Stop the war!
Остановите войну!
for scientists:
default search action
Wireless Personal Communications, Volume 127
Volume 127, Number 1, November 2022
- Tanvi Sood, Kanika Sharma:
A Novelistic GSA and CSA Based Optimization for Energy-Efficient Routing Using Multiple Sinks in HWSNs Under Critical Scenarios. 1-37 - Thavavel Vaiyapuri, Velmurugan Subbiah Parvathy, V. Manikandan, N. Krishnaraj, Deepak Gupta, K. Shankar:
A Novel Hybrid Optimization for Cluster-Based Routing Protocol in Information-Centric Wireless Sensor Networks for IoT Based Mobile Edge Computing. 39-62 - P. Sruthi, K. Sahadevaiah:
A Novel Efficient Heuristic Based Localization Paradigm in Wireless Sensor Network. 63-83 - G. Amudha:
Dilated Transaction Access and Retrieval: Improving the Information Retrieval of Blockchain-Assimilated Internet of Things Transactions. 85-105 - M. Senthil Raja, L. Arun Raj:
Detection of Malicious Profiles and Protecting Users in Online Social Networks. 107-124 - Minhang Ma, Zhen Han:
Symmetric Algorithm for Direction Tracking of Dribble Directional Shooting. 125-140 - Feifei Wang, Haifeng Hu:
Symmetric Algorithm for Detection of Coverage Hole in Wireless Sensor Network. 141-158 - Ashutosh Sharma, Lokesh Tharani:
Ant Colony Based Node Disjoint Local Repair in Multipath Routing in MANET Network. 159-186 - Arslan Khalid, Faizan Rashid, Umair Tahir, Hafiz M. Asif, Fadi M. Al-Turjman:
Multi-carrier Visible Light Communication System Using Enhanced Sub-carrier Index Modulation and Discrete Wavelet Transform. 187-215 - Sathish A. P. Kumar, A. Suresh, S. Raj Anand, K. Chokkanathan, M. Vijayasarathy:
Hybridization of Mean Shift Clustering and Deep Packet Inspected Classification for Network Traffic Analysis. 217-233 - P. Mahalakshmi, N. Sabiyath Fatima:
Ensembling of text and images using Deep Convolutional Neural Networks for Intelligent Information Retrieval. 235-253 - Azath Mubarakali:
An Efficient Authentication Scheme Using Blockchain Technology for Wireless Sensor Networks. 255-269 - Shiyao Qin, Ruiming Wang, Deyi Fu:
Research on Wind Turbines Fault Diagnosis Technology Based on CMS Data Feature Extraction. 271-291 - K. Sornalakshmi, G. Vadivu:
Dynamic Auto Reconfiguration of Operator Placement in Wireless Distributed Stream Processing Systems. 293-318 - Aldosary Saad:
Hybrid Secure Equivalent Computing Model for Distributed Computing Applications. 319-339 - Wentian Cai, Huijun Yao:
A Secure Transmission Method of Network Communication Data Based on Symmetric Key Encryption Algorithm. 341-352 - Ming Li:
Automatic Encryption Method of Sensor Network Capture Data Based on Symmetric Algorithm. 353-367 - Hongjing Bi:
Aggregation Encryption Method of Social Network Privacy Data Based on Matrix Decomposition Algorithm. 369-383 - Sunil Kumar, Korhan Cengiz, S. Vimal, Annamalai Suresh:
Energy Efficient Resource Migration Based Load Balance Mechanism for High Traffic Applications IoT. 385-403 - Jie Zhang, Jinguang Sun, Hua He:
Detection and Location for Network Hidden Threat Information Based on Improved MSCKF Algorithm. 405-418 - Ankit Agarwal, Manju Khari, Rajiv Singh:
Detection of DDOS Attack using Deep Learning Model in Cloud Storage Application. 419-439 - Ying Liu, Qianchao Sun, Ashutosh Sharma, Amit Sharma, Gaurav Dhiman:
Line Monitoring and Identification Based on Roadmap Towards Edge Computing. 441-464 - J. Omana, Moorthi Madhavan:
Predictive Analysis and Prognostic Approach of Diabetes Prediction with Machine Learning Techniques. 465-478 - K. Lakshmi Narayanan, R. Santhana Krishnan, Eanoch Golden Julie, Y. Harold Robinson, Vimal Shanmuganathan:
Machine Learning Based Detection and a Novel EC-BRTT Algorithm Based Prevention of DoS Attacks in Wireless Sensor Networks. 479-503 - Yuvaraja Teekaraman, Hariprasath Manoharan:
Implementation of Cognitive Radio Model for Agricultural Applications Using Hybrid Algorithms. 505-522 - Y. Harold Robinson, S. Vimal, Eanoch Golden Julie, K. Lakshmi Narayanan, Seungmin Rho:
3-Dimensional Manifold and Machine Learning Based Localization Algorithm for Wireless Sensor Networks. 523-541 - Wenwen Liu, Haolan Wu, Fei Yu, Qiang Wei:
Design of Information Security Access System in the Power Grid Based on Improved Bayesian Algorithm. 543-559 - Yanlong Zhu:
Edge Defect Detection of Network Image by the Application of Modal Symmetry. 561-576 - Shahana Gajala Qureshi, Shishir Kumar Shandilya:
Novel Fuzzy Based Crow Search Optimization Algorithm for Secure Node-to-Node Data Transmission in WSN. 577-597 - Jie Zhang, Jinguang Sun, Hua He:
Clustering Detection Method of Network Intrusion Feature Based on Support Vector Machine and LCA Block Algorithm. 599-613 - Liwei Zhang:
Predictive Analysis of Machine Learning Error Classification Based on Bayesian Network. 615-634 - M. Raja, S. Dhanasekaran, V. Vasudevan:
Opposition Based Joint Grey Wolf-Whale Optimization Algorithm Based Attribute Based Encryption in Secure Wireless Communication. 635-655 - M. Raja, S. Dhanasekaran, V. Vasudevan:
Correction to: Opposition Based Joint Grey Wolf‑Whale Optimization Algorithm Based Attribute Based Encryption in Secure Wireless Communication. 657 - Rana Muhammad Waseem, Farrukh Zeeshan Khan, Muneer Ahmad, Anum Naseem, N. Z. Jhanjhi, Uttam Ghosh:
Performance Evaluation of AOMDV on Realistic and Efficient VANet Simulations. 659-678 - Sathish A. P. Kumar, Resmi R. Nair, E. Kannan, A. Suresh, S. Raj Anand:
Intelligent Vehicle Parking System (IVPS) Using Wireless Sensor Networks. 679-694 - Dayal Kumar Behera, Madhabananda Das, Subhra Swetanisha, Janmenjoy Nayak, S. Vimal, Bighnaraj Naik:
Follower Link Prediction Using the XGBoost Classification Model with Multiple Graph Features. 695-714 - Feslin Anish Mon Solomon, S. Godfrey Winster, R. Ramesh:
Trust Model for IoT Using Cluster Analysis: A Centralized Approach. 715-736 - R. Krishnamoorthy, I. D. Soubache, Shafali Jain:
Wireless Communication Based Evaluation of Power Consumption for Constrained Energy System. 737-748 - Roy Setiawan, Rama Koteswara Rao Ganga, Priya Velayutham, Kumaravel Thangavel, Dilip Kumar Sharma, Regin Rajan, Sujatha Krishnamoorthy, Sudhakar Sengan:
Encrypted Network Traffic Classification and Resource Allocation with Deep Learning in Software Defined Network. 749-765 - Tu N. Nguyen, Vinh V. Le, Shao-I Chu, Bing-Hong Liu, Yao-Chuan Hsu:
Secure Localization Algorithms Against Localization Attacks in Wireless Sensor Networks. 767-792 - G. Vasukidevi, T. Sethukarasi:
BBSSE: Blockchain-Based Safe Storage, Secure Sharing and Energy Scheme for Smart Grid Network. 793-814 - Fahad Ghalib Abdulkadhim, Zhang Yi, Ameer N. Onaizah, Furkan Rabee, Abbas M. Ali Al-muqarm:
Optimizing the Roadside Unit Deployment Mechanism in VANET with Efficient Protocol to Prevent Data Loss. 815-843 - Renze Luo, Guodong Li, Shunli Fan, Fatemeh Safara:
Location-Based Explosion Detection in Wireless Optical Pressure Sensor Networks Using Bat Optimization Algorithm. 845-868 - Abdulrahman Saad Alqahtani:
Expectation Maximization Method for Effective Detection and Tracking of Object Using Machine Learning Technique for Secure Wireless Communication. 869-880 - Yafei Wang:
Detection for Nodes Intrusion of Compressed Transmission Data Based on Fuzzy Analytic Hierarchy Process. 881-896
Volume 127, Number 2, November 2022
- ShanGuo Lv, Hongli Chen:
Security Protection Technology in Multi-Attribute Data Transmission Based on Fuzzy Genetic Algorithm. 897-917 - Jingkuang Liu, Lemei Yan, Dong Wang:
A Hybrid Blockchain Model for Trusted Data of Supply Chain Finance. 919-943 - Bo Fang:
Method for Quickly Identifying Mine Water Inrush Using Convolutional Neural Network in Coal Mine Safety Mining. 945-962 - Anil Kumar Budati, George Ghinea, S. N. V. Ganesh:
Novel Aninath Computation Detection Algorithm to Identify the UAV Users in 5G Networks. 963-978 - R. Bala Krishnan, N. Rajesh Kumar, N. R. Raajan, G. Manikandan, A. Srinivasan, D. Narasimhan:
An Approach for Attaining Content Confidentiality on Medical Images Through Image Encryption with Steganography. 979-995 - B. Ida Seraphim, E. Poovammal:
Adversarial Attack by Inducing Drift in Streaming Data. 997-1021 - Smriti Sachan, Rohit Sharma, Amit Sehgal:
SINR Based Energy Optimization Schemes for 5G Vehicular Sensor Networks. 1023-1043 - Deep Kumar Bangotra, Yashwant Singh, Arvind Selwal, Nagesh Kumar, Pradeep Kumar Singh:
A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks. 1045-1066 - Mukesh Soni, Dileep Kumar Singh:
LAKA: Lightweight Authentication and Key Agreement Protocol for Internet of Things Based Wireless Body Area Network. 1067-1084 - Arthur A. M. Teodoro, Otávio S. M. Gomes, Muhammad Saadi, Bruno A. Silva, Renata Lopes Rosa, Demóstenes Z. Rodríguez:
An FPGA-Based Performance Evaluation of Artificial Neural Network Architecture Algorithm for IoT. 1085-1116 - Gang Li, Mingle Zhou, Zhengqian Feng, Min Li, Hui Jiang:
Research on Key Influencing Factors of E-Government Cloud Service Satisfaction. 1117-1135 - M. Kirankumar, M. Santhi:
Accomplishment of Reversible Logic Gates in WSN Environment by Patternization. 1137-1155 - Nanditha Boddu, Veeramallu Boba, Ramesh Vatambeti:
A Novel Georouting Potency based Optimum Spider Monkey Approach for Avoiding Congestion in Energy Efficient Mobile Ad-hoc Network. 1157-1186 - Selvakumar S, S. S. Manivannan:
A Spectrum Defragmentation Algorithm Using Jellyfish Optimization Technique in Elastic Optical Network (EON). 1187-1205 - Bingjun Wan, Chengwei Xu, Rajendra Prasad Mahapatra, P. Selvaraj:
Understanding the Cyber-Physical System in International Stadiums for Security in the Network from Cyber-Attacks and Adversaries using AI. 1207-1224 - Dhiren P. Bhagat:
Tracking of Moving Target in Wireless Sensor Network with Improved Network Life Time Using PSO. 1225-1239 - V. Jyothi, M. V. Subramanyam:
An Enhanced Routing Technique to Improve the Network Lifetime of Cognitive Sensor Network. 1241-1264 - Libin Liu, Zhiyuan Sun:
Flow Control in Network Media Information Transmission Based on Differential Evolution Algorithm. 1265-1282 - Jeyasudha Jeyaraj, Usha Gopal:
An Intelligent Centrality Measures for Influential Node Detection in COVID-19 Environment. 1283-1309 - Satheesh Narayanasami, Rajasekhar Butta, Rajeshkumar Govindaraj, Surendra Singh Choudhary, Dilip Kumar Sharma, Anjana Poonia, Sudhakar Sengan, Pankaj Dadheech, Neeraj Kumar Shukla, Rajesh Verma:
An Enhanced Trust-Based Kalman Filter Route Optimization Technique for Wireless Sensor Networks. 1311-1329 - Bei He:
Algorithm to Enhance Security of Dynamic Data Migration in Optical Fiber Network. 1331-1339 - Weina He, Yafei Wang, Dongliang Xia:
Fuzzy Integration Algorithm of Big Data in Peer-to-Peer Communication Network Based on Deep Learning. 1341-1357 - B. Sowmiya, E. Poovammal:
A Heuristic K-Anonymity Based Privacy Preserving for Student Management Hyperledger Fabric blockchain. 1359-1376 - Venu Madhav Kuthadi, Rajalakshmi Selvaraj, S. Baskar, P. Mohamed Shakeel, Abhishek Ranjan:
Optimized Energy Management Model on Data Distributing Framework of Wireless Sensor Network in IoT System. 1377-1403 - Fawad Masood, Maha Driss, Wadii Boulila, Jawad Ahmad, Sadaqat ur Rehman, Sana Ullah Jan, Abdullah Qayyum, William J. Buchanan:
A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations. 1405-1432 - Qiheng Sun, Lanxia Zhang:
Bilateral Matching Model Between R & D Personnel and Project Manager Based on Ant Colony Optimization. 1433-1451 - Muhammad Hassaan Anwar, Saeid Ghafouri, Sukhpal Singh Gill, Joseph Doyle:
Recommender System for Optimal Distributed Deep Learning in Cloud Datacenters. 1453-1477 - K. Subramanian, S. Shanmugavel:
A Complete Continuous Target Coverage Model for Emerging Applications of Wireless Sensor Network Using Termite Flies Optimization Algorithm. 1479-1501 - Yichun Dong:
Design of an Automatic Detection System for Abnormal Communication Data Packets of Electronic Equipment. 1503-1516 - T. Rubesh Kumar, Moorthi Madhavan:
Hybrid Fabric Wearable Antenna Design and Evaluation for High Speed 5G Applications. 1517-1528 - Xuemei Wang, Jiajun Zhang:
An Algorithm of Video Image Fault-Tolerant Coding Transmission Based on OFDM Technology. 1529-1546 - Yingying Liu, Yisen Wang:
Adaptive Data Transmission Method Based on Mean Fuzzy Algorithm in Ad Hoc Networks. 1547-1564 - Inderjeet Kaur, E. Laxmi Lydia, Vinay Kumar Nassa, Bhanu Shrestha, Jamel Nebhen, Sharaf J. Malebary, Gyanendra Prasad Joshi:
Generative Adversarial Networks with Quantum Optimization Model for Mobile Edge Computing in IoT Big Data. 1565-1585 - M. Gayathri, C. Malathy:
Fisher-Yates Chaotic Shuffling Based Visual Cryptography Scheme for Multimodal Biometric Authentication. 1587-1614 - Amit Kishor, Chinmay Chakraborty:
Artificial Intelligence and Internet of Things Based Healthcare 4.0 Monitoring System. 1615-1631 - Lanfang Jia:
Algorithm Design of Multi-channel Weak Signal Detection and Synchronous Acquisition in Communication Network. 1633-1645 - Jayagopalan Santhosh, P. Balamurugan, G. Arulkumaran, Manickam Baskar, R. Velumani:
Image Driven Multi Feature Plant Management with FDE Based Smart Agriculture with Improved Security in Wireless Sensor Networks. 1647-1663 - Liren Zou:
Detection Method of DC Microgrid Network Attack Based on Two-level and Multi-segment Model. 1665-1681 - Amit Kishor, Chinmay Chakraborty:
Task Offloading in Fog Computing for Using Smart Ant Colony Optimization. 1683-1704 - Abdulrahman Saad Alqahtani, Khaled Ali Abuhasel, Mohammed M. Alquraish:
A Novel Decentralized Analytical Methodology for Cyber Physical Networks Attack Detection. 1705-1716 - N. Sree Divya, Veeramallu Bobba, Ramesh Vatambeti:
An Adaptive Cluster based Vehicular Routing Protocol for Secure Communication. 1717-1736 - Roy Setiawan, Vidya Sagar Ponnam, Sudhakar Sengan, Mamoona Anam, Chidambaram Subbiah, Khongdet Phasinam, Manikandan Vairaven, Selvakumar Ponnusamy:
Certain Investigation of Fake News Detection from Facebook and Twitter Using Artificial Intelligence Approach. 1737-1762 - Satheesh Narayanasami, Sudhakar Sengan, Saira Khurram, Farrukh Arslan, SureshKumar Murugaiyan, Regin Rajan, Vijayakumar Peroumal, Anil Kumar Dubey, Sujatha Srinivasan, Dilip Kumar Sharma:
Biological Feature Selection and Classification Techniques for Intrusion Detection on BAT. 1763-1785 - Hasnain Ali Almashhadani, Xiaoheng Deng, Suhaib N. Abdul Latif, Mohammed M. Ibrahim, Ali Hussien Alshammari:
An Edge-Computing Based Task-Unloading Technique with Privacy Protection for Internet of Connected Vehicles. 1787-1808 - C. Santhanakrishnan, K. Annapurani, S. Pradeep, T. Senthilkumar, M. Ramya:
Physical Features Based Authentication Technique and Key Management for IoT Networks. 1809-1825 - Muhammad Junaid, Sajid Ali, Isma Farah Siddiqui, Choon-Sung Nam, Nawab Muhammad Faseeh Qureshi, Jaehyoun Kim, Dong Ryeol Shin:
Correction to: Performance Evaluation of Data-driven Intelligent Algorithms for Big data Ecosystem. 1827
Volume 127, Number 3, December 2022
- Mididoddi Padmaja, Shitharth Selvarajan, K. Prasuna, Abhay Chaturvedi, Pravin Kshirsagar, A. Vani:
Grow of Artificial Intelligence to Challenge Security in IoT Application. 1829-1845 - T. Balachander, M. B. Mukesh Krishnan:
Carrier Frequency Offset (CFO) Synchronization and Peak Average Power Ratio (PAPR) Minimization for Energy Efficient Cognitive Radio Network (CRN) for 5G Wireless Communication. 1847-1867 - Prateek Sikka, Abhijit R. Asati, Chandra Shekhar:
Area, Speed and Power Optimized Implementation of a Band-Pass FIR Filter Using High-Level Synthesis. 1869-1878 - M. Selvakumar, B. Sudhakar:
Energy Efficient Clustering with Secure Routing Protocol Using Hybrid Evolutionary Algorithms for Mobile Adhoc Networks. 1879-1897 - Ashish Khanna, Poonam Rani, Tariq Hussain Sheikh, Deepak Gupta, Vineet Kansal, Joel J. P. C. Rodrigues:
Blockchain-Based Security Enhancement and Spectrum Sensing in Cognitive Radio Network. 1899-1921 - S. Venkatasubramanian, A. Suhasini, C. Vennila:
An Efficient Route Optimization Using Ticket-ID Based Routing Management System (T-ID BRM). 1923-1942 - Pronaya Bhattacharya, Sudeep Tanwar, Umesh Bodkhe, Ashwani Kumar, Neeraj Kumar:
EVBlocks: A Blockchain-Based Secure Energy Trading Scheme for Electric Vehicles underlying 5G-V2X Ecosystems. 1943-1983 - C. Mohanadevi, S. Selvakumar:
A Qos-Aware, Hybrid Particle Swarm Optimization-Cuckoo Search Clustering Based Multipath Routing in Wireless Sensor Networks. 1985-2001 - Beledha Santhosh Kumar, Polipalli Trinatha Rao:
An Optimal Emperor Penguin Optimization Based Enhanced Flower Pollination Algorithm in WSN for Fault Diagnosis and Prolong Network Lifespan. 2003-2020 - Ashish Khanna, Poonam Rani, Puneet Garg, Prakash Kumar Singh, Aditya Khamparia:
An Enhanced Crow Search Inspired Feature Selection Technique for Intrusion Detection Based Wireless Network System. 2021-2038 - Ashish Khanna, Poonam Rani, Puneet Garg, Prakash Kumar Singh, Aditya Khamparia:
Correction to: An Enhanced Crow Search Inspired Feature Selection Technique for Intrusion Detection Based Wireless Network System. 2039 - Mukesh Soni, Gaurav Dhiman, Brajendra Singh Rajput, Rajan Patel, Nitesh Kumar Tejra:
Energy-Effective and Secure Data Transfer Scheme for Mobile Nodes in Smart City Applications. 2041-2061 - Yi-Cheng Shen, Te-Chun Hsia, Ching-Hsien Hsu:
Software Optimization in Ultrasound Imaging Technique Using Improved Deep Belief Learning Network on the Internet of Medical Things Platform. 2063-2081 - Sangeeta Sa, Arunanshu Mahapatro:
Role-Based Channel Hopping Algorithm for a Cognitive Radio Network in Asynchronous Environment. 2083-2102 - S. Raamakirtinan, L. M. Jenila Livingston:
Identifying Influential Spreaders in Complex Networks Based on Weighted Mixed Degree Decomposition Method. 2103-2119 - Yuan Xiwen:
Design of Voice Recognition Acoustic Compression System Based on Neural Network. 2121-2139 - Yang He, Bai-sheng Nie, Jianhui Zhang, Priyan Malarvizhi Kumar, BalaAnand Muthu:
Fault Detection and Diagnosis of Cyber-Physical System Using the Computer Vision and Image Processing. 2141-2160 - Sita Kumari Kotha, Meesala Shobha Rani, Bharat Subedi, Anilkumar Chunduru, Aravind Karrothu, Bipana Neupane, V. E. Sathishkumar:
A Comprehensive Review on Secure Data Sharing in Cloud Environment. 2161-2188 - T. Balachander, M. B. Mukesh Krishnan:
Efficient Utilization of Cooperative Spectrum Sensing (CSS) in Cognitive Radio Network (CRN) Using Non-orthogonal Multiple Access (NOMA). 2189-2210 - M. Girija, P. Manickam, M. Ramaswami:
FibGeoPresent: A Highly Secured and Geographic Coordinate System Based Authenticated Lightweight Block Cipher for Smart System. 2211-2228 - Vadivel Ramasamy, SudalaiMuthu Thalavai Pillai:
Cauchy Particle Swarm Optimization (CPSO) Based Migrations of Tasks in a Virtual Machine. 2229-2246 - P. Savaridassan, G. Maragatham:
Integrated Deep Auto-Encoder and Q-Learning-Based Scheme to Detect Anomalies and Supporting Forensics in Cloud Computing Environments. 2247-2265 - V. Nallarasan, Kottilingam Kottursamy:
Cognitive Radio Jamming Attack Detection Using an Autoencoder for CRIoT Network. 2267-2283