default search action
International Journal of Wireless Information Networks, Volume 25
Volume 25, Number 1, March 2018
- Lei Chen:
Multi-antenna Decode and Forward Relay Selection over Nakagami-m Fading Channels. 1-14 - Vahid Heydari, Seong-Moo Yoo:
Timeout Period Analysis to Detect Black Hole Attack in Multihop Wireless Ad Hoc Networks. 15-29 - Bhawani Shanker Bhati, Pallapa Venkataram:
Performance Analysis of Privacy Protection System During Data Transfer in MANETs. 30-43 - Umma Hany, Lutfa Akter:
Non-parametric Method of Path Loss Estimation for Endoscopic Capsule Localization. 44-56 - M. N. Upama Rajan, A. V. Babu:
Variable Beam Width Selection for Improving the Throughput of IEEE 802.11ad Wireless LAN in the Contention Based Access Period. 57-71 - Yang Zhao, Zheng Gao, Yongtao Ma, Yangguang Zang, Jianfu Teng, Kaihua Liu:
Pattern Matching Performance Analysis Based on Linear Models with Information Backscattered from RFID Tags. 72-78 - Vilaskumar M. Patil, Rohitha Ujjinimatad, Siddarama R. Patil:
Signal Detection in Cognitive Radio Networks over AWGN and Fading Channels. 79-86 - Vilaskumar M. Patil, Rohitha Ujjinimatad, Siddarama R. Patil:
Correction to: Signal Detection in Cognitive Radio Networks over AWGN and Fading Channels. 87 - Tawfik Najeh, Hichem Sassi, Noureddine Liouane:
A Novel Range Free Localization Algorithm in Wireless Sensor Networks Based on Connectivity and Genetic Algorithms. 88-97 - Stefan Weithoffer, Norbert Wehn:
Low-Latency CRC Calculation in Turbo-Code Decoding. 98-107 - Shyna Chugh, Lavish Kansal:
A Noval RAR-QOSTBC Scheme with Linear Decoding for M-PSK Over Diverse Channels. 108-115
Volume 25, Number 2, June 2018
- Fatemeh Afghah, Bertrand Cambou, Masih Abedini, Sherali Zeadally:
A ReRAM Physically Unclonable Function (ReRAM PUF)-Based Approach to Enhance Authentication Security in Software Defined Wireless Networks. 117-129 - Mayank Agarwal, Santosh Biswas, Sukumar Nandi:
An Efficient Scheme to Detect Evil Twin Rogue Access Point Attack in 802.11 Wi-Fi Networks. 130-145 - Shihong Duan, Tianqing Yu, Jie He:
WiDriver: Driver Activity Recognition System Based on WiFi CSI. 146-156 - Babajide O. Ayinde, Hashim A. Hashim:
Energy-Efficient Deployment of Relay Nodes in Wireless Sensor Networks Using Evolutionary Techniques. 157-172 - Wenbo Wang, Zhanyou Ma, Jian Cao, Zhe Wang:
Analysis of Half-Asleep and Wakeup Strategy in Wireless Mesh/Relay Networks with Double-State Channel. 173-185 - K. Dharani Tejaswini, Vidhya Balasubramanian:
A Scalable and Hybrid Location Estimation Algorithm for Long-Range RFID Systems. 186-199 - Shama Siddiqui, Sayeed Ghani, Anwar Ahmed Khan:
PD-MAC: Design and Implementation of Polling Distribution-MAC for Improving Energy Efficiency of Wireless Sensor Networks. 200-208 - Kunxiao Zhou, Huaqiang Yuan, Zusheng Zhang, Xin Ao, Hui Zhao:
Joint Topology Control and Channel Assignment Employing Partially Overlapping Channels in Multirate Wireless Mesh Backbone. 209-220 - Yingying Zhang, Guiling Sun:
Stagewise Arithmetic Orthogonal Matching Pursuit. 221-228
Volume 25, Number 3, September 2018
- Zheng Xu, Yunhuai Liu, Xinrong Li:
Special Issue on Selected Technologies and Applications in Wireless Communications for Smart City Computing. 229-231 - Jun Wang, Yu Chen:
Research and Improvement of Wireless Sensor Network Secure Data Aggregation Protocol Based on SMART. 232-240 - Yinqing Tang, Feng Du, Xianming Fang:
Deadband Scheduling in Sensor Node and Controller Node for Wireless Networked Control Systems. 241-249 - Lulu Xie, Fangqin Xu:
The Research of User's Behavioural Decision on Intelligent Home Control and Sensing System. 250-257 - Peng Li, Baiyang Li, Jun Mou, Chunfeng Luo:
Chaos Synchronization of Complex Network Based on Signal Superposition of Single Variable. 258-268 - Jianwei Wang:
Structural Modeling and Performance Analysis of Rotary Circuit in Directional Drilling Rig Based on Load Sensing Technology. 269-278 - Feng Luo, Yueyin Xie:
Conformance Test of AUTOSAR Network Management. 279-288 - Hongying Luo:
A Distributed Management Method Based on the Artificial Fish-Swarm Model in Cloud Computing Environment. 289-295 - Jianhuan Su, Yinjun Zhang, Yinghui Li:
Iterative Learning Control for Network Data Dropout in Nonlinear System. 296-303 - Da-Zhi Huang, Zongjun Tian, Zhi-Dong Liu, Li-Da Shen, Ming-Bo Qiu:
Flow Field Simulation and Experimental Study of Friction Aided Jet-Electro-Deposition Based on the Wireless Information Networks. 304-313 - Jianhuan Su, Yinjun Zhang, Mengji Chen:
Power Line Communication with Network Transmission Data Loss Based on Learning Control. 314-322 - Wenwei Huang, Yun Ling, Weilong Zhou:
An Improved LEACH Routing Algorithm for Wireless Sensor Network. 323-331 - Hua Jiang, Jiarong Liang:
Intermittent Fault Diagnosability of Hyper Petersen Network. 332-339 - Youchan Zhu, Li Zhou:
An Compression Technology for Effective Data on Cloud Platform. 340-347 - Yongfei Ye, Suqin Feng, Minghe Liu, Xinghua Sun, Ting Xu, Xuming Tong:
A Safe Proactive Routing Protocol SDSDV for Ad Hoc Network. 348-357 - Hongchun Wang, Wensheng Niu:
A Review on Key Technologies of the Distributed Integrated Modular Avionics System. 358-369
Volume 25, Number 4, December 2018
- Ruoyu Zhang, Honglin Zhao, Chengzhao Shan, Shaobo Jia:
A Low Complexity Correlation Algorithm for Compressive Channel Estimation in Massive MIMO System. 371-381 - Ruoyu Zhang, Honglin Zhao, Chengzhao Shan, Shaobo Jia:
Correction to: A Low Complexity Correlation Algorithm for Compressive Channel Estimation in Massive MIMO System. 382 - Mohammad Zaeri-Amirani, Fatemeh Afghah, Jonathan D. Ashdown:
Optimal Relaying Beamforming in Multiple Access Broadcast Channel (MABC) Bidirectional Cognitive Radio Networks in Presence of Interferers. 383-398 - Basant Subba, Santosh Biswas, Sushanta Karmakar:
A Game Theory Based Multi Layered Intrusion Detection Framework for Wireless Sensor Networks. 399-421 - Christopher Boyd, Roope Vehkalahti, Olav Tirkkonen:
Interference Cancelling Codes for Ultra-Reliable Random Access. 422-433 - T. Divya Sai Keerthi, Pallapa Venkataram:
Honeypot Based Black-Hole Attack Confirmation in a MANET - Black-Hole Attack Confirmation. 434-448 - Mohammad Reza Mosavi, R. Zebarjad, Maryam Moazedi:
Novel Anti-spoofing Methods Based on Discrete Wavelet Transform in the Acquisition and Tracking Stages of Civil GPS Receiver. 449-460 - Seetaiah Kilaru:
Optimization of Three-Dimensional MIMO System with Vertical User Distribution. 461-469 - Shu Shen, Lijuan Sun, Yibo Dang, Zhiqiang Zou, Ruchuan Wang:
Node Localization Based on Improved PSO and Mobile Nodes for Environmental Monitoring WSNs. 470-479 - Yi Xu, Guiling Sun, Tianyu Geng, Ying Zhang:
A Two-Stage Fusing Method of Reconstruction Algorithms for Compressed Sensing. 480-487 - Jyotsna Verma, Nishtha Kesswani:
BIGM: A Biogeography Inspired Group Mobility Model for Mobile Ad Hoc Networks. 488-505
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.