


default search action
Ad Hoc & Sensor Wireless Networks, Volume 51
Volume 51, Numbers 1-3, 2022
- Chunmao Jiang, Yue Liu: 
 Energy-saving Offloading Strategies for Sensor Tasks Based on Three-way Game Theory in Wireless Communications. 1-22
- N. Srinivas Rao, K. V. S. N. Rama Rao: 
 An Energy-Efficient Routing Scheme in Wireless Sensor Networks for Life Time Maximization Using Fuzzy Based Decision. 23-39
- Zhifang Wang, Jianguo Yu, Kun Bi, Shangjing Lin, Zheng Yu: 
 Research on Long-distance Transmission of Nodes in Amorphous Flat Air-to-ground Wireless Ad-Hoc Network Based on Bidirectional Relay Beamforming. 41-59
- Xin-Lei Liu, Qiang Wu, Bin Shen, Hong-Quan Zhang, Hong-Liang Wang, Sheng-Wu Cao: 
 Research of Oriented Ceramic Nanotube Array Full Range Methane Sensors Based on MEMS Technology Used for Wireless Monitoring Networks. 61-74
- Li Qian, Yongyi Fang, Baoan Liu, Shi Shanzhe: 
 Optimization of Wireless Transmission of Distributed Cable Tunnel Data Based on Mobile Edge Computing and Wireless Sensor Networks. 75-89
- Chaitanya Duggineni: 
 Performance Analysis of Cooperative Sensing Based on Reputation Values. 91-111
- Krishnadas J., P. Manimegalai, G. K. D. Prasanna Venkatesan: 
 A Detailed Survey on Swarm Intelligence Algorithms for Efficient Optimal Path Selection in WSN for Effective Online Business Platform. 113-140
- Mohsen Othmani, Tahar Ezzedine, Qing-Guo Wang: 
 Event Detection in Clustered Wireless Sensor Networks Using Dynamic Cell Structures Neural Networks. 141-171
- Mohammad Javad Khani, Zahra Shirmohammadi: 
 SRCM: An Efficient Method for Energy Consumption Reduction in Wireless Body Area Networks based on Data Similarity. 173-187
- Angeline Rachel Sharon, N. Victor Jaya: 
 Efficient Cluster Head Selection and Fault Tolerant Routing Method for Mobile Wireless Sensor Networks. 189-204
- V. N. Senthil Kumaran, G. Ananthi: 
 Artificial Noise Aided Polar Code with Optimal Jamming Position for Physical Layer Security in Mondrian Loss Integrated Rayleigh Wireless Relay Channel. 205-234
Volume 51, Number 4, 2022
- Neda Mehdizadeh, Nazbanoo Farzaneh: 
 An Evidence Theory based Approach in Detecting Malicious Controller in the Multi-Controller Software-defined Internet of Things Network. 235-260
- Yuhan Jing, Lei Zhang, Cong Liu, Jing Wang, Wei Li, Bo He, Qi Qi, Jingyu Wang  : :
 Causality Graph Construction of Fault Alarms for Wireless Sensor Networks. 261-284
- Farhana Afroz, Robin Braun, Zenon Chaczko: 
 XX-MAC and EX-MAC: Two Variants of X-MAC Protocol for Low Power Wireless Sensor Networks. 285-314

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














