researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: IJIPT
Home
Index
Info
Volume
Volume
16
, Issue
4
185
--
195
Heng Du
.
Smart approach to constraint programming: intelligent backtracking using artificial intelligence
196
--
203
Haiyan Kang
,
Ying Li
,
Shasha Zhang
.
An effective differential privacy protection method of location data based on perturbation loss constraint
204
--
216
Warodom Werapun
,
Jakapan Suaboot
,
Piyawit Tantisarkhornkhet
,
Jirawat Thaenthong
.
SVC-MST BWQLB multicast over software-defined networking
217
--
225
N. Ashokkumar
,
N. S. Kavitha
,
M. Lakshmi
,
Ashok Vajravelu
.
A constant temperature control system for indoor environments in buildings using internet of things
226
--
239
Kaoutar Bazi
,
Nassereddine Bouchaib
.
Enhanced TCP BBR performance in wireless mesh networks (WMNs) and next-generation high-speed 5G networks
Volume
16
, Issue
3
131
--
137
S. Narasimha Prasad
,
K. Senthamil Selvan
,
B. Lakshmi Dhevi
,
A. Niranjil Kumar
.
Computation on scheduling attacks and optimal resource utilisation in wireless sensor networks via optimisation techniques
138
--
147
Sana Zeba
,
Mohammad Amjad
.
Distribution and tracking current live location of recognised criminal face at decentralised blockchain through image
148
--
160
Tianfang Yu
,
Xue-song Qiu 0001
.
Towards a transmission control mechanism for data centres based on flow deadline and size over software defined networking
161
--
175
Vivek Kumar Jaiswal
,
Sanjeev Patel
.
A comparative performance analysis of TCP congestion control algorithm: elastic TCP vs. e-Elastic TCP
176
--
184
Ankit Verma
,
Suman Deswal
.
Efficient routing protocol for IoT networks based on fog computing and routing protocol of low-power lossy networks
Volume
16
, Issue
2
75
--
91
Inès Mouakher
,
Fatma Dhaou
,
J. Christian Attiogbé
.
Validating and verifying LwM2M clients with event-B
92
--
98
J. Viji Gripsy
,
K. R. Kanchana
.
Relaxed hybrid routing to prevent consecutive attacks in mobile ad-hoc networks
99
--
109
Wei Luo
.
Cognitive wireless communication network information sharing method based on blockchain technology
110
--
118
Bhavika Gambhava
,
C. K. Bhensdadia
.
Mathematical modelling of packet transmission during reclamation period in NewReno TCP and CTCP
119
--
130
Sandeep Patil
,
Lalita Admuthe
,
Meenakshi R. Patil
.
SNTAM: secure neuro-fuzzy-based trusted neighbour selection and attackers detection in multipath ad-hoc network
Volume
16
, Issue
1
1
--
10
Hai-yan Kang
,
Jie Deng
.
A cross encryption scheme for data security storage in cloud computing environment
11
--
33
Ummer Iqbal
,
Ajaz Hussain Mir
.
Practical and scalable access control mechanism for wireless sensor networks
34
--
45
Shilpee Prasad
,
B. R. Purushothama
.
Secure and verifiable outsourcing of Euclidean distance and closest pair of points with single untrusted cloud server
46
--
57
Rushdi A. Hamamreh
,
Mohammed R. Ayyad
,
Mohammed AbuTaha
.
RAD: reinforcement authentication model based on DYMO protocol for MANET
58
--
67
Haiyan Kang
,
Yaping Feng
,
Xiameng Si
,
Kaili Lu
.
Research on personalised privacy-preserving model of multi-sensitive attributes
68
--
74
Bhushana Samyuel Neelam
,
Benjamin A. Shimray
.
Improved network performance in CPS communication with distributed IPC mechanisms of recursive internetworking architecture (RINA)