Journal: Wireless Personal Communications

Volume 127, Issue 4

2709 -- 2725Prachi Gupta, Vishal Gupta. Linear 1 × 4 Microstrip Antenna Array Using Slotted Circular Patch for 5G Communication Applications
2727 -- 2742T. A. Balarajuswamy, R. Nakkeeran. Efficiency Enhancement of Reconfigurable SIW Antenna for Millimeter-Wave Applications
2743 -- 2759M. S. Saranya, P. Geetha. Multi-View Clothing Image Segmentation Using the Iterative Triclass Thresholding Technique
2761 -- 2779Deivanai Gurusamy, Galane Diriba. Sensor Network and Energy Harvesting Solutions Towards Water Quality Monitoring in Developing Countries
2781 -- 2798Mini Arora, Ashok Pal. A Deep Learning Approach to Accurately Predict the κ-Coverage Probability in Wireless Sensor Networks
2799 -- 2821Seyedeh Maedeh Mirmohseni, Chunming Tang 0003, Amir Javadpour. FPSO-GA: A Fuzzy Metaheuristic Load Balancing Algorithm to Reduce Energy Consumption in Cloud Networks
2823 -- 2839Monika, Dipali Bansal, Abhiruchi Passi. Image Forgery Detection and Localization Using Block Based and Key-Point Based Feature Matching Forensic Investigation
2841 -- 2858Gaurav Aggarwal. Social Communication Disorder Outside Intellectual Disability? A Review and Classification Approach to Receptive and Expressive Communication in Intellectual Disability
2859 -- 2871Dong Yan, Peixue Liu, Xiujie Yue, PengHao Wang, Minghua Liu, Baoshun Li. Data Fusion Algorithm Based on Classification Adaptive Estimation Weighted Fusion in WSN
2873 -- 2889Aashiq Banu S, B. K. Murthy, G. Bindu Sai, Sowmya Gali, Kalluru Hemaswitha, Rengarajan Amirtharajan. Telugu DNA for Safe Delivery: A Secured Text Communication
2891 -- 2903Ketavath Kumar Naik, Ravi Kumar Palla, Sriram Sandhya Rani, B. V. S. Sailaja. Design of Compact Bow-Tie Patch Antenna with Defected Concentric Rings on Ground for Wireless Communications
2905 -- 2934Neda Solari Esfehani, Hamid Haj Seyyed Javadi. A High Resilience and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Networks
2935 -- 2954Piyush Jain, N. Jayanthi, M. Lakshmanan. Closed Form Expressions of AC and SER for Double GG Fading Distribution under EGC Scheme in FSO Communication System
2955 -- 2977G. Pius Agbulu, G. Joselin Retna Kumar, Asokan Vimala Juliet, S. Adurrashid Hassan. PECDF-CMRP: A Power-Efficient Compressive Data Fusion and Cluster-Based Multi-hop Relay-Assisted Routing Protocol for IoT Sensor Networks
2979 -- 2996Yijun Yang, Xiayan Zhang. A Novel Hash Function Based on Multi-iterative Parallel Structure
2997 -- 3013M. Maria Dominic Savio, T. Deepa. Design of Energy Efficient Multiplier with Approximate Computing on Scalable Compressor for Error-Resilient Image Contrast Enhancement
3015 -- 3039Shruti Goel, Rakhee Kulshrestha. Dependability-Based Analysis for Ultra-reliable Communication in Heterogeneous Traffic Cognitive Radio Networks with Spectrum Reservation
3041 -- 3059Shaik Karimullah, D. Vishnu Vardhan, Vidhyacharan Bhaskar. An Improved Harmony Search Approach for Block Placement for VLSI Design Automation
3061 -- 3077Sungwook Kim. Two-Phase Wireless Bandwidth Allocation Scheme Based on Cooperative Game Solutions
3079 -- 3096Maryam Farahbakhsh, Meisam Nesary Moghadam. Multi-class Multipath Routing Protocol for Low Power and Lossy Networks, with Energy Balanced Optimal Rate Assignment
3097 -- 3117Lahcen Sellak, Lahcen Aguni, Samira Chabaa, Saida Ibnyaich, Abdelouhab Zeroual, Atmane Baddou. Modeling and Designing of a Compact Single Band PIFA Antenna for Wireless Application Using Artificial Neural Network
3119 -- 3138Valarmathi Marudhai, Shanthi Prince, Shayna Kumari. Design and Simulation of Physical Layer Security for Next Generation Intelligent Optical Networks
3139 -- 3172Hassan Harb, Chady Abou Jaoude, David Laiymani, Abdallah Makhoul, Chamseddine Zaki, Layla Tannoury. A Multi-Tier Data Prediction Mechanism for the Internet of Things Networks
3173 -- 3210Amine Dahane, Rabaie Benameur, Kechar Bouabdellah. An IoT Low-Cost Smart Farming for Enhancing Irrigation Efficiency of Smallholders Farmers
3211 -- 3243Rakesh Ranjan Swain, Tirtharaj Dash, Pabitra Mohan Khilar. Automated Fault Diagnosis in Wireless Sensor Networks: A Comprehensive Survey
3245 -- 3297Xiangdong Jia, Zhemin Wei, Zhenchao Hao, Yuhua Ouyang. Modeling D2D Underlaying Cellular Network for Hotspot Communications with Poisson Cluster and Hole Processes
3299 -- 3319K. Gavaskar, D. Malathi, G. Ravivarma, V. Krithika Devi, M. Megala, S. Megaraj Begam. A Variant of Long Multiplication Design with Low Power and Area Using Modified 7: 3 Compressor for Biomedical Applications
3321 -- 3346Riad Aouabed, Fouzi Semchedine, Aboubekeur Hamdi-Cherif. A Wake-up Radio-Based Energy-Efficient Multi-Hop Clustering Protocol for WSNs
3347 -- 3361Akhilesh Verma, Anshdha Gupta, Mohammad Akbar, Arun Kumar Yadav 0001, Divakar Yadav. Presentation Attack Detection Using Referential Quality Metrics and Minutiae Count
3363 -- 3377Sammaiah Thurpati, P. Muthuchidambaranathan. Design of Hybrid Precoding for Millimeter-Wave Massive MIMO System
3379 -- 3405Sunita Saini, Davinder Singh Saini. Performance Modelling and Design Techniques for Efficiency Improvement in On-chip Switched-Capacitor DC-DC Converter
3407 -- 3421Somasundaram Mathivanan, A. Rajeswari. Omnidirectional Microstrip MIMO Antenna for Intelligent Vehicle RADAR Communication
3423 -- 0Somasundaram Mathivanan, A. Rajeswari. Correction to: Omnidirectional Microstrip MIMO Antenna for Intelligent Vehicle RADAR Communication
3425 -- 3434Piyush Satti, Nikhil Sharma, Gurinder Singh, Bharat Garg. A Flexible Dynamic Master-User Look-Up Table Approach for Evaluation of Trigonometric Values
3435 -- 3448Mohd Javed Khan, Ram Chandra Singh Chauhan, Indrasen Singh 0002. Comparative Analysis of Full Duplex and Half Duplex Relay for High-Speed Vehicular Scenario
3449 -- 3465Mahyar Sadrishojaei, Nima Jafari Navimipour, Midia Reshadi, Mehdi Hosseinzadeh 0001. An Energy-Aware IoT Routing Approach Based on a Swarm Optimization Algorithm and a Clustering Technique
3467 -- 3491Mohd Shariq, Karan Singh. A Secure and Lightweight RFID-Enabled Protocol for IoT Healthcare Environment: A Vector Space Based Approach
3493 -- 3510Pankaj Kumar, Sam Darshi, Samar Shailendra. Analysis of Drone Assisted Network Coded Cooperation for LoS Environments
3511 -- 3532Robbi Rahim, Manikandan Ramachandran, Prassanna Jayachandran, Hariharan Kalyanaraman, Vidhyacharan Bhaskar, Ambeshwar Kumar. Holistic Feistel Authenticated Learning-`Based Authorization for Protecting the Internet of Things from Cyber Attacks
3533 -- 3613Deepanshu Arora, Shashank Gupta, Alagan Anpalagan. Evolution and Adoption of Next Generation IoT-Driven Health Care 4.0 Systems
3615 -- 3635Rafidah Ahmad, Mohamad Faiz Mohamed Omar, Jagadheswaran Rajendran, Widad Ismail. Performance Analysis of Enhanced AES-128 and Blowfish Algorithms Through Parallel-Pipelined-Memory Techniques
3637 -- 3658Banani Talukdar, Deepak Kumar, Wasim Arif. Performance Analysis of a Prediction-Sensing Based Cooperative Energy Harvesting CRN Over Rician Fading Channels
3659 -- 3675Sourav Roy, Ujjal Chakraborty. Frequency Reconfigurable Wearable Low-Cost Multi Band Antenna for WLAN and ISM Band Application
3677 -- 3709Ravilla Dilli. Hybrid Beamforming in 5G NR Networks Using Multi User Massive MIMO at FR2 Frequency Bands

Volume 127, Issue 3

1829 -- 1845M. Padmaja, Shitharth Selvarajan, K. Prasuna, Abhay Chaturvedi, Pravin Kshirsagar, A. Vani. Grow of Artificial Intelligence to Challenge Security in IoT Application
1847 -- 1867T. Balachander, M. B. Mukesh Krishnan. Carrier Frequency Offset (CFO) Synchronization and Peak Average Power Ratio (PAPR) Minimization for Energy Efficient Cognitive Radio Network (CRN) for 5G Wireless Communication
1869 -- 1878Prateek Sikka, Abhijit R. Asati, Chandra Shekhar 0001. Area, Speed and Power Optimized Implementation of a Band-Pass FIR Filter Using High-Level Synthesis
1879 -- 1897M. Selvakumar, B. Sudhakar. Energy Efficient Clustering with Secure Routing Protocol Using Hybrid Evolutionary Algorithms for Mobile Adhoc Networks
1899 -- 1921Ashish Khanna, Poonam Rani, Tariq Hussain Sheikh, Deepak Gupta 0002, Vineet Kansal, Joel J. P. C. Rodrigues. Blockchain-Based Security Enhancement and Spectrum Sensing in Cognitive Radio Network
1923 -- 1942S. Venkatasubramanian, A. Suhasini, C. Vennila. An Efficient Route Optimization Using Ticket-ID Based Routing Management System (T-ID BRM)
1943 -- 1983Pronaya Bhattacharya, Sudeep Tanwar, Umesh Bodkhe, Ashwani Kumar, Neeraj Kumar 0001. EVBlocks: A Blockchain-Based Secure Energy Trading Scheme for Electric Vehicles underlying 5G-V2X Ecosystems
1985 -- 2001C. Mohanadevi, S. Selvakumar 0002. A Qos-Aware, Hybrid Particle Swarm Optimization-Cuckoo Search Clustering Based Multipath Routing in Wireless Sensor Networks
2003 -- 2020Beledha Santhosh Kumar, Polipalli Trinatha Rao. An Optimal Emperor Penguin Optimization Based Enhanced Flower Pollination Algorithm in WSN for Fault Diagnosis and Prolong Network Lifespan
2021 -- 2038Ashish Khanna, Poonam Rani, Puneet Garg, Prakash Kumar Singh, Aditya Khamparia. An Enhanced Crow Search Inspired Feature Selection Technique for Intrusion Detection Based Wireless Network System
2039 -- 0Ashish Khanna, Poonam Rani, Puneet Garg, Prakash Kumar Singh, Aditya Khamparia. Correction to: An Enhanced Crow Search Inspired Feature Selection Technique for Intrusion Detection Based Wireless Network System
2041 -- 2061Mukesh Soni, Gaurav Dhiman, Brajendra Singh Rajput, Rajan Patel, Nitesh Kumar Tejra. Energy-Effective and Secure Data Transfer Scheme for Mobile Nodes in Smart City Applications
2063 -- 2081Yi-Cheng Shen, Te-Chun Hsia, Ching-Hsien Hsu. Software Optimization in Ultrasound Imaging Technique Using Improved Deep Belief Learning Network on the Internet of Medical Things Platform
2083 -- 2102Sangeeta Sa, Arunanshu Mahapatro. Role-Based Channel Hopping Algorithm for a Cognitive Radio Network in Asynchronous Environment
2103 -- 2119S. Raamakirtinan, L. M. Jenila Livingston. Identifying Influential Spreaders in Complex Networks Based on Weighted Mixed Degree Decomposition Method
2121 -- 2139Yuan Xiwen. Design of Voice Recognition Acoustic Compression System Based on Neural Network
2141 -- 2160Yang He, Bai-sheng Nie, Jianhui Zhang, Priyan Malarvizhi Kumar, BalaAnand Muthu. Fault Detection and Diagnosis of Cyber-Physical System Using the Computer Vision and Image Processing
2161 -- 2188Sita Kumari Kotha, Meesala Shobha Rani, Bharat Subedi, Anilkumar Chunduru, Aravind Karrothu, Bipana Neupane, V. E. Sathishkumar. A Comprehensive Review on Secure Data Sharing in Cloud Environment
2189 -- 2210T. Balachander, M. B. Mukesh Krishnan. Efficient Utilization of Cooperative Spectrum Sensing (CSS) in Cognitive Radio Network (CRN) Using Non-orthogonal Multiple Access (NOMA)
2211 -- 2228M. Girija, P. Manickam, M. Ramaswami. FibGeoPresent: A Highly Secured and Geographic Coordinate System Based Authenticated Lightweight Block Cipher for Smart System
2229 -- 2246Vadivel Ramasamy, SudalaiMuthu Thalavai Pillai. Cauchy Particle Swarm Optimization (CPSO) Based Migrations of Tasks in a Virtual Machine
2247 -- 2265P. Savaridassan, G. Maragatham. Integrated Deep Auto-Encoder and Q-Learning-Based Scheme to Detect Anomalies and Supporting Forensics in Cloud Computing Environments
2267 -- 2283V. Nallarasan, Kottilingam Kottursamy. Cognitive Radio Jamming Attack Detection Using an Autoencoder for CRIoT Network
2285 -- 2304Rudranath Banerjee, Sourav De, Shouvik Dey. WTAOF-ILPB Based Feature Learning and LFSSOA-RBFNN Based Classification for Facial Micro-Expression Recognition
2305 -- 2324G. Saranya, A. Pravin. Hybrid Global Sensitivity Analysis Based Optimal Attribute Selection Using Classification Techniques by Machine Learning Algorithm
2325 -- 2345Parameshwaran Ramalingam, R. Thanuja, R. Bhavani 0004, Gopalakrishnan Lakshminarayanan. An Efficient Lossless Telemetry Data Compression and Fault Analysis System Using 2SMLZ and CMOW-DLNN
2347 -- 2364U. Padmavathi, Narendran Rajagopalan. Blockchain Enabled Emperor Penguin Optimizer Based Encryption Technique for Secure Image Management System
2365 -- 2390A. Saritha, B. Ramasubba Reddy, A. Suresh Babu. QEMDD: Quantum Inspired Ensemble Model to Detect and Mitigate DDoS Attacks at Various Layers of SDN Architecture
2391 -- 2415R. Uthra, D. Suchitra. A Fuzzy Based Improved Control Strategy of Dynamic Voltage Restorer for Low Voltage and High Voltage Ride Through Compensation for Variable Speed Hybrid Energy System
2417 -- 2441M. Revathi, V. V. Ramalingam, B. Amutha. A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework
2443 -- 2460Juan Wang, Fang Liu. Computer-Assisted Collaborative Learning for Enhancing Students Intellectual Ability Using Machine Learning Techniques
2461 -- 2482Haider Mehraj, Ajaz Hussain Mir. Robust Multimodal Biometric System Based on Feature Level Fusion of Optimiseddeepnet Features
2483 -- 2499K. Sita Kumari, Sarita Samal, Ruby Mishra, Gunashekhar Madiraju, M. Nazargi Mahabob, Anil Bangalore Shivappa. Diagnosing COVID-19 from CT Image of Lung Segmentation & Classification with Deep Learning Based on Convolutional Neural Networks
2501 -- 2513P. Sachidhanandam, P. Balasubramanie 0001. Elevated Ensemble Dynamic Energy-Aware Routing Optimization Based Energy Management and Network Lifetime Improvement in WSN
2515 -- 2533Mallikarjuna Nandi, K. Anusha. An Optimized and Hybrid Energy Aware Routing Model for Effective Detection of Flooding Attacks in a Manet Environment
2535 -- 2552Neeraj Kumar, Abhishek Mishra. EEDLNN Algorithm for Assessing the Vulnerability in Railway Network with Respect to Passengers and Trains
2553 -- 2568Archana Shirke, M. M. Chandane. Performance Modelling and Analysis of IoT Based Edge Computing Policies
2569 -- 2583M. S. Abirami, B. Vennila, K. Suganthi, Sarthak Kawatra, Anuja Vaishnava. Detection of Choroidal Neovascularization (CNV) in Retina OCT Images Using VGG16 and DenseNet CNN
2585 -- 2603S. Karthigaiveni, R. Pandeeswari, S. Deivalakshmi. Miniaturized MIMO Antenna with Complementary Split Ring Resonators Loaded Superstrate for X-band Applications
2605 -- 2624Purnima Lala Mehta, Ambuj Kumar, Bilal Muhammad 0015, Ramjee Prasad. A Technological and Business Perspective on Connected Drones for 6G and Beyond Mobile Wireless Communications
2625 -- 2644Tayeb Diab, Marc Gilg, Pascal Lorenz, Frédéric Drouhin. Using I2P (Invisible Internet Protocol) Encrypted Virtual Tunnels for a Secure and Anonymous Communication in VANets: I2P Vehicular Protocol (IVP)
2645 -- 0Tayeb Diab, Marc Gilg, Pascal Lorenz, Frédéric Drouhin. Correction to: Using I2P (Invisible Internet Protocol) Encrypted Virtual Tunnels for a Secure and Anonymous Communication in VANets: I2P Vehicular Protocol (IVP)
2647 -- 2666Masoud Khodaverdizadeh, Afrooz Haghbin, Farbod Razzazi. Improving the Performance of HF Radio Networks in the Presence of Interference through Automatic Link Establishment with Frequency Hopping Technique
2667 -- 2694Sriram Arumugam, Sangeetha Manoharan, Vidhyacharan Bhaskar, P. Sandeep Kumar. A Comprehensive Review on Automotive Antennas for Short Range Radar Communications
2695 -- 2708Mohamed Shalaby, Mohamed Shahein, Mona Shokair. Mathematical Analysis and Performance Evaluation of the Cell-Free mMIMO Networks Based on Cognitive Relays

Volume 127, Issue 2

897 -- 917Shanguo Lv, Hongli Chen. Security Protection Technology in Multi-Attribute Data Transmission Based on Fuzzy Genetic Algorithm
919 -- 943Jingkuang Liu, Lemei Yan, Dong Wang. A Hybrid Blockchain Model for Trusted Data of Supply Chain Finance
945 -- 962Bo Fang. Method for Quickly Identifying Mine Water Inrush Using Convolutional Neural Network in Coal Mine Safety Mining
963 -- 978Anil Kumar Budati, George Ghinea, S. N. V. Ganesh. Novel Aninath Computation Detection Algorithm to Identify the UAV Users in 5G Networks
979 -- 995R. Bala Krishnan, N. Rajesh Kumar, N. R. Raajan, G. Manikandan, A. Srinivasan 0002, D. Narasimhan. An Approach for Attaining Content Confidentiality on Medical Images Through Image Encryption with Steganography
997 -- 1021B. Ida Seraphim, E. Poovammal. Adversarial Attack by Inducing Drift in Streaming Data
1023 -- 1043Smriti Sachan, Rohit Sharma, Amit Sehgal. SINR Based Energy Optimization Schemes for 5G Vehicular Sensor Networks
1045 -- 1066Deep Kumar Bangotra, Yashwant Singh, Arvind Selwal, Nagesh Kumar, Pradeep Kumar Singh 0001. A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks
1067 -- 1084Mukesh Soni, Dileep Kumar Singh. LAKA: Lightweight Authentication and Key Agreement Protocol for Internet of Things Based Wireless Body Area Network
1085 -- 1116Arthur A. M. Teodoro, Otávio S. M. Gomes, Muhammad Saadi, Bruno A. Silva, Renata Lopes Rosa, Demóstenes Z. Rodríguez. An FPGA-Based Performance Evaluation of Artificial Neural Network Architecture Algorithm for IoT
1117 -- 1135Gang Li, Mingle Zhou, Zhengqian Feng, Min Li, Hui Jiang. Research on Key Influencing Factors of E-Government Cloud Service Satisfaction
1137 -- 1155M. Kirankumar, M. Santhi. Accomplishment of Reversible Logic Gates in WSN Environment by Patternization
1157 -- 1186Nanditha Boddu, Veeramallu Boba, Ramesh Vatambeti. A Novel Georouting Potency based Optimum Spider Monkey Approach for Avoiding Congestion in Energy Efficient Mobile Ad-hoc Network
1187 -- 1205Selvakumar S, S. S. Manivannan. A Spectrum Defragmentation Algorithm Using Jellyfish Optimization Technique in Elastic Optical Network (EON)
1207 -- 1224Bingjun Wan, Chengwei Xu, Rajendra Prasad Mahapatra, P. Selvaraj. Understanding the Cyber-Physical System in International Stadiums for Security in the Network from Cyber-Attacks and Adversaries using AI
1225 -- 1239Dhiren P. Bhagat. Tracking of Moving Target in Wireless Sensor Network with Improved Network Life Time Using PSO
1241 -- 1264V. Jyothi, M. V. Subramanyam. An Enhanced Routing Technique to Improve the Network Lifetime of Cognitive Sensor Network
1265 -- 1282Libin Liu, Zhiyuan Sun. Flow Control in Network Media Information Transmission Based on Differential Evolution Algorithm
1283 -- 1309Jeyasudha Jeyaraj, Usha Gopal. An Intelligent Centrality Measures for Influential Node Detection in COVID-19 Environment
1311 -- 1329Satheesh Narayanasami, Rajasekhar Butta, Rajeshkumar Govindaraj, Surendra Singh Choudhary, Dilip Kumar Sharma, Anjana Poonia, Sudhakar Sengan, Pankaj Dadheech, Neeraj Kumar Shukla, Rajesh Verma. An Enhanced Trust-Based Kalman Filter Route Optimization Technique for Wireless Sensor Networks
1331 -- 1339Bei He. Algorithm to Enhance Security of Dynamic Data Migration in Optical Fiber Network
1341 -- 1357Weina He, Yafei Wang, Dongliang Xia. Fuzzy Integration Algorithm of Big Data in Peer-to-Peer Communication Network Based on Deep Learning
1359 -- 1376B. Sowmiya, E. Poovammal. A Heuristic K-Anonymity Based Privacy Preserving for Student Management Hyperledger Fabric blockchain
1377 -- 1403Venu Madhav Kuthadi, Rajalakshmi Selvaraj, S. Baskar 0002, P. Mohamed Shakeel, Abhishek Ranjan. Optimized Energy Management Model on Data Distributing Framework of Wireless Sensor Network in IoT System
1405 -- 1432Fawad Masood, Maha Driss, Wadii Boulila, Jawad Ahmad 0001, Sadaqat ur Rehman, Sana Ullah Jan, Abdullah Qayyum, William J. Buchanan. A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations
1433 -- 1451Qiheng Sun, Lanxia Zhang. Bilateral Matching Model Between R & D Personnel and Project Manager Based on Ant Colony Optimization
1453 -- 1477Muhammad Hassaan Anwar, Saeid Ghafouri, Sukhpal Singh Gill, Joseph Doyle. Recommender System for Optimal Distributed Deep Learning in Cloud Datacenters
1479 -- 1501K. Subramanian, S. Shanmugavel. A Complete Continuous Target Coverage Model for Emerging Applications of Wireless Sensor Network Using Termite Flies Optimization Algorithm
1503 -- 1516Yichun Dong. Design of an Automatic Detection System for Abnormal Communication Data Packets of Electronic Equipment
1517 -- 1528T. Rubesh Kumar, Moorthi Madhavan. Hybrid Fabric Wearable Antenna Design and Evaluation for High Speed 5G Applications
1529 -- 1546Xuemei Wang, Jiajun Zhang. An Algorithm of Video Image Fault-Tolerant Coding Transmission Based on OFDM Technology
1547 -- 1564Yingying Liu, Yisen Wang 0002. Adaptive Data Transmission Method Based on Mean Fuzzy Algorithm in Ad Hoc Networks
1565 -- 1585Inderjeet Kaur, E. Laxmi Lydia, Vinay Kumar Nassa, Bhanu Shrestha, Jamel Nebhen, Sharaf J. Malebary, Gyanendra Prasad Joshi. Generative Adversarial Networks with Quantum Optimization Model for Mobile Edge Computing in IoT Big Data
1587 -- 1614M. Gayathri, C. Malathy 0001. Fisher-Yates Chaotic Shuffling Based Visual Cryptography Scheme for Multimodal Biometric Authentication
1615 -- 1631Amit Kishor, Chinmay Chakraborty. Artificial Intelligence and Internet of Things Based Healthcare 4.0 Monitoring System
1633 -- 1645Lanfang Jia. Algorithm Design of Multi-channel Weak Signal Detection and Synchronous Acquisition in Communication Network
1647 -- 1663Jayagopalan Santhosh, P. Balamurugan, G. Arulkumaran, Manickam Baskar, R. Velumani. Image Driven Multi Feature Plant Management with FDE Based Smart Agriculture with Improved Security in Wireless Sensor Networks
1665 -- 1681Liren Zou. Detection Method of DC Microgrid Network Attack Based on Two-level and Multi-segment Model
1683 -- 1704Amit Kishor, Chinmay Chakarbarty. Task Offloading in Fog Computing for Using Smart Ant Colony Optimization
1705 -- 1716Abdulrahman Saad Alqahtani, Khaled Ali Abuhasel, Mohammed M. Alquraish. A Novel Decentralized Analytical Methodology for Cyber Physical Networks Attack Detection
1717 -- 1736N. Sree Divya, Veeramallu Bobba, Ramesh Vatambeti. An Adaptive Cluster based Vehicular Routing Protocol for Secure Communication
1737 -- 1762Roy Setiawan, Vidya Sagar Ponnam, Sudhakar Sengan, Mamoona Anam, Chidambaram Subbiah, Khongdet Phasinam, Manikandan Vairaven, Selvakumar Ponnusamy. Certain Investigation of Fake News Detection from Facebook and Twitter Using Artificial Intelligence Approach
1763 -- 1785Satheesh Narayanasami, Sudhakar Sengan, Saira Khurram, Farrukh Arslan, Suresh Kumar Murugaiyan, Regin Rajan, Vijayakumar Peroumal, Anil Kumar Dubey, Sujatha Srinivasan, Dilip Kumar Sharma. Biological Feature Selection and Classification Techniques for Intrusion Detection on BAT
1787 -- 1808Hasnain Ali Almashhadani, Xiaoheng Deng, Suhaib N. Abdul Latif, Mohammed M. Ibrahim, Ali Hussien Alshammari. An Edge-Computing Based Task-Unloading Technique with Privacy Protection for Internet of Connected Vehicles
1809 -- 1825C. Santhanakrishnan, K. Annapurani, S. Pradeep, T. Senthilkumar, M. Ramya. Physical Features Based Authentication Technique and Key Management for IoT Networks
1827 -- 0Muhammad Junaid, Sajid Ali, Isma Farah Siddiqui, Choon-Sung Nam, Nawab Muhammad Faseeh Qureshi, Jaehyoun Kim, Dong Ryeol Shin. Correction to: Performance Evaluation of Data-driven Intelligent Algorithms for Big data Ecosystem

Volume 127, Issue 1

1 -- 37Tanvi Sood, Kanika Sharma. A Novelistic GSA and CSA Based Optimization for Energy-Efficient Routing Using Multiple Sinks in HWSNs Under Critical Scenarios
39 -- 62Thavavel Vaiyapuri, Velmurugan Subbiah Parvathy, V. Manikandan, N. Krishnaraj, Deepak Gupta 0002, K. Shankar 0002. A Novel Hybrid Optimization for Cluster-Based Routing Protocol in Information-Centric Wireless Sensor Networks for IoT Based Mobile Edge Computing
63 -- 83P. Sruthi, K. Sahadevaiah. A Novel Efficient Heuristic Based Localization Paradigm in Wireless Sensor Network
85 -- 105G. Amudha. Dilated Transaction Access and Retrieval: Improving the Information Retrieval of Blockchain-Assimilated Internet of Things Transactions
107 -- 124M. Senthil Raja, L. Arun Raj. Detection of Malicious Profiles and Protecting Users in Online Social Networks
125 -- 140Minhang Ma, Zhen Han. Symmetric Algorithm for Direction Tracking of Dribble Directional Shooting
141 -- 158Feifei Wang, Haifeng Hu 0005. Symmetric Algorithm for Detection of Coverage Hole in Wireless Sensor Network
159 -- 186Ashutosh Sharma, Lokesh Tharani. Ant Colony Based Node Disjoint Local Repair in Multipath Routing in MANET Network
187 -- 215Arslan Khalid, Faizan Rashid, Umair Tahir, Hafiz M. Asif, Fadi M. Al-Turjman. Multi-carrier Visible Light Communication System Using Enhanced Sub-carrier Index Modulation and Discrete Wavelet Transform
217 -- 233Sathish A. P. Kumar, A. Suresh, S. Raj Anand, K. Chokkanathan, M. Vijayasarathy. Hybridization of Mean Shift Clustering and Deep Packet Inspected Classification for Network Traffic Analysis
235 -- 253P. Mahalakshmi, N. Sabiyath Fatima. Ensembling of text and images using Deep Convolutional Neural Networks for Intelligent Information Retrieval
255 -- 269Azath Mubarakali. An Efficient Authentication Scheme Using Blockchain Technology for Wireless Sensor Networks
271 -- 291Shiyao Qin, Ruiming Wang, Deyi Fu. Research on Wind Turbines Fault Diagnosis Technology Based on CMS Data Feature Extraction
293 -- 318K. Sornalakshmi, G. Vadivu. Dynamic Auto Reconfiguration of Operator Placement in Wireless Distributed Stream Processing Systems
319 -- 339Aldosary Saad. Hybrid Secure Equivalent Computing Model for Distributed Computing Applications
341 -- 352Wentian Cai, Huijun Yao. A Secure Transmission Method of Network Communication Data Based on Symmetric Key Encryption Algorithm
353 -- 367Ming Li. Automatic Encryption Method of Sensor Network Capture Data Based on Symmetric Algorithm
369 -- 383Hongjing Bi. Aggregation Encryption Method of Social Network Privacy Data Based on Matrix Decomposition Algorithm
385 -- 403Sunil Kumar, Korhan Cengiz, S. Vimal 0001, Annamalai Suresh. Energy Efficient Resource Migration Based Load Balance Mechanism for High Traffic Applications IoT
405 -- 418Jie Zhang, Jinguang Sun, Hua He. Detection and Location for Network Hidden Threat Information Based on Improved MSCKF Algorithm
419 -- 439Ankit Agarwal, Manju Khari, Rajiv Singh. Detection of DDOS Attack using Deep Learning Model in Cloud Storage Application
441 -- 464Ying Liu, Qianchao Sun, Ashutosh Sharma, Amit Sharma, Gaurav Dhiman. Line Monitoring and Identification Based on Roadmap Towards Edge Computing
465 -- 478J. Omana, Moorthi Madhavan. Predictive Analysis and Prognostic Approach of Diabetes Prediction with Machine Learning Techniques
479 -- 503K. Lakshmi Narayanan, R. Santhana Krishnan, Eanoch Golden Julie, Y. Harold Robinson, Vimal Shanmuganathan. Machine Learning Based Detection and a Novel EC-BRTT Algorithm Based Prevention of DoS Attacks in Wireless Sensor Networks
505 -- 522Yuvaraja Teekaraman, Hariprasath Manoharan. Implementation of Cognitive Radio Model for Agricultural Applications Using Hybrid Algorithms
523 -- 541Y. Harold Robinson, S. Vimal 0001, Eanoch Golden Julie, K. Lakshmi Narayanan, Seungmin Rho. 3-Dimensional Manifold and Machine Learning Based Localization Algorithm for Wireless Sensor Networks
543 -- 559Wenwen Liu, Haolan Wu, Fei Yu, Qiang Wei. Design of Information Security Access System in the Power Grid Based on Improved Bayesian Algorithm
561 -- 576Yanlong Zhu. Edge Defect Detection of Network Image by the Application of Modal Symmetry
577 -- 597Shahana Gajala Qureshi, Shishir Kumar Shandilya. Novel Fuzzy Based Crow Search Optimization Algorithm for Secure Node-to-Node Data Transmission in WSN
599 -- 613Jie Zhang, Jinguang Sun, Hua He. Clustering Detection Method of Network Intrusion Feature Based on Support Vector Machine and LCA Block Algorithm
615 -- 634Liwei Zhang. Predictive Analysis of Machine Learning Error Classification Based on Bayesian Network
635 -- 655M. Raja, S. Dhanasekaran, V. Vasudevan. Opposition Based Joint Grey Wolf-Whale Optimization Algorithm Based Attribute Based Encryption in Secure Wireless Communication
657 -- 0M. Raja, S. Dhanasekaran, V. Vasudevan. Correction to: Opposition Based Joint Grey Wolf‑Whale Optimization Algorithm Based Attribute Based Encryption in Secure Wireless Communication
659 -- 678Rana Muhammad Waseem, Farrukh Zeeshan Khan, Muneer Ahmad, Anum Naseem, N. Z. Jhanjhi, Uttam Ghosh. Performance Evaluation of AOMDV on Realistic and Efficient VANet Simulations
679 -- 694Sathish A. P. Kumar, Resmi R. Nair, E. Kannan, A. Suresh, S. Raj Anand. Intelligent Vehicle Parking System (IVPS) Using Wireless Sensor Networks
695 -- 714Dayal Kumar Behera, Madhabananda Das, Subhra Swetanisha, Janmenjoy Nayak, S. Vimal 0001, Bighnaraj Naik. Follower Link Prediction Using the XGBoost Classification Model with Multiple Graph Features
715 -- 736Feslin Anish Mon Solomon, S. Godfrey Winster, R. Ramesh. Trust Model for IoT Using Cluster Analysis: A Centralized Approach
737 -- 748R. Krishnamoorthy, I. D. Soubache, Shafali Jain. Wireless Communication Based Evaluation of Power Consumption for Constrained Energy System
749 -- 765Roy Setiawan, Rama Koteswara Rao Ganga, Priya Velayutham, Kumaravel Thangavel, Dilip Kumar Sharma, Regin Rajan, Sujatha Krishnamoorthy, Sudhakar Sengan. Encrypted Network Traffic Classification and Resource Allocation with Deep Learning in Software Defined Network
767 -- 792Tu N. Nguyen 0001, Vinh V. Le, Shao-I Chu, Bing-Hong Liu, Yao-Chuan Hsu. Secure Localization Algorithms Against Localization Attacks in Wireless Sensor Networks
793 -- 814G. Vasukidevi, T. Sethukarasi. BBSSE: Blockchain-Based Safe Storage, Secure Sharing and Energy Scheme for Smart Grid Network
815 -- 843Fahad Ghalib Abdulkadhim, Zhang Yi, Ameer N. Onaizah, Furkan Rabee, Abbas M. Ali Al-muqarm. Optimizing the Roadside Unit Deployment Mechanism in VANET with Efficient Protocol to Prevent Data Loss
845 -- 868Renze Luo, Guodong Li, Shunli Fan, Fatemeh Safara. Location-Based Explosion Detection in Wireless Optical Pressure Sensor Networks Using Bat Optimization Algorithm
869 -- 880Abdulrahman Saad Alqahtani. Expectation Maximization Method for Effective Detection and Tracking of Object Using Machine Learning Technique for Secure Wireless Communication
881 -- 896Yafei Wang. Detection for Nodes Intrusion of Compressed Transmission Data Based on Fuzzy Analytic Hierarchy Process