


default search action
Wireless Personal Communications, Volume 117
Volume 117, Number 1, March 2021
- Homero Toral-Cruz, Debiao He, Albena Dimitrova Mihovska, Kim-Kwang Raymond Choo

, Muhammad Khurram Khan
:
Reliable and Secure e-Health Networks. 1-6 - Prateek Pandey

, Ratnesh Litoriya
:
Securing E-health Networks from Counterfeit Medicine Penetration Using Blockchain. 7-25 - Saru Kumari

, Km. Renuka:
Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services. 27-45 - Bander A. Alzahrani

, Azeem Irshad
, Aiiad Albeshri
, Khalid Alsubhi:
A Provably Secure and Lightweight Patient-Healthcare Authentication Protocol in Wireless Body Area Networks. 47-69 - Shaohao Xie, Fangguo Zhang

, Rong Cheng:
Security Enhanced RFID Authentication Protocols for Healthcare Environment. 71-86 - Ritu Chauhan, Harleen Kaur

, Victor Chang
:
An Optimized Integrated Framework of Big Data Analytics Managing Security and Privacy in Healthcare Data. 87-108 - Vasileios A. Memos

, Kostas E. Psannis
, Sotirios K. Goudos
, Sofoklis A. Kyriazakos:
An Enhanced and Secure Cloud Infrastructure for e-Health Data Transmission. 109-127 - Reema Goyal

, R. B. Patel, H. S. Bhaduria, Devendra Prasad
:
An Efficient Data Delivery Scheme in WBAN to Deal with Shadow Effect due to Postural Mobility. 129-149 - Napa Rachata, Punnarumol Temdee

:
Mobile-Based Self-Monitoring for Preventing Patients with Type 2 Diabetes Mellitus and Hypertension from Cardiovascular Complication. 151-175 - Djallel Eddine Boubiche

, Samir Athmani, Sabrina Boubiche, Homero Toral-Cruz:
Cybersecurity Issues in Wireless Sensor Networks: Current Challenges and Solutions. 177-213 - Supansa Chaising

, Ramjee Prasad, Punnarumol Temdee
:
Personalized Recommendation Method for Preventing Elderly People from Cardiovascular Disease Complication Using Integrated Objective Distance. 215-233 - Reema Goyal, R. B. Patel, H. S. Bhaduria, Devendra Prasad

:
An Energy Efficient QoS Supported Optimized Transmission Rate Technique in WBANs. 235-260 - John Soldatos

, Sofoklis A. Kyriazakos
, Pouyan Ziafati, Albena Mihovska:
Securing IoT Applications with Smart Objects: Framework and a Socially Assistive Robots Case Study. 261-280
Volume 117, Number 2, March 2021
- Yongjun Sun, Mingzhu Miao

, Zhenzhen Wang, Zujun Liu
:
Resource Allocation Based on Hierarchical Game for D2D Underlaying Communication Cellular Networks. 281-291 - Tripta

, Seemanti Saha
:
Multiband Spectrum Sensing Using Modified Daniell Windowing Technique in Full-Duplex Cognitive Radio Networks: A Performance Study. 293-309 - Yeh Chuang, Fang-Biau Ueng

, Ye-Shun Shen:
A Cyclic Prefix Free Multiple Input Multiple Output Generalized Frequency Division Multiplexing System Design. 311-336 - Jen-Chen Tsai, Jenq-Shiou Leu

, Setya Widyawan Prakosa
, Lo-Chi Hsiao, Ping-Chen Huang, Shih-Yi Yang, Ya-Tieh Huang:
Design and Implementation of an Internet of Healthcare Things System for Respiratory Diseases. 337-353 - Weiwei Xia

, Lianfeng Shen:
Joint Resource Allocation at Edge Cloud Based on Ant Colony Optimization and Genetic Algorithm. 355-386 - Tibin Mathew Thekkil, N. Prabakaran:

Optimization Based Multi-Objective Weighted Clustering For Remote Monitoring System in WSN. 387-404 - Muhammad Bilal

, Rashid Saleem, Aroosa Jabbar, Muhammad Farhan Shafique:
A Miniaturized and Polarization Independent Electromagnetic Shield for C and X-Band Applications. 405-416 - Hong Zhang

, Li He:
Data Mining Method of Sequential Patterns for Vehicle Trajectory Prediction in VANET. 417-429 - Tanima Bhowmik

, Indrajit Banerjee:
An Improved PSOGSA for Clustering and Routing in WSNs. 431-459 - Shakti Raj Chopra

, Akhil Gupta
:
Error Analysis of Grouped Multilevel Space-Time Trellis Coding with the Combined Application of Massive MIMO and Cognitive Radio. 461-482 - Arka Bhowmik, Debashis De

:
mTrust: Call Behavioral Trust Predictive Analytics Using Unsupervised Learning in Mobile Cloud Computing. 483-501 - Abid Naeem, Shahryar Shafique Qurashi, Yousaf Khan

, Sheeraz Ahmed
, Nadeem Safwan:
Fiber to the Home (FTTH) Automation Planning, Its Impact on Customer Satisfaction & Cost-Effectiveness. 503-524 - Abdellah Nabou

, My Driss Laanaoui, Mohammed Ouzzif:
New MPR Computation for Securing OLSR Routing Protocol Against Single Black Hole Attack. 525-544 - S. Prithi, S. Sumathi:

Automata Based Hybrid PSO-GWO Algorithm for Secured Energy Efficient Optimal Routing in Wireless Sensor Network. 545-559 - Sabitha Gauni, C. T. Manimegalai

, K. Murali Krishnan, V. Shreeram, V. V. Arvind, T. V. Nikhil Srinivas:
Design and Analysis of Co-operative Acoustic and Optical Hybrid Communication for Underwater Communication. 561-575 - Abbas Fathtabar, Ali Akbar Khazaei

, Asadallah Ghezelbigloo:
A New Eigen-Structure Based DOA Estimation Method for Wideband Coherent Signals. 577-589 - Sachin Kumar Yadav

, Amanpreet Kaur, Rajesh Khanna
:
Compact Rack Shaped MIMO Dielectric Resonator Antenna with Improved Axial Ratio for UWB Applications. 591-606 - Yufang Yin

, Qiyu Wang, Huijie Zhang, Hong Xu:
A Novel Distributed Sensor Fusion Algorithm for RSSI-Based Location Estimation Using the Unscented Kalman Filter. 607-621 - P. Dharanyadevi, Venkatalakshmi Krishnan

:
Effectual Computing Enhanced Aggregator Node B for 5G Vehicular Milieu. 623-636 - Mina Hashemian, Farbod Razzazi

, Houman Zarrabi, Mohammad Shahram Moin:
Semi-supervised and Unsupervised Privacy-Preserving Distributed Transfer Learning Approach in HAR Systems. 637-654 - Licui Zhang, Pengcheng Wang

, Chunxia Zhang:
SC-EEDC: Similarity Based Clustering for Energy Efficient Data Collection in WSN. 655-687 - Ehsan Soleimani-Nasab

, Maryam Abbaspour-Asadollah:
A Framework on the Performance Analysis of Cooperative Wireless Body Area Networks. 689-725 - Arindam Sarkar, Joydeep Dey, Sunil Karforma:

Musically Modified Substitution-Box for Clinical Signals Ciphering in Wireless Telecare Medical Communicating Systems. 727-745 - M. Yuvaraju

, K. A. Pranesh
:
Energy Proficient Hybrid Secure Scheme for Wireless Sensor Networks. 747-767 - Partha Sarathy Banerjee

, Baisakhi Chakraborty
, Utkarsh Anand, Harsh Upadhyay:
Trainable Framework for Information Extraction, Structuring and Summarization of Unstructured Data, Using Modified NER. 769-807 - Motilal Singh Khoirom

, Dolendro Singh Laiphrakpam
, Themrichon Tuithung:
Audio Encryption Using Ameliorated ElGamal Public Key Encryption Over Finite Field. 809-823 - Piyush Rawat

, Siddhartha Chauhan
, Rahul Priyadarshi
:
A Novel Heterogeneous Clustering Protocol for Lifetime Maximization of Wireless Sensor Network. 825-841 - Rahul Priyadarshi

, Bharat Gupta:
Area Coverage Optimization in Three-Dimensional Wireless Sensor Network. 843-865 - Wassim Fassi Fihri

, Hassan El Ghazi, Badr Abou El Majd
:
A Multi-Objective Particle Swarm Optimization Based Algorithm for Primary User Emulation Attack Detection. 867-886 - Qiu Peng, Weihong Xu:

Crop Nutrition and Computer Vision Technology. 887-899 - Vivek Kanwar

, Ashok Kumar:
Range Free Localization for Three Dimensional Wireless Sensor Networks Using Multi Objective Particle Swarm Optimization. 901-921 - Jayita Saha

, Dip Ghosh, Chandreyee Chowdhury
, Sanghamitra Bandyopadhyay:
Smart Handheld Based Human Activity Recognition Using Multiple Instance Multiple Label Learning. 923-943 - Riki H. Patel

, Arpan Desai
, Trushit Upadhyaya
:
Low-Profile Parallel Mutually Coupled Triple-Band Antenna for Telecommunications Applications. 945-956 - Saida Ibnyaich

, Layla Wakrim
, Moha M'Rabet Hassani:
Nonuniform Semi-patches for Designing an Ultra Wideband PIFA Antenna by Using Genetic Algorithm Optimization. 957-969 - Dheerendra Singh Gangwar

, Sanjeev Tyagi, Sanjay K. Soni:
The Impact of Deployment Pattern and Routing Scheme on the Lifetime in Multi-Sink Wireless Sensor Network. 971-985 - M. V. Ranjith Kumar

, N. Bhalaji
:
Blockchain Based Chameleon Hashing Technique for Privacy Preservation in E-Governance System. 987-1006 - Fatima Bouakkaz

, Makhlouf Derdour
:
Maximizing WSN Life Using Power Efficient Grid-Chain Routing Protocol (PEGCP). 1007-1023 - Negar Najafi Dehaghani, Rasool Sadeghi

, Sayed Mahdi Faghih Imani:
REF: A Novel Forwarding Strategy in Wireless NDN. 1025-1042 - Arunkumar Subramanian, Vinoth Kumar Bojan

:
An Integrated Piezoelectric Sensor Based Energy Efficient Transmission Using Base-Station Controlled Dynamic Clustering Protocol. 1043-1058 - Belbergui Chaimaa, Elkamoun Najib, Rachid Hilal:

E-banking Overview: Concepts, Challenges and Solutions. 1059-1078 - Chaudhuri Manoj Kumar Swain

, Susmita Das:
Proposed Prediction Framework for Improving the Accuracy of Path loss Models of WiMAX Network. 1079-1101 - Moumita Deb, Sarbani Roy

:
Enhanced-Pro: A New Enhanced Solar Energy Harvested Prediction Model for Wireless Sensor Networks. 1103-1121 - Nuparam Chauhan

, Surya Prakash Tripathi:
Optimal Admission Control Policy Based on Memetic Algorithm in Distributed Real Time Database System. 1123-1141 - Zhijun Teng, Baohe Pang, Mingyang Sun, Luying Xie, Liwen Guo:

A Malicious Node Identification Strategy with Environmental Parameters Optimization in Wireless Sensor Network. 1143-1162 - Pandiyan Kabilamani, Gomathy Chidambaram

:
Efficient MRFFT Feedback-Commutator Technique for Handling Data Flow Control in Narrow Band-IOT Based LTE. 1163-1186 - K. V. Praveen, Joe Prathap P. M

:
Energy Efficient Congestion Aware Resource Allocation and Routing Protocol for IoT Network using Hybrid Optimization Techniques. 1187-1207 - L. Gandhimathi

, G. Murugaboopathi:
Mobile Malicious Node Detection Using Mobile Agent in Cluster-Based Wireless Sensor Networks. 1209-1222 - Balasaheb Tarle, Sudarson Jena

:
Ant Lion Optimization Based Medical Data Classification Using Modified Neuro Fuzzy Classifier. 1223-1242 - Hossein Ghaffarian

:
Reducing Search Area in Indoor Localization Applications. 1243-1258 - Satyanarayana Murthy Nimmagadda

:
Enhancement of Efficiency and Performance Gain of Massive MIMO System Using Trial-Based Rider Optimization Algorithm. 1259-1277 - K. Sekar

, K. Suganya Devi
, P. Srinivasan:
Energy Efficient Data Gathering using Spatio-temporal Compressive Sensing for WSNs. 1279-1295 - Pratik Shrivastava, Udai Shanker

:
Prediction Based QoS Management in Replicated DRTDBS. 1297-1318 - Satyasen Panda

:
Spectral Efficiency Optimization of Massive MIMO System Under Channel Varying Conditions. 1319-1335 - Hari Shankar

, Ankush Kansal:
Performance Analysis of MRC Receiver over Fisher Snedecor (F) Composite Fading Channels. 1337-1359 - Chukhu Chunka

, Subhasish Banerjee, Rajat Subhra Goswami:
An Efficient User Authentication and Session Key Agreement in Wireless Sensor Network Using Smart Card. 1361-1385 - T. Ravi Babu

, C. Dharma Raj, V. Adinarayana, K. Murali Krishna:
Estimation of Sparse Channel Using Bayesian Gaussian Mixture and CS-Aided Techniques for Pilot Contaminated Massive MIMO System. 1387-1398 - Surajit Kundu

, Ayan Chatterjee
:
Sharp Triple-Notched Ultra Wideband Antenna with Gain Augmentation Using FSS for Ground Penetrating Radar. 1399-1418 - Urmila Patil, Anju Vijay Kumar Kulkarni, Radhika Menon

, Mithra Venkatesan
:
A Novel AEB-AODV Based AADITHYA Cross Layer Design Hibernation Algorithm for Energy Optimization in WSN. 1419-1439 - Janmoni Borah

, Joyatri Bora:
Energy-Efficient ICI Mitigation with Dynamic and Location-Based Power Allocation in Mobility-Based 5G HetCN. 1441-1457 - Tayyaba Khan, MuhibUr Rahman

:
Wearable Tri-Band Antenna for Switching Between WLAN and Bluetooth for Body Centric Wireless Communication. 1459-1470 - Shailesh Mishra

, Garima Srivastava, Sachin Kumar
:
A State-of-the Art Review on Distributed Amplifiers. 1471-1525 - Masoud Heydari, Saeed Roshani

:
Miniaturized Harmonic Suppressed Wilkinson Power Divider using Lumped Components and Resonators. 1527-1536 - Daniel Rodrigues de Luna

, Lívio Carvalho de Sousa, Vicente A. de Sousa Jr.:
Multicarrier Systems Over Underwater Acoustic Channels: A Performance Evaluation. 1537-1555 - Saurabh Jain

, C. Nandhini
, Rajesh Doriya:
ECC-Based Authentication Scheme for Cloud-Based Robots. 1557-1576 - Abderahman Rejeb, John G. Keogh

:
5G Networks in the Value Chain. 1577-1599 - P. V. Bhuvaneshwari, C. Tharini

:
Review on LDPC Codes for Big Data Storage. 1601-1625 - Reeta Bhardwaj, Dinesh Kumar

:
Wavelet-Based Least Common Ancestor Algorithm for Aggregate Query Processing in Energy Aware Wireless Sensor Network. 1627-1643 - M. Prasad

, U. B. Mahadevaswamy:
Quantum Mechanical Effect on Trigate Junctionless FET for Fast Switching Application. 1645-1657 - Pradeepa Parthiban, R. Pushpa Lakshmi:

Violation Detection in Service Level Agreement to Ensure the Privacy in Cloud Community using Chicken Spider Monkey Optimization-Based Deep Belief Network. 1659-1683 - Prashant Sangulagi

, Ashok Sutagundar:
Fuzzy based Load Balancing in Sensor Cloud: Multi-Agent Approach. 1685-1710 - Narasak Boonthep, Kosin Chamnongthai:

Correction to: A Method of Motion‑Estimation‑Based H.264 Video Coding Using Optimal Search‑Range. 1711 - Narasak Boonthep, Kosin Chamnongthai

, Pranithan Phensadsaeng:
Correction to: H.264 Video Coding‑Based Motion Estimation Architecture for Video Broadcasting from a Studio. 1713 - Retraction Note to: Power Budget Analysis of an Ultra-Dense Coherent MB-OFDM WDM Metro-Access Networks. 1715

Volume 117, Number 3, April 2021
- Irfan Anjum

, Aqeel A. Syed, Azhar A. Rizvi:
Independent Code Division Multiple Access in DS-CDMA. 1717-1733 - Nagender Aneja

, Sapna Gambhir:
Recent Advances in Ad-Hoc Social Networking: Key Techniques and Future Research Directions. 1735-1753 - Naveena A. Priyadharsini

, S. Tamil Selvi
:
Adaptive Spectrum Aggregation Regimen for Downlink NR-gNodeB and Device to Device Systems in 5G. 1755-1771 - Hao Lin, Hua Zhang, Hanbing Yan, Huawei Wang, Yijie Shi, Fei Gao, Qiaoyan Wen:

A Secure Online Treatment Blockchain Service. 1773-1795 - Arvind Dhaka, Vidhyacharan Bhaskar, Siddhartha Chauhan

, Amita Nandal:
Analysing Outage Probability and Diversity for Matrix Based Shadowed Attenuation in Multipath Fading Environment. 1797-1814 - Pradnya Patil

, Sangeetha Manoharan, Vidhyacharan Bhaskar:
Blockchain for IoT Access Control, Security and Privacy: A Review. 1815-1834 - Vidhyalakshmi M. K.

, E. Poovammal
, Vidhyacharan Bhaskar, J. Sathyanarayanan:
Novel Similarity Metric Learning Using Deep Learning and Root SIFT for Person Re-identification. 1835-1851 - Priti Kumari, Parmeet Kaur

:
Checkpointing Algorithms for Fault-Tolerant Execution of Large-Scale Distributed Applications in Cloud. 1853-1877 - Sumit Kumar

, Shrawan Kumar, Neera Batra
:
Optimized Distance Range Free Localization Algorithm for WSN. 1879-1907 - Reena P. Pingale, S. N. Shinde:

Multi-objective Sunflower Based Grey Wolf Optimization Algorithm for Multipath Routing in IoT Network. 1909-1930 - Ayman Khalil

, Nassif Abou Haidar, Georges Bassil, Rabih Chbeir:
Adaptive Resource Management Solution for Ad-Hoc Opportunistic Networks. 1931-1958 - Harekrishna Kumar

, V. K. Tomar:
A Review on Performance Evaluation of Different Low Power SRAM Cells in Nano-Scale Era. 1959-1984 - Ava Tahmasebi, Ahmad Salahi, Mohammad Ali Pourmina

:
A Novel Feature-Based DDoS Detection and Mitigation Scheme in SDN Controller Using Queueing Theory. 1985-2006 - Jamaah Binti Suud, Hushairi Zen, Al-Khalid Othman, Khairuddin Abdul Hamid:

An Empirical Comparison of Encoding Algorithms of the Low Density Parity Check Code for Decode and Forward Protocol Relay System. 2007-2026 - Dan Ye

:
Linear Network Coding for Dynamic Rate Adaptation with Global Resource Tradeoff in Distributed 5G LAA Network. 2027-2039 - Vikas V. Khairnar

, C. K. Ramesha
, Lucy J. Gudino:
A Parasitic Antenna with Independent Pattern, Beamwidth and Polarization Reconfigurability. 2041-2059 - Senthilkumar Muthukrishnan

, Muthukumar Sumathi
, Chinnadurai Veeramani:
Optimal Control of Malware Spreading Model with Tracing and Patching in Wireless Sensor Networks. 2061-2083 - Saeed Roshani

, Mohammad Behdad Jamshidi
, Farzad Mohebi, Sobhan Roshani:
Design and Modeling of a Compact Power Divider with Squared Resonators Using Artificial Intelligence. 2085-2096 - Basheer Ali Sheik

, P. V. Sridevi, P. V. Rama Raju:
Enhancement of Impedance Matching of Rectangular Patch to the Elimination of the Surface Waves. 2097-2114 - Muhammad Kashif Saeed

, Mahmood ul Hassan
, Khalid Mahmood
, Ansar Munir Shah, Jahangir Khan
:
Efficient Solution for Connectivity Restoration (ESCR) in Wireless Sensor and Actor-Networks. 2115-2134 - J. Amutha

, Jaiprakash Nagar
, Sandeep Sharma
:
A Distributed Border Surveillance (DBS) System for Rectangular and Circular Region of Interest with Wireless Sensor Networks in Shadowed Environments. 2135-2155 - Bacem Mbarek

, Mouzhi Ge, Tomás Pitner
:
Trust-Based Authentication for Smart Home Systems. 2157-2172 - Kalyan Mondal

, Lakhindar Murmu
:
A High Gain Broadband Modified Patch Antenna for ISM band/WLAN/WiMAX Applications. 2173-2192 - Rajiv Ranjan

:
Canonical Huffman Coding Based Image Compression using Wavelet. 2193-2206 - Bin Xia

, Tao Liu, Tian Ding, Zhi-Qiang Wang:
An Improved PSO Localization Algorithm for UWB Sensor Networks. 2207-2223 - Kazem Mirzadi

, Jamshid Bagherzadeh Mohasefi:
An Ultra-Lightweight Mutual Authentication Protocol Based on LPN Problem with Distance Fraud Resistant. 2225-2251 - Puspendu Bikash Saha

, Rajib Kumar Dash
, Dibyendu Ghoshal:
Triple-band Four-port MIMO Antenna with Reduced Mutual Coupling Using Minkowiski-modified Novel Fractal Loop. 2253-2271 - Satyendra Sharma

, Brahmjit Singh
:
Network Planning in Deep Fading Area is a Research Challenge. 2273-2284 - Mehtab Singh

, Jyoteesh Malhotra
, Ahmad Atieh, Hala J. El-Khozondar
, Dhasarathan Vigneswaran
:
Performance Investigation of 1.6 Tbps Hybrid WDM-PDM-OFDM-based Free Space Optics Transmission Link. 2285-2309 - Ali El Ksimi, Cherkaoui Leghris:

Contribution to Optimization and Evaluation of IPv6 Signals Based Constrained Devices Networks. 2311-2325 - Veerendra Dakulagi

:
Single Snapshot 2D-DOA Estimation in Wireless Location System. 2327-2339 - Aishwarya Gupta

, Bharat Mahaur:
An Improved DV-maxHop Localization Algorithm for Wireless Sensor Networks. 2341-2357 - Neha Barthwal

, Shashi Kant Verma:
An Optimized Routing Algorithm for Enhancing Scalability of Wireless Sensor Network. 2359-2382 - Nawres Abdelwahed

, Asma Ben Letaifa, Sadok El Asmi:
How User Engagement Metrics Ameliorate the Web QoE? 2383-2402 - Natarajan Yuvaraj

, T. Karthikeyan
, K. Praghash
:
An Improved Task Allocation Scheme in Serverless Computing Using Gray Wolf Optimization (GWO) Based Reinforcement Learning (RIL) Approach. 2403-2421 - T. Suriya Praba

, S. Saravanan, T. Sethukarasi
:
An Efficient Energy Aware Semigraph-Based Total Edge Domination Routing Algorithm in Wireless Sensor Networks. 2423-2439 - Tiaojun Zeng, Changzheng Liu

:
A Two-Stage Separation Algorithm for Weak Correlation Source Signals. 2441-2452 - Shoukath Ali K

, Sampath Palaniswami:
Time Domain Channel Estimation for Time and Frequency Selective Millimeter Wave MIMO Hybrid Architectures: Sparse Bayesian Learning-Based Kalman Filter. 2453-2473 - Sudeep Varshney

, Chiranjeev Kumar
, Abhishek Swaroop:
Lightning-Based Lion Optimization Algorithm for Monitoring the Pipelines Using Linear Wireless Sensor Network. 2475-2494 - Kethepalli Mallikarjuna

, Bepar Abdul Raheem
, Govindaraj Pathanadka
, Sudhakar Mogappair Suriyakumar:
A Simple Shape Descriptor Merging Arithmetical Wrap Around Technique with Absolute Localized Pixel Differences. 2495-2511 - Mustapha Benssalah

, Izza Sarah, Karim Drouiche:
An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things. 2513-2539 - B. Jesvin Veancy

, P. Yogesh:
Fractional Frequency Reuse with Enhanced Scheduling Strategies. 2541-2553 - Mitra Aghadadashfam, A. Ramezani, Mohammad Reza Mosavi

:
A Hardware Implementation for a New Post-correlation Anti-jamming Method. 2555-2574 - Zaheer Abbas

, Muhammad Rizwan Anjum, Muhammad Usman Younus
, Bhawani Shankar Chowdhry:
Monitoring of Gas Distribution Pipelines Network Using Wireless Sensor Networks. 2575-2594 - M. Nava Barathy

, Dejey Dharma
:
A Novel Protein Sequence Alignment-Based Patch Similarity Estimation for Two-Level Data Aggregation in WMSNs. 2595-2633 - M. Nava Barathy

, Dejey Dharma:
Correction to: A Novel Protein Sequence Alignment‑Based Patch Similarity Estimation for Two‑Level Data Aggregation in WMSNs. 2635 - (Withdrawn) RETRACTED ARTICLE: Enhancing the LTE-Based Intelligent Transportation System's Performance. 2637

- (Withdrawn) RETRACTED ARTICLE: A Novel Eye-Shaped Monopole Antenna for Dual Band and Wideband Communication Applications. 2639

Volume 117, Number 4, April 2021
- Chan-Yun Yang, Muhammad Sharif, Sri Devi Ravana

, Anandakumar Haldorai
:
Big Cloud Innovation for Sustainable Wireless Management. 2641-2643 - Deva Priya M.

, M. Sangeetha, A. Christy Jeba Malar, E. Dhivyaprabha, N. Kiruthiga, PL. Rajarajeswari:
Fair Adaptive Cross-Layer Resource Allocation Scheme for IEEE 802.16 Broadband Wireless Networks. 2645-2666 - S. Madhavapandian, P. Maruthupandi:

System Level Protection Against Side-Channel Attack Using High Performance Virtual Secure Circuit for Cryptographic Processor. 2667-2677 - Hanumantharao Bitra

, Palanisamy Ponnusamy
:
Analysis of GSM-SM Over κ -μ, η -μ and α -μ Fading Channels. 2679-2693 - P. Preethi, R. Asokan:

Modelling LSUTE: PKE Schemes for Safeguarding Electronic Healthcare Records Over Cloud Communication Environment. 2695-2711 - R. Dhanagopal

, Balasundaram Muthukumar
:
A Model for Low Power, High Speed and Energy Efficient Early Landslide Detection System Using IoT. 2713-2728 - K. Hariharan, N. R. Rajaan, Peter Pethuru Raj Chelliah, Malini Deepika

:
The Enriched Feature Enhancement Technique for Satellite Image Based on Transforms Using PCNN. 2729-2744 - M. Manojprabu, V. R. Sarma Dhulipala:

Power Aware Hessian Multi-set Canonical Correlations Based Algorithm for Wireless Eeg Sensor Networks. 2745-2756 - (Withdrawn) A Sly Salvage of Semantic Web Content with Insistence of Low Precision and Low Recall. 2757-2780

- C. Chandravathi

, Krishnan Mahadevan
:
Web Based Cross Layer Optimization Technique for Energy Efficient WSN. 2781-2792 - A. Lavanya

, R. Jegatheesan
, K. Vijayakumar
:
Design of Novel Dual Input DC-DC Converter for Energy Harvesting System in IoT Sensor Nodes. 2793-2808 - P. Parthasarathi

, S. Shankar:
Weighted Ternary Tree Approach for Secure Group Communication Among Mobile Applications. 2809-2829 - S. Nithyanantham

, G. Singaravel:
Resource and Cost Aware Glowworm Mapreduce Optimization Based Big Data Processing in Geo Distributed Data Center. 2831-2852 - U. Nagabalan

, N. M. Jothi Swaroopan:
An Improved Single Stage Phase Shifted Control Based AC-DC PFC Converter for Wireless Applications. 2853-2864 - M. Shobana, R. Sabitha, S. Karthik:

Cluster-Based Systematic Data Aggregation Model (CSDAM) for Real-Time Data Processing in Large-Scale WSN. 2865-2883 - J. Raj Kannan, R. Sabitha, S. Karthik, J. Shanthini:

Mouse Movement Pattern Based Analysis of Customer Behavior (CBA-MMP) Using Cloud Data Analytics. 2885-2901 - R. Saravana Ram

, M. Vinoth Kumar, S. Ramamoorthy
, Saravana Balaji B.
, T. Rajesh Kumar
:
An Efficient Hybrid Computing Environment to Develop a Confidential and Authenticated IoT Service Model. 2903-2927 - Abu Salim, Rajesh Kumar Tiwari

, Sachin Tripathi:
An Efficient Public Auditing Scheme for Cloud Storage with Secure Access Control and Resistance Against DOS Attack by Iniquitous TPA. 2929-2954 - V. Sampath, S. Karthik, R. Sabitha:

Position-Based Adaptive Clustering Model (PACM) for Efficient Data Caching in Vehicular Named Data Networks (VNDN). 2955-2971 - J. Anitha Josephine

, S. Senthilkumar:
Tanimoto Support Vector Regressive Linear Program Boost Based Node Trust Evaluation for Secure Communication in MANET. 2973-2993 - K. Naveen Durai, R. Subha, Anandakumar Haldorai

:
A Novel Method to Detect and Prevent SQLIA Using Ontology to Cloud Web Security. 2995-3014 - Ramesh Chandran, S. Rakesh Kumar, N. Gayathri:

Designing a Locating Scams for Mobile Transaction with the Aid of Operational Activity Analysis in Cloud. 3015-3028 - G. Keerthana, P. Anandan, N. Nandhagopal

:
Enhancing the Robustness and Security Against Various Attacks in a Scale: Free Network. 3029-3050 - M. Subalatha

, S. Jayashri, J. Raja, K. Sakthidasan Sankaran:
Low Complexity Maximum Likelihood FBMC QAM for Improved Performance in Longer Delay Channels. 3051-3066 - Prasanna Kumar Godi

, Battula Tirumala Krishna
, Pushpa Kotipalli:
Optimized Pipelined Fast Fourier Transform Using Split and Merge Parallel Processing Units for OFDM. 3067-3089 - (Withdrawn) Skyline Query Optimization for Preferable Product Selection and Recommendation System. 3091-3108

- Sreejith Gopalakrishnan, P. Alli:

Trust Based Approach and Risk Management for IT Systems in Cloud Service Selection. 3109-3127 - Ayoub Alsarhan

, Abdel-Rahman Al-Ghuwairi, Islam T. Almalkawi, Mohammad Alauthman
, Ahmed Al-Dubai
:
Machine Learning-Driven Optimization for Intrusion Detection in Smart Vehicular Networks. 3129-3152 - M. Geetha, R. Ganesan

:
CEPRAN-Cooperative Energy Efficient and Priority Based Reliable Routing Protocol with Network Coding for WBAN. 3153-3171 - J. Prakash, N. Sengottaiyan, S. Anbukaruppusamy:

Fuel Consumption and Delay Aware Traffic Scheduling in Vanet Environment. 3173-3191 - T. Prakash, V. Senthil Kumar:

Improvement of Oscillatory Stability in Wide Area Controlled Systems Using Power Injection. 3193-3207 - Pothuri Surendra Varma

, Veena Anand:
Random Forest Learning Based Indoor Localization as an IoT Service for Smart Buildings. 3209-3227 - Ajay Kumar

, Kumar Abhishek
, Xuan Liu
, Anandakumar Haldorai
:
An Efficient Privacy-Preserving ID Centric Authentication in IoT Based Cloud Servers for Sustainable Smart Cities. 3229-3253 - (Withdrawn) Optimized Fuzzy System Dependent Trust Score for Mobile AdHoc Network. 3255-3269

- D. Loganathan

, M. Balasubramani, R. Sabitha:
Energy Aware Efficient Data Aggregation (EAEDAR) with Re-scheduling Mechanism Using Clustering Techniques in Wireless Sensor Networks. 3271-3287 - Sakthidasan Krishnan, S. Vaithyasubramanian

, M. Maragatharajan
:
SAED: Self-adaptive Error Detection Automation for Leveraging Computational Efficiency of HCI Systems. 3289-3307 - Silambarasan Elkana Ebinazer, Nickolas Savarimuthu

, S. Mary Saira Bhanu:
ESKEA: Enhanced Symmetric Key Encryption Algorithm Based Secure Data Storage in Cloud Networks with Data Deduplication. 3309-3325 - V. Roopa, K. Malarvizhi, S. Karthik:

Efficient Resource Management on Cloud Using Energy and Power Aware Dynamic Migration (EPADM) of VMs. 3327-3342 - R. Subha, Anandakumar Haldorai

, Arulmurugan Ramu
:
An Optimal Approach to Enhance Context Aware Description Administration Service for Cloud Robots in a Deep Learning Environment. 3343-3358 - Jansi Rani Sella Veluswami

, Karthikeyan Chinnusamy
, Kailash Kumar
, Klinge Villalba-Condori, Suryakanth Mohankumar:
Improvement of Transmission Control Protocol for High Bandwidth Applications. 3359-3379 - S. NagaMallik Raj

, Debnath Bhattacharyya
, Divya Midhunchakkaravarthy, Tai-Hoon Kim:
Multi-hop in Clustering with Mobility Protocol to Save the Energy Utilization in Wireless Sensor Networks. 3381-3395 - R. Gopi, S. T. Suganthi, Rajadevi Ramasamy

, P. Johnpaul, Nebojsa Bacanin
, S. Kannimuthu
:
An Enhanced Green Cloud Based Queue Management (GCQM) System to Optimize Energy Consumption in Mobile Edge Computing. 3397-3419 - Xianfu Lin, Yuzhang Huang:

Short-Term High-Speed Traffic Flow Prediction Based on ARIMA-GARCH-M Model. 3421-3430 - Xinhui Zhao, Qingxian Wang, Zehui Wu, Rui Guo:

Method for Overflow Attack Defense of SDN Network Flow Table Based on Stochastic Differential Equation. 3431-3447 - B. Mohankumar

, K. Karuppasamy
:
Network Lifetime Improved Optimal Routing in Wireless Sensor Network Environment. 3449-3468 - Min Zhao:

Information Iterative Retrieval of Internet of Things Communication Terminal Based on Symmetric Algorithm. 3469-3485 - J. Britto Dennis, M. Shanmuga Priya

:
A Profile-Based Novel Framework for Detecting EDoS Attacks in the Cloud Environment. 3487-3503 - Hongsong Chen

, Yongpeng Zhang, Yongrui Cao, Bharat K. Bhargava:
Security Threats and Defensive Approaches in Machine Learning System Under Big Data Environment. 3505-3525 - Anitha Velu

, Menakadevi Thangavelu
:
Hetero-GCD2RDF: An Interoperable Solution for Geospatial Climatic Data by Deploying Semantic Web Technologies. 3527-3551

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














