Journal: IJIPT

Volume 12, Issue 4

181 -- 189Huawei Wu, Yicheng Li, Yong Kuang, Zhixiang Hou. Intelligent switching algorithm for mobile communication under non-uniform distribution of scatterers
190 -- 204Moufida Rahmani, Mahfoud Benchaïba. CRAM: clustering-based resource availability measurement in mobile peer-to-peer systems
205 -- 212Yang Sun, Zuoqin Shi, Ling Zhao, Sumin Li, Zhenshi Zhang, RongHua Du, Zhixiang Hou. Analysis of spatial information service composition network based on Ricci curvature
213 -- 220Jinming Zhang. Research on adaptive recommendation algorithm for big data mining based on Hadoop platform
221 -- 228Min Zhang. Structural optimisation algorithm of weight correlation analysis for DBN
229 -- 235Jian Gao, Shuyun Niu, Honghai Li, Meng Wang. The reliability research of V2V based on sample judgment and balanced modulation
236 -- 242Sasikala Chinthakunta, Chigarapalle Shoba Bindu. Certificateless batch verification protocol to ensure data integrity in multi-cloud using lattices

Volume 12, Issue 3

121 -- 127Ying Li, Lian Xue. Construction of building fire information monitoring model based on adaptive clustering scheduling
128 -- 135Xian Luo, Rongtao Liao, Guoru Deng, Dangdang Dai, Xiaolan He, Zhixiang Hou. Real-time reliability allocation algorithm of high-throughput communication channel under strong interference
136 -- 143Qian Gao, Chong Shen, Xiaosi Chen, Kun Zhang. Weighted moving average-based differential UWB indoor localisation system for high external disturbance environment
144 -- 152Jiwei Qin, Yunpeng Jiang. Recommender resources based on acquiring user's requirement and exploring user's preference with Word2Vec model in web service
153 -- 156Manish Kalra, Ramesh Chandra Poonia. Design a new protocol and comparison with B92 protocol for quantum key distribution
157 -- 166Zied Trifa. Preventing Sybil attacks in chord and Kademlia protocols
167 -- 172Yicheng Mu. High-speed data aggregation storage query method
173 -- 180Jiefeng Wang. Network distance education platform control system based on big data

Volume 12, Issue 2

61 -- 75Naziha Ali Saoucha, Badr Benmammar. Bio-inspired approaches for OFDM-based cognitive radio
76 -- 84Junhua Zhang, Yi Zhu, Fangxiong Xiao. Modelling and analysis of real-time and reliability for WSN-based CPS
85 -- 96Tz-Heng Hsu, Lin-You Wu. A cloud-fog scalable video streaming architecture for multimedia internet of things devices
97 -- 109Tanapat Anusas-Amornkul, Surawut Moonsin. 2-DASH algorithm
110 -- 120Hung-Chin Jang, Jian-Ting Lin. Bandwidth management framework for smart homes using SDN: ISP perspective

Volume 12, Issue 1

2 -- 10Sweta Bhattacharya, V. Raju. Analysis of factors affecting customer satisfaction in e-commerce applications using Condorcet - AHP method
11 -- 15S. Vaithyasubramanian, A. Christy. ATM PIN generation - a formal mathematical model to generate PIN using regular grammar, context free grammar and recognition through finite state machine, pushdown automata
16 -- 25Andrea Huszti, Norbert Olah. Security analysis of a cloud authentication protocol using applied pi calculus
26 -- 34C. E. Ait Zaouiat, A. Latif. Improvement of WBAN performances by a hybrid model: design and evaluation of a novel inter-MAC layer exploited in medical applications
35 -- 43Prashant Kharat, Muralidhar Kulkarni. Modified QUIC protocol for improved network performance and comparison with QUIC and TCP
44 -- 50Liang Tang, Zhichao Wang, Jun Huang, Li Bian. A general purpose deployment method for wireless mesh network
51 -- 60Zhengxiong Dou, Xiaonan Wang 0001, Yanli Li. Addressing for 6LoWPAN