Search dblp for Publications

export results for "toc:db/journals/ijahuc/ijahuc41.bht:"

 download as .bib file

@article{DBLP:journals/ijahuc/ChinnarajA22,
  author       = {Govindasamy Chinnaraj and
                  Arokiasamy Antonidoss},
  title        = {Hybrid meta-heuristic-based inventory management using block chain
                  technology in cloud sector},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {41},
  number       = {3},
  pages        = {147--169},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAHUC.2022.10048672},
  doi          = {10.1504/IJAHUC.2022.10048672},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijahuc/ChinnarajA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/Chopra22,
  author       = {Khyati Chopra},
  title        = {Intercept analysis with threshold-based diversity reception for cognitive
                  network},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {41},
  number       = {3},
  pages        = {170--180},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAHUC.2022.10050033},
  doi          = {10.1504/IJAHUC.2022.10050033},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijahuc/Chopra22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/DebBKR22,
  author       = {Subhrajyoti Deb and
                  Bubu Bhuyan and
                  Nirmalya Kar and
                  K. Sudheer Reddy},
  title        = {Colour image encryption using an improved version of stream cipher
                  and chaos},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {41},
  number       = {2},
  pages        = {118--133},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAHUC.2022.10045645},
  doi          = {10.1504/IJAHUC.2022.10045645},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijahuc/DebBKR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/GaoYCFTZ22,
  author       = {Peng Gao and
                  Xiao Yue and
                  Wei Chen and
                  Weidong Fang and
                  Zijian Tian and
                  Fan Zhang},
  title        = {A state-of-the-art review on person re-identification with deep learning},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {41},
  number       = {2},
  pages        = {69--91},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAHUC.2022.10049324},
  doi          = {10.1504/IJAHUC.2022.10049324},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijahuc/GaoYCFTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/JainP22,
  author       = {Shivani Jain and
                  R. Padmavathy},
  title        = {Lattice-based lightweight cryptosystem},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {41},
  number       = {3},
  pages        = {135--146},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAHUC.2022.10050032},
  doi          = {10.1504/IJAHUC.2022.10050032},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijahuc/JainP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/JuangHCC22,
  author       = {Tong{-}Ying Juang and
                  Chih{-}Shun Hsu and
                  Yuh{-}Shyan Chen and
                  Wan{-}Chun Chen},
  title        = {A concurrent prediction of criminal law charge and sentence using
                  twin convolutional neural networks},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {41},
  number       = {1},
  pages        = {29--43},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAHUC.2022.10049035},
  doi          = {10.1504/IJAHUC.2022.10049035},
  timestamp    = {Tue, 20 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijahuc/JuangHCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/KumarRR22,
  author       = {Aruru Sai Kumar and
                  T. V. K. Hanumantha Rao and
                  B. Naresh Kumar Reddy},
  title        = {Performance and communication energy constrained embedded benchmark
                  for fault tolerant core mapping onto NoC architectures},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {41},
  number       = {2},
  pages        = {108--117},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAHUC.2022.10049325},
  doi          = {10.1504/IJAHUC.2022.10049325},
  timestamp    = {Tue, 20 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijahuc/KumarRR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/LiangCLY22,
  author       = {Wei{-}Che Liang and
                  Chih{-}Min Chao and
                  Chih{-}Yu Lin and
                  Chun{-}Chao Yeh},
  title        = {Transmission range determination and antenna deployment to recognise
                  fitness actions using Wi-Fi signals},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {41},
  number       = {4},
  pages        = {221--231},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAHUC.2022.10051163},
  doi          = {10.1504/IJAHUC.2022.10051163},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijahuc/LiangCLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/MaivizhiY22,
  author       = {Radhakrishnan Maivizhi and
                  Palanichamy Yogesh},
  title        = {Identity-based secure data aggregation in big data wireless sensor
                  networks},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {41},
  number       = {1},
  pages        = {16--28},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAHUC.2022.10049034},
  doi          = {10.1504/IJAHUC.2022.10049034},
  timestamp    = {Tue, 20 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijahuc/MaivizhiY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/MeherA22,
  author       = {Bimal Kumar Meher and
                  Ruhul Amin},
  title        = {A location-based multi-factor authentication scheme for mobile devices},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {41},
  number       = {3},
  pages        = {181--190},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAHUC.2022.10050034},
  doi          = {10.1504/IJAHUC.2022.10050034},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijahuc/MeherA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/MeritH22,
  author       = {C. K. Deena Merit and
                  M. Haridass},
  title        = {A simulation study on the necessity of working breakdown in a state
                  dependent bulk arrival queue with disaster and optional re-service},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {41},
  number       = {1},
  pages        = {1--15},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAHUC.2022.10049033},
  doi          = {10.1504/IJAHUC.2022.10049033},
  timestamp    = {Tue, 20 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijahuc/MeritH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/RadM22,
  author       = {Khodadad Jalali Rad and
                  Abbas Mirzaei},
  title        = {Hierarchical capacity management and load balancing for HetNets using
                  multi-layer optimisation methods},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {41},
  number       = {1},
  pages        = {44--57},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAHUC.2022.10044294},
  doi          = {10.1504/IJAHUC.2022.10044294},
  timestamp    = {Wed, 19 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijahuc/RadM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/RajaramVN22,
  author       = {Sangeetha Rajaram and
                  Satyanarayana Vollala and
                  Ramasubramanian Natarajan},
  title        = {\emph{ERMAP}: ECC-based robust mutual authentication protocol for
                  smart grid communication with {AVISPA} simulations},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {41},
  number       = {4},
  pages        = {232--245},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAHUC.2022.10051164},
  doi          = {10.1504/IJAHUC.2022.10051164},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijahuc/RajaramVN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/Sarkar22,
  author       = {Sajal Sarkar},
  title        = {Mobility aware and reliable multipath routing protocol for MANETs},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {41},
  number       = {4},
  pages        = {256--269},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAHUC.2022.10051169},
  doi          = {10.1504/IJAHUC.2022.10051169},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijahuc/Sarkar22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/SilemTM22,
  author       = {Abd El Heq Silem and
                  Hajer Taktak and
                  Faouzi Moussa},
  title        = {User interests profiling using fuzzy regression tree},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {41},
  number       = {3},
  pages        = {191--203},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAHUC.2022.10050035},
  doi          = {10.1504/IJAHUC.2022.10050035},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijahuc/SilemTM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/SinghPAC22,
  author       = {Pulkit Singh and
                  K. Abhimanyu Kumar Patro and
                  Bibhudendra Acharya and
                  Rahul Kumar Chaurasiya},
  title        = {Efficient hardware architectures of Lilliput lightweight algorithm
                  for image encryption},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {41},
  number       = {4},
  pages        = {205--220},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAHUC.2022.10051162},
  doi          = {10.1504/IJAHUC.2022.10051162},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijahuc/SinghPAC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/SmruthyS22,
  author       = {A. Smruthy and
                  M. Suchetha},
  title        = {A novel optimised apnea classification with {AA-CNN} method by utilising
                  the {EDR} and {ECG} features},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {41},
  number       = {1},
  pages        = {58--67},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAHUC.2022.10049036},
  doi          = {10.1504/IJAHUC.2022.10049036},
  timestamp    = {Tue, 20 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijahuc/SmruthyS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/SunP22,
  author       = {Haibin Sun and
                  Dijing Pan},
  title        = {Research on optimisation of energy efficient routing protocol based
                  on {LEACH}},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {41},
  number       = {2},
  pages        = {92--107},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAHUC.2021.10043469},
  doi          = {10.1504/IJAHUC.2021.10043469},
  timestamp    = {Tue, 20 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijahuc/SunP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/Turk22,
  author       = {Yekta Turk},
  title        = {Indoor performance analysis of {URLLC} service for industrial IoT},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {41},
  number       = {4},
  pages        = {246--255},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAHUC.2022.10051167},
  doi          = {10.1504/IJAHUC.2022.10051167},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijahuc/Turk22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics