


default search action
International Journal of Internet Protocol Technology, Volume 13
Volume 13, Number 1, 2020
- Qingqing Han, Liejun Wang, Yongming Lee, Jiwei Qin:

Video encryption scheme using hybrid encryption technology. 1-8 - Zhichao Wang, Liang Tang, Jun Steed Huang, Hongwei Shi, Li Bian:

Reconstruction and application of flooding routing algorithm for smart street light over wireless sensor networks. 9-17 - Adnan J. Jabir:

A low cost paging scheme for clustered PMIPv6 protocol by head-MAG entity utilisation. 18-24 - P. Jyotheeswari, N. Jeyanthi:

Hybrid encryption model for managing the data security in medical internet of things. 25-31 - Jiazhong Lu, Xiaosong Zhang, Xiaolei Liu, Teng Hu, Yu Cao:

An equalisation control method for network big data transmission based on parallel computing. 32-38 - Yuan Cheng, Yucai Zhou:

Optimal channel selection in parallel scheduling of heterogeneous network based on competitive channel non-cooperative game model. 39-45 - Minglei Song, Zhixiang Hou:

Model analysis of traffic emergency dispatching in intelligent transportation system under cloud computing. 46-54
Volume 13, Number 2, 2020
- Yu Cao:

Optimisation of classification algorithm of associated data features of large-scale network system. 55-60 - Sneha K. Thombre

, Lalit Patnaik, Anil S. Tavildar:
Delay and jitter sensitivity analysis with varying TCP fraction for multiplexed internet communications. 61-77 - Chungeng Ma, Lixia Hou, Wenjing Ma:

Optimal network selection algorithms under the multi-network coexistence environment based on attribute decision. 78-84 - Junjun Liu, Jian Wu, Lanzhong Guo, Mingyang Li, Ming Zhang:

Research on intelligent scheduling strategy of elevator group under the big data platform. 85-93 - Lu Wang, Difei Jiang:

Constant temperature control system for indoor environment of buildings based on internet of things. 94-101 - Bo Wang, Yi-Wei Ma, Hong-Tao Hu:

Hybrid model for Chinese character recognition based on Tesseract-OCR. 102-108 - Jianxin Qiu, Lianguang Mo:

Low-power clustering scheduling algorithm for wireless sensor nodes in the internet of things. 109-116
Volume 13, Number 3, 2020
- Li Li:

Secure encryption algorithms for wireless sensor networks based on node trust value. 117-123 - Lixia Hou, Chungeng Ma, Lihui Yang:

A novel encryption algorithm for unstructured big data in wireless communication network. 124-130 - Dawei Luo, Jinming Liu, Zhihong Xin:

Heuristic scheduling algorithm for hybrid storage data in the cloud computing environment. 131-136 - Huikai Zheng:

Real-time monitoring system for passive energy-saving houses in the internet of things environment. 137-143 - Xiangjun Tian:

Research on quick extraction method for integrated information of intelligent transportation system scheduling based on internet of things. 144-150 - Jing Wei, Lianguang Mo:

Open interactive education algorithm based on cloud computing and big data. 151-157 - Yucai Zhou, Xiaoya Xu, Caihong Liu, Yuelin Li:

Optimisation method of MAC protocol based on SVM neural network in VANET. 158-166 - Xue Wen She:

Software design of intelligent interactive autonomous learning system. 167-175
Volume 13, Number 4, 2020
- Fen Liu, Zheng Yu, Yixi Wang, Hao Feng, Zhiyong Zha, Rongtao Liao, Ying Zhang:

Falsified data filtering method for smart grid wireless communication based on SVM. 177-183 - Jin Guo, Shengbing Zhang:

Dynamic resource adaptation method for airborne network based on multi-objective optimisation. 184-192 - Jin-Jun Ruan:

Multi-channel scheduling analysis of dynamic data in wireless networks oriented big data. 193-201 - Guoning Yue:

Design of information management system for structural monitoring based on network fragmentation. 202-210 - Lei Cui:

Research on the filtering recommendation technology of network information based on big data environment. 211-218 - Huawei Wu

, Chuan Sun, Yicheng Li, Yong Kuang:
Deformation detection algorithm of shallow and large-span tunnel support structure based on wireless sensor network. 219-227 - Xiaoling Jiang, Hui Zhang, Jiaming Xu, Weicheng Wu, Xingyong Xie:

Abnormal network data mining model based on deep training learning. 228-236

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














