Journal: Wireless Personal Communications

Volume 89, Issue 4

1027 -- 1043Meiqin Tang, Yalin Xin, Chengnian Long, Xinjiang Wei, Xiaohua Liu. Optimizing Power and Rate in Cognitive Radio Networks using Improved Particle Swarm Optimization with Mutation Strategy
1045 -- 1063Mani Zarei, Amir Masoud Rahmani. Renewal Process of Information Propagation in Delay Tolerant VANETs
1065 -- 1088Xiaoheng Deng, LiFang He, Congxu Zhu, Mianxiong Dong, Kaoru Ota, Lin Cai. QoS-Aware and Load-Balance Routing for IEEE 802.11s Based Neighborhood Area Network in Smart Grid
1089 -- 1102Francisco Rubén Castillo Soria, Jaime Sanchez-Garcia, Ramón Parra-Michel. Multiuser MIMO Downlink Transmission Using SSK and Orthogonal Walsh Codes
1103 -- 1121Hojin Ha, Changhoon Yim. Unequal Luby Transform Based on Block Weight Shift (ULT-BWS) for Error Resilient Video Transmission
1123 -- 1145C. S. Anita, R. M. Suresh. On Demand Stable Routing with Channel Allocation and Backoff Countdown Optimization in Wireless Mesh Networks
1147 -- 1163Yu Du, Fengye Hu, Xiaolan Liu, Ling Cen, Wei Xiong. Planar Sparse Array Synthesis for Sensor Selection by Convex Optimization with Constrained Beam Pattern
1165 -- 1176Divya Lohani, Shirshu Varma. Energy Efficient Data Aggregation in Mobile Agent Based Wireless Sensor Network
1177 -- 1202Simon D. Barnes, Bodhaswar T. Maharaj, Attahiru Sule Alfa. Cooperative Prediction for Cognitive Radio Networks
1203 -- 1219Takahiro Yazaki, Yukitoshi Sanada. Effect of Joint Detection in Far User on Non-orthogonal Multiple Access Downlink
1221 -- 1242P. Vijayakumar, V. Vijayalakshmi, G. Zayaraz. An Improved Level of Security for DNA Steganography Using Hyperelliptic Curve Cryptography
1243 -- 1264T. R. Reshmi, Krishnan. Murugan. Secure and Reliable Autoconfiguration Protocol (SRACP) for MANETs
1265 -- 1293Manjula R. Bharamagoudra, Sunil Kumar S. Manvi. Deployment Scheme for Enhancing Coverage and Connectivity in Underwater Acoustic Sensor Networks
1295 -- 1313Jiahui Hu, Qing Qian, An Fang, Sizhu Wu, Yi Xie. Optimal Data Transmission Strategy for Healthcare-Based Wireless Sensor Networks: A Stochastic Differential Game Approach
1315 -- 1334Vajihe Zeinali, Hossein Khaleghi Bizaki. Shared Secret Key Generation Protocol in Wireless Networks Based on the Phase of MIMO Fading Channels
1335 -- 1354Saaidal Razalli Azzuhri, Harith Ahmad, Marius Portmann, Ismail Ahmedy, Ranjana Pathak. An Efficient Hybrid MANET-DTN Routing Scheme for OLSR
1355 -- 1370Linshu Lv, Qi Zhu, Guangjun Liang. Distributed Resource Allocation for Multi-cell Cooperative OFDMA Networks with Decode-and-Forward Relaying
1371 -- 1390Kerem Ok, Vedat Coskun, Siddik Binboga Yarman, Cem Cevikbas, Busra Ozdenizci. SIMSec: A Key Exchange Protocol Between SIM Card and Service Provider
1391 -- 1412Fagen Li, Yanan Han, Chunhua Jin. Practical Signcryption for Secure Communication of Wireless Sensor Networks
1413 -- 1432Nasreddine Mallouki, Bechir Nsiri, Sofien Mhatli, Mohammad Ghanbarisabagh, Walid Hakimi, Mahmoud Ammar. Analysis of Full Volterra and Sparse Volterra Nonlinear Equalization for Downlink LTE System
1433 -- 0Nasreddine Mallouki, Bechir Nsiri, Sofien Mhatli, Mohammad Ghanbarisabagh, Walid Hakimi, Mahmoud Ammar. Erratum to: Analysis of Full Volterra and Sparse Volterra Nonlinear Equalization for Downlink LTE System
1435 -- 0Raazia Sosan, Choudhry Fahad Azim. RETRACTED ARTICLE: Mobile Cloud Computing: The Taxonomy and Comparison of Mobile Cloud Computing Application Models

Volume 89, Issue 3

709 -- 713Yu-Keum Jeong, Joong-Kyung Ryu. Convergence Interaction for Communication
715 -- 728Hyung-Jin Mun, Sejong Oh. Injecting Subject Policy into Access Control for Strengthening the Protection of Personal Information
729 -- 745Jihyun Lee, Sunmyung Hwang. Variability Change Management Using the Orthogonal Variability Model-Based Traceability
747 -- 759Kyungyong Chung, Sang Yeob Oh. Voice Activity Detection Using an Improved Unvoiced Feature Normalization Process in Noisy Environments
761 -- 775Kyoo-Sung Noh. A Study on the Authentication and Security of Financial Settlement Using the Finger Vein Technology in Wireless Internet Environment
777 -- 793Seokmo Kim, R. Young-Chul Kim, Young B. Park. Software Vulnerability Detection Methodology Combined with Static and Dynamic Analysis
795 -- 818Hangoo Jeon, Kwang-Kyu Seo. A New Performance Assessment Modeling and Development of a Performance Assessment System for a Cloud Service
819 -- 832Cheol-Joo Chae, Kwang Nam Choi, Kiseok Choi. Information Interoperability System Using Multi-agent with Security
833 -- 845Joon Koo Choi, Ki-Bong Kim, Gha Jung Kim. Image Selection Algorithm Proposal for Digital Radiography Training Simulator
847 -- 861Sang Un Ahn, Jin Kim. A Conceptual Design of Job Pre-processing Flow for Heterogeneous Batch Systems in Data Center
863 -- 879Jeongbae Park, Hyesung Ji, Jaechoon Jo, HeuiSeok Lim. A Method for Measuring Cooperative Activities in a Social Network Supported Learning Environment
881 -- 891Jeong-Heon Kim, Duseok Jin, Pillwoo Lee. Cyber Physical System-Based Convergence Operation of Data Intensive Computing Resources
893 -- 911Young Jung Kim, Jong Yun Lee. Algorithm of a Perspective Transform-Based PDF417 Barcode Recognition
913 -- 925Young-Man Je, Yen-Yoo You, Kwan-Sik Na. Information Security Evaluation Using Multi-Attribute Threat Index
927 -- 940Jongmin Kim, Hoill Jung, Myunga Kang, Kyung-Yong Chung. 3D Human-Gesture Interface for Fighting Games Using Motion Recognition Sensor
941 -- 958Kigon Lyu, Hyeoncheol Kim. Sentiment Analysis Using Word Polarity of Social Media
959 -- 975Kwang-Ho Ko, Byung-Koo Moon, Tong-Won Lee, Won-Ho Lee, Ink-Yoon Yoo, Sooh-Yung Lee, Dae-Seok Han, Seung-Hyun Jeong. An Economic Calibration Method for Fuel Consumption Model in HDM4
977 -- 992Yong-Ki Kim 0001, Hanjo Jeong. A Cloud Computing-Based Analysis System for the National R&D Information Concerning with the Data Security
993 -- 1008Jihoon Kim, Sanghun Lee, Gangseong Lee, Youngsoo Park, YeongPyo Hong. Using a Method Based on a Modified K-Means Clustering and Mean Shift Segmentation to Reduce File Sizes and Detect Brain Tumors from Magnetic Resonance (MRI) Images
1009 -- 1025Joo-Chang Kim, Hoill Jung, Kyungyong Chung. Mining Based Urban Climate Disaster Index Service According to Potential Risk

Volume 89, Issue 2

303 -- 318Kuo-Ching Fu, Yung-Fang Chen. Subspace-Based Algorithms for Blind ML Frequency and Transition Time Estimation in Frequency Hopping Systems
319 -- 330Aouatif Amine, Adil Belhaj, Moulay Brahim Sedra. The Hexagonal Geometrical Structure of the N-Coverage Networks in the G2-Lie Algebra Framework
331 -- 349Siddig Gomha, Abdel-Aziz T. Shalaby, El-Sayed M. El-Rabaie, Ahmed S. ElKorany. Thin Film Ferroelectric Compact Branch-Line Coupler Based on D-CRLH Unit Cell and YBCO HTS Microstrip
351 -- 364R. Juliana, P. Uma Maheswari. An Energy Efficient Cluster Head Selection Technique Using Network Trust and Swarm Intelligence
365 -- 384Chao Ning, Rui Li, Kejiong Li. Outdoor Location Estimation Using Received Signal Strength-Based Fingerprinting
385 -- 403Xiaojuan Wang, Mei Song, Yinglei Teng, Anqi Xing, Deyu Yuan. Coverage and Capacity Optimization Analysis in Heterogeneous Cellular Networks Based on Truncated Function
405 -- 426Pai Wang, Yongqing Wang, Xiuli Yu, Siliang Wu. Performance Comparison of Code Discriminators in the Presence of CW Interference
427 -- 445Yi-Jia Bu, Min Lin, Kang An, Jian Ouyang, Can Yuan. Performance Analysis of Hybrid Satellite-Terrestrial Cooperative Systems with Fixed Gain Relaying
447 -- 465Chin-Chen Chang, Wei-Yuan Hsueh, Ting-Fang Cheng. A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
467 -- 478Sabri M. Hanshi, Mohammad M. Kadhum, Tat Chee Wan. Efficient Approximated Q-Function Form for Error Probability over Rayleigh Fading Channels
479 -- 499Mukhridinkhon Ibragimov, Jae-Hoon Lee, Muppalla Kalyani, Jung-Il Namgung, Soo-Hyun Park, Okyeon Yi, Changhwa Kim, Yong-Kon Lim. CCM-UW Security Modes for Low-band Underwater Acoustic Sensor Networks
501 -- 520BeomSeok Kim, Jinsung Cho, Seokhee Jeon, Ben Lee. An AHP-Based Flexible Relay Node Selection Scheme for WBANs
521 -- 537Yalin Wang, Jie Zhou, Hisakazu Kikuchi. Performance of a Three-Dimensional Antenna Array and Its Application in DOA Estimation
539 -- 568James Osuru Mark Amok, Naufal Mohamad Saad. Performance Analysis of Multiantenna MC DS CDMA System Over Correlated η-µ Multipath Fading Channels
569 -- 597Xiong Li, Jianwei Niu, Saru Kumari, SK Hafizul Islam, Fan Wu, Muhammad Khurram Khan, Ashok Kumar Das. A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security
599 -- 619Cornelia-Ionela Badoi, Neeli R. Prasad, Ramjee Prasad. Virtualization and Scheduling Methods for 5G Cognitive Radio Based Wireless Networks
621 -- 637Sonam Devgan Kaul, Amit K. Awasthi. Security Enhancement of an Improved Remote User Authentication Scheme with Key Agreement
639 -- 662Shixin Peng, Yingzhuang Liu, Zhengmin Kong, Wei Lv. Spatial Degrees of Freedom for MIMO Interference Channel with Local Channel State Information at Transmitters
663 -- 685Yongqun Chen, Huaibei Zhou, Ruoshan Kong, Junyuan Huang, Bo Chen. QoS-Based Blind Spectrum Selection with Multi-armed Bandit Problem in Cognitive Radio Networks
687 -- 707Nitin Goyal, Mayank Dave, Anil Kumar Verma. Energy Efficient Architecture for Intra and Inter Cluster Communication for Underwater Wireless Sensor Networks

Volume 89, Issue 1

1 -- 13Mingjun Dai, Zexin Lu, Dan Shen, Hui Wang, Bin Chen, Xiaohui Lin, Shengli Zhang, Li Zhang, Hongwei Liu. Design of (4, 8) Binary Code with MDS and Zigzag-Decodable Property
15 -- 26P. Malarvezhi, R. Kumar. A Diversity Enhanced Particle Filter for Carrier Frequency Offset Estimation in Nonlinear OFDM System
27 -- 43M. Usha, C. N. Vanitha. Pruning Route Modifiers in Wireless Sensor Networks
45 -- 59Enyu Li, Xinjie Wang, Yunquan Dong, Yansheng Li. Research on the Nth-best Relay Selection with Outdated Feedback in Selection Cooperation Systems
61 -- 78Priyanka Rathee, Rishipal Singh, Sushil Kumar. Performance Analysis of IEEE 802.11p in the Presence of Hidden Terminals
79 -- 92Gaurav Kumar Pandey, Hari Shankar Singh, Pradutt Kumar Bharti, Manoj Kumar Meshram. Design and Analysis of Ψ-Shaped UWB Antenna with Dual Band Notched Characteristics
93 -- 118K. S. Deepak, Anchare V. Babu. Enhancing Reliability of IEEE 802.15.6 Wireless Body Area Networks in Scheduled Access Mode and Error Prone Channels
119 -- 133Sandeep Kumar, Binod Kumar Kanaujia, Santanu Dwari, Ganga Prasad Pandey, Dinesh Kumar Singh. Analysis and Design of Switchable Rectangular Monopole Antenna Using Asymmetric Cross Slot for Wireless Communication
135 -- 147Rui Chen, Changle Li, Jiandong Li, Xuelian Cai. Performance of Vector Perturbation MU-MIMO Systems in a Composite Fading Channel
149 -- 163Xiaochen Xia, Kui Xu, Youyun Xu. Asynchronous Physical-layer Network Coding Scheme for Broadband Two-Way Relay Channels
165 -- 180Tung-Linh Pham, Dong Seong Kim. Efficient Forwarding Protocol for Dual-Hop Relaying Wireless Networks
181 -- 194Tai-Kuo Woo. FISH: Finite Projective Plane Based Interference Cancellation for Slotted ALOHA
195 -- 210M. Madheswaran, R. N. Shanmugasundaram. Performance Evaluation of Balanced Partitioning Dynamic Cluster Head Algorithm (BP-DCA) for Wireless Sensor Networks
211 -- 226Feriel Bouakkaz, Mawloud Omar, Souad Laib, Lilia Guermouz, Abdelkamel Tari, Abdelmadjid Bouabdallah. Lightweight Sharing Scheme for Data Integrity Protection in WSNs
227 -- 240Priya Aggarwal, Anubha Gupta, Vivek Ashok Bohara. Recursive Least Squares Channel Estimation for Rapidly Time-Varying Scenarios in IEEE 802.11p
241 -- 269Neeraj Kumar Rathore, Inderveer Chana. Job Migration Policies for Grid Environment
271 -- 287Geunseok Choi, Wonsik Yoon. Distributed Joint Rate Control, Resource Allocation, and Congestion Control for Throughput Optimization in Multirate Multiradio Multichannel Wireless Network with Intersession/Intrasession Network Coding
289 -- 302Chi-Min Li, Szu-Hsien Lu. Energy-Based Maximum Likelihood Spectrum Sensing Method for the Cognitive Radio