0 | -- | 0 | Sanika K. Wijayasekara, Suvit Nakpeerayuth, Robithoh Annur, Hung-Yun Hsieh, Teerapat Sanguankotchakorn, Kumbesan Sandrasegaran, Warakorn Srichavengsup, Tharathorn Phromsa-ard, Lunchakorn Wuttisittikulkij. A fast tag identification anti-collision algorithm for RFID systems |
0 | -- | 0 | Jianhong Zhang, Zhengtao Jiang. Identity-and-data privacy forward security public auditing protocol in the standard model |
0 | -- | 0 | Deepnarayan Tiwari, Gayatri K. Chaturvedi, G. R. Gangadharan. ACDAS: Authenticated controlled data access and sharing scheme for cloud storage |
0 | -- | 0 | Shang-Juh Kao, Kuo-Chan Hsiao, Fu-Min Chang. Radio resource allocation using genetic algorithm in heterogeneous networks |
0 | -- | 0 | O. Gokhan Uyan, Vehbi Cagri Gungor. QoS-aware LTE-A downlink scheduling algorithm: A case study on edge users |
0 | -- | 0 | Mohammad Wazid, Poonam Reshma Dsouza, Ashok Kumar Das, Vivekananda Bhat K., Neeraj Kumar 0001, Joel J. P. C. Rodrigues. RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment |
0 | -- | 0 | Xiaolong Li, Jianrong Wang, Ningning Zhu, Zhu Jin, Wei Zheng. A switch-controlled multimode narrowband receiver RF front-end |
0 | -- | 0 | Ilija Basicevic, Stanislav Ocovaj. Application of entropy formulas in detection of denial-of-service attacks |
0 | -- | 0 | Sadanand Yadav, Vinay Kumar. Energy-efficient design of 3D UWSNs leveraging compressive sensing and principal component analysis: A communication techniques perspective |
0 | -- | 0 | Imran Ashraf, Soojung Hur, Muhammad Shafiq 0002, Saru Kumari, Yongwan Park. GUIDE: Smartphone sensors-based pedestrian indoor localization with heterogeneous devices |
0 | -- | 0 | Saleem Raza, Muhammad Faheem 0003, Mesut Günes. Industrial wireless sensor and actuator networks in industry 4.0: Exploring requirements, protocols, and challenges - A MAC survey |
0 | -- | 0 | Pankaj Pal, Sachin Tripathi, Chiranjeev Kumar. Bandwidth estimation in high mobility scenarios of IEEE 802.11 infrastructure-less mobile ad hoc networks |
0 | -- | 0 | Wassim Fassi Fihri, Hassan El Ghazi, Badr Abou El Majd, Faissal El Bouanani. A decision-making approach for detecting the primary user emulation attack in cognitive radio networks |
0 | -- | 0 | Dinh-Thuan Do, Minh-Sang Van Nguyen, Thi-Anh Hoang. Exploiting secure performance in power domain-based multiple access: Impacts of relay link/direct link and secure analysis |
0 | -- | 0 | Merhawit Berhane, Wei-Xiao Meng, Cheng Li 0005, Lei Chen 0046. Spectral efficiency evaluation of full-duplex mode of communications based on SLNR approach |
0 | -- | 0 | Phidahunlang Chyne, Debdatta Kandar. LTE-DSRC hybrid vehicular communication system using DFT-spread OFDM in uplink |
0 | -- | 0 | Fereshte Dehghani, Naser Movahhedinia. Energy-delay-aware caching strategy in green CCN using markov approximation |
0 | -- | 0 | K. Kalaiselvi, G. R. Suresh, V. Ravi. An efficient approach for the detection of link failures in WBAN system for health care applications |
0 | -- | 0 | Hua Zhao, Sheng Wang, Lemin Li. A directly seeking spectrum holes algorithm by compressive sampling |
0 | -- | 0 | Farzana Noor, Ahthasham Sajid, Syed Bilal Hussain Shah, Mehwish Zaman, Mehdi Gheisari, Vinayagam Mariappan. Bayesian estimation and prediction for Burr-Rayleigh mixture model using censored data |
0 | -- | 0 | Lian Pan, Hanwu Wang, Weijia Jia. A distributed Newton algorithm for network utility maximization in wireless ad hoc networks |
0 | -- | 0 | Sanjeev Patel. Comparative analysis of cumulative distribution function for TCP congestion window size and triple-duplicate period |
0 | -- | 0 | Parwinder Kaur Dhillon, Sheetal Kalra. A secure multifactor remote user authentication scheme for Internet of Multimedia Things environment |
0 | -- | 0 | Rajeev Kumar, Dilip Kumar, Dinesh Kumar. Performance enhancement of traffic information gathering (PEnTInG) algorithm for vehicular ad-hoc networks |
0 | -- | 0 | Arijit Datta, Manish Mandloi, Vimal Bhatia. Reliability feedback-aided low-complexity detection in uplink massive MIMO systems |
0 | -- | 0 | Emad Aqeeli, Hashim A. Hashim, Anwar Haque, Abdallah Shami. Optimal location management in LTE networks using evolutionary techniques |
0 | -- | 0 | Carlos Figuera, Eduardo Morgado, Esteban Municio, Javier Simó-Reigadas. A low complexity mechanism for congestion notification in rural IPSec-enabled heterogeneous backhaul networks |
0 | -- | 0 | Roohallah Alizadeh. A pessimistic method in web service composition by view on execution states |
0 | -- | 0 | Iman Al-Kindi, Dawood Al-Abri, Ahmed Al-Maashri, Fahad Bait Shiginah. Analysis of malware propagation behavior in Social Internet of Things |
0 | -- | 0 | Shao-I Chu, Bing-Hong Liu, Ngoc-Tu Nguyen 0002. Secure AF relaying with efficient partial relay selection scheme |