Journal: IJIPT

Volume 16, Issue 4

185 -- 195Heng Du. Smart approach to constraint programming: intelligent backtracking using artificial intelligence
196 -- 203Haiyan Kang, Ying Li, Shasha Zhang. An effective differential privacy protection method of location data based on perturbation loss constraint
204 -- 216Warodom Werapun, Jakapan Suaboot, Piyawit Tantisarkhornkhet, Jirawat Thaenthong. SVC-MST BWQLB multicast over software-defined networking
217 -- 225N. Ashokkumar, N. S. Kavitha, M. Lakshmi, Ashok Vajravelu. A constant temperature control system for indoor environments in buildings using internet of things
226 -- 239Kaoutar Bazi, Nassereddine Bouchaib. Enhanced TCP BBR performance in wireless mesh networks (WMNs) and next-generation high-speed 5G networks

Volume 16, Issue 3

131 -- 137S. Narasimha Prasad, K. Senthamil Selvan, B. Lakshmi Dhevi, A. Niranjil Kumar. Computation on scheduling attacks and optimal resource utilisation in wireless sensor networks via optimisation techniques
138 -- 147Sana Zeba, Mohammad Amjad. Distribution and tracking current live location of recognised criminal face at decentralised blockchain through image
148 -- 160Tianfang Yu, Xue-song Qiu 0001. Towards a transmission control mechanism for data centres based on flow deadline and size over software defined networking
161 -- 175Vivek Kumar Jaiswal, Sanjeev Patel. A comparative performance analysis of TCP congestion control algorithm: elastic TCP vs. e-Elastic TCP
176 -- 184Ankit Verma, Suman Deswal. Efficient routing protocol for IoT networks based on fog computing and routing protocol of low-power lossy networks

Volume 16, Issue 2

75 -- 91Inès Mouakher, Fatma Dhaou, J. Christian Attiogbé. Validating and verifying LwM2M clients with event-B
92 -- 98J. Viji Gripsy, K. R. Kanchana. Relaxed hybrid routing to prevent consecutive attacks in mobile ad-hoc networks
99 -- 109Wei Luo. Cognitive wireless communication network information sharing method based on blockchain technology
110 -- 118Bhavika Gambhava, C. K. Bhensdadia. Mathematical modelling of packet transmission during reclamation period in NewReno TCP and CTCP
119 -- 130Sandeep Patil, Lalita Admuthe, Meenakshi R. Patil. SNTAM: secure neuro-fuzzy-based trusted neighbour selection and attackers detection in multipath ad-hoc network

Volume 16, Issue 1

1 -- 10Hai-yan Kang, Jie Deng. A cross encryption scheme for data security storage in cloud computing environment
11 -- 33Ummer Iqbal, Ajaz Hussain Mir. Practical and scalable access control mechanism for wireless sensor networks
34 -- 45Shilpee Prasad, B. R. Purushothama. Secure and verifiable outsourcing of Euclidean distance and closest pair of points with single untrusted cloud server
46 -- 57Rushdi A. Hamamreh, Mohammed R. Ayyad, Mohammed AbuTaha. RAD: reinforcement authentication model based on DYMO protocol for MANET
58 -- 67Haiyan Kang, Yaping Feng, Xiameng Si, Kaili Lu. Research on personalised privacy-preserving model of multi-sensitive attributes
68 -- 74Bhushana Samyuel Neelam, Benjamin A. Shimray. Improved network performance in CPS communication with distributed IPC mechanisms of recursive internetworking architecture (RINA)