0 | -- | 0 | Fahimeh Sadeghi, Avid Avokh. Load-balanced data gathering in Internet of Things using an energy-aware cuckoo-search algorithm |
0 | -- | 0 | Yalan Li, Siguang Chen, Chuanxin Zhao, Weifeng Lu. Layered data aggregation with efficient privacy preservation for fog-assisted IIoT |
0 | -- | 0 | Shadi Moazzeni, Mohammad-Reza Khayyambashi, Naser Movahhedinia, Franco Callegati. Improving the reliability of Byzantine fault-tolerant distributed software-defined networks |
0 | -- | 0 | Usha Jain, Muzzammil Hussain, Jagadeesh Kakarla. Simple, secure, and lightweight mechanism for mutual authentication of nodes in tiny wireless sensor networks |
0 | -- | 0 | Aditi Chatterjee, Jayabrata Biswas, Kiranmoy Das. An automated patient monitoring using discrete-time wireless sensor networks |
0 | -- | 0 | Prasenjit Chanak, Indrajit Banerjee, R. Simon Sherratt. A green cluster-based routing scheme for large-scale wireless sensor networks |
0 | -- | 0 | Weifeng Lu, Mingqi Zhu, Jia Xu, Siguang Chen, Lijun Yang, Jian Xu. Cooperative caching game based on social trust for D2D communication networks |
0 | -- | 0 | Alak Roy, Nityananda Sarma. RPCP-MAC: Receiver preambling with channel polling MAC protocol for underwater wireless sensor networks |
0 | -- | 0 | Imbaby I. Mahmoud, Osama H. Elgazzar, Sherief Hashima, Hussein A. Konber. Analysis and comparison of different cooperative cellular networks |
0 | -- | 0 | Zeyad Mohammad. Cryptanalysis and improvement of the YAK protocol with formal security proof and security verification via Scyther |
0 | -- | 0 | Kavitha S, Parimala Venkata Krishna, Pounambal Muthukumar. Learning automata-based multilevel medium access control in cyber physical system-based smart wireless networks |
0 | -- | 0 | Sanjay Chouhan, Leeladhar Malviya. Four-port shared rectangular radiator with defected ground for wireless application |
0 | -- | 0 | Mohammad Reza Ghavidel Aghdam, Behzad Mozaffari Tazehkand, Reza Abdolee, MAHMOOD MOHASSEL FEGHHI. Cover Image |
0 | -- | 0 | Reihaneh Khorsand, Mohammadreza Ramezanpour. An energy-efficient task-scheduling algorithm based on a multi-criteria decision-making method in cloud computing |
0 | -- | 0 | Ossama Nazih, Nabil Benamar, Mohamed Younis. An evolutionary bargaining-based approach for incentivized cooperation in opportunistic networks |
0 | -- | 0 | Volkan Ozduran. Leakage rate analysis with imperfect channel state information for cooperative nonorthogonal multiple access networks |
0 | -- | 0 | Dheerendra Mishra, Saurabh Rana. Authenticated content distribution framework for digital rights management systems with smart card revocation |
0 | -- | 0 | Rojalina Priyadarshini, Rabindra Kumar Barik, Harishchandra Dubey. Fog-SDN: A light mitigation scheme for DDoS attack in fog computing framework |
0 | -- | 0 | Morteza Arjmandpanah-Kalat, Dariush Abbasinezhad-Mood, Hamid Reza Mahrooghi, Sobhan Aliabadi. Design and performance analysis of an efficient single flow IP traceback technique in the AS level |
0 | -- | 0 | Agab Bakheet Mohammednour, Ahmet Turan Ă–zdemir. GNSS positioning accuracy improvement based on surface meteorological parameters using artificial neural networks |
0 | -- | 0 | Mohammad Reza Ghavidel Aghdam, Behzad Mozaffari Tazehkand, Reza Abdolee, MAHMOOD MOHASSEL FEGHHI. Space-time block coding in millimeter wave large-scale MIMO-NOMA transmission scheme |
0 | -- | 0 | Wafa Feneniche, Khaled Rouabah, Mustapha Flissi, Salim Atia, Salah Eddine Mezaache, Sabrina Meguellati. Unambiguous method for DLL BOC signals tracking |