


default search action
Wireless Personal Communications, Volume 127
Volume 127, Number 1, November 2022
- Tanvi Sood

, Kanika Sharma:
A Novelistic GSA and CSA Based Optimization for Energy-Efficient Routing Using Multiple Sinks in HWSNs Under Critical Scenarios. 1-37 - Thavavel Vaiyapuri

, Velmurugan Subbiah Parvathy, V. Manikandan, N. Krishnaraj, Deepak Gupta, K. Shankar
:
A Novel Hybrid Optimization for Cluster-Based Routing Protocol in Information-Centric Wireless Sensor Networks for IoT Based Mobile Edge Computing. 39-62 - P. Sruthi, K. Sahadevaiah:

A Novel Efficient Heuristic Based Localization Paradigm in Wireless Sensor Network. 63-83 - G. Amudha:

Dilated Transaction Access and Retrieval: Improving the Information Retrieval of Blockchain-Assimilated Internet of Things Transactions. 85-105 - M. Senthil Raja

, L. Arun Raj
:
Detection of Malicious Profiles and Protecting Users in Online Social Networks. 107-124 - Minhang Ma, Zhen Han:

Symmetric Algorithm for Direction Tracking of Dribble Directional Shooting. 125-140 - Feifei Wang, Haifeng Hu:

Symmetric Algorithm for Detection of Coverage Hole in Wireless Sensor Network. 141-158 - Ashutosh Sharma, Lokesh Tharani:

Ant Colony Based Node Disjoint Local Repair in Multipath Routing in MANET Network. 159-186 - Arslan Khalid

, Faizan Rashid
, Umair Tahir
, Hafiz M. Asif
, Fadi M. Al-Turjman
:
Multi-carrier Visible Light Communication System Using Enhanced Sub-carrier Index Modulation and Discrete Wavelet Transform. 187-215 - Sathish A. P. Kumar, A. Suresh, S. Raj Anand

, K. Chokkanathan
, M. Vijayasarathy:
Hybridization of Mean Shift Clustering and Deep Packet Inspected Classification for Network Traffic Analysis. 217-233 - P. Mahalakshmi

, N. Sabiyath Fatima
:
Ensembling of text and images using Deep Convolutional Neural Networks for Intelligent Information Retrieval. 235-253 - Azath Mubarakali

:
An Efficient Authentication Scheme Using Blockchain Technology for Wireless Sensor Networks. 255-269 - Shiyao Qin, Ruiming Wang, Deyi Fu

:
Research on Wind Turbines Fault Diagnosis Technology Based on CMS Data Feature Extraction. 271-291 - K. Sornalakshmi, G. Vadivu

:
Dynamic Auto Reconfiguration of Operator Placement in Wireless Distributed Stream Processing Systems. 293-318 - Aldosary Saad

:
Hybrid Secure Equivalent Computing Model for Distributed Computing Applications. 319-339 - Wentian Cai, Huijun Yao:

A Secure Transmission Method of Network Communication Data Based on Symmetric Key Encryption Algorithm. 341-352 - Ming Li:

Automatic Encryption Method of Sensor Network Capture Data Based on Symmetric Algorithm. 353-367 - Hongjing Bi:

Aggregation Encryption Method of Social Network Privacy Data Based on Matrix Decomposition Algorithm. 369-383 - Sunil Kumar

, Korhan Cengiz
, S. Vimal
, Annamalai Suresh:
Energy Efficient Resource Migration Based Load Balance Mechanism for High Traffic Applications IoT. 385-403 - Jie Zhang, Jinguang Sun, Hua He:

Detection and Location for Network Hidden Threat Information Based on Improved MSCKF Algorithm. 405-418 - Ankit Agarwal

, Manju Khari, Rajiv Singh
:
Detection of DDOS Attack using Deep Learning Model in Cloud Storage Application. 419-439 - Ying Liu, Qianchao Sun, Ashutosh Sharma

, Amit Sharma
, Gaurav Dhiman
:
Line Monitoring and Identification Based on Roadmap Towards Edge Computing. 441-464 - J. Omana

, Moorthi Madhavan
:
Predictive Analysis and Prognostic Approach of Diabetes Prediction with Machine Learning Techniques. 465-478 - K. Lakshmi Narayanan

, R. Santhana Krishnan, Eanoch Golden Julie, Y. Harold Robinson
, Vimal Shanmuganathan
:
Machine Learning Based Detection and a Novel EC-BRTT Algorithm Based Prevention of DoS Attacks in Wireless Sensor Networks. 479-503 - Yuvaraja Teekaraman

, Hariprasath Manoharan:
Implementation of Cognitive Radio Model for Agricultural Applications Using Hybrid Algorithms. 505-522 - Y. Harold Robinson

, S. Vimal
, Eanoch Golden Julie, K. Lakshmi Narayanan
, Seungmin Rho:
3-Dimensional Manifold and Machine Learning Based Localization Algorithm for Wireless Sensor Networks. 523-541 - Wenwen Liu, Haolan Wu, Fei Yu, Qiang Wei:

Design of Information Security Access System in the Power Grid Based on Improved Bayesian Algorithm. 543-559 - Yanlong Zhu:

Edge Defect Detection of Network Image by the Application of Modal Symmetry. 561-576 - Shahana Gajala Qureshi

, Shishir Kumar Shandilya
:
Novel Fuzzy Based Crow Search Optimization Algorithm for Secure Node-to-Node Data Transmission in WSN. 577-597 - Jie Zhang, Jinguang Sun, Hua He:

Clustering Detection Method of Network Intrusion Feature Based on Support Vector Machine and LCA Block Algorithm. 599-613 - Liwei Zhang:

Predictive Analysis of Machine Learning Error Classification Based on Bayesian Network. 615-634 - M. Raja, S. Dhanasekaran, V. Vasudevan:

Opposition Based Joint Grey Wolf-Whale Optimization Algorithm Based Attribute Based Encryption in Secure Wireless Communication. 635-655 - M. Raja, S. Dhanasekaran, V. Vasudevan:

Correction to: Opposition Based Joint Grey Wolf‑Whale Optimization Algorithm Based Attribute Based Encryption in Secure Wireless Communication. 657 - Rana Muhammad Waseem, Farrukh Zeeshan Khan, Muneer Ahmad

, Anum Naseem, N. Z. Jhanjhi
, Uttam Ghosh:
Performance Evaluation of AOMDV on Realistic and Efficient VANet Simulations. 659-678 - Sathish A. P. Kumar, Resmi R. Nair

, E. Kannan, A. Suresh, S. Raj Anand
:
Intelligent Vehicle Parking System (IVPS) Using Wireless Sensor Networks. 679-694 - Dayal Kumar Behera

, Madhabananda Das, Subhra Swetanisha
, Janmenjoy Nayak, S. Vimal
, Bighnaraj Naik
:
Follower Link Prediction Using the XGBoost Classification Model with Multiple Graph Features. 695-714 - Feslin Anish Mon Solomon

, S. Godfrey Winster, R. Ramesh:
Trust Model for IoT Using Cluster Analysis: A Centralized Approach. 715-736 - R. Krishnamoorthy

, I. D. Soubache, Shafali Jain:
Wireless Communication Based Evaluation of Power Consumption for Constrained Energy System. 737-748 - (Withdrawn) Encrypted Network Traffic Classification and Resource Allocation with Deep Learning in Software Defined Network. 749-765

- Tu N. Nguyen

, Vinh V. Le, Shao-I Chu, Bing-Hong Liu, Yao-Chuan Hsu:
Secure Localization Algorithms Against Localization Attacks in Wireless Sensor Networks. 767-792 - G. Vasukidevi

, T. Sethukarasi
:
BBSSE: Blockchain-Based Safe Storage, Secure Sharing and Energy Scheme for Smart Grid Network. 793-814 - Fahad Ghalib Abdulkadhim

, Zhang Yi, Ameer N. Onaizah, Furkan Rabee, Abbas M. Ali Al-muqarm:
Optimizing the Roadside Unit Deployment Mechanism in VANET with Efficient Protocol to Prevent Data Loss. 815-843 - Renze Luo, Guodong Li, Shunli Fan, Fatemeh Safara:

Location-Based Explosion Detection in Wireless Optical Pressure Sensor Networks Using Bat Optimization Algorithm. 845-868 - Abdulrahman Saad Alqahtani:

Expectation Maximization Method for Effective Detection and Tracking of Object Using Machine Learning Technique for Secure Wireless Communication. 869-880 - Yafei Wang:

Detection for Nodes Intrusion of Compressed Transmission Data Based on Fuzzy Analytic Hierarchy Process. 881-896
Volume 127, Number 2, November 2022
- ShanGuo Lv, Hongli Chen:

Security Protection Technology in Multi-Attribute Data Transmission Based on Fuzzy Genetic Algorithm. 897-917 - Jingkuang Liu

, Lemei Yan, Dong Wang:
A Hybrid Blockchain Model for Trusted Data of Supply Chain Finance. 919-943 - Bo Fang:

Method for Quickly Identifying Mine Water Inrush Using Convolutional Neural Network in Coal Mine Safety Mining. 945-962 - Anil Kumar Budati

, George Ghinea, S. N. V. Ganesh:
Novel Aninath Computation Detection Algorithm to Identify the UAV Users in 5G Networks. 963-978 - R. Bala Krishnan

, N. Rajesh Kumar
, N. R. Raajan, Manikandan Ganesan
, A. Srinivasan, D. Narasimhan
:
An Approach for Attaining Content Confidentiality on Medical Images Through Image Encryption with Steganography. 979-995 - B. Ida Seraphim

, E. Poovammal
:
Adversarial Attack by Inducing Drift in Streaming Data. 997-1021 - Smriti Sachan, Rohit Sharma

, Amit Sehgal:
SINR Based Energy Optimization Schemes for 5G Vehicular Sensor Networks. 1023-1043 - Deep Kumar Bangotra, Yashwant Singh, Arvind Selwal

, Nagesh Kumar, Pradeep Kumar Singh
:
A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks. 1045-1066 - Mukesh Soni

, Dileep Kumar Singh
:
LAKA: Lightweight Authentication and Key Agreement Protocol for Internet of Things Based Wireless Body Area Network. 1067-1084 - Arthur A. M. Teodoro

, Otávio S. M. Gomes, Muhammad Saadi
, Bruno A. Silva, Renata Lopes Rosa, Demóstenes Z. Rodríguez
:
An FPGA-Based Performance Evaluation of Artificial Neural Network Architecture Algorithm for IoT. 1085-1116 - Gang Li, Mingle Zhou, Zhengqian Feng, Min Li, Hui Jiang

:
Research on Key Influencing Factors of E-Government Cloud Service Satisfaction. 1117-1135 - M. Kirankumar

, M. Santhi:
Accomplishment of Reversible Logic Gates in WSN Environment by Patternization. 1137-1155 - Nanditha Boddu

, Veeramallu Bobba
, Ramesh Vatambeti:
A Novel Georouting Potency based Optimum Spider Monkey Approach for Avoiding Congestion in Energy Efficient Mobile Ad-hoc Network. 1157-1186 - Selvakumar S

, S. S. Manivannan:
A Spectrum Defragmentation Algorithm Using Jellyfish Optimization Technique in Elastic Optical Network (EON). 1187-1205 - Bingjun Wan, Chengwei Xu, Rajendra Prasad Mahapatra, P. Selvaraj

:
Understanding the Cyber-Physical System in International Stadiums for Security in the Network from Cyber-Attacks and Adversaries using AI. 1207-1224 - Dhiren P. Bhagat

:
Tracking of Moving Target in Wireless Sensor Network with Improved Network Life Time Using PSO. 1225-1239 - V. Jyothi

, M. V. Subramanyam:
An Enhanced Routing Technique to Improve the Network Lifetime of Cognitive Sensor Network. 1241-1264 - Libin Liu, Zhiyuan Sun:

Flow Control in Network Media Information Transmission Based on Differential Evolution Algorithm. 1265-1282 - Jeyasudha Jeyaraj, Usha Gopal:

An Intelligent Centrality Measures for Influential Node Detection in COVID-19 Environment. 1283-1309 - Satheesh Narayanasami

, Rajasekhar Butta
, Rajeshkumar Govindaraj, Surendra Singh Choudhary, Dilip Kumar Sharma
, Anjana Poonia, Sudhakar Sengan, Pankaj Dadheech
, Neeraj Kumar Shukla
, Rajesh Verma
:
An Enhanced Trust-Based Kalman Filter Route Optimization Technique for Wireless Sensor Networks. 1311-1329 - Bei He:

Algorithm to Enhance Security of Dynamic Data Migration in Optical Fiber Network. 1331-1339 - Weina He, Yafei Wang, Dongliang Xia:

Fuzzy Integration Algorithm of Big Data in Peer-to-Peer Communication Network Based on Deep Learning. 1341-1357 - B. Sowmiya

, E. Poovammal
:
A Heuristic K-Anonymity Based Privacy Preserving for Student Management Hyperledger Fabric blockchain. 1359-1376 - Venu Madhav Kuthadi, Rajalakshmi Selvaraj, S. Baskar, P. Mohamed Shakeel, Abhishek Ranjan

:
Optimized Energy Management Model on Data Distributing Framework of Wireless Sensor Network in IoT System. 1377-1403 - Fawad Masood, Maha Driss

, Wadii Boulila
, Jawad Ahmad
, Sadaqat ur Rehman
, Sana Ullah Jan
, Abdullah Qayyum
, William J. Buchanan
:
A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations. 1405-1432 - Qiheng Sun, Lanxia Zhang:

Bilateral Matching Model Between R & D Personnel and Project Manager Based on Ant Colony Optimization. 1433-1451 - Muhammad Hassaan Anwar, Saeid Ghafouri

, Sukhpal Singh Gill
, Joseph Doyle
:
Recommender System for Optimal Distributed Deep Learning in Cloud Datacenters. 1453-1477 - K. Subramanian, S. Shanmugavel:

A Complete Continuous Target Coverage Model for Emerging Applications of Wireless Sensor Network Using Termite Flies Optimization Algorithm. 1479-1501 - Yichun Dong:

Design of an Automatic Detection System for Abnormal Communication Data Packets of Electronic Equipment. 1503-1516 - T. Rubesh Kumar, Moorthi Madhavan

:
Hybrid Fabric Wearable Antenna Design and Evaluation for High Speed 5G Applications. 1517-1528 - Xuemei Wang, Jiajun Zhang:

An Algorithm of Video Image Fault-Tolerant Coding Transmission Based on OFDM Technology. 1529-1546 - Yingying Liu, Yisen Wang:

Adaptive Data Transmission Method Based on Mean Fuzzy Algorithm in Ad Hoc Networks. 1547-1564 - Inderjeet Kaur

, E. Laxmi Lydia
, Vinay Kumar Nassa
, Bhanu Shrestha
, Jamel Nebhen
, Sharaf J. Malebary
, Gyanendra Prasad Joshi
:
Generative Adversarial Networks with Quantum Optimization Model for Mobile Edge Computing in IoT Big Data. 1565-1585 - M. Gayathri, C. Malathy:

Fisher-Yates Chaotic Shuffling Based Visual Cryptography Scheme for Multimodal Biometric Authentication. 1587-1614 - Amit Kishor, Chinmay Chakraborty

:
Artificial Intelligence and Internet of Things Based Healthcare 4.0 Monitoring System. 1615-1631 - Lanfang Jia:

Algorithm Design of Multi-channel Weak Signal Detection and Synchronous Acquisition in Communication Network. 1633-1645 - Jayagopalan Santhosh, P. Balamurugan, G. Arulkumaran, Manickam Baskar

, R. Velumani
:
Image Driven Multi Feature Plant Management with FDE Based Smart Agriculture with Improved Security in Wireless Sensor Networks. 1647-1663 - Liren Zou:

Detection Method of DC Microgrid Network Attack Based on Two-level and Multi-segment Model. 1665-1681 - Amit Kishor, Chinmay Chakraborty

:
Task Offloading in Fog Computing for Using Smart Ant Colony Optimization. 1683-1704 - Abdulrahman Saad Alqahtani, Khaled Ali Abuhasel, Mohammed M. Alquraish:

A Novel Decentralized Analytical Methodology for Cyber Physical Networks Attack Detection. 1705-1716 - N. Sree Divya, Veeramallu Bobba

, Ramesh Vatambeti:
An Adaptive Cluster based Vehicular Routing Protocol for Secure Communication. 1717-1736 - Roy Setiawan, Vidya Sagar Ponnam, Sudhakar Sengan

, Mamoona Anam, Chidambaram Subbiah
, Khongdet Phasinam
, Manikandan Vairaven
, Selvakumar Ponnusamy:
Certain Investigation of Fake News Detection from Facebook and Twitter Using Artificial Intelligence Approach. 1737-1762 - Satheesh Narayanasami

, Sudhakar Sengan
, Saira Khurram, Farrukh Arslan, SureshKumar Murugaiyan
, Regin Rajan
, Vijayakumar Peroumal
, Anil Kumar Dubey, Sujatha Srinivasan
, Dilip Kumar Sharma
:
Biological Feature Selection and Classification Techniques for Intrusion Detection on BAT. 1763-1785 - Hasnain Ali Almashhadani, Xiaoheng Deng, Suhaib N. Abdul Latif, Mohammed M. Ibrahim, Ali Hussien Alshammari:

An Edge-Computing Based Task-Unloading Technique with Privacy Protection for Internet of Connected Vehicles. 1787-1808 - C. Santhanakrishnan

, K. Annapurani
, S. Pradeep, T. Senthilkumar, M. Ramya
:
Physical Features Based Authentication Technique and Key Management for IoT Networks. 1809-1825 - Muhammad Junaid, Sajid Ali, Isma Farah Siddiqui

, Choon-Sung Nam, Nawab Muhammad Faseeh Qureshi
, Jaehyoun Kim, Dong Ryeol Shin:
Correction to: Performance Evaluation of Data-driven Intelligent Algorithms for Big data Ecosystem. 1827
Volume 127, Number 3, December 2022
- Mididoddi Padmaja

, Shitharth Selvarajan
, K. Prasuna
, Abhay Chaturvedi
, Pravin Kshirsagar
, A. Vani
:
Grow of Artificial Intelligence to Challenge Security in IoT Application. 1829-1845 - T. Balachander

, M. B. Mukesh Krishnan:
Carrier Frequency Offset (CFO) Synchronization and Peak Average Power Ratio (PAPR) Minimization for Energy Efficient Cognitive Radio Network (CRN) for 5G Wireless Communication. 1847-1867 - Prateek Sikka, Abhijit R. Asati

, Chandra Shekhar:
Area, Speed and Power Optimized Implementation of a Band-Pass FIR Filter Using High-Level Synthesis. 1869-1878 - M. Selvakumar, B. Sudhakar:

Energy Efficient Clustering with Secure Routing Protocol Using Hybrid Evolutionary Algorithms for Mobile Adhoc Networks. 1879-1897 - Ashish Khanna, Poonam Rani, Tariq Hussain Sheikh, Deepak Gupta

, Vineet Kansal, Joel J. P. C. Rodrigues:
Blockchain-Based Security Enhancement and Spectrum Sensing in Cognitive Radio Network. 1899-1921 - S. Venkatasubramanian

, A. Suhasini, C. Vennila
:
An Efficient Route Optimization Using Ticket-ID Based Routing Management System (T-ID BRM). 1923-1942 - Pronaya Bhattacharya

, Sudeep Tanwar
, Umesh Bodkhe, Ashwani Kumar
, Neeraj Kumar
:
EVBlocks: A Blockchain-Based Secure Energy Trading Scheme for Electric Vehicles underlying 5G-V2X Ecosystems. 1943-1983 - C. Mohanadevi, S. Selvakumar:

A Qos-Aware, Hybrid Particle Swarm Optimization-Cuckoo Search Clustering Based Multipath Routing in Wireless Sensor Networks. 1985-2001 - Beledha Santhosh Kumar

, Polipalli Trinatha Rao:
An Optimal Emperor Penguin Optimization Based Enhanced Flower Pollination Algorithm in WSN for Fault Diagnosis and Prolong Network Lifespan. 2003-2020 - Ashish Khanna, Poonam Rani, Puneet Garg, Prakash Kumar Singh, Aditya Khamparia

:
An Enhanced Crow Search Inspired Feature Selection Technique for Intrusion Detection Based Wireless Network System. 2021-2038 - Ashish Khanna, Poonam Rani, Puneet Garg, Prakash Kumar Singh, Aditya Khamparia

:
Correction to: An Enhanced Crow Search Inspired Feature Selection Technique for Intrusion Detection Based Wireless Network System. 2039 - Mukesh Soni, Gaurav Dhiman

, Brajendra Singh Rajput, Rajan Patel
, Nitesh Kumar Tejra:
Energy-Effective and Secure Data Transfer Scheme for Mobile Nodes in Smart City Applications. 2041-2061 - Yi-Cheng Shen, Te-Chun Hsia, Ching-Hsien Hsu:

Software Optimization in Ultrasound Imaging Technique Using Improved Deep Belief Learning Network on the Internet of Medical Things Platform. 2063-2081 - Sangeeta Sa, Arunanshu Mahapatro

:
Role-Based Channel Hopping Algorithm for a Cognitive Radio Network in Asynchronous Environment. 2083-2102 - S. Raamakirtinan, L. M. Jenila Livingston:

Identifying Influential Spreaders in Complex Networks Based on Weighted Mixed Degree Decomposition Method. 2103-2119 - Yuan Xiwen:

Design of Voice Recognition Acoustic Compression System Based on Neural Network. 2121-2139 - Yang He, Bai-sheng Nie, Jianhui Zhang, Priyan Malarvizhi Kumar, BalaAnand Muthu

:
Fault Detection and Diagnosis of Cyber-Physical System Using the Computer Vision and Image Processing. 2141-2160 - Sita Kumari Kotha, Meesala Shobha Rani

, Bharat Subedi, Anilkumar Chunduru, Aravind Karrothu
, Bipana Neupane, Sathishkumar V. E.
:
A Comprehensive Review on Secure Data Sharing in Cloud Environment. 2161-2188 - T. Balachander

, M. B. Mukesh Krishnan:
Efficient Utilization of Cooperative Spectrum Sensing (CSS) in Cognitive Radio Network (CRN) Using Non-orthogonal Multiple Access (NOMA). 2189-2210 - M. Girija, P. Manickam, M. Ramaswami:

FibGeoPresent: A Highly Secured and Geographic Coordinate System Based Authenticated Lightweight Block Cipher for Smart System. 2211-2228 - Vadivel Ramasamy

, SudalaiMuthu Thalavai Pillai:
Cauchy Particle Swarm Optimization (CPSO) Based Migrations of Tasks in a Virtual Machine. 2229-2246 - P. Savaridassan, G. Maragatham:

Integrated Deep Auto-Encoder and Q-Learning-Based Scheme to Detect Anomalies and Supporting Forensics in Cloud Computing Environments. 2247-2265 - V. Nallarasan

, Kottilingam Kottursamy
:
Cognitive Radio Jamming Attack Detection Using an Autoencoder for CRIoT Network. 2267-2283 - Rudranath Banerjee, Sourav De, Shouvik Dey:

WTAOF-ILPB Based Feature Learning and LFSSOA-RBFNN Based Classification for Facial Micro-Expression Recognition. 2285-2304 - G. Saranya, A. Pravin:

Hybrid Global Sensitivity Analysis Based Optimal Attribute Selection Using Classification Techniques by Machine Learning Algorithm. 2305-2324 - Parameshwaran Ramalingam, R. Thanuja, R. Bhavani, Gopalakrishnan Lakshminarayanan:

An Efficient Lossless Telemetry Data Compression and Fault Analysis System Using 2SMLZ and CMOW-DLNN. 2325-2345 - U. Padmavathi

, Narendran Rajagopalan:
Blockchain Enabled Emperor Penguin Optimizer Based Encryption Technique for Secure Image Management System. 2347-2364 - A. Saritha, B. Ramasubba Reddy, A. Suresh Babu:

QEMDD: Quantum Inspired Ensemble Model to Detect and Mitigate DDoS Attacks at Various Layers of SDN Architecture. 2365-2390 - R. Uthra, D. Suchitra:

A Fuzzy Based Improved Control Strategy of Dynamic Voltage Restorer for Low Voltage and High Voltage Ride Through Compensation for Variable Speed Hybrid Energy System. 2391-2415 - M. Revathi, V. V. Ramalingam

, B. Amutha:
A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework. 2417-2441 - Juan Wang, Fang Liu:

Computer-Assisted Collaborative Learning for Enhancing Students Intellectual Ability Using Machine Learning Techniques. 2443-2460 - Haider Mehraj

, Ajaz Hussain Mir:
Robust Multimodal Biometric System Based on Feature Level Fusion of Optimiseddeepnet Features. 2461-2482 - K. Sita Kumari, Sarita Samal, Ruby Mishra

, Gunashekhar Madiraju, M. Nazargi Mahabob, Anil Bangalore Shivappa:
Diagnosing COVID-19 from CT Image of Lung Segmentation & Classification with Deep Learning Based on Convolutional Neural Networks. 2483-2499 - P. Sachidhanandam, P. Balasubramanie:

Elevated Ensemble Dynamic Energy-Aware Routing Optimization Based Energy Management and Network Lifetime Improvement in WSN. 2501-2513 - Mallikarjuna Nandi, K. Anusha

:
An Optimized and Hybrid Energy Aware Routing Model for Effective Detection of Flooding Attacks in a Manet Environment. 2515-2533 - Neeraj Kumar, Abhishek Mishra

:
EEDLNN Algorithm for Assessing the Vulnerability in Railway Network with Respect to Passengers and Trains. 2535-2552 - Archana Shirke

, M. M. Chandane
:
Performance Modelling and Analysis of IoT Based Edge Computing Policies. 2553-2568 - M. S. Abirami, B. Vennila, K. Suganthi, Sarthak Kawatra, Anuja Vaishnava:

Detection of Choroidal Neovascularization (CNV) in Retina OCT Images Using VGG16 and DenseNet CNN. 2569-2583 - S. Karthigaiveni

, R. Pandeeswari
, S. Deivalakshmi
:
Miniaturized MIMO Antenna with Complementary Split Ring Resonators Loaded Superstrate for X-band Applications. 2585-2603 - Purnima Lala Mehta

, Ambuj Kumar, Bilal Muhammad
, Ramjee Prasad:
A Technological and Business Perspective on Connected Drones for 6G and Beyond Mobile Wireless Communications. 2605-2624 - Tayeb Diab, Marc Gilg

, Pascal Lorenz
, Frédéric Drouhin:
Using I2P (Invisible Internet Protocol) Encrypted Virtual Tunnels for a Secure and Anonymous Communication in VANets: I2P Vehicular Protocol (IVP). 2625-2644 - Tayeb Diab, Marc Gilg, Pascal Lorenz

, Frédéric Drouhin:
Correction to: Using I2P (Invisible Internet Protocol) Encrypted Virtual Tunnels for a Secure and Anonymous Communication in VANets: I2P Vehicular Protocol (IVP). 2645 - Masoud Khodaverdizadeh, Afrooz Haghbin

, Farbod Razzazi:
Improving the Performance of HF Radio Networks in the Presence of Interference through Automatic Link Establishment with Frequency Hopping Technique. 2647-2666 - Sriram Arumugam, Sangeetha Manoharan, Vidhyacharan Bhaskar

, P. Sandeep Kumar:
A Comprehensive Review on Automotive Antennas for Short Range Radar Communications. 2667-2694 - Mohamed Shalaby, Mohamed Shahein, Mona Shokair:

Mathematical Analysis and Performance Evaluation of the Cell-Free mMIMO Networks Based on Cognitive Relays. 2695-2708
Volume 127, Number 4, December 2022
- Prachi Gupta

, Vishal Gupta:
Linear 1 × 4 Microstrip Antenna Array Using Slotted Circular Patch for 5G Communication Applications. 2709-2725 - T. A. Balarajuswamy, R. Nakkeeran:

Efficiency Enhancement of Reconfigurable SIW Antenna for Millimeter-Wave Applications. 2727-2742 - M. S. Saranya, P. Geetha:

Multi-View Clothing Image Segmentation Using the Iterative Triclass Thresholding Technique. 2743-2759 - Deivanai Gurusamy

, Galane Diriba:
Sensor Network and Energy Harvesting Solutions Towards Water Quality Monitoring in Developing Countries. 2761-2779 - Mini Arora

, Ashok Pal
:
A Deep Learning Approach to Accurately Predict the κ-Coverage Probability in Wireless Sensor Networks. 2781-2798 - Seyedeh Maedeh Mirmohseni

, Chunming Tang, Amir Javadpour
:
FPSO-GA: A Fuzzy Metaheuristic Load Balancing Algorithm to Reduce Energy Consumption in Cloud Networks. 2799-2821 - Monika

, Dipali Bansal, Abhiruchi Passi:
Image Forgery Detection and Localization Using Block Based and Key-Point Based Feature Matching Forensic Investigation. 2823-2839 - Gaurav Aggarwal

:
Social Communication Disorder Outside Intellectual Disability? A Review and Classification Approach to Receptive and Expressive Communication in Intellectual Disability. 2841-2858 - Dong Yan, Peixue Liu, Xiujie Yue, Penghao Wang, Minghua Liu, Baoshun Li:

Data Fusion Algorithm Based on Classification Adaptive Estimation Weighted Fusion in WSN. 2859-2871 - Aashiq Banu S

, B. K. Murthy, G. Bindu Sai, Sowmya Gali, Kalluru Hemaswitha, Rengarajan Amirtharajan
:
Telugu DNA for Safe Delivery: A Secured Text Communication. 2873-2889 - Ketavath Kumar Naik

, Ravi Kumar Palla, Sriram Sandhya Rani
, B. V. S. Sailaja:
Design of Compact Bow-Tie Patch Antenna with Defected Concentric Rings on Ground for Wireless Communications. 2891-2903 - Neda Solari Esfehani, Hamid Haj Seyyed Javadi

:
A High Resilience and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Networks. 2905-2934 - Piyush Jain, Natarajan Jayanthi

, M. Lakshmanan
:
Closed Form Expressions of AC and SER for Double GG Fading Distribution under EGC Scheme in FSO Communication System. 2935-2954 - G. Pius Agbulu, G. Joselin Retna Kumar, Asokan Vimala Juliet, S. Adurrashid Hassan:

PECDF-CMRP: A Power-Efficient Compressive Data Fusion and Cluster-Based Multi-hop Relay-Assisted Routing Protocol for IoT Sensor Networks. 2955-2977 - Yijun Yang, Xiayan Zhang:

A Novel Hash Function Based on Multi-iterative Parallel Structure. 2979-2996 - M. Maria Dominic Savio, T. Deepa:

Design of Energy Efficient Multiplier with Approximate Computing on Scalable Compressor for Error-Resilient Image Contrast Enhancement. 2997-3013 - Shruti Goel

, Rakhee Kulshrestha:
Dependability-Based Analysis for Ultra-reliable Communication in Heterogeneous Traffic Cognitive Radio Networks with Spectrum Reservation. 3015-3039 - Shaik Karimullah

, D. Vishnu Vardhan, Vidhyacharan Bhaskar
:
An Improved Harmony Search Approach for Block Placement for VLSI Design Automation. 3041-3059 - Sungwook Kim

:
Two-Phase Wireless Bandwidth Allocation Scheme Based on Cooperative Game Solutions. 3061-3077 - Maryam Farahbakhsh, Meisam Nesary Moghadam

:
Multi-class Multipath Routing Protocol for Low Power and Lossy Networks, with Energy Balanced Optimal Rate Assignment. 3079-3096 - Lahcen Sellak

, Lahcen Aguni, Samira Chabaa
, Saida Ibnyaich, Abdelouhab Zeroual, Atmane Baddou:
Modeling and Designing of a Compact Single Band PIFA Antenna for Wireless Application Using Artificial Neural Network. 3097-3117 - Valarmathi Marudhai

, Shanthi Prince, Shayna Kumari:
Design and Simulation of Physical Layer Security for Next Generation Intelligent Optical Networks. 3119-3138 - Hassan Harb

, Chady Abou Jaoude, David Laiymani
, Abdallah Makhoul, Chamseddine Zaki
, Layla Tannoury:
A Multi-Tier Data Prediction Mechanism for the Internet of Things Networks. 3139-3172 - Amine Dahane

, Rabaie Benameur
, Kechar Bouabdellah:
An IoT Low-Cost Smart Farming for Enhancing Irrigation Efficiency of Smallholders Farmers. 3173-3210 - Rakesh Ranjan Swain

, Tirtharaj Dash, Pabitra Mohan Khilar:
Automated Fault Diagnosis in Wireless Sensor Networks: A Comprehensive Survey. 3211-3243 - Xiangdong Jia

, Zhemin Wei, Zhenchao Hao, Yuhua Ouyang:
Modeling D2D Underlaying Cellular Network for Hotspot Communications with Poisson Cluster and Hole Processes. 3245-3297 - K. Gavaskar

, D. Malathi, G. Ravivarma, V. Krithika Devi, M. Megala, S. Megaraj Begam:
A Variant of Long Multiplication Design with Low Power and Area Using Modified 7: 3 Compressor for Biomedical Applications. 3299-3319 - Riad Aouabed, Fouzi Semchedine

, Aboubekeur Hamdi-Cherif
:
A Wake-up Radio-Based Energy-Efficient Multi-Hop Clustering Protocol for WSNs. 3321-3346 - Akhilesh Verma

, Anshdha Gupta, Mohammad Akbar, Arun Kumar Yadav
, Divakar Yadav
:
Presentation Attack Detection Using Referential Quality Metrics and Minutiae Count. 3347-3361 - Sammaiah Thurpati, P. Muthuchidambaranathan

:
Design of Hybrid Precoding for Millimeter-Wave Massive MIMO System. 3363-3377 - Sunita Saini, Davinder Singh Saini

:
Performance Modelling and Design Techniques for Efficiency Improvement in On-chip Switched-Capacitor DC-DC Converter. 3379-3405 - Somasundaram Mathivanan

, A. Rajeswari:
Omnidirectional Microstrip MIMO Antenna for Intelligent Vehicle RADAR Communication. 3407-3421 - Somasundaram Mathivanan

, A. Rajeswari:
Correction to: Omnidirectional Microstrip MIMO Antenna for Intelligent Vehicle RADAR Communication. 3423 - Piyush Satti, Nikhil Sharma

, Gurinder Singh, Bharat Garg
:
A Flexible Dynamic Master-User Look-Up Table Approach for Evaluation of Trigonometric Values. 3425-3434 - Mohd Javed Khan

, Ram Chandra Singh Chauhan
, Indrasen Singh
:
Comparative Analysis of Full Duplex and Half Duplex Relay for High-Speed Vehicular Scenario. 3435-3448 - Mahyar Sadrishojaei

, Nima Jafari Navimipour
, Midia Reshadi, Mehdi Hosseinzadeh
:
An Energy-Aware IoT Routing Approach Based on a Swarm Optimization Algorithm and a Clustering Technique. 3449-3465 - Mohd Shariq

, Karan Singh
:
A Secure and Lightweight RFID-Enabled Protocol for IoT Healthcare Environment: A Vector Space Based Approach. 3467-3491 - Pankaj Kumar

, Sam Darshi, Samar Shailendra
:
Analysis of Drone Assisted Network Coded Cooperation for LoS Environments. 3493-3510 - Robbi Rahim, Manikandan Ramachandran

, Prassanna Jayachandran
, Hariharan Kalyanaraman, Vidhyacharan Bhaskar
, Ambeshwar Kumar:
Holistic Feistel Authenticated Learning-Based Authorization for Protecting the Internet of Things from Cyber Attacks. 3511-3532 - Deepanshu Arora, Shashank Gupta, Alagan Anpalagan

:
Evolution and Adoption of Next Generation IoT-Driven Health Care 4.0 Systems. 3533-3613 - Rafidah Ahmad

, Mohamad Faiz Mohamed Omar, Jagadheswaran Rajendran
, Widad Ismail:
Performance Analysis of Enhanced AES-128 and Blowfish Algorithms Through Parallel-Pipelined-Memory Techniques. 3615-3635 - Banani Talukdar

, Deepak Kumar
, Wasim Arif
:
Performance Analysis of a Prediction-Sensing Based Cooperative Energy Harvesting CRN Over Rician Fading Channels. 3637-3658 - Sourav Roy

, Ujjal Chakraborty:
Frequency Reconfigurable Wearable Low-Cost Multi Band Antenna for WLAN and ISM Band Application. 3659-3675 - Ravilla Dilli

:
Hybrid Beamforming in 5G NR Networks Using Multi User Massive MIMO at FR2 Frequency Bands. 3677-3709

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














