrid Beamforming in 5G NR Networks Using Multi User Massive MIMO at FR2 Frequency Bands. 3677-3709
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.