


default search action
IET Networks, Volume 9
Volume 9, Number 1, 2020
- Fei Wang, Changchun Qin:

Secure resource allocation for green two-way relay networks with mutually untrusted relay and mobile users. 1-6 - Juan Zhao, Guihui Xie, Dongming Li, Mailing Song:

Improved GMM-based method for target detection. 7-11 - Rajendran Muthukkumar

, D. Manimegalai:
Distributed coalition formation game for enhancing cooperative spectrum sensing in cognitive radio ad hoc networks. 12-22 - Zakia Berber, Samir Kameche, Elhadj Benkhelifa:

Design of integer-N PLL frequency synthesiser for E-band frequency for high phase noise performance in 5G communication systems. 23-28 - Qingbo Du, Faming Yin, Zongchen Li

:
Base station traffic prediction using XGBoost-LSTM with feature enhancement. 29-37 - Yanli Li, Xiaonan Wang:

Green content communications in 6LoWPAN. 38-42
Volume 9, Number 2, 2020
- Bhisham Sharma

, Mohammad S. Obaidat:
Comparative analysis of IoT based products, technology and integration of IoT with cloud computing. 43-47 - Samaneh Hoghooghi, Reza Javidan:

Proposing a new method for improving RPL to support mobility in the Internet of things. 48-55 - Weijing Wang

, Guoxiang Tong:
Multi-path unequal clustering protocol based on ant colony algorithm in wireless sensor networks. 56-63 - V. Ramasamy, B. Gomathy

, Joy Lal Sarkar
, Chhabi Rani Panigrahi
, Bibudhendu Pati
, Abhishek Majumder
:
EMC2: an emergency management system using mobile cloud computing. 64-73 - Parimala Venkata Krishna

, Vankadara Saritha, Mohammad S. Obaidat:
E2CA-SM: an energy-efficient channel allocation with sleep mode for base station in fifth-generation-based cellular network systems. 74-82 - Deepak Kr. Sharma

, Swati Singh, Vishakha Gautam, Shubham Kumaram, Mehul Sharma, Shrid Pant
:
Ant Router: An efficient routing protocol for social opportunistic networks using ant routing. 83-93
Volume 9, Number 3, 2020
- Zhengxiong Dou, Xiaonan Wang:

Ethernet-based access cloud. 95-101 - Guo-Ming Sung, Yen-Shih Shen, Chih-Ping Yu, Cheng-Syuan Jian:

Two-port-two-port SI between RS485 and Ethernet with an FIFO queue for efficient PC-to-PC communication. 102-109 - Rakesh Ranjan Swain

, Tirtharaj Dash
, Pabitra Mohan Khilar:
Lightweight approach to automated fault diagnosis in WSNs. 110-119 - Monika Roopak

, Gui Yun Tian, Jonathon A. Chambers:
Multi-objective-based feature selection for DDoS attack detection in IoT networks. 120-127 - Ehsan Kharati

, Mohammad Khalily Dermany
, Hamidreza Karmajani:
Increasing the amount of collected data using network coding and continuous movement of mobile sinks in wireless sensor networks. 128-138 - Xian Liu:

Optimisation of the duplex D2D network: a deep learning approach. 139-144
Volume 9, Number 4, 2020
- Hitesh Mohapatra

, Amiya Kumar Rath:
Survey on fault tolerance-based clustering evolution in WSN. 145-155 - Shun-Ping Chung, Hui-Yu Pai, Chia-Hsin Lin, Guan-Ting Lin:

Performance analysis of the pending interest table in the cellular network with reservation and retrials. 156-164 - Hamza Hammami, Sadok Ben Yahia

, Mohammad S. Obaidat:
Scalable and efficient authentication scheme for secure smart grid communication. 165-169 - Radhika Gour

, Anshul Tyagi:
Cluster oriented resource allocation and power optimisation for D2D network in cellular communications. 170-179 - Quynh Tu Ngo

, Duc Ngoc Minh Dang
, Quan Le Trung:
Extreme power saving directional MAC protocol in IEEE 802.11ah networks. 180-188 - Kapil Netaji Vhatkar, Girish P. Bhole:

Particle swarm optimisation with grey wolf optimisation for optimal container resource allocation in cloud. 189-199 - Hankiz Yilahun, Kudret Abdurahman, Seyyare Imam, Askar Hamdulla:

Automatic extraction of Uyghur domain concepts based on multi-feature for ontology extension. 200-205
Volume 9, Number 5, September 2020
- Guest Editorial: Selected Papers from the Ubiquitous Clouds and Cognitive Communication Networks (UCCCN 2019). 207-208

- Pradeep Sudhakaran

, Chidambaranathan Malathy:
Authorisation, attack detection and avoidance framework for IoT devices. 209-214 - Sivaraman Eswaran

, Daniel Dominic, Jayapandian Natarajan
, Prasad B. Honnavalli
:
Augmented intelligent water drops optimisation model for virtual machine placement in cloud environment. 215-222 - K. Sridharan

, G. Komarasamy
, S. Daniel Madan Raja
:
Hadoop framework for efficient sentiment classification using trees. 223-228 - Padakandla Chenna Praveen Kumar

, Polipalli Trinatha Rao:
Design of reconfigurable circularly polarised double folded inverted-L antenna with rectangular ground plane using HFSS. 229-234 - Vijayalakshmi Murugesan

, S. Mercy Shalinie, Ming-Hour Yang, Raja Meenakshi U.:
Web phishing detection techniques: a survey on the state-of-the-art, taxonomy and future directions. 235-246 - Raad S. Alhumaima

, Saib Thiab Alwan, Riyadh Khlf Ahmed
:
Mitigating X2-AP interface cost using quantum teleportation. 247-254 - Ramachandira Moorthy Buvanesvari, Kanagaraj Suresh Joseph:

RBFNN: a radial basis function neural network model for detecting and mitigating the cache pollution attacks in named data networking. 255-261 - Shuan He, Wei Wang:

QoE-aware Q-learning resource allocation for NOMA wireless multimedia communications. 262-269 - David Aondoakaa, John Cosmas, Stephen Swift:

Exploiting heterogeneity for cost efficient 5G base station deployment using meta-heuristics. 270-275
Volume 9, Number 6, November 2020
- Guest Editorial: Intelligent Computing: a Promising Network Computing Paradigm. 277-278

- B. S. Shylaja, R. Bhaskar

:
Rough-set and machine learning-based approach for optimised virtual machine utilisation in cloud computing. 279-283 - Whai-En Chen

, Chia-Hung Liu
:
High-performance user plane function (UPF) for the next generation core networks. 284-289 - Jianneng Chen, Zhen-Jie Huang

, Yu-Ping Zhou, Fumin Zou, Chien-Ming Chen
, Jimmy Ming-Tai Wu, Tsu-Yang Wu
:
Efficient certificate-based aggregate signature scheme for vehicular ad hoc networks. 290-297 - Yize Yang

, Hong-yong Yang, Yuling Li:
Finite-time convergence of group flocking for multi-agent systems with mismatched/matched disturbances. 298-304 - Dang Van Huynh

, Quan Le Trung:
SD-IoTR: an SDN-based Internet of Things reprogramming framework. 305-314 - Devender Kumar, Satish Chand, Bijendra Kumar:

Cryptanalysis and improvement of a user authentication scheme for wireless sensor networks using chaotic maps. 315-325 - Khiet Thanh Bui

, Hung Dac Ho
, Tran Vu Pham
, Hung Cong Tran:
Virtual machines migration game approach for multi-tier application in infrastructure as a service cloud computing. 326-337 - Ko-Tsung Chu, Hua-Ting Hsu, Jyh-Jian Sheu, Wei-Pang Yang, Cheng-Chi Lee

:
Effective spam filter based on a hybrid method of header checking and content parsing. 338-347 - Bhushan Yelure, Shefali Sonavane

:
ACO-IBR: a modified intersection-based routing approach for the VANET. 348-359 - Ridhima Mehta

:
Multi-objective design of energy harvesting enabled wireless networks based on evolutionary genetic optimisation. 360-366 - Ali Ghiasian

:
Impact of TCAM size on power efficiency in a network of OpenFlow switches. 367-371 - Jun Li, Xingyu He

, Dan Zhao, Guisong Yang, Daojing He
, Sammy Chan:
Delay-aware and cost-efficient probabilistic transmission for opportunistic networks. 372-377

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














