


default search action
Wireless Personal Communications, Volume 90
Volume 90, Number 1, September 2016
- Ramjee Prasad:

Editorial Note. 1-2 - Yun-zheng Ding, Mingzhou Zhou, Yuan Tian, Hui-ying Li, Bingxiang Liu:

A BER and 2-Hop Routing Information-Based Stable Geographical Routing Protocol in MANETs for Multimedia Applications. 3-32 - Xue Jun Li

, Maode Ma:
Joint Concurrent Routing and Multi-Pointer Packet Scheduling in IEEE 802.16 Mesh Networks. 33-50 - Fuxin Zhang, Guozhen Tan, Chao Yu, Nan Ding, Caixia Song:

Dynamic Feedback Power Control for Cooperative Vehicle Safety Systems. 51-74 - Abbas Ali Sharifi, Mir Javad Musevi Niya

:
Securing Collaborative Spectrum Sensing Against Malicious Attackers in Cognitive Radio Networks. 75-91 - Samaneh Mashhadi

:
How to Fairly Share Multiple Secrets Stage by Stage. 93-107 - Somayyeh Chamaani

, Ali Mokhtarani:
Indoor On-body to Off-body Fading Mitigation Using Pattern Diversity. 109-120 - José A. Afonso

, Antonio Fernández-Caballero, Ricardo Simões
:
Performance Evaluation of Bluetooth Low Energy for High Data Rate Body Area Networks. 121-141 - Nauman Anwar Baig, Mohammad Bilal Malik

:
2-D Direction-of-Arrival: Estimation of Azimuth and Elevation by Exploiting the Amplitude Modulation Induced by Antenna's Mechanical and Electronic Scan. 143-155 - Dipen Bepari

, Abhishake Kumar Bojja, B. Sandeep Kumar, Debjani Mitra:
A Spectral Distance Based Power Control Scheme for Capacity Enhancement of OFDM Cognitive Radio. 157-173 - Imran Erguler:

Subtle Flaws in the Secure RFID Tag Searching Protocol: SRTS. 175-188 - Abdulkarim Ayopo Oloyede

, David Grace:
Energy Efficient Short Term Spectrum Auction Using the Concept of Green Payments. 189-216 - Pratik Ranjan, Hari Om:

An Efficient Remote User Password Authentication Scheme based on Rabin's Cryptosystem. 217-244 - Fang Huang, Xuefei Liao, Yong Bai:

Multipath Channel Model for Radio Propagation over Sea Surface. 245-257 - Xunli Fan, Feifei Du, Wei Wei:

A Geography-Based Void-Bypassing Routing Protocol for Wireless Sensor Network. 259-280 - Zory Marantz:

Logistic Modeling for Optimal Resource Allocation in Network Assisted Power Control. 281-299 - Mojtaba MalekpourShahraki, Hadi Barghi, Seyed Vahid Azhari, Saeed Asaiyan:

Distributed and Energy Efficient Scheduling for IEEE802.11s Wireless EDCA Networks. 301-323 - Xiaolin Liang, Xiongwen Zhao, Yitian Li, Shu Li, Qi Wang:

A Non-Stationary Geometry-Based Street Scattering Model for Vehicle-to-Vehicle Wideband MIMO Channels. 325-338 - Rajarajan Sundaramurthi, Sanjay K. Chaturvedi

:
On Throughput-Reliability Tradeoff of Two-Layer D-BLAST Transmission Scheme. 339-367 - Sahar Idwan

, Junaid Ahmed Zubairi:
Load Balancing for Disaster Recovery and Management. 369-379 - M. Bala Krishna, Arpit Dugar:

Product Authentication Using QR Codes: A Mobile Application to Combat Counterfeiting. 381-398 - Hao Cai, Hans Jørgen Krebs, Yingshan Tao, John Hansen

, Ruihuan Pan, Yanguang Cai, Egon Toft, Birthe Dinesen:
A Qualitative Study on Implementation of the Intelligent Bed: Findings from a Rehabilitation Ward at a Large Chinese Tertiary Hospital. 399-420
Volume 90, Number 2, September 2016
- S. Smys, Robert Bestak

:
Introduction to the Special Issue on Inventive Network Structures for Next Generation Wireless Personal Systems. 421-422 - A. Muthu Krishnan

, P. Ganesh Kumar:
An Effective Clustering Approach with Data Aggregation Using Multiple Mobile Sinks for Heterogeneous WSN. 423-434 - Kathiroli Raja, Arivudainambi Deivasigamani

, Vidhya Ravi:
A Reliant Certificate Revocation of Malicious Nodes in MANETs. 435-455 - A. Thomas Paul Roy, K. Balasubadra:

DAD: A Secured Routing Protocol for Detecting and Preventing Denial-of-Service in Wireless Networks. 457-471 - P. K. Kowsalya

, Rajaguru Harikumar
:
Performance Analysis of Adaptive Routing Structure for Wireless Sensor Network Based on Load Balancing. 473-485 - Hua Shao, Zhaoming Lu, Xiangming Wen, Haijun Zhang, Yawen Chen, Yan Hong:

Content-Aware Video QoE Coverage Analysis in Heterogeneous Wireless Networks. 487-502 - P. Poongodi, N. Kumareshan

:
Analysis of Dynamic Overlay Architecture for the Quality of Experience (QoE) Improvement in Wireless Networks. 503-514 - Lamri Sayad, Djamil Aïssani

, Louiza Bouallouche-Medjkoune
:
On-Demand Routing Protocol with Tabu Search Based Local Route Repair in Mobile Ad Hoc Networks. 515-536 - T. Abirami

, S. Anandamurugan:
Data Aggregation in Wireless Sensor Network Using Shuffled Frog Algorithm. 537-549 - Helin Yang, Xianzhong Xie, Athanasios V. Vasilakos

:
A Robust Stackelberg Game Based Uplink Power Control for Device-to-Device Communication with Channel Uncertainty and Outage Probability Constraints. 551-573 - Fancheng Kong, Xinghua Sun, Hongbo Zhu:

Optimal Biased Association Scheme with Heterogeneous User Distribution in HetNets. 575-594 - S. Senthilkumar, P. Suresh:

Analysis of Virtual Robot Movements for Performance Improvements in Personal Communication. 595-608 - K. Senthil Kumar, D. Ramkumar:

Combined Genetic and Fuzzy Approach for Shortest Path Routing Problem in Ad hoc Networks. 609-623 - K. Muralisankar, A. M. J. Md. Zubair Rahman:

A Scalable Solution to the Wireless Personal Cloud Service Providers to Allocate Maximize Resources to Users. 625-637 - Yanli Xu:

A Distributed Mode Selection Scheme for Device-to-Device Communications. 639-655 - David Sundararaj Shylu, D. Jackuline Moni, G. Nivetha:

Design and Power Optimization of High-Speed Pipelined ADC with Programmable Gain Amplifier for Wireless Receiver Applications. 657-678 - S. Balaji, M. Rajaram:

SIPTAN: Securing Inimitable and Plundering Track for Ad Hoc Network. 679-699 - N. Arun Vignesh

, P. Poongodi:
Analysis of Localized Quality of Service Improvement Architecture for Wireless LAN. 701-711 - R. Harikumar, B. Manjurathi

:
Test Data Compression and Power Reduction Using Similarity Based Reordering Technique for Wireless Systems. 713-728 - I. S. Akila, R. Venkatesan:

A Cognitive Multi-hop Clustering Approach for Wireless Sensor Networks. 729-747 - Yunpeng Li, Zeeshan Kaleem

, KyungHi Chang:
Interference-Aware Resource-Sharing Scheme for Multiple D2D Group Communications Underlaying Cellular Networks. 749-768 - Yesudhas Harold Robinson

, M. Rajaram:
A Memory Aided Broadcast Mechanism with Fuzzy Classification on a Device-to-Device Mobile Ad Hoc Network. 769-791 - B. Sivakumar, B. Sowmya:

An Energy Efficient Clustering with Delay Reduction in Data Gathering (EE-CDRDG) Using Mobile Sensor Node. 793-806 - J. N. Swaminathan

, P. Kumar:
A Novel ML-2D-LUT Based Adaptive Predistorter of High Power Amplifier Using New Improved RLS Algorithm. 807-816 - N. V. S. Sree Rathna Lakshmi

, N. Bhalaji
, B. Sivakumar:
On the Construction of QoS Based Overlay Architecture for Wireless Local Area Network. 817-829 - M. Rajesh Babu, G. Usha:

A Novel Honeypot Based Detection and Isolation Approach (NHBADI) To Detect and Isolate Black Hole Attacks in MANET. 831-845 - C. Anand, R. K. Gnanamurthy

:
Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network. 847-859 - M. Malathi

, S. Jayashri:
Modified Bi-directional Routing with Best Afford Path (MBRBAP) for Routing Optimization in MANET. 861-873 - Ambayiram Chinnasamy

, S. Prakash
, PrabathKumar Selvakumari
:
Wagon Next Point Routing Protocol (WNPRP) in VANET. 875-887 - R. Kalpana, Madhusudhanan Baskaran:

TAR: TOA-AOA Based Random Transmission Directed Localization. 889-902 - Eanoch Golden Julie, S. Tamil Selvi

:
CDS-Fuzzy Opportunistic Routing Protocol for Wireless Sensor Networks. 903-922 - S. Gopikrishnan

, P. Priakanth
:
Hybrid Tree Construction for Sustainable Delay Aware Data Aggregation in Wireless Sensor Networks. 923-945 - R. Pitchai, S. Jayashri, J. Raja:

Searchable Encrypted Data File Sharing Method Using Public Cloud Service for Secure Storage in Cloud Computing. 947-960 - A. Sureshkumar

, R. Samson Ravindran:
Swarm and Fuzzy Based Cooperative Caching Framework to Optimize Energy Consumption Over Multimedia Wireless Sensor Networks. 961-984 - M. Umaparvathi, N. Bhalaji

, S. Jothi Prasanna, N. Parthiban
:
Analysis of Creido Enhanced Chord Overlay Protocol Under Different Movement Models in Delay Tolerant Networks. 985-1001 - Sitadevi Bharatula, Meenakshi Murugappan

:
Design of Cognitive Radio Network for Hospital Management System. 1021-1038 - Thangamuthu Poongodi

, M. Karthikeyan:
Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks. 1039-1050 - K. Loheswaran

, J. Premalatha
:
Renaissance System Model Improving Security and Third Party Auditing in Cloud Computing. 1051-1066
Volume 90, Number 3, October 2016
- Hiren Kumar Deva Sarma, Avijit Kar, Rajib Mall:

A Hierarchical and Role Based Secure Routing Protocol for Mobile Wireless Sensor Networks. 1067-1103 - Il-Kwon Lim

, Young-Gil Park, Jae-Kwang Lee:
Design of Security Training System for Individual Users. 1105-1120 - Wei Zhang, Longkai Wu, Sanya Liu, Tao Huang, Yajun Guo, Chingfang Hsu:

A Trajectory Privacy Model for Radio-Frequency Identification System. 1121-1134 - Hemant Kumar Mehta

, Pawan Pawar, Priyesh Kanungo
:
A Two Level Broker System for Infrastructure as a Service Cloud. 1135-1147 - Farzad Tashtarian, Mohammad Reza Majma

, Hossein Pedram, Mehdi Dehghan Takht Fooladi:
Controlling Mobile Sink Trajectory for Data Harvesting in Wireless Sensor Networks. 1149-1178 - Wafa Ben Hassen, Mériem Afif, Sami Tabbane:

Interference Mitigation Through Inter-Cell Interference Coordination Using Virtual PRB Allocation in 4G Networks. 1179-1209 - Zhi-mi Cheng:

A Differential Game Model Between Intrusion Detection System and Attackers for Wireless Sensor Networks. 1211-1219 - Megha Dadel

, Shweta Srivastava
, Kamala Pati Tiwary
:
Design of Substrate Integrated Waveguide (SIW) Fed Log Periodic Microstrip Array Antennas. 1221-1238 - Victor R. L. Shen, Rong-Kuan Shen, Cheng-Ying Yang, Gibran:

Cost Optimization of a Path Protection System with Partial Bandwidth Using Petri Nets. 1239-1259 - Bandar Alotaibi

, Khaled Elleithy
:
Rogue Access Point Detection: Taxonomy, Challenges, and Future Directions. 1261-1290 - N. Muthukumaran, R. Ravi:

Hardware Implementation of Architecture Techniques for Fast Efficient Lossless Image Compression System. 1291-1315 - R. Ramanathan

, M. Jayakumar
:
A Low Complex Sparse Formulation of Semidefinite Relaxation Detector for Large-MIMO Systems Employing BPSK Constellations. 1317-1329 - Sangram Ray

, G. P. Biswas, Mou Dasgupta
:
Secure Multi-Purpose Mobile-Banking Using Elliptic Curve Cryptography. 1331-1354 - Mimoza Ibrani

, Enver Hamiti
, Luan Ahma, Doruntinë Berisha
:
Frequency-Selective Evaluation of Personal Exposure to Electromagnetic Fields of Wireless Communications and Broadcast Transmitters. 1355-1367 - Chayapol Kamyod

, Rasmus Hjorth Nielsen, Neeli Rashmi Prasad, Ramjee Prasad:
A Novel Estimation Framework for Quality of Resilience. 1369-1386 - Osama S. Faragallah

:
Transmission of DWT Block-Based KLT Watermarked Images Through MC-CDMA Wireless Channel. 1387-1404 - Seo Weon Heo, Jeong-Ho Kim:

Measurements Data-Based Location Determination for Characterizing Indoor Signal Propagations of the Shipboard Sensor Nodes. 1405-1412 - Folasade Mojisola Dahunsi, Barry Dwolatzky:

Investigating Geometry-Aware Network-Based Positioning in Cellular Networks Using Neural Network Predictive Model. 1413-1432 - Qi Duan, Kaijun Song, Maoyu Fan, Yu Zhu, Fulong Chen:

Compact Dual-Mode Bandpass Filter with Wide Stopband Using Capacitance Loaded Square Meander Loop Resonator. 1433-1442 - Geng Sun, Yanheng Liu, Aimin Wang, Jing Zhang, Xu Zhou, Zhao Liu:

Sidelobe Control by Node Selection Algorithm Based on Virtual Linear Array for Collaborative Beamforming in WSNs. 1443-1462 - Shapna Muralidharan, Abhishek Roy, Navrati Saxena:

An Exhaustive Review on Internet of Things from Korea's Perspective. 1463-1486 - Hermanto Chua, Ji-Hoon Yun

:
Classification of Transmission Events Based on Receive Power Pattern with Self-Tuning Thresholds in Wireless Receivers. 1487-1495 - Songyang Wu, Yong Zhang

:
Secure Provenance for Data Forensics with Efficient Revocation of Anonymous Credentials in Cloud Computing. 1497-1517 - Misun Yoon, Chungyong Lee:

An Improved TR Prefilter for SSR Maximization in Indoor Wireless Communication System. 1519-1532 - Tian Zhang:

Delay-Aware Data Transmission of Multi-carrier Communications in the Presence of Renewable Energy. 1533-1545 - Sichun Du, Xionghui Zhu:

A Low-Power CMOS Class-E Chireix RF Outphasing Power Amplifier for WLAN Applications. 1547-1561 - Mohammad R. Mosavi

, Maryam Salamat Moghaddasi, Mohammad Javad Rezaei:
A New Method for Continuous Wave Interference Mitigation in Single-Frequency GPS Receivers. 1563-1578 - Kwang-Ho Ko, Byung-Koo Moon, Tong-Won Lee, Won-Ho Lee, In-Kyoon Yoo, Soo-Hyung Lee, Dae-Seok Han, Seung-Hyun Jeong:

Erratum to: An Economic Calibration Method for Fuel Consumption Model in HDM4. 1579
Volume 90, Number 4, October 2016
- Samala Nagaraju, Vidhyacharan Bhaskar:

Outage Probability of Maximal Ratio Combiner in the Presence of Adjacent Cell Interference and Adjacent Channel Interference. 1581-1595 - Mohammad Hossein Refan, Adel Dameshghi, Mehrnoosh Kamarzarrin

:
Implementation of DGPS Reference and User Stations Based on RPCE Factors. 1597-1617 - Jianping Wang, Xianyu Du, Zhen He, Ke Zhang:

A Novel Data-Aided Joint Timing and Carrier Frequency Offset Estimation Based on Central Symmetry ZC Sequence in OFDM/OQAM Systems. 1619-1634 - Nan Run Zhou, Xiao Rong Liang, Zhi Juan Kang, Lihua Gong, Zhi Xue:

Secrecy Outage Probability of a Distributed Multi-Antenna Cooperative Communication System. 1635-1645 - Md. K. Alam, Suhaimi Abd Latif, Mahmuda Akter, Farhat Anwar, Mohammad Kamrul Hasan

:
Enhancements of the Dynamic TXOP Limit in EDCA Through a High-Speed Wireless Campus Network. 1647-1672 - Prateek Jain

, Shyam Akashe
:
An Innovative Design: MOS Based Full-Wave Centre-Tapped Rectifier. 1673-1693 - Chin-Chen Chang, Ngoc-Tu Nguyen

:
An Untraceable Biometric-Based Multi-server Authenticated Key Agreement Protocol with Revocation. 1695-1715 - Reza Malekian, A. F. Kavishe, Bodhaswar T. Maharaj

, P. K. Gupta
, G. Singh, H. Waschefort:
Smart Vehicle Navigation System Using Hidden Markov Model and RFID Technology. 1717-1742 - Abhishek Agrahari, Pulkit Garg, Aditya K. Jagannatham:

Joint Secondary User Transceiver Optimization and User/Antenna Selection for MIMO-OFDM Cognitive Radio Networks with CSI Uncertainty. 1743-1762 - Victor Sucasas

, Firooz B. Saghezchi
, Ayman Radwan
, Hugo Marques
, Jonathan Rodriguez, Seiamak Vahid, Rahim Tafazolli
:
A Cognitive Self-Organising Clustering Algorithm for Urban Scenarios. 1763-1798 - Davinder S. Saini, Vipin Balyan

:
An Efficient Multicode Design for Real Time QoS Support in OVSF Based CDMA Networks. 1799-1810 - Ilayaraja N., Mary Magdalene Jane F.

, Maytham Safar
, R. Nadarajan:
WARM Based Data Pre-fetching and Cache Replacement Strategies for Location Dependent Information System in Wireless Environment. 1811-1842 - Vidhyacharan Bhaskar, E. Gouthami Reddy:

Adaptive Power Control for A-CDMA Systems Over K-Distributed Fading Channels. 1843-1857 - Renning Xie, Anfeng Liu, Jianliang Gao:

A Residual Energy Aware Schedule Scheme for WSNs Employing Adjustable Awake/Sleep Duty Cycle. 1859-1887 - Konstantinos A. Gotsis, Ioannis Kyriakides, John N. Sahalos

:
3D Localization and Frequency Band Estimation of Multiple Unknown RF Sources Using Particle Filters and a Wireless Sensor Network. 1889-1902 - Vikrant Sharma

, R. B. Patel, Harvendra Singh Bhadauria, Devendra Prasad
:
NADS: Neighbor Assisted Deployment Scheme for Optimal Placement of Sensor Nodes to Achieve Blanket Coverage in Wireless Sensor Network. 1903-1933 - G. R. Kanagachidambaresan, A. Chitra:

TA-FSFT Thermal Aware Fail Safe Fault Tolerant algorithm for Wireless Body Sensor Network. 1935-1950 - Dian-Wu Yue

, Yichuang Sun:
Transmit Power Minimization for MIMO Systems of Exponential Average BER with Fixed Outage Probability. 1951-1970 - Mohammad Wazid

, Ashok Kumar Das:
An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks. 1971-2000 - Farhoud Jafari Kaleibar, Maghsoud Abbaspour

, Hadi S. Aghdasi:
An Energy-Efficient Hybrid Routing Method for Wireless Sensor Networks with Mobile Sink. 2001-2015 - Ana Gómez-Andrades

, Raquel Barco
, Pablo Muñoz Luengo
, Inmaculada Serrano:
Unsupervised Performance Functions for Wireless Self-Organising Networks. 2017-2032 - Sajjad Shaukat Jamal, Muhammad Usman Khan

, Tariq Shah:
A Watermarking Technique with Chaotic Fractional S-Box Transformation. 2033-2049 - Yunmin Kim, Chul Wan Park, Tae-Jin Lee:

Differentiated Access Mechanism in Cognitive Radio Networks with Energy-Harvesting Nodes. 2051-2071 - Jia Wu

, Zhi-gang Chen:
Data Decision and Transmission Based on Mobile Data Health Records on Sensor Devices in Wireless Networks. 2073-2087

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














