Wireless Personal Communications, Volume 112 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 112, Number 1, May 2020

Sandeep Sharma, Mainuddin
, Binod Kumar Kanaujia
, Mukesh Kumar Khandelwal
:
Theoretical Analysis and Design of High-Stable-Gain Antenna with Ultrawide Band Capabilities and Suppressed Back Radiations. 1-19

R. Geetha
, T. Padmavathy, T. Thilagam, A. Lallithasree:
Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm. 21-36

Ali Asghar Abedi, Mohammad Reza Mosavi
, Karim Mohammadi:
Low Computational Complexity in Low-Cost GNSS Receivers. 37-59

Xue Jun Li
, Muthusubramanian Bharanidharan:
RSSI Fingerprinting Based iPhone Indoor Localization System Without Apple API. 61-74

Mariappan Rajashanthi, K. Valarmathi
:
A Secure Trusted Multipath Routing and Optimal Fuzzy Logic for Enhancing QoS in MANETs. 75-90

Mukil Alagirisamy
, Chee-Onn Chow
, Kamarul Ariffin Bin Noordin
:
Intelligence Framework Based Analysis of Spatial-Temporal Data with Compressive Sensing Using Wireless Sensor Networks. 91-103

Gaurav Saxena
, Priyanka Jain
, Yogendra Kumar Awasthi
:
High Diversity Gain MIMO-Antenna for UWB Application with WLAN Notch Band Characteristic Including Human Interface Devices. 105-121

Amir Javadpour, Khatereh Saedifar
, Guojun Wang, Kuan-Ching Li
:
Optimal Execution Strategy for Large Orders in Big Data: Order Type using Q-learning Considerations. 123-148

Ahmed Abdelaziz Salem
, S. El-Rabaie
, Mona Shokair:
A Proposed Efficient Hybrid Precoding Algorithm for Millimeter Wave Massive MIMO 5G Networks. 149-167

Rohit Raja
, Sandeep Kumar, Md Rashid Mahmood
:
Color Object Detection Based Image Retrieval Using ROI Segmentation with Multi-Feature Method. 169-192

M. Islabudeen
, M. K. Kavitha Devi
:
A Smart Approach for Intrusion Detection and Prevention System in Mobile Ad Hoc Networks Against Security Attacks. 193-224

S. Nagasundari
, S. Ravimaran, G. V. Uma:
Enhancement of the Dynamic Computation-Offloading Service Selection Framework in Mobile Cloud Environment. 225-241

V. Pandiyaraju, Logambigai Rajasekaran
, Sannasi Ganapathy
, Arputharaj Kannan
:
An Energy Efficient Routing Algorithm for WSNs Using Intelligent Fuzzy Rules in Precision Agriculture. 243-259

Rajeswari Packianathan
, Gobinath Arumugam
:
Performance Analysis of Microstriplines Interconnect Structure with Novel Guard Trace as Parallel Links for High Speed Dram Interfaces. 261-271

Anil Kumar Sagar
, Shivangi Singh
, Avadhesh Kumar:
Energy-Aware WBAN for Health Monitoring Using Critical Data Routing (CDR). 273-302

Anil Kumar Sagar
, Shivangi Singh
, Avadhesh Kumar:
Correction to: Energy-Aware WBAN for Health Monitoring Using Critical Data Routing (CDR). 303

Nadhir Ben Halima
, Hatem Boujemâa:
Performance Analysis of Opportunistic, Reactive and Partial Relay Selection with Adaptive Transmit Power for Cognitive Radio Networks. 305-324

Jasminder Kaur Sandhu
, Anil Kumar Verma, Prashant Singh Rana
:
An Expert Approach for Data Flow Prediction: Case Study of Wireless Sensor Networks. 325-352

T. Shankar, A. Rajesh
, R. Mageshvaran
:
Adaptive Buffering and Fuzzy Based Multilevel Clustering for Energy Efficient Wireless Sensor Network. 353-370

Fahimeh Dehestani, Mohammad Ali Jabraeil Jamali
:
Load Balanced Clustering Based on Imperialist Competitive Algorithm in Wireless Sensor Networks. 371-385

Yumin Yuan:
Security Analysis of an Enhanced Certificateless Signcryption in the Standard Model. 387-394

Bingquan Chen
, Chang Chen, Hongyang Ma
:
The Combined Method of Ray Tracing and Diffraction and Its Application to Ultra-wideband Pulse Propagation. 395-409

Tushar P. Dave
, Jagdish M. Rathod:
A Compact Frequency Diversity Antenna with DGS and SRR Mode Switching for LTE and WLAN/WiMAX Wireless Systems. 411-420

Dennison Rajesh
, Thirasamma Jaya:
A Mathematical Model for Energy Efficient Secured CH Clustering Protocol for Mobile Wireless Sensor Network. 421-438

Priyajit Biswas
, Tuhina Samanta:
True Event-Driven and Fault-Tolerant Routing in Wireless Sensor Network. 439-461

Salman Shamshad
, Khalid Mahmood
, Saru Kumari
:
Comments on "A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things". 463-466

Adnan Javeed, Tariq Shah, Atta Ullah:
Construction of Non-linear Component of Block Cipher by Means of Chaotic Dynamical System and Symmetric Group. 467-480

Jolly Parikh
, Anuradha Basu
:
Technologies Assisting the Paradigm Shift from 4G to 5G. 481-502

Shri Ramtej Kondamuri
, Subramanian Anuradha:
Non Linear Companding Transform to Mitigate PAPR in DCT Based SC-FDMA System. 503-522

Nadhir Ben Halima
, Hatem Boujemâa:
Energy Harvesting for Cooperative Cognitive Radio Networks. 523-540

Sarvjit Singh
, Amit Gupta, J. S. Sohal
:
Transmission of Audio over LTE Packet Based Wireless Networks Using Wavelets. 541-553

Md. Tariqul Islam, Nazrul Islam
, Md. Al Refat:
Node to Node Performance Evaluation through RYU SDN Controller. 555-570

Hiwa Taha Sediq
, Yasser Nozad Mohammed:
Performance Analysis of Novel Multi-band Monopole Antenna for Various Broadband Wireless Applications. 571-585

Abdelkader Khelil, Rachid Beghdad
, Amar Khelloufi
:
3HA: Hybrid Hole Healing Algorithm in a Wireless Sensor Networks. 587-605

Prateek Pandey
, Ratnesh Litoriya
:
An IoT Assisted System for Generating Emergency Alerts Using Routine Analysis. 607-630

K. Selvaraj, David Judson
, P. Ganeshkumar, M. Anandaraj:
Low Complexity Linear Detection for Uplink Multiuser MIMO SC-FDMA Systems. 631-649
Volume 112, Number 2, May 2020

Pooria Varahram, Somayeh Mohammady
, Ronan Farrell, John Dooley:
A Crest Factor Reduction Scheme with Optimum Spacing Peak Cancellation for Intra-band Non-contiguous Carrier Aggregated OFDM Signals. 651-673

Abdullah Waqas
:
Interference Aware Route Discovery in Wireless Mobile Ad Hoc Networks. 675-684

Bazil Taha Ahmed
:
Propagation Loss Measurement of Wireless Body Area Network at 2.4 GHz and 3.35 GHz Bands. 685-716

Ribhu Abhusan Panda
, Debasis Mishra:
Efficient Design of Bi-circular Patch Antenna for 5G Communication with Mathematical Calculations for Resonant Frequencies. 717-727

Bhanu Pratap Singh, Ananda Kumar Subramanian
, Xiao-Zhi Gao, Maulik Kohli, Sanskar Katiyar:
A Study on Energy Consumption of DVFS and Simple VM Consolidation Policies in Cloud Computing Data Centers Using CloudSim Toolkit. 729-741

A. L. Siridhara, D. V. Ratnam:
Mitigation of Multipath Effects Based on a Robust Fractional Order Bidirectional Least Mean Square (FOBLMS) Beamforming Algorithm for GPS Receivers. 743-761

Minhae Kwon
, Hyunggon Park:
Non-iterative Coordinated Beamforming for Multicell MIMO Heterogeneous Networks. 763-775

Tai-Jung Huang
:
Theoretical Analysis of NOMA Within Massive MIMO Systems. 777-783

Kishorebabu Vasanth
, Rachuri Sravanthi:
Real Time Monitoring of Environmental Parameters Using IOT. 785-808

Rahul Hooda, Ajay Mittal, Sanjeev Sofat:
A Novel Ensemble Method for PTB Classification in CXRs. 809-826

Sabyasachi Bhattacharyya
, G. Aruna:
Radiation Pattern Analysis of Uniform Rectangular Planar Arrays for Millimeter Wave Communications: Comparative Study with Uniform Linear Arrays. 827-848

Kuldeep Yadav
, Sanjay Dhar Roy
, Sumit Kundu:
Defense Against Spectrum Sensing Data Falsification Attacker in Cognitive Radio Networks. 849-862

Karteek Viswanadha, Nallanthighal Srinivasa Raghava:
Design and Analysis of a Multi-band Flower Shaped Patch Antenna for WLAN/WiMAX/ISM Band Applications. 863-887

Madhuri Gummineni
, Polipalli Trinatha Rao:
Implementation of Reconfigurable Transceiver using GNU Radio and HackRF One. 889-905

Amit M. Joshi
, Alongbar Bramha:
VLSI Architecture of Block Matching Algorithms for Motion Estimation in High Efficiency Video Coding. 907-922

V. Nithya
, C. Priyanka, Vidhyacharan Bhaskar:
Joint Phase and Amplitude Modelling Using a Finite-State Markov Chain for η-µ Fading Channels. 923-940

Atli Lemma Gebretsadik
:
Low Complexity Radio Mobile Speed Estimation Using Count of Received Envelop Peaks and Troughs. 941-948

Jianfeng Wang
, Song-Rong Qian:
Spallation Analysis of Concrete Under Pulse Load Based on Peridynamic Theory. 949-966

Yalda Akbari, Shayesteh Tabatabaei
:
A New Method to Find a High Reliable Route in IoT by Using Reinforcement Learning and Fuzzy Logic. 967-983

Ahmad Shelebaf, Shayesteh Tabatabaei
:
A Novel Method for Clustering in WSNs via TOPSIS Multi-criteria Decision-Making Algorithm. 985-1001

Hadjer Bouzebiba
, Mohamed Lehsaini
:
FreeBW-RPL: A New RPL Protocol Objective Function for Internet of Multimedia Things. 1003-1023

Sayed Qaiser Ali Shah, Farrukh Zeeshan Khan, Adeel Baig, Muhammad Munwar Iqbal
:
A QoS Model for Real-Time Application in Wireless Network Using Software Defined Network. 1025-1044

Rim Gasmi
, Makhlouf Aliouat
, Hamida Seba:
A Stable Link Based Zone Routing Protocol (SL-ZRP) for Internet of Vehicles Environment. 1045-1060

Syed Thouheed Ahmed
, Maheshwari Sandhya, Sharmila Sankar
:
TelMED: Dynamic User Clustering Resource Allocation Technique for MooM Datasets Under Optimizing Telemedicine Network. 1061-1077

Rupayan Das, Dinesh Dash, Mrinal Kanti Sarkar
:
HTMS: Fuzzy Based Hierarchical Trust Management Scheme in WSN. 1079-1112

Harjeet Kaur Ojhla, Sharada Patil:
A Wavelet Based Hybrid Threshold Transform Method for Speech Intelligibility and Quality in Noisy Speech Patterns of English Language. 1113-1135

Nitin Mittal
:
An Energy Efficient Stable Clustering Approach Using Fuzzy Type-2 Bat Flower Pollinator for Wireless Sensor Networks. 1137-1163

Mohamed Ouwais Kabaou, Hassen Hamouda
:
Implementation and Evaluation of Opportunistic Routing Protocols for Wireless and New Generation Communication Networks. 1165-1183

D. Arivudainambi
, R. Pavithra
:
Coverage and Connectivity-Based 3D Wireless Sensor Deployment Optimization. 1185-1204

Bin Liu
:
A Survey on Trust Modeling from a Bayesian Perspective. 1205-1227

A. Sree Madhuri
, Govardhani Immadi
, M. Venkata Narayana:
Estimation of Effect of Fog on Terrestrial Free Space Optical Communication Link. 1229-1241

Kavita Prashant Mhatre, Uday Pandit Khot:
Energy Efficient Opportunistic Routing with Sleep Scheduling in Wireless Sensor Networks. 1243-1263

Javaid A. Sheikh
, Zaffer Iqbal Mir, Mehboob ul-Amin, Shabir A. Parah
, Ghulam Mohiuddin Bhat:
A New Filter Bank Multicarrier (FBMC) Based Cognitive Radio for 5G Networks Using Optimization Techniques. 1265-1280

Harpreet Kaur
, Neeru Jindal
:
Image and Video Forensics: A Critical Survey. 1281-1302

Santosh Vishnu Purkar
, Rajkumar S. Deshpande
:
Clustering Algorithm for Deployment of Independent Heterogeneous Wireless Sensor Network. 1303-1317
Volume 112, Number 3, June 2020

Kiranjot Kaur
, Munish Rattan, Manjeet Singh Patterh:
Nakagami-m Fading Affected Multiuser Cognitive Radio System Design Using Moth Flame Optimization. 1319-1337

A. M. Hema
, Kuppusamy Krishnamoorthy
:
A Novel Trust-Based Privacy Preservation Framework for Service Handling via Ontology Service Ranking. 1339-1354

Jayanthi Ramasamy
, John Singh Kumaresan:
Image Encryption and Cluster Based Framework for Secured Image Transmission in Wireless Sensor Networks. 1355-1368

Paramasivam Kannan
, S. Arockia Edwin Xavier
:
A Comparison of the Performance Indices of Embedded EZ-Source Inverter Using Different PWM Techniques. 1369-1382

Sobin C. C.
:
A Survey on Architecture, Protocols and Challenges in IoT. 1383-1429

Preeti Sharma, Devi Charan Dhubkarya:
An Energy Efficient OFDM-MIMO Systems for Multimedia Data Transmission Based on Hybrid Fuzzy Approach. 1431-1450

Xinyu Liang, Yajun Guo
, Yimin Guo:
A Global Optimal Model for Protecting Privacy. 1451-1478

Khaled Hamouid, Salwa Othmen, Amine Barkat:
LSTR: Lightweight and Secure Tree-Based Routing for Wireless Sensor Networks. 1479-1501

Joonwoo Shin
:
Per-Antenna Power Constrained Transceiver Design for MIMO Multisource and Multidestination Amplify-and-Forward Relay Systems. 1503-1515

C. Sureshkumar
, S. Sabena
:
Fuzzy-Based Secure Authentication and Clustering Algorithm for Improving the Energy Efficiency in Wireless Sensor Networks. 1517-1536

Kaustubh Ranjan Singh
, Aditya Trivedi:
Physical Layer Security for Wireless Powered Massive MIMO Decode and Forward Relay Systems with Hardware Impairments: Performance Analysis. 1537-1547

Syed Saeed Jaffer
, Ashiq Hussain, Muhammad Ali Qureshi
, Wasim Shahid Khawaja
:
Towards the Shifting of 5G Front Haul Traffic on Passive Optical Network. 1549-1568

Anas Had
, Khalid Sabri
, Mohssin Aoutoul
:
Detection of Heart Valves Closure Instants in Phonocardiogram Signals. 1569-1585

Manish Sharma
:
Design and Analysis of MIMO Antenna with High Isolation and Dual Notched Band Characteristics for Wireless Applications. 1587-1599

S. Subashini
, P. Mathiyalagan
:
A Cross Layer Design and Flower Pollination Optimization Algorithm for Secured Energy Efficient Framework in Wireless Sensor Network. 1601-1628

Abir Mchergui
, Tarek Moulahi
, Mohamed Tahar Ben Othman
, Salem Nasri:
Enhancing VANETs Broadcasting Performance with Mobility Prediction for Smart Road. 1629-1641

Adeeb Salh, Lukman Audah
, Nor Shahida Mohd Shah
, Shipun Anuar Hamzah:
Mitigating Pilot Contamination for Channel Estimation in Multi-cell Massive MIMO Systems. 1643-1658

Djamila Boukredera
, Karima Adel-Aissanou:
Modeling and Performance Analysis of Cognitive Radio Networks Using Stochastic Timed Colored Petri Nets. 1659-1687

Farhan Jamil, Farrukh Zeeshan Khan:
Multi-criteria-Based Mobile Hotspot Selection in IoT-Based Highly Dense Network. 1689-1704

Vandana Juyal
, Ravish Saggar, Nitin Pandey
:
On Exploiting Dynamic Trusted Routing Scheme in Delay Tolerant Networks. 1705-1718

Jianxiong Li
, Ke Zhao, Xuelong Ding, Weiguang Shi:
Resource Allocation Strategy of SWIPT Relay Under General Interference. 1719-1733

Neha Agrawal
, Shashikala Tapaswi:
Detection of Low-Rate Cloud DDoS Attacks in Frequency Domain Using Fast Hartley Transform. 1735-1762

Harpreet Kaur
, Neeru Jindal
:
Deep Convolutional Neural Network for Graphics Forgery Detection in Video. 1763-1781

Sarah Asheer
, Sanjeet Kumar
:
Lifetime Enhancement of a WSN Through Duty Cycle in an Aggregation Based Cooperative MIMO Framework. 1783-1808

Kadam Rekha Shashikant, Anju Kulkarni:
Reconfigurable Patch Antenna Design Using Pin Diodes and Raspberry PI for Portable Device Application. 1809-1828

M. Revanesh, V. Sridhar, John M. Acken:
Secure Coronas Based Zone Clustering and Routing Model for Distributed Wireless Sensor Networks. 1829-1857

Vivek Srivastava, Ravi Shankar Pandey:
A Dominance of the Channel Capacity in Load Balancing of Software Defined Network. 1859-1873

Tho Thi Ngoc Le
, Tran Viet Xuan Phuong:
Privacy Preserving Jaccard Similarity by Cloud-Assisted for Classification. 1875-1892

Arouna Ndam Njoya, Ado Adamou Abba Ari
, Marah Nana Awa, Chafiq Titouna, Nabila Labraoui
, Joseph Yves Effa
, Wahabou Abdou
, Abdelhak Guéroui:
Hybrid Wireless Sensors Deployment Scheme with Connectivity and Coverage Maintaining in Wireless Sensor Networks. 1893-1917

Shanqi Pang, Yongmei Li, Qiang Gao
, Yifan Xia, Xianchao Hu:
Key Predistribution Schemes Based on Orthogonal Arrays with Unique Hamming Distance Distribution. 1919-1945

Sumit Singh Dhanda
, Brahmjit Singh
, Poonam Jindal:
Lightweight Cryptography: A Solution to Secure IoT. 1947-1980

Abeer Al Attal, Saleh Hussin
, Mohamed M. Fouad:
Performance Analysis of Different Channel Allocation Schemes of Random Access (RA) MAC Protocol with Back-Off Algorithm (BOA). 1981-1993

Tomás de Jesús Mateo Sanguino
, Eduardo Navarro Lozano, Manuel Sánchez Alcántara:
Intelligent Agent-Based Assessment of a Resilient Multi-hop Routing Protocol for Dynamic WSN. 1995-2021

M. Jagadeesh Babu, A. Raji Reddy:
SH-IDS: Specification Heuristics Based Intrusion Detection System for IoT Networks. 2023-2045

Chandan Kumar Ghosh, Manish Pratap, Rahul Kumar, Saurabh Pratap:
Mutual Coupling Reduction of Microstrip MIMO Antenna Using Microstrip Resonator. 2047-2056
Volume 112, Number 4, June 2020

Asrin Abdollahi
, Mohammad Fathi
:
An Intrusion Detection System on Ping of Death Attacks in IoT Networks. 2057-2070

M. N. Geetha, U. B. Mahadevaswamy:
Performance Evaluation and Analysis of Peak to Average Power Reduction in OFDM Signal. 2071-2089

Parvathy Arulmozhi
, N. Hemavathi
, John Bosco Balaguru Rayappan
, Pethuru Raj:
ALRC: A Novel Adaptive Linear Regression Based Classification for Grade based Student Learning using Radio Frequency Identification. 2091-2107

Sofiane Aissani
, Bournane Abbache:
Secure Key Management System Integrated in Cell-LEACH (SKMSI-CL). 2109-2129

Shubhdeep Kaur, Sukhchandan Randhawa
:
Dark Web: A Web of Crimes. 2131-2158

Debashis De
, Anwesha Mukherjee
, Deepsubhra Guha Roy
:
Power and Delay Efficient Multilevel Offloading Strategies for Mobile Cloud Computing. 2159-2186

Naresh Kumar
, Pradeep Kumar
, Manish Sharma
:
Reconfigurable Antenna and Performance Optimization Approach. 2187-2212

V. Bibin Christopher
, J. Jasper
:
DHGRP: Dynamic Hexagonal Grid Routing Protocol with Mobile Sink for Congestion Control in Wireless Sensor Networks. 2213-2232

Rashmi Datta, Devendra Singh Gurjar
, T. K. Manohar Reddy, Sonu K. Chaupal, Manish Mandloi, Ashraf Hossain:
Secrecy Performance of Amplify-and-Forward Relay Networks with Relay Selection under Nakagami-m Fading. 2233-2251

Rishav Dubey
, Pavan Kumar Mishra, Sudhakar Pandey
:
Mixed Uplink, Downlink Channel Allocation and Power Allocation Schemes for 5G Networks. 2253-2274

Juhwan Seo
, Dong-Hyun Jung
:
Energy Beamforming for Full-Duplex Wireless Powered Cooperative Communications. 2275-2284

Gang Li
, Bin He
, Zhipeng Wang, Shoulin Xu, Hongwei Huang:
A Swarm Optimization-Enhanced Data Aggregation Tree Based on a Nonuniform Clustering Structure for Long and Linear Wireless Sensor Networks. 2285-2295

Muhammad Saidu Aliero, Kashif Naseer Qureshi
, Muhammad Fermi Pasha
, Imran Ghani, Aliyu Rufai Yauri:
Systematic Review Analysis on SQLIA Detection and Prevention Approaches. 2297-2333

Sathyaprakash Palaniappan
, Prakasam Periasamy
:
Boltzmann Randomized Clustering Algorithm for Providing Quality of Evolution in Wireless Multimedia Sensor Networks. 2335-2349

Nai-Wei Lo
, Alexander Yohan
:
BLE-Based Authentication Protocol for Micropayment Using Wearable Device. 2351-2372

Hamid Mirvaziri
, Rahim Hosseini
:
A Novel Method for Key Establishment Based on Symmetric Cryptography in Hierarchical Wireless Sensor Networks. 2373-2391

Amandeep Noliya, Sanjeev Kumar:
Performance Analysis of Resource Scheduling Techniques in Homogeneous and Heterogeneous Small Cell LTE-A Networks. 2393-2422

Lanmei Wang
, Zhe Hui, Shuzhen Wang, Guibao Wang:
Underdetermined DOA Estimation Algorithm Based on an Improved Nested Array. 2423-2437

Raghav R. S
, Kalaipriyan Thirugnanasambandam, Dinesh Kumar Anguraj
:
Beeware Routing Scheme for Detecting Network Layer Attacks in Wireless Sensor Networks. 2439-2459

Valmik Tilwari
, R. Maheswar
, P. Jayarajan, T. V. P. Sundararajan, Mohammad Nour Hindia, Kaharudin Dimyati, Henry Ojukwu, Iraj Sadegh Amiri:
MCLMR: A Multicriteria Based Multipath Routing in the Mobile Ad Hoc Networks. 2461-2483

Anshuman Singh, R. M. Mehra, V. K. Pandey:
Design and Optimization of Microstrip Patch Antenna for UWB Applications Using Moth-Flame Optimization Algorithm. 2485-2502

Kaveh Mehdipour Chari
, Mohammad Ghanbari
:
Application Layer Energy-Efficient Scalable Video Cooperative Multicast in Cellular Networks. 2503-2517

Emre Uzundurukan
, Aysha M. Ali, Yaser Dalveren
, Ali Kara
:
Performance Analysis of Modular RF Front End for RF Fingerprinting of Bluetooth Devices. 2519-2531

Esther Omolara Abiodun
, Aman Jantan, Oludare Isaac Abiodun, Humaira Arshad:
Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp. 2533-2556

Satyasen Panda
:
Joint User Patterning and Power Control Optimization of MIMO-NOMA Systems. 2557-2573

Amruta Lipare, Damodar Reddy Edla
, Ramesh Dharavath
:
Energy Efficient Routing Structure to Avoid Energy Hole Problem in Multi-Layer Network Model. 2575-2596

Jinsoo Hwang, Jeankyung Kim, Seunghwan Lee, Kichang Kim
:
Two-Stage Ransomware Detection Using Dynamic Analysis and Machine Learning Techniques. 2597-2609

Anurag Shukla
, Sarsij Tripathi
:
An Effective Relay Node Selection Technique for Energy Efficient WSN-Assisted IoT. 2611-2641

N. Saranya
, K. Geetha
, C. Rajan:
Data Replication in Mobile Edge Computing Systems to Reduce Latency in Internet of Things. 2643-2662

M. S. Sumathi, Gowda Sheshadri Anitha:
Link Aware Routing Protocol for Landslide Monitoring Using Efficient Data Gathering and Handling System. 2663-2684

Zaib Ullah
:
A Survey on Hybrid, Energy Efficient and Distributed (HEED) Based Energy Efficient Clustering Protocols for Wireless Sensor Networks. 2685-2713

Nurzhan Kalikulov
, Diana Zhussip, Nauryzgali Zhexenov, Refik Çaglar Kizilirmak:
Multipath Diversity for OFDM Based Visible Light Communication Systems Through Fractional Sampling. 2715-2724

Fazdliana Samat
, Mandeep Singh Jit Singh:
Impact of Rain Attenuation to Ka-Band Signal Propagation in Tropical Region: A Study of 5-Year MEASAT-5's Beacon Measurement Data. 2725-2740

Sukham Dhillon, Charu Madhu, Daljeet Kaur
, Sarvjit Singh:
A Solar Energy Forecast Model Using Neural Networks: Application for Prediction of Power for Wireless Sensor Networks in Precision Agriculture. 2741-2760

Sharmila Selvaraj
, Saranya Vasanthamani
:
Energy Efficient Dynamic Routing Mechanism (EEDRM) with Obstacles in WSN. 2761-2776

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







