


default search action
International Journal of Ad Hoc and Ubiquitous Computing, Volume 41
Volume 41, Number 1, 2022
- C. K. Deena Merit, M. Haridass:

A simulation study on the necessity of working breakdown in a state dependent bulk arrival queue with disaster and optional re-service. 1-15 - Radhakrishnan Maivizhi, Palanichamy Yogesh:

Identity-based secure data aggregation in big data wireless sensor networks. 16-28 - Tong-Ying Juang, Chih-Shun Hsu, Yuh-Shyan Chen, Wan-Chun Chen:

A concurrent prediction of criminal law charge and sentence using twin convolutional neural networks. 29-43 - Khodadad Jalali Rad, Abbas Mirzaei:

Hierarchical capacity management and load balancing for HetNets using multi-layer optimisation methods. 44-57 - A. Smruthy, M. Suchetha:

A novel optimised apnea classification with AA-CNN method by utilising the EDR and ECG features. 58-67
Volume 41, Number 2, 2022
- Peng Gao, Xiao Yue, Wei Chen, Weidong Fang, Zijian Tian, Fan Zhang:

A state-of-the-art review on person re-identification with deep learning. 69-91 - Haibin Sun, Dijing Pan:

Research on optimisation of energy efficient routing protocol based on LEACH. 92-107 - Aruru Sai Kumar, T. V. K. Hanumantha Rao, B. Naresh Kumar Reddy:

Performance and communication energy constrained embedded benchmark for fault tolerant core mapping onto NoC architectures. 108-117 - Subhrajyoti Deb

, Bubu Bhuyan, Nirmalya Kar
, K. Sudheer Reddy
:
Colour image encryption using an improved version of stream cipher and chaos. 118-133
Volume 41, Number 3, 2022
- Shivani Jain, R. Padmavathy:

Lattice-based lightweight cryptosystem. 135-146 - Govindasamy Chinnaraj, Arokiasamy Antonidoss:

Hybrid meta-heuristic-based inventory management using block chain technology in cloud sector. 147-169 - Khyati Chopra:

Intercept analysis with threshold-based diversity reception for cognitive network. 170-180 - Bimal Kumar Meher, Ruhul Amin:

A location-based multi-factor authentication scheme for mobile devices. 181-190 - Abd El Heq Silem, Hajer Taktak, Faouzi Moussa:

User interests profiling using fuzzy regression tree. 191-203
Volume 41, Number 4, 2022
- Pulkit Singh, K. Abhimanyu Kumar Patro, Bibhudendra Acharya, Rahul Kumar Chaurasiya:

Efficient hardware architectures of Lilliput lightweight algorithm for image encryption. 205-220 - Wei-Che Liang, Chih-Min Chao, Chih-Yu Lin, Chun-Chao Yeh:

Transmission range determination and antenna deployment to recognise fitness actions using Wi-Fi signals. 221-231 - Sangeetha Rajaram, Satyanarayana Vollala, Ramasubramanian Natarajan:

ERMAP: ECC-based robust mutual authentication protocol for smart grid communication with AVISPA simulations. 232-245 - Yekta Turk:

Indoor performance analysis of URLLC service for industrial IoT. 246-255 - Sajal Sarkar:

Mobility aware and reliable multipath routing protocol for MANETs. 256-269

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














