1023 | -- | 1049 | Sabry S. Nassar, Nabil M. Ayad, Hamdy M. Kelash, Hala S. El-sayed, Mohsen A. M. El-Bendary, Fathi E. Abd El-Samie, Osama S. Faragallah. Secure Wireless Image Communication Using LSB Steganography and Chaotic Baker Ciphering |
1051 | -- | 1064 | Zhenyu Zhang, Fengchun Tian, Fanxin Zeng, Lijia Ge, Guixin Xuan. Inter-Group Complementary Sequence Set Based on Interleaved Periodic Complementary Sequences |
1065 | -- | 1083 | B. Siva Kumar Reddy. Performance Improvement Techniques for OFDM system using Software Defined Radio |
1085 | -- | 1093 | Da-Zhi Sun, Ji-Dong Zhong. Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol |
1095 | -- | 1108 | S. H. Alsamhi, N. S. Rajput. An Efficient Channel Reservation Technique for Improved QoS for Mobile Communication Deployment Using High Altitude Platform |
1109 | -- | 1121 | Hua Guo, Yandong Zheng. On the Security of a Self-Healing Group Key Distribution Scheme |
1123 | -- | 1136 | C. S. Preetham, Mutchakayala Siva Ganga Prasad. Hybrid Overlay/Underlay Transmission Scheme with Optimal Resource Allocation for Primary User Throughput Maximization in Cooperative Cognitive Radio Networks |
1137 | -- | 1152 | Prashant Kumar, Preetam Kumar. Performance Evaluation of $$\pi /4$$ π / 4 -DQPSK OFDM over Underwater Acoustic Channels |
1153 | -- | 1161 | Sumeet Singh Bhatia, Jagtar Singh Sivia. A Novel Design of Circular Monopole Antenna for Wireless Applications |
1163 | -- | 1170 | Lin Peng, Yunjie Qiu, Lai-yi Luo, Xing Jiang. Bandwidth Enhanced L-Shaped Patch Antenna with Parasitic Element for 5.8-GHz Wireless Local Area Network Applications |
1171 | -- | 1189 | E. Golden Julie, S. Tamilselvi, Y. Harold Robinson. Performance Analysis of Energy Efficient Virtual Back Bone Path Based Cluster Routing Protocol for WSN |
1191 | -- | 1212 | Rudzidatul Akmam Dziyauddin, Angela Doufexi, Dritan Kaleshi, Suriani Mohd Sam, Norliza Mohamed. Performance Evaluation of Dynamic Burst Mapping in a WiMAX System |
1213 | -- | 1235 | Ajay Pratap, Rajiv Misra, Utkarsh Gupta. Randomized Graph Coloring Algorithm for Physical Cell ID Assignment in LTE-A Femtocellular Networks |
1237 | -- | 1257 | Yu-Ting Liao, Tzer-Long Chen, Tzer-Shyong Chen, Zheng-Hong Zhong, Jen-Hung Hwang. The Application of RFID to Healthcare Management of Nursing House |
1259 | -- | 1270 | Fulai Liu, Ruiyan Du. LPWS Algorithm for Wideband Spectrum Sensing |
1271 | -- | 1284 | Yee-Loo Foo. Dominant Interferers in Cognitive Radio Network |
1285 | -- | 1296 | Cezary Ziólkowski, Jan M. Kelner. Empirical Models of the Azimuthal Reception Angle - Part II: Adaptation of the Empirical Models in Analytical and Simulation Studies |
1297 | -- | 1319 | Osama S. Faragallah, S. F. El-Zoghdy. Improved Hierarchical Key Management Scheme (IHKMS) with Three Phase Technique for Ad-Hoc Networks |
1321 | -- | 1333 | S. Selva Nidhyananthan, R. Shantha Selva Kumari, T. Senthur Selvi. Noise Robust Speaker Identification Using RASTA-MFCC Feature with Quadrilateral Filter Bank Structure |
1335 | -- | 1344 | Hongyang Ma, Bingquan Chen. An Authentication Protocol Based on Quantum Key Distribution Using Decoy-State Method for Heterogeneous IoT |
1345 | -- | 1357 | Hsin-Ying Liang, Cheng-Ying Yang, Kuang-Hao Lin, Chia-Hsin Cheng. Using Improved Product-Coded Modulation Codes to Reduce the Peak-to-Average Power Ratio in Single-Carrier Frequency Division Multiple Access Systems |
1359 | -- | 0 | Hsin-Ying Liang, Cheng-Ying Yang, Kuang-Hao Lin, Chia-Hsin Cheng. Erratum to: Using Improved Product-Coded Modulation Codes to Reduce the Peak-to-Average Power Ratio in Single-Carrier Frequency Division Multiple Access Systems |
1361 | -- | 1391 | Dheerendra Mishra, Ashok Kumar Das, Sourav Mukhopadhyay, Mohammad Wazid. A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography |
1393 | -- | 1417 | Mithra Venkatesan, Anju Vijay Kumar Kulkarni. Comparative Performance Investigation of Supervised and Unsupervised Learning Outlines applied in Cognitive Radio Systems |
1419 | -- | 1433 | Dan Wang, Yu Liu, Yong Liao. Double Codebook Estimation and Feedback with Outdated CSI |
1435 | -- | 1446 | Naresh Kumar, Balwinder S. Sohi. Evaluation of Conventional and Wavelet Based OFDM System for ICI Cancellation |
1447 | -- | 1458 | Chi-Min Li, Wei-Wen Tsao, Pao-Jen Wang. A Low-Complexity Rank Indicator Determination Method for the LTE System |
1459 | -- | 1469 | Massoud Hadian Dehkordi, Reza Ghasemi. A Lightweight Public Verifiable Multi Secret Sharing Scheme Using Short Integer Solution |
1471 | -- | 1487 | Lilatul Ferdouse, Alagan Anpalagan, Mohan Nadarajah. Performance of Dynamic Access Class Barring Method in Cellular M2M Networks |
1489 | -- | 1505 | Licai Yang, Haiqing Liu. A Data Transmitting Scheme Based on Improved AODV and RSU-Assisted Forwarding for Large-Scale VANET |
1507 | -- | 1529 | Bui Quang Chung, Zhang Tian Qi, Alina Labitzke. A Blind Recognition Algorithm for Real Orthogonal STBC MC-CDMA Underdetermined Systems Based on LPCA and SCA |
1531 | -- | 1547 | Beomkeun Shin, Hyobeen Park, Yunho Jung, Seongjoo Lee. An Adaptive Modulation Technique for Wireless Image Sequence Transmission |