![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/ijahuc/ijahuc41.bht:"
@article{DBLP:journals/ijahuc/ChinnarajA22, author = {Govindasamy Chinnaraj and Arokiasamy Antonidoss}, title = {Hybrid meta-heuristic-based inventory management using block chain technology in cloud sector}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {41}, number = {3}, pages = {147--169}, year = {2022}, url = {https://doi.org/10.1504/IJAHUC.2022.10048672}, doi = {10.1504/IJAHUC.2022.10048672}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/ChinnarajA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/Chopra22, author = {Khyati Chopra}, title = {Intercept analysis with threshold-based diversity reception for cognitive network}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {41}, number = {3}, pages = {170--180}, year = {2022}, url = {https://doi.org/10.1504/IJAHUC.2022.10050033}, doi = {10.1504/IJAHUC.2022.10050033}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/Chopra22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/DebBKR22, author = {Subhrajyoti Deb and Bubu Bhuyan and Nirmalya Kar and K. Sudheer Reddy}, title = {Colour image encryption using an improved version of stream cipher and chaos}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {41}, number = {2}, pages = {118--133}, year = {2022}, url = {https://doi.org/10.1504/IJAHUC.2022.10045645}, doi = {10.1504/IJAHUC.2022.10045645}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/DebBKR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/GaoYCFTZ22, author = {Peng Gao and Xiao Yue and Wei Chen and Weidong Fang and Zijian Tian and Fan Zhang}, title = {A state-of-the-art review on person re-identification with deep learning}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {41}, number = {2}, pages = {69--91}, year = {2022}, url = {https://doi.org/10.1504/IJAHUC.2022.10049324}, doi = {10.1504/IJAHUC.2022.10049324}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/GaoYCFTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/JainP22, author = {Shivani Jain and R. Padmavathy}, title = {Lattice-based lightweight cryptosystem}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {41}, number = {3}, pages = {135--146}, year = {2022}, url = {https://doi.org/10.1504/IJAHUC.2022.10050032}, doi = {10.1504/IJAHUC.2022.10050032}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/JainP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/JuangHCC22, author = {Tong{-}Ying Juang and Chih{-}Shun Hsu and Yuh{-}Shyan Chen and Wan{-}Chun Chen}, title = {A concurrent prediction of criminal law charge and sentence using twin convolutional neural networks}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {41}, number = {1}, pages = {29--43}, year = {2022}, url = {https://doi.org/10.1504/IJAHUC.2022.10049035}, doi = {10.1504/IJAHUC.2022.10049035}, timestamp = {Tue, 20 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/JuangHCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/KumarRR22, author = {Aruru Sai Kumar and T. V. K. Hanumantha Rao and B. Naresh Kumar Reddy}, title = {Performance and communication energy constrained embedded benchmark for fault tolerant core mapping onto NoC architectures}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {41}, number = {2}, pages = {108--117}, year = {2022}, url = {https://doi.org/10.1504/IJAHUC.2022.10049325}, doi = {10.1504/IJAHUC.2022.10049325}, timestamp = {Tue, 20 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/KumarRR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/LiangCLY22, author = {Wei{-}Che Liang and Chih{-}Min Chao and Chih{-}Yu Lin and Chun{-}Chao Yeh}, title = {Transmission range determination and antenna deployment to recognise fitness actions using Wi-Fi signals}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {41}, number = {4}, pages = {221--231}, year = {2022}, url = {https://doi.org/10.1504/IJAHUC.2022.10051163}, doi = {10.1504/IJAHUC.2022.10051163}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/LiangCLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/MaivizhiY22, author = {Radhakrishnan Maivizhi and Palanichamy Yogesh}, title = {Identity-based secure data aggregation in big data wireless sensor networks}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {41}, number = {1}, pages = {16--28}, year = {2022}, url = {https://doi.org/10.1504/IJAHUC.2022.10049034}, doi = {10.1504/IJAHUC.2022.10049034}, timestamp = {Tue, 20 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/MaivizhiY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/MeherA22, author = {Bimal Kumar Meher and Ruhul Amin}, title = {A location-based multi-factor authentication scheme for mobile devices}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {41}, number = {3}, pages = {181--190}, year = {2022}, url = {https://doi.org/10.1504/IJAHUC.2022.10050034}, doi = {10.1504/IJAHUC.2022.10050034}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/MeherA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/MeritH22, author = {C. K. Deena Merit and M. Haridass}, title = {A simulation study on the necessity of working breakdown in a state dependent bulk arrival queue with disaster and optional re-service}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {41}, number = {1}, pages = {1--15}, year = {2022}, url = {https://doi.org/10.1504/IJAHUC.2022.10049033}, doi = {10.1504/IJAHUC.2022.10049033}, timestamp = {Tue, 20 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/MeritH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/RadM22, author = {Khodadad Jalali Rad and Abbas Mirzaei}, title = {Hierarchical capacity management and load balancing for HetNets using multi-layer optimisation methods}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {41}, number = {1}, pages = {44--57}, year = {2022}, url = {https://doi.org/10.1504/IJAHUC.2022.10044294}, doi = {10.1504/IJAHUC.2022.10044294}, timestamp = {Wed, 19 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/RadM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/RajaramVN22, author = {Sangeetha Rajaram and Satyanarayana Vollala and Ramasubramanian Natarajan}, title = {\emph{ERMAP}: ECC-based robust mutual authentication protocol for smart grid communication with {AVISPA} simulations}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {41}, number = {4}, pages = {232--245}, year = {2022}, url = {https://doi.org/10.1504/IJAHUC.2022.10051164}, doi = {10.1504/IJAHUC.2022.10051164}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/RajaramVN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/Sarkar22, author = {Sajal Sarkar}, title = {Mobility aware and reliable multipath routing protocol for MANETs}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {41}, number = {4}, pages = {256--269}, year = {2022}, url = {https://doi.org/10.1504/IJAHUC.2022.10051169}, doi = {10.1504/IJAHUC.2022.10051169}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/Sarkar22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/SilemTM22, author = {Abd El Heq Silem and Hajer Taktak and Faouzi Moussa}, title = {User interests profiling using fuzzy regression tree}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {41}, number = {3}, pages = {191--203}, year = {2022}, url = {https://doi.org/10.1504/IJAHUC.2022.10050035}, doi = {10.1504/IJAHUC.2022.10050035}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/SilemTM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/SinghPAC22, author = {Pulkit Singh and K. Abhimanyu Kumar Patro and Bibhudendra Acharya and Rahul Kumar Chaurasiya}, title = {Efficient hardware architectures of Lilliput lightweight algorithm for image encryption}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {41}, number = {4}, pages = {205--220}, year = {2022}, url = {https://doi.org/10.1504/IJAHUC.2022.10051162}, doi = {10.1504/IJAHUC.2022.10051162}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/SinghPAC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/SmruthyS22, author = {A. Smruthy and M. Suchetha}, title = {A novel optimised apnea classification with {AA-CNN} method by utilising the {EDR} and {ECG} features}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {41}, number = {1}, pages = {58--67}, year = {2022}, url = {https://doi.org/10.1504/IJAHUC.2022.10049036}, doi = {10.1504/IJAHUC.2022.10049036}, timestamp = {Tue, 20 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/SmruthyS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/SunP22, author = {Haibin Sun and Dijing Pan}, title = {Research on optimisation of energy efficient routing protocol based on {LEACH}}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {41}, number = {2}, pages = {92--107}, year = {2022}, url = {https://doi.org/10.1504/IJAHUC.2021.10043469}, doi = {10.1504/IJAHUC.2021.10043469}, timestamp = {Tue, 20 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/SunP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/Turk22, author = {Yekta Turk}, title = {Indoor performance analysis of {URLLC} service for industrial IoT}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {41}, number = {4}, pages = {246--255}, year = {2022}, url = {https://doi.org/10.1504/IJAHUC.2022.10051167}, doi = {10.1504/IJAHUC.2022.10051167}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/Turk22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.