default search action
Journal of Networks, Volume 9
Volume 9, Number 1, 2014
- Ameen Banjar, Pakawat Pupatwibul, Robin Braun:
DAIM: a Mechanism to Distribute Control Functions within OpenFlow Switches. 1-9 - Fang Zuo, Wei Zhang:
An Evolutionary Game-Based Mechanism for Routing P2P Network Flow among Selfish Peers. 10-17 - Yangyang Gao, Fei Song, Yajuan Qin:
IDDTL: A Novel Identified Internet Data Transport Layer Mechanism. 18-27 - Qingling Cai, Yiju Zhan, Jian Yang:
The Improvement of RFID Authentication Protocols Based on R-RAPSE. 28-35 - Hang Zhou:
An Upper Bound on the Coding Capacity of Matroidal Network Associated with R8. 36-41 - Stanislav Milanovic:
Case Study for a GPON Deployment in the Enterprise Environment. 42-47 - Jianjun Lang, Qigang Jiang:
Artificial Intelligence based Profit-Sharing Algorithm in Multi-Agent Systems. 48-55 - Bing Cheng:
Modified Particle Swarm Optimization for Hybrid Wireless Sensor Networks Coverage. 56-62 - Chunyu Miao, Lina Chen:
Infrastructure Communication Reliability for WSN on Cluster Topology and Tree Topology. 63-70 - Zhaoning Zhang, Ping Wang:
Computing Model of Airspace Utilization Rate Based on Airspace Load. 71-77 - Ligang Cai, Bo Xu, Jianwu Yang, Sen Zhang:
Parameters Tracking Differentiator based on the Fuzzy Control and Varied Sliding Mode. 78-84 - Yan Li, Zhiyong Zhang, Xiaohua Sun, Fushun Wang:
A Curvature-based Manifold Learning Algorithm. 85-91 - Jin Li:
Blow-up in the Parablic Problems under Nonlinear Boundary Conditions. 92-99 - Pinghui Zou, Yun Liu:
A Data-aggregation Scheme for WSN based on Optimal Weight Allocation. 100-107 - Yuhuan Cui, Jingguo Qu, Aimin Yang, Yamian Peng:
Fast Multipole Boundary Element Method of Potential Problems. 108-114 - Chunfeng Liu, Jingguo Qu, Yuhuan Cui, Aimin Yang:
Research on Potential Problem based on Singular Decomposition and Boundary FM-BEM Algorithm. 115-122 - Zhicheng Bian, Weijian Mi, Xiaoming Yang, Ning Zhao, Chao Mi:
Modified Hungarian Algorithm for Real-Time ALV Dispatching Problem in Huge Container Terminals. 123-130 - Xiaoxiang Han:
Mobile Node Deployment based on Improved Probability Model and Dynamic Particle Swarm Algorithm. 131-137 - Xuehua Zhao, Liping Shi:
DC Voltage Balance Control Strategy for Medium Voltage Cascaded STATCOM Based on Distributed Control. 138-146 - Guifeng Wang, Jianguo Jiang, Shutong Qiao, Lifeng Guo:
Research on the Multilevel STATCOM based on the H-bridge Cascaded. 147-152 - Mingxin Wu:
Inter-cell Interference Mitigation in Multi-cell Cooperating System Based on SLNR Method. 153-160 - Xiuchang Huang, Wei Su:
An Improved K-means Clustering Algorithm. 161-167 - Xiaolong Huang:
Target Localization Based on Improved DV-Hop Algorithm in Wireless Sensor Networks. 168-175 - Kun Jiang, Li Yao, Juan Feng:
Wireless Sensor Networks Target Localization Based on Least Square Method and DV-Hop Algorithm. 176-182 - Shyi-Ching Liang, LunHao Liao, Yen-Chun Lee:
Localization Algorithm based on Improved Weighted Centroid in Wireless Sensor Networks. 183-189 - Zhenyu Shu, Dianhong Wang, Cheng Zhou:
Road Geometric Features Extraction based on Self-Organizing Map (SOM) Neural Network. 190-197 - Nan Chen, Rui Jiang:
Security Analysis and Improvement of User Authentication Framework for Cloud Computing. 198-203 - ChengGang Liu, Zhenhong Jia, Xizhong Qin, Lei Sheng, Li Chen:
Improvement Priority Handoff Scheme for Multi-Service Wireless Mobile Networks. 204-209 - Chang-Peng Ji, Hong-Hong Ji, Wei-Ping Guo, Jun Wang:
APA with Evolving Order and Variable Regularization for Echo Cancellation. 210-215 - Min Liu, Ying Li:
Global Trust Value Grading Calculation Method in P2P Network. 216-222 - Xianwen Wu, Zhiliang Xue, Jingwen Zuo:
The PeerBehavior Model based on Continuous Behavioral Observation P2P Network Neighbors. 223-230 - Liangyu Luan, Yingfang Fu, Peng Xiao:
Access Authentication Scheme Based on Authorized Certificate in Wireless Mesh Networks. 231-237
Volume 9, Number 2, 2014
- Taha Sochi:
Testing the Connectivity of Networks. 239-243 - Jianqi Li, Fuwen Wang, Xiaofeng Li, Binfang Cao, Zhen Tan:
Wireless Monitoring System Based on the Non-uniform Stratified WSN in Viticulture. 244-251 - Jingyu Chen, Ping Chen:
Sequential Pattern Mining for Uncertain Data Streams using Sequential Sketch. 252-258 - Amjad Ali, Huiqiang Wang, Hongwu Lv, Xiaoming Chen:
Asynchronous Session Reservation Multi-Channel MAC for Ad Hoc Networks. 259-268 - Guikai Liu, Qing Li:
Fair and Efficient Packet Scheduling Using Resilient Quantum Round-Robin. 269-276 - Kun Mu, Li Li:
An Efficient Pairwise Key Predistribution Scheme for Wireless Sensor Networks. 277-282 - Ruijuan Zheng, Wangyang Wei, Mingchuan Zhang, Qingtao Wu, Dan Zhang:
Network Security Situation Evaluation Strategy Based on Cloud Gravity Center Judgment. 283-290 - Guang Jin, Qian Wang, Xianliang Jiang:
A New Stateless Packet Classification and Filter against DoS Attacks. 291-296 - Abdallah Al Sabbagh, Robin Braun, Mehran Abolhasan:
Intelligent Hybrid Cheapest Cost and Mobility Optimization RAT Selection Approaches for Heterogeneous Wireless Networks. 297-305 - Jianwei Zhang, Wei Xing, Yongchao Wang, Dongming Lu:
LR2: Improving Push-Based Live Streaming and File Sharing in Peer-to-Peer Network. 306-314 - Quan Liu, Huachen Liu, Wenjun Xu:
TCP-Adaptive in High Speed Long Distance Networks. 315-322 - Yi Ding:
Joint Optimization of Asymmetry and Diversity of Bit-Interleaved Space-Time code. 323-327 - George Adam, Christos Bouras, Apostolos Gkamas, Vaggelis Kapoulas, Georgios Kioumourtzis:
Cross Layer Design for Video Streaming in MANETs. 328-338 - Ling Xing, Ling Jiang, Guohai Yang, Bin Wen:
A Novel Trusted Computing Model for Network Security Authentication. 339-343 - Guofeng Yan, Yuxing Peng, Ying Hu, Junyi Liu:
Effective Hierarchical Routing Algorithm for Large-scale Wireless Mobile Networks. 344-352 - Zuojie Deng, Xiaolan Tan:
Overload Control for the Wireless Intelligent Network. 353-359 - Tingting Yang, Zhonghua Sun, Chengming Yang:
Towards Resource Allocation Algorithm in Opportunistic Relaying Cooperative UWB Communication System. 360-366 - Mei Peng, Huajian Mou:
A Novel Computer Virus Model and Its Stability. 367-374 - Qingjia Huang, Kai Shuang, Peng Xu, Jian Li, Xu Liu, Sen Su:
Prediction-based Dynamic Resource Scheduling for Virtualized Cloud Systems. 375-383 - Xi Chen:
Semi-Supervised Classification Method Based on Spectral Clustering. 384-392 - Fucai Wang, Bingrong Li, Luping Zhou:
Routing Strategy Based on Local Density Sensing in Delay Tolerant Network. 393-399 - Xu Chang:
Compressible Data Fusion Based on Minimum Energy Consumption in Wireless Sensor Network. 400-408 - Xiao-yong Chen, Hui Gu, Zhi-juan Peng:
Iterative Detecting and Decoding Based on VBLAST of LDPC in Coded Cooperation System. 409-414 - Xiang Zhou, Xiaoqiang Liu:
Multiple Computing Task Scheduling Method Based on Dynamic Data Replication and Hierarchical Strategy. 415-422 - Yuhuan Cui, Jingguo Qu, Hongbo Shao, Aimin Yang, Yamian Peng:
Research on Elasto-plastic Contact with Friction Multipole BEM and Rolling Process. 423-429 - Jingguo Qu, Yuhuan Cui, Chunfeng Liu, Aimin Yang:
Adaptive Boundary Elements and Error Estimation for Elastic Problems. 430-436 - Geng Sui, Hong Qiao:
Emotional Tendency Contrast Recommendation Algorithm Based on Cloud Model. 437-442 - Xuan Huang, Zhijun Song:
Clustering Analysis on E-commerce Transaction Based on K-means Clustering. 443-450 - Liping Wang:
Channel Estimation and Combining Orthogonal Pilot Design in MIMO-OFDM System. 451-457 - Huabei Nie, Jianqiao Shen, Xiaoping Li:
Research on Glowworm Swarm Optimization with Ethnic Division. 458-465 - Jun Zhang, Da-Yong Luo:
Analysis of Time Delay and Packet Dropouts Based on State Observer for a Kind of Networked Control System. 466-473 - Cai-xia Wang:
Clustering Model Based on Improved LEACH Algorithm in Sensor Network. 474-480 - Yong Jin, Peng Ruan:
Adaptive Cooperative FEC Based on Combination of Network Coding and Channel Coding for Wireless Sensor Networks. 481-487 - Hongbo Zhao, Lina Feng:
An Improved Adaptive Dynamic Particle Swarm Optimization Algorithm. 488-494 - Zhibo Wang, Hui Tian, Nannan Chen:
Reliability Improvement Using Power Control in Device-to-Device Networks. 495-500 - Nianyi Wang, Yide Ma, Weilan Wang, Shijie Zhou:
An Image Fusion Method Based on NSCT and Dual-channel PCNN Model. 501-506 - Chaoyu Yang, Minli Song:
Access Path Planning of Mobile Agent in Wireless Sensor Networks. 507-514 - Weiwei Zhang, Yongyu Chang, Yitong Liu, Atif Hameed, Yuan Tian:
Study on the QoE for VoIP Networks. 515-522
Volume 9, Number 3, 2014
- Kazeem I. Rufai, Ravie Chandren Muniyandi, Zulaiha Ali Othman:
Improving Bee Algorithm Based Feature Selection in Intrusion Detection System Using Membrane Computing. 523-529 - Ittipong Khemapech:
Power Preservation Friendly Congestion Control. 530-540 - Jiagao Wu, Hang Yuan, Ying He, Zhiqiang Zou:
ChordMR: A P2P-based Job Management Scheme in Cloud. 541-548 - Anbao Wang, Bin Zhu:
An Improved Algorithm of the Node Localization in Ad Hoc Network. 549-557 - Fannian Meng, Quanlin Dong, Xintao Xia:
True Value Estimation of Centrifugal Fan Vibration Data Based on Fusion Method. 558-564 - Tongguang Zhang:
QoS-aware Web Service Selection based on Particle Swarm Optimization. 565-570 - Xiangyang Luo, Lin Yang, Dai Hao, Fenlin Liu, Daoshun Wang:
On Data and Virtualization Security Risks and Solutions of Cloud Computing. 571-581 - Yingqiang Ding, Dongsheng Yang, Gangtao Han:
Multidimensional Scaling-Based Localization Algorithm for Wireless Sensor Network with Geometric Correction. 582-587 - Somia Natouri, Chidung Lac, Ahmed Serhrouchni:
A Model-Based Resilience Analysis for IMS. 588-603 - Zhijun Wu, Yi Cui, Meng Yue, Lan Ma, Lu Wang:
Cross-correlation Based Synchronization Mechanism of LDDoS Attacks. 604-611 - Shailendra Shukla, Rajiv Misra:
Angle Based Double Boundary Detection in Wireless Sensor Networks. 612-619 - Hongyu Li, Yuxin Wang, Jiazheng Yuan:
The Calculation of QoS Aggregation Functions for Composite Web Services. 620-628 - Bayu Kanigoro, Andreas Calvin Gotandra, Yansen Jayawinata, Ricky:
Mobile Ad-Hoc Network Based Child Monitoring with DSDV Routing. 629-634 - Abdallah Al Sabbagh, Robin Braun, Mehran Abolhasan:
Performance Analysis of the Intelligent Mobility Optimization CRRM Approach Using a Markovian Chain Model. 635-644 - Xiaolu Zhang, Liang Hu, Shinan Song, Zhenzhen Xie, Xiangyu Meng, Kuo Zhao:
Windows Volatile Memory Forensics Based on Correlation Analysis. 645-652 - Shuona Xu, Biqing Zeng:
Network Traffic Prediction Model Based on Auto-regressive Moving Average. 653-659 - Junjie Peng, Rong Shen:
An Optical Tri-valued Computing System. 660-665 - Jing Peng:
A New Model of Data Protection on Cloud Storage. 666-671 - Yu Liu, You He, Kai Dong, Haipeng Wang:
Fuzzy Binary Track Correlation Algorithms for Multisensor Information Fusion. 672-681 - Li Li, Hui Song, Jianya Chen:
Self-Adaptive Genetic Algorithm for LTE Backhaul Network. 682-688 - Mu Zhang:
Optimization of Inter-network Bandwidth Resources for Large-Scale Data Transmission. 689-694 - Weijia Lu:
Parameters of Network Traffic Prediction Model Jointly Optimized by Genetic Algorithm. 695-702 - Zhijun Hu, Hongbin Wang, Huibin Zhang:
Bandwidth Allocation Algorithm of Heterogeneous Network. 703-710 - Shihua Cao, Qihui Wang, Yaping Yuan, Junyang Yu:
Anomaly Event Detection Method Based on Compressive Sensing and Iteration in Wireless Sensor Networks. 711-718 - Na Lu, Caiwu Lu, Zhen Yang, Yishuang Geng:
Modeling Framework for Mining Lifecycle Management. 719-725 - Li Shu, Ke-wei Cheng, Xiaowen Zhang, Jiliu Zhou:
Periodic Sweep Coverage Scheme Based on Periodic Vehicle Routing Problem. 726-732 - Jin Li:
Blow-up in the Parabolic Problems under Nonlinear Boundary Conditions. 733-738 - Jiayou Luo, Xingqun Zhan:
Characterization of Smart Phone Received Signal Strength Indication for WLAN Indoor Positioning Accuracy Improvement. 739-746 - Yuxiang Li, Changquan Ren, Jingyi Bo, Qianying Cai, Yanrong Dong:
The Application of GMKL Algorithm to Fault Diagnosis of Local Area Network. 747-753 - Biqiang Yu, Wei Li, Ming Zhang:
Redundancy Transmission System Based on Multidisciplinary Object Compatibility Design Optimization. 754-761 - Hua Sun:
Congestion Control Based on Reliable Transmission in Wireless Sensor Networks. 762-768 - Teng Geng, Fu Xu, Han Mei, Wei Meng, Zhibo Chen, Changqing Lai:
A Practical GLR Parser Generator for Software Reverse Engineering. 769-776 - Yongxia Li:
Networked Analysis Approach of Supply Chain Network. 777-784 - Yuan Sun:
Optimal Scheduling Algorithm in Vehicular Real Time System. 785-792 - Kai Huang, Fujiang Jin:
An Improved Signal Detection Algorithm of LTE System in Interference Environment. 793-798 - Hai Shen, Yunlong Zhu:
Adaptive Bacterial Foraging Optimization Algorithm Based on Social Foraging Strategy. 799-806
Volume 9, Number 4, 2014
- Keiichiro Tsukamoto, Masato Ohtani, Yuki Koizumi, Hiroyuki Ohsaki, Kunio Hato, Junichi Murayama:
Virtual Content-Centric Networking. 807-815 - Xiao Ma:
Adaptive Distributed Load Balancing Routing Mechanism for LEO Satellite IP Networks. 816-821 - Wanni Liu, Long Zhang, Yanping Li:
A Noise-Correlated Cancellation Transmission Scheme for Cooperative MIMO Ad Hoc Networks. 822-827 - Yousef Dashti, Martin Reisslein:
CluLoR: Clustered Localized Routing for FiWi Networks. 828-839 - Daudi S. Simbeye, Shi-Feng Yang:
Water Quality Monitoring and Control for Aquaculture Based on Wireless Sensor Networks. 840-849 - Jie Ma, Jinlong E:
An NFC-based Scenic Service System. 850-858 - Qiuling Yang, Zhigang Jin, Xiangdang Huang:
Research on Delay and Packet Loss Control Mechanism in Wireless Mesh Networks. 859-865 - Song Zha, Jijun Huang, Ning Li:
Compressed Wideband Spectrum Sensing with Partially Known Occupancy Status by Weighted l1 Minimization. 866-873 - Yulong Wang, Rui Sun:
An IP-Traceback-based Packet Filtering Scheme for Eliminating DDoS Attacks. 874-881 - Rong Chai, Bin Yang, Li Cai, Xizhe Yang, Qianbin Chen:
Multi-Object Optimization Based RV Selection Algorithm for VCN. 882-888 - Zhihua Li, Bin Lian, Zhongcheng Wei, Liang Xue, Jijun Zhao:
The Effect of MAC Parameters on Energy Efficiency and Delay in Wireless Sensor Networks. 889-895 - Yanpeng Ma, Xiaofeng Wang, Jinshu Su, Chunqing Wu, Wanrong Yu, Baokang Zhao:
A Multicast Routing Algorithm for Datagram Service in Delta LEO Satellite Constellation Networks. 896-907 - Sri Wahjuni, Anak Agung Putri Ratna, Kalamullah Ramli:
Bandwidth Consumption Efficiency Using Collective Rejoin in Hierarchical Peer-To-Peer. 908-913 - Yuhuai Wang, Hong Jia, Xiaojing Zhu:
A Method of Case Retrieval for Web-based Remote Customization Platform. 914-920 - Sheng Zhong, Chun Yang, Jian Zhang:
Symbol Timing Estimation with Multi-h CPM Signals. 921-926 - Jianyun Lei, Yanhong Li:
Vector-Based Sensitive Information Protecting Scheme in Automatic Trust Negotiation. 927-931 - Yi Tian:
An Improved Byzantine Fault-tolerant Program for WSNs. 932-940 - Pei Zhang, Lu Feng:
EESA Algorithm in Wireless Sensor Networks. 941-947 - Gan Yan, Yuxiang Lv, Qiyin Wang, Yishuang Geng:
Routing Algorithm Based on Delay Rate in Wireless Cognitive Radio Network. 948-955 - Yuting Lu, Weiyang Wang:
Energy Hole Solution Algorithm in Wireless Sensor Network. 956-963 - Wenhua Huang, Yishuang Geng:
Identification Method of Attack Path Based on Immune Intrusion Detection. 964-971 - Yuanyuan Zhao, Qian Chen:
Online Order Priority Evaluation Based on Hybrid Harmony Search Algorithm of Optimized Support Vector Machines. 972-978 - Xianwang Li, Yuchuan Song, Ping Yan, Xuehai Chen:
Framework and Modeling Method for Heterogeneous Systems Information Integration Base on Semantic Gateway. 979-985 - Yu Wang, Zhiqiang Wu, Xin-hua Zhu:
Satellite Formation based on SDDF Method. 986-992 - Cui Cheng:
Heterogeneous Web Data Extraction Algorithm Based On Modified Hidden Conditional Random Fields. 993-999 - Zimao Li, Wenying Xiao:
Nearly Optimal Solution for Restricted Euclidean Bottleneck Steiner Tree Problem. 1000-1004 - Ying Wang, Xinguang Peng, Jing Bian:
Computer Crime Forensics Based on Improved Decision Tree Algorithm. 1005-1011 - Zhenhua Xu:
Demand-oriented Traffic Measuring Method for Network Security Situation Assessment. 1012-1019 - Lin Gong, Dingjun Hu:
Visual Simulation of Explosion Effects Based on Mathematical Model and Particle System. 1020-1026 - Kan Luo, Hua Wang, Shyi-Ching Liang:
Reliable Transmission Protocol based on Network Coding in Delay Tolerant Mobile Sensor Network. 1027-1032 - Hongxue Yang, Lingling Xuan:
Routing Optimization Based on Taboo Search Algorithm for Logistic Distribution. 1033-1039 - Hua Guo, Sheng-Wen Yu, Douglas J. Leith:
Opportunistic Cooperative Reliable Transmission Protocol for Wireless Sensor Networks. 1040-1046 - Jianning Yang, Kun Lin, Xie Zhao:
An Improved Channel Estimation Method based on Jointly Preprocessing of Time-frequency Domain in TD-LTE System. 1047-1054 - Dongfeng Xu:
Dynamic Routing Algorithm Based on the Channel Quality Control for Farmland Sensor Networks. 1055-1060 - Keqiang Yue, Lingling Sun, Bin You, Shengzhou Zhang:
DCSK Multi-Access Scheme for UHF RFID System. 1061-1066 - Xiaosong Wu, Xingshu Chen, Haizhou Wang:
An Effective Scheme for Performance Improvement of P2P Live Streaming Systems. 1067-1073
Volume 9, Number 5, 2014
- Giorgos Adam, Christos Bouras, Ioannis Kalligeros, Kostas Stamos, Giannis Zaoudis:
Multi-domain Information Exchange in a Bandwidth on Demand Tool. 1075-1085 - Hongli Zhang, Panpan Li, Zhigang Zhou, Junchao Wu, Xiang-Zhan Yu:
A Privacy-aware Virtual Machine Migration Framework on Hybrid Clouds. 1086-1095 - Liya Xu, Chuanhe Huang, Jinhai Wang, Junyu Zhu, Lianzhen Zhang:
An Efficient Traffic Geographic Static-Node-Assisted Routing in VANET. 1096-1102 - Fangmin Sun, Zhan Zhao, Zhen Fang, Lidong Du, Zhihong Xu, Diliang Chen:
A Review of Attacks and Security Protocols for Wireless Sensor Networks. 1103-1113 - Jia-Ning Luo, Ming-Hour Yang:
An Efficient Offline Delegation Protocol in Mobile RFID Environment. 1114-1120 - Muhammad Zubair, Xiangwei Kong, Saeed Mahfooz:
Secure Session Mobility using Hierarchical Authentication Key Management in Next Generation Networks. 1121-1131 - Dengyin Zhang, Min Yang, Lei Cui:
Congestion Control Strategy for Opportunistic Network Based on Message Values. 1132-1138 - Aihan Yin, Hongchao Liang, Ming Zhu:
Authentication Protocol using MYK-NTRUSign Signature Algorithm in Wireless Network Environment. 1139-1144 - Huanliang Xu, Duo Li, Jianhua Che, Haoyun Wang:
Cooperative Localization Algorithm based on Coverage Optimization of Actors for Wireless Sensor and Actor Networks. 1145-1156 - Mande Xie:
The Optimal Partition Algorithm for Multiple Video Sequences in Streaming Media System. 1157-1162 - Yi Xu, Yixian Yang, Yang Xin, Hongliang Zhu:
An Improved Directed Diffusion Protocol based on Opportunistic Routing. 1163-1168 - Jinzhi Lin, Ying Wu, Gongyi Wu, Jingdong Xu:
An Adaptive Approach for Multi-Agent Formation Control in MANET Based on CPS Perspective. 1169-1177 - Jinping Liu, Gang Zhu, Bo Cheng, Shengfeng Xu:
Optimal-sampling Active Interference Cancellation under the Minimax Criterion. 1178-1182 - Lin Xue, Cheng Cui, Suman Kumar, Seung-Jong Park:
Impact of Queue Management Schemes and TCP Variants on the Performance of 10Gbps High Speed Networks: An Experimental Study. 1183-1192 - Daming Gu:
Uncertain Networks Optimization Based on Random ADD Algorithm. 1193-1200 - Jianbin Xiong, Qinhua Zhang, Guoxi Sun, Zhiping Peng, Qiong Liang:
Fusion of the Dimensionless Parameters and Filtering Methods in Rotating Machinery Fault Diagnosis. 1201-1207 - Wenqing Fan, Xue Lei, Jing An:
Obfuscated Malicious Code Detection with Path Condition Analysis. 1208-1214 - Wen Zhong, Zhuoying Tan, Xiaojun Wang, Jin Wang, Tianshou Hu:
Numerical Simulation of Stability Analyzing for Unsaturated Slope with Rainfall Infiltration. 1215-1222 - Zheng Guan, Hongwei Ding, Wenhua Qian:
Delay Analysis of an Enhancing IEEE 802.11 Point Coordination Function MAC Protocol. 1223-1228 - Degui Zeng, Yishuang Geng:
Content Distribution Mechanism in Mobile P2P Network. 1229-1236 - Shenghan Zhou, Wenbing Chang:
Research of Network System Reconfigurable Model Based on the Finite State Automation. 1237-1244 - Jian Xu:
KSC Centralized Index Model in Complex Network. 1245-1251 - Xianwang Li, Yuchuan Song, Ping Yan, Xuehai Chen:
Network Topology Connection Optimization Control Algorithm Based on Network Efficiency and Average Connectivity. 1252-1259 - Yuan Gao, Na Zhen, Nan Hao, Yuanqing Liu:
Impulsive Neural Networks Algorithm Based on the Artificial Genome Model. 1260-1267 - Yan Zhang, Fengfan Yang, Guobing Hu:
LDPC Coded Combined with Space-Time Codes in Cooperative MIMO System. 1268-1273 - Liang He:
An Improved Intrusion Detection based on Neural Network and Fuzzy Algorithm. 1274-1280 - Liwei Deng:
Traffic Load Constrained Routing Algorithm for Wireless Sensor Networks. 1281-1286 - Huiqiang Wang, Yanqiu Xing, Weilian Sun:
Study on Measuring System of Casing Machine Based on PLC. 1287-1294 - Pengfei Zhang, Xiang-Yang Li, Lei Ma:
Grid Computing based on Game Optimization Theory for Networks Scheduling. 1295-1300 - Jian-xin Zhu, Gihwan Cho:
Broadcast Networks based on the Virus Evolutionary Algorithm. 1301-1308 - Qihui Wang, Lidong Wang, Kang An, Zhouxiang Shou, Huixi Zhang:
DOA Estimation of Smart Antenna Signal Based on MUSIC Algorithm. 1309-1316 - Dali Li:
Complexity Measurement of Large-Scale Software System Based on Complex Network. 1317-1324 - Wei Wang, Zi-Jing Zhang:
Design of Digital Synthesis Filters for Hybrid Filter Bank A/D Converters Using Semidefinite Programming. 1325-1332 - Fu-gui He, Yanping Zhang, Xiancun Zhou, Renjin Liu, Ling Zhang:
Multi-granularity-based Routing Algorithm for Dynamic Networks. 1333-1338 - Wenjing Zhang, Donglai Ma, Wei Yao:
Medical Diagnosis Data Mining Based on Improved Apriori Algorithm. 1339-1345 - Hui Nie, Bo Liu, Pumo Xie, Zhenbing Liu, Huihua Yang:
A Cuckoo Search Algorithm for Scheduling Multiskilled Workforce. 1346-1353 - Meng Wang, Jianfeng Teng, Erlin Liu:
Global Exponential Synchronization of Delayed BAM Neural Networks. 1354-1360
Volume 9, Number 6, 2014
- Rosario Culmone:
Light Routing Algorithm for Utility Networks. 1361-1367 - Huamei Xin, Fangzhen Cheng, Dapeng Zhang:
MPSK Symbol-based Soft-Information-Forwarding Scheme in Rayleigh Fading Channels. 1368-1373 - Hao Zhang, Lingwei Xu, Chunlei Wu, Jingjing Wang, T. Aaron Gulliver:
On the Capacity of Spatially Correlated MIMO Channels in a 60 GHz Indoor Environment. 1374-1379 - Zhicai Shi, Yongxiang Xia, Fei Wu, Jian Dai:
The Discretization Algorithm for Rough Data and Its Application to Intrusion Detection. 1380-1387 - Coskun Cetinkaya:
Achieving per Node Throughput Fairness in a Single-Branch of Mesh Networks. 1388-1398 - Chunhong Zhang, Yaxi He:
Network Coordination Algorithm Based on Distributed Probability Matrix Factorization. 1399-1408 - Yunfeng Yang, Hao Jin:
Ratio Tests for Persistence Change with Heavy Tailed Observations. 1409-1415 - Xiaoguo Zhang, Wei Ding:
Flow-aggregation Accelerating Strategy for TCP Traffic. 1416-1425 - Tian Shen, Zairong Tian:
Utility-based joint Power and Rate Control Game with Interference Threshold Elasticity for Cooperative Cognitive Networks. 1426-1431 - Boqi Li, Chao Yang, Song Huang:
Study on Supply Chain Disruption Management under Service Level Dependent Demand. 1432-1439 - Lihua Zhang, Guangjie Liu, Yuewei Dai:
Network Packet Length Covert Channel Based on Empirical Distribution Function. 1440-1446 - Bo Yang:
A Scheme for Securing Traffic Transport among Autonomous Systems. 1447-1453 - Hai Fang, Quan Zhou, Xiaojun Li:
Robust Reversible Data Hiding for Multispectral Images. 1454-1463 - Chao Feng, Yang Xin, Hongliang Zhu, Yixian Yang:
A Weakly Homomorphic Encryption with LDN. 1464-1470 - Weimin Xie, Liejun Wang, Mingwei Wang:
A Bloom Filter and Matrix-based Protocol for Detecting Node Replication Attack. 1471-1476 - Yi Zhang, Li Yu, Liyue Wang:
High Access Performance Strategy for Next Generation Healthcare Networks. 1477-1484 - Sébastien Demmel, Alain Lambert, Dominique Gruyer, Grégoire S. Larue, Andry Rakotonirainy:
IEEE 802.11p Empirical Performance Model from Evaluations on Test Tracks. 1485-1495 - Yangguang Sun, Zhihua Cai:
An Improved Character Segmentation Algorithm Based on Local Adaptive Thresholding Technique for Chinese NvShu Documents. 1496-1501 - Wentao Zhang, Wenhua Zhao, Xinhui Du:
Short-term Forecast Technology in Load of Electrified Railway based on Wavelet-extreme Learning Machine. 1502-1508 - Rongrong Song, Zili Chen:
Design of PID Controller for Maglev System Based on an Improved PSO with Mixed Inertia Weight. 1509-1517 - Jun Shuai, Xuli Han:
New Basis Functions for Model Reduction of Nonlinear PDEs. 1518-1525 - Dong Zhao, Ming Zhu, Ming Xu:
Leveraging SDN and OpenFlow to Mitigate Interference in Enterprise WLAN. 1526-1533 - Junyong Tang, Haiyan Hao, Woundlss Y. Marden:
Aware Ant Routing Algorithm in Mobile Peer-To-Peer Networks. 1534-1541 - Xin Zhang, Zhanwen Wu:
Optimization Planning based on Improved Ant Colony Algorithm for Robot. 1542-1549 - Zhenduo Wang, Jing Wang, Weigang Cheng, Qi Zhang:
Local Linear Embedding Algorithm with Adaptively Determining Neighborhood. 1550-1557 - Fushun Wang, Bin Wang, Xiaohua Sun, Zhenjiang Cai:
Data Merging Method by Protecting Energy in Wireless Sensor Networks. 1558-1564 - Junya Lv:
An Improved Clustering Algorithm based on Intelligent Computing. 1565-1571 - Xinlei Li:
Improved Joint Probabilistic Data Association Method based on Interacting Multiple Model. 1572-1579 - Dongqi Lu, Zhonghao Dongye, Zichuan Wu, Lin Chen, Zheng Wei, Xinyu Si, Chao Wang:
Global Network Model based on Earth Grid and Cellular. 1580-1587 - Zhanjie Wang, Ting Fang:
Task Scheduling Model Based on Multi-Agent and Multi-Objective Dynamical Scheduling Algorithm. 1588-1595 - Hua Li, Zhenkui Wu, Jihong Zhang, Hanshan Li:
Wind-Solar-Storage Hybrid Micro grid Control Strategy Based on SVPWM Converter. 1596-1602 - Jun Tian:
Game-theory Model based on Carrier Sense Multiple Access Protocol in Wireless Network. 1603-1609 - Changchun Deng, Yongxia Li:
A New Optimization Model with Bee Colony Algorithm on Land-Use Network. 1610-1616 - Xiubin Zhu:
Face Representation with Local Gabor Phase Quantization. 1617-1623 - Yu Zhao, Yazi Wang, Gang Wang:
Network Anti-interference Technology Based on Hybrid Optimization Algorithm. 1624-1631 - Bo Xu, Ligang Cai, Jianwu Yang, Sen Zhang:
Application of Self-optimization Closed-Loop Input-shaping with Parameter of Chaotic Particle Swarm in Coaxial Drive Printing System. 1632-1639 - Ke Xu, Cui Wen, Qiong Yuan, Xiangzhu He, Jun Tie:
A MapReduce based Parallel SVM for Email Classification. 1640-1647 - Ying Wang, Fenfen Yang, Zhuolin Yan:
Design and Development of Decision Support System for Equipping Farm Machines. 1648-1655 - Hao Wang, Lei Wu:
Adaptively Anonymous Public-Key Broadcast Encryption Scheme without Random Oracle. 1656-1663
Volume 9, Number 7, 2014
- Keiichi Endo, Akinobu Imaoka, Dai Okano, Kaname Amano:
A Search Method Using Temporary Links for Unstructured P2P Networks. 1665-1673 - Anbao Wang, Bin Zhu:
Improving MPR Selection Algorithm in OLSR Protocol Based on Node Localization Technology. 1674-1681 - Nitul Dutta, Iti Saha Misra, Kushal Pokhrel, Mrinal Kanti Ghose:
Performance Analysis of Multilayer MIPv6 Architecture through Experimental Testbed. 1682-1691 - Quan Liang, Jiu-mei Liang, Fumin Zou:
The Resource Configuration Method with Lower Energy Consumption Based on Prediction in Cloud Data Center. 1692-1700 - Yecai Guo, Tao Yuan, Xiuzai Zhang:
Satellite Channel Markov Model of Ka-band based on Principal Component. 1701-1706 - Bo Yang:
A Lightweight Scheme for Protecting AS-PATH Attributes of Update Messages. 1707-1713 - Xianfan Xu, Fan Guo, Dawei Ding, Sen Qiu, Kun Zhang, Haixu Zhang:
Nonlinear Dynamics in High-speed Wireless Networks Congestion Control Model with TCP LogWestwood+ under RED. 1714-1720 - Yun He, Zhongyang Xiong, Xiaolin Tan:
Optimal Rate Allocation for ISP-friendly P2P VoD Systems. 1721-1731 - Nur Arzilawati Md Yunus, Mohamed Othman:
Reliability Evaluation and Routing Integration in Shuffle Exchange Omega Network. 1732-1737 - Kai Liu, Guang Jin, Daheng Rao, Jiaming He, Xianliang Jiang:
A Participation-Based Trust Model for Mobile P2P Networks. 1738-1746 - Changxiao Zhao, Zheng Li, Ying Xiong:
An Energy-efficient MAC Protocol with Delay-bounded Downlink Traffic Scheduling Strategy for 802.11 Wireless LANs. 1747-1755 - Chun-Hui Wu, Qin Li, Chuan Lin:
New Identity-based Key-exposure Free Chameleon Hash from Bilinear Pairings. 1756-1763 - Yong Lan, Bo Zhang, Zhicheng Chen:
QoS Performance Analysis for Slotted CSMA/CA in IEEE802.15.4. 1764-1769 - Fei Wang, Xiaofeng Liao, Songtao Guo:
A Newton-Like Optimal Resource Allocation Algorithm and its Convergence for Wireless Ad Hoc Networks. 1770-1782 - Ye Li, Yan Chen:
An improved Genetic Algorithm of Bi-level Coding for Flexible Job Shop Scheduling Problems. 1783-1789 - Nan Jiang, Yan Guo, Yueshun He:
A Local-world Evolving Model for WSNs with the Self-regulating Attractiveness. 1790-1797 - Yao-Hsu Tsai, Chieh-Heng Ko, Kuo-Chung Lin:
Using CommonKADS Method to Build Prototype System in Medical Insurance Fraud Detection. 1798-1802 - Fang Wu, Dianhong Wang, Yong Wang:
Collaborative Nodes Strategy for Target Tracking in Two-tier Wireless Multimedia Sensor Networks. 1803-1810 - Yichao Zhou, Zhenmin Tang, Xiyuan Hu:
Fast Single Image Super Resolution Reconstruction via Image Separation. 1811-1818 - Shaojie Wen, Zhenyu Zhang, Wenzhong Yang, Siquan Hou:
An Energy-efficient Opportunistic Multicast Routing Protocol in Mobile Wireless Sensor Networks. 1819-1827 - Xing Liu, Kun Mean Hou, Christophe de Vaulx, Khalid El Gholami:
Real-time Embedded Java Virtual Machine for Application Development in Wireless Sensor Network. 1828-1837 - Jianzhong Zhou, Ji'an Li, Yongchuan Zhang:
Efficient Deployment Scheme Selection Based On TOPSIS for Clustering Protocols of WSN. 1838-1845 - Hao Wang, Lei Wu:
Unbounded Anonymous Hierarchical Identity-Based Encryption in the Standard Model. 1846-1853 - Chunhong Guo, Yu Zhou, Qingwei Ye, Xiaodong Wang:
A Zigbee and Bluetooth Protocol Converter Based on Multi-sinks Wireless Sensor Network. 1854-1860 - Ke Xiao, Haiying Jiang, Yuanyao Lu:
A Physical Layer Scheme in Two-Way Relay Networks with Soft Network Coding. 1861-1867 - Han Yan, Zhihong Zou:
Water Quality Evaluation Based on Entropy Coefficient and Blind Number Theory Measure Model. 1868-1874 - Pu Wang, Liying Fang, Lei Yu:
Research on Application of Improved Smart Data Aggregation Algorithm in Wireless Sensor Network. 1875-1882 - Xinlei Li, Di Li:
A Network Attack Model based on Colored Petri Net. 1883-1891 - Gang Ni, Bixi Zhang, Pangpang Wu:
Layered Workflow Process Model Based on Extended Synchronizer. 1892-1899 - Qiang Xian, Wanting Zhang:
Adaptive Localization Algorithm Based on Distributed Compressed Sensing in Wireless Sensor Networks. 1900-1907 - Xuequan Tian, Yi Yang, Hongke Wang:
Oscillation Criteria for Damping Quasi-Linear Neutral Differential Equations with Distributed Deviating Arguments. 1908-1913 - Zhuo Zhang, Qinruo Wang, Qiyu Yang, Cheng Zhang:
Study on Network Remote Controlling Huge-Power Chopping Cascade Speed Regulation System Based on State-Space Averaging Model. 1914-1920 - Wenjing Xu:
Vehicle Travel Time Predication based on Multiple Kernel Regression. 1921-1926 - Xuebing Dai, Yan Zhang, Chaojing Wang:
An Reliable Transmission Scheme Based on Opportunistic Cooperation for Wireless Body Sensor Networks. 1927-1934 - Yang Gao:
Wireless Sensor Network Adaptive Energy Optimization Clustering Algorithm based on Routing Rules. 1935-1940 - Yannan Yu, Rongfeng Yang, Jichi Yan, Chang Qu:
Research on Cascaded H-bridge SVG. 1941-1947 - Wenqing Ge, Yanjun Zhao, Bo Li, Binbin Sun:
Numerical Simulation of Electric Controlled Injection Device Equipped on Gas Fuel Engine. 1948-1954 - Yanli Hou:
Multiple-sensor Fusion Tracking Based on Square-root Cubature Kalman Filtering. 1955-1961 - Rui Ouyang, Miaochan Zhao:
Study on Signal Intersection Traffic Flow Characteristics in Ice Conditions. 1962-1969
Volume 9, Number 8, 2014
- Mohamed K. Watfa, Mohamed Moubarak:
A Benchmarking Tool for Wireless Sensor Network Embedded Operating Systems. 1971-1984 - Wei Wang, Hao Huang, Changsheng Xie, Lin Han:
CBSNTS: A Chaotic Based Security Network Transmission System. 1985-1992 - Zongjian He, Huijuan Zhang:
Density Adaptive Urban Data Collection in Vehicular Sensor Networks. 1993-2002 - Shiyu Du, Jiayin Qi:
Multi-agent Modeling and Simulation on Group Polarization Behavior in Web 2.0. 2003-2012 - Reza Adinehnia, Mohamed Othman:
Direction-based TCP Fairness Enhancement in High speed IEEE 802.11n. 2013-2020 - Heng Shao, Juan Li:
Research on Resource Sharing and Concurrency Access Based on E-learning Platform. 2021-2025 - Jun Xu, Yann-Hang Lee, Chengcheng Guo, Jianfeng Yang:
Resource Allocation in City-wide Real-Time Wireless Mesh Networks. 2026-2036 - Yufeng Xiao:
An Efficient Network Reliability Computation Method Based on Isomorphism Judgment. 2037-2044 - Hongxia Shi:
Adaptive Packet Context-Constrained KL-Divergence Model for Intrusion Detection. 2045-2050 - Chuan-Min Lee:
Remarks on the Complexity of Non-negative Signed Domination. 2051-2058 - Wei Li, Yan Wang:
Design and Implementation of Distance Learning Platform Based on Information Technology and Cloud Computing. 2059-2065 - Jinfeng Li, Jilong Bian, Limei Wang, Liu Yang:
Small Baseline Stereo Matching Method based on Maximum Likelihood Estimation. 2066-2071 - Hailiang Wang, Zhihui Ge, Taoshen Li:
E2-DLNA: An Improved Energy-Efficiency Mechanism for DLNA. 2072-2078 - Lijun Dong, Jinxia Wu, Cheng Gong, Benjie Pi:
A Network-Cliques Based Role Mining Model. 2079-2088 - Jemal H. Abawajy, Gleb Beliakov, Andrei V. Kelarev, Morshed U. Chowdhury:
Iterative Construction of Hierarchical Classifiers for Phishing Website Detection. 2089-2098 - Yi Liu, Tianri Wang, Mingzhong Yang:
Research on Concept Clustering of Order Task Ontology based on Modified PART. 2099-2105 - Jinmin Guo, Congshuang Luo:
Study on Application of Electromagnetic Tomography Advanced Geological Prediction in Tunnel Construction. 2106-2113 - Yi Han, Yuan Yao, Haiyang Liu:
Design and Implementation of Driving Behavior Analysis System. 2114-2120 - Guo Pan, Aijia Ouyang:
Medium and Long Term Power Load Forecasting using CPSO-GM Model. 2121-2128 - Nanli Zhu, Yibo Wang, Cheng Cheng, Wei Xu, Yongping Zhang, Ping Zou, M. S. K. Awan:
Regression-Based Microblogging Influence Detection Framework for Stock Market. 2129-2136 - Jiali Wang, Qingnian Zhang:
Model and Algorithm Design for Cargo Shipping Safety Based on Fuzzy- Precise Bayesian Network. 2137-2144 - Jian Zhang:
Adaptive Fault Diagnosis Method Based on FNN. 2145-2152 - Zhiqing Zheng:
Cooperative Networks Power Allocation Scheme for Two-Way Opportunistic Relaying. 2153-2160 - Xueqin Kou, Lichen Gu:
Research of Long Range Accurate Ranging Technology Based on Ultrasonic Sensor Measurement. 2161-2167 - Shaoxiong Zheng, Weixing Wang, Baoxia Sun, Gang Lei:
Design of a Gateway Based on Directional Antenna WSN in Paddy Field. 2168-2175 - Feng Liu, Xiaoxing Gao:
A New Construction of Pseudorandom Number Generator. 2176-2182 - Jianhui Lai, Yanyan Chen, Weiwei Zhang, Zhihong Chen:
Identification Method of Residence and Employment Locations Based on Cellular Phone Data. 2183-2188 - Gang Cao:
Secure and Efficient Electronic Auction Scheme with Strong Anonymity. 2189-2194 - Wei Liu, Shumei Yang:
Research on the Distribution of Attention in the Course of Maintenance Training. 2195-2202 - Yourui Huang, Jing Wang, Liguo Qu:
FPGA Implementation of Temperature Controller for PCR Based on Microfluidic Chip. 2203-2210 - Zhangbing Li, Zilan Zhu, Shaobo Zhang:
A Locking Mechanism for Distributed Database Systems. 2211-2217 - Hong Wu, Peng Lin, Kun Chen:
A Novel Frequency Offset Estimation Algorithm with Wide Range and High Accuracy for OFDM System. 2218-2223 - Jiamin Qi, Jiapin Chen, Yu Geng:
Unambiguous Synchronization Scheme for GNSS BOC(n, n) Signals. 2224-2231 - Jing Zhao:
Self-adaptive Particle Swarm Optimization Algorithm based on Directed-weighted Complex Networks. 2232-2238 - Xingjun Shi, Huibin Xu:
An Effective Scheme for Location Privacy in VANETs. 2239-2244 - Fushun Wang, Bin Wang, Xiaohua Sun, Zhenjiang Cai:
Data Merging Method by Protecting Energy in Wireless Sensor Networks. 2245-2251 - Xuefei Gao, Yongli An, Kaiyu Zhu:
2FSK Modem Based on the Microcontroller AT89C51. 2252-2258
Volume 9, Number 9, 2014
- Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury:
Automatic Generation of Meta Classifiers with Large Levels for Distributed Computing and Networking. 2259-2268 - Peipeng Liu, Lihong Wang, Qingfeng Tan, Quangang Li, Xuebin Wang, Jinqiao Shi:
Empirical Measurement and Analysis of I2P Routers. 2269-2278 - Lei Yang, Yifang Qin, Xu Zhou, Hongjia Li, Song Ci, Hui Tang:
Social Relation Based Cache Distribution Policy in Wireless Mobile Networks. 2279-2288 - Yang Li, Ying Sha, Jixi Shan, Bo Jiang, Jianjun Wu:
An Improved Community Partition Algorithm Integrating Mutual Information. 2289-2298 - Jikang Xia, Lan Chen, Ying Li, Endong Tong:
A Physical Layer Key Negotiation Mechanism to Secure Wireless Networks. 2299-2308 - Ahmed K. Elsherif, Chunming Tang, Lei Zhang:
Radar Detection Based on Fuzzy Hypotheses with Fuzzy Data. 2309-2318 - Bo Zeng, Yabo Dong:
A Collaboration-based Distributed TDMA Scheduling Algorithm for Data Collection in Wireless Sensor Networks. 2319-2327 - Weiting Gao, Hui Li:
A Blind Adaptive Kalman-PIC MUD Algorithm for the Multiple Access Communication Network. 2328-2335 - Meijuan Chen, Xiaorong Zhu, Hongbo Zhu:
Service Adaptively Medium Access Control Algorithm Based on Fuzzy Logical for Energy Harvesting Wireless Sensor Networks. 2336-2341 - Quazi Mamun, Ashfaqur Rahman:
A Robust Data Gathering Technique for Large Scaled Wireless Sensor Networks. 2342-2352 - Jian Zhou, Fan Yang, Ke Wang:
An Inverse Shortest Path Problem on an Uncertain Graph. 2353-2359 - Tingrui Pei, Yuxin Cao, Zhetao Li, Gengming Zhu:
Overlapping Community Detection by Local Community Gravitation in Social Networks. 2360-2364 - I. Chandra, K. Helenprabha:
Efficient Resource Allocation with QoS Guarantee on LTE-A Downlink Network Systems. 2365-2370 - Qi Yang, Yuebo Cao:
The value distribution of fm + a(f(k))n and normal families of meromorphic functions. 2371-2375 - Na Wang, Xiaogang Qi, Li Duan, Hua Jiang, Xiaofei Liu:
Clustering-based Routing Algorithm in Wireless Sensor Networks with Mobile Sink. 2376-2383 - Ji'an Li, Jianzhong Zhou, Yongchuan Zhang:
Cluster Head Selection Based on an Information Factor for Wireless Sensor Network Protocol. 2384-2391 - Mingyi Duan, Yajun Yang, Wei Wang:
An RFID Data and Location Parameter Joint Estimation Based on an Improved MCMC Method. 2392-2401 - Donglan Zou:
Research on the New Algorithm using Multi-Array Computation Signal Direction. 2402-2410 - Li Daniel, Xi Li, Ming-Jie Li, Jun Wang, Zheng-yu Huang:
Application of the Grey System Theory to Predict the Strength Retrogression of Concrete with Gangue Subjected to Corrosion by Sulphate. 2411-2416 - Wei Wang, Wei Wei, Jie Hu, Junting Ye, Qinghua Zheng:
Knowledge Unit Relation Recognition Based on Markov Logic Networks. 2417-2423 - Rui-hui Mu:
Node-Based Resource Optimization Algorithm of Wireless Network. 2424-2432 - Jincheng Huang, Huihui Xiang, Yaheng Zhang:
Stable AODV Routing Protocol with Energy-aware in Mobile Ad Hoc Network. 2433-2440 - Jun Gong, Manru Li:
Queuing Time Decision Model with the Consideration on Call Center Customer Abandonment Behavior. 2441-2447 - Fengxiang Wu:
A Novel Opportunistic Relay and Energy Efficient Power Allocation Algorithm in Cooperative Wireless Sensor Networks. 2448-2455 - Yajun Hou:
P2P Network Traffic Identification Based on Random Forest Algorithm. 2456-2461 - Yiping Zheng, F. Liu:
Filtering Network Spam Message using Approximated Logistic Regression. 2462-2467 - Liang Yuan, Chuan Cai:
An Improved Clustering Routing Algorithm in Wireless Sensor Network Based on ZigBee. 2468-2473 - Ningzhe Xing:
Optimization Algorithm of Power Communication Network Based on the Equivalent Network. 2474-2481 - Hongdong Zhang, Yuli Song:
Study on the Survival of Wireless Sensor Networks Based on Hierarchical Topology Control Method. 2482-2489 - Hengshan Zong, Guozhu Jia, Feng Jin, Jili Kong:
Evolutionary Game Analysis of Knowledge Sharing in Asymmetric Upstream and Downstream Enterprises of Supply Chain. 2490-2497 - Xingguang Liu, Zi John:
Active Mechanism Network Coding Algorithm based on Multi-channel Sensing. 2498-2503 - P. Ni, Y. L. Liu, Z. H. He:
A New Estimation Method for Burnout Point Parameters of Ballistic Missile Based on Closest Distance Method. 2504-2513 - Xiaohui Su, Tongxin Hu:
Flue Gas Analysis Based on Recursive Iteration Algorithm. 2514-2520 - Hui Hu, Zhongxiao Hao, Peng Guo, Xilong Qu:
Output Feedback Tracking Control Based on Neural Network for a Class of SISO Strict Feedback Nonlinear Systems. 2521-2528 - Yu Liu, Shihong Chen, Yunhua Wang:
SOFERS: Scenario Ontology for Emergency Response System. 2529-2535 - Dandan Cheng, Qingwei Ye, Yu Zhou, Xiaodong Wang:
A Compression Sampling System based on Sparse AR Model. 2536-2542 - Zhi Bai, Yigang He, Sainan Wang:
Research of RFID Tag Anti-collision Algorithm based on Binary Tree. 2543-2548 - Linqin Cai, Youdong Zhang, Jianrong Zhang, Binbin Liu:
Controller Design for Nonlinear Networked Control Systems with Time-varying Delay Based on T-S Fuzzy Model. 2549-2555 - Kete Wang, Lisheng Wang, Xinkao Liao, George Albert:
An Auto-Matching Model with Pattern Recognition Using Bayesian Classifier for Parallel Programming on A Multi-Core Processor. 2556-2566
Volume 9, Number 10, 2014
- Mohammad Ahmadinia, Hamid Alinejad-Rokny, Hojjatollah Ahangarikiasari:
Data Aggregation in Wireless Sensor Networks Based on Environmental Similarity: A Learning Automata Approach. 2567-2573 - Xiaoping Yang, Chunfeng Song, Jiwei Sun, Xiaojing Wang:
Simulation and Implementation of Adaptive Fuzzy PID. 2574-2581 - Ning Huang:
An Enhanced Hill Cipher and Its Application in Software Copy Protection. 2582-2590 - Lubos Matejka, Jindrich Skupa, Radek Strejc, Ladislav Pesicka, Jirí Safarík:
Dynamic Routing in Distributed File System. 2591-2597 - Fan Zhao, Jin Li:
Pedestrian Motion Tracking and Crowd Abnormal Behavior Detection Based on Intelligent Video Surveillance. 2598-2605 - Cheng Yuan, Xiaodong Wang, Shu-ming Xiong, Lijing Ma, Qishi Miu:
A Fair Data Transmission Strategy in Underwater Acoustic Sensor Networks. 2606-2614 - Cheng Wang, Zhicong Liang:
Android-based Vehicular Distributed Intelligent Video Collection System. 2615-2621 - Tianshu Wang, Gongxuan Zhang, Xichen Yang, Longxia Huang:
A New Architecture in Greenhouse Soil Solution Monitoring System Based on ZigBee Protocol. 2622-2628 - Song Yang, Feng Hu, Chaoshi Cai:
An Improved Tone Reservation Scheme Based Nearly Optimal Peak Reduction for Adaptive Amplitude Clipping. 2629-2632 - Giovanni B. Vece, Eros Mazza, Massimo Conti:
A System-Level Protocol-Based Methodology for Noise Analysis of Digital Networked Systems. 2633-2644 - Wei Feng, Haixia Wu:
Stability of Genetic Regulatory Networks with Interval Time-Varying Delays via Convex Combination Method. 2645-2654 - Yila Huang, Qiwei Lu, Yan Xiong:
Collaborative Outsourced Data Mining for Secure Cloud Computing. 2655-2664 - Lujuan Ma, Henry Leung, Deshi Li:
Hybrid TDMA/CDMA MAC Protocol for Wireless Sensor Networks. 2665-2673 - Dan Tang, Kai Chen, Xiaosu Chen, Huiyu Liu, Xinhua Li:
A New Collaborative Detection Method for LDoS Attacks. 2674-2681 - Jianqing Li, Weiming Wang, Chuanhuang Li, Julong Lan:
Research on the Function Consistency of the Network Element based on Atomic Capability Architecture. 2682-2689 - Li Zhou, Junshe An:
Research on Wireless MIL-STD-1553B Bus Based on Infrared Technology. 2690-2696 - Xueyan Zhou, Jing Yang, Zehong Lin, Yali Ji:
Research on the Spread Control of Unconfirmed Information after the Emergency Occurs based on the Topic Model. 2697-2701 - Shangfeng Mo, Yongjian Fan, Yinglong Li, Xiaoliang Wang:
Multi-Attribute Join Query Processing in Sensor Networks. 2702-2712 - Meihong Liu, Xingqun Zhan, Wei Li, Maolin Chen:
MSK-BCS Modulation for GNSS Radio Frequency Compatibility in C Band. 2713-2720 - Dongyi Ling, Shihai Wang, Bin Liu, Xiaoqi Xing:
Reliability Evaluation based on the AADL Architecture Model. 2721-2727 - Peiyi Shen, Liang Zhang, Juan Song, Hu Xu, Lianjie Qin, Wei Wei, Wenzheng Zhang, Bin Leng, Mengqi Zeng:
A Near-Infrared Face Detection and Recognition System Using ASM and PCA+LDA. 2728-2733 - Xiaoli Chen, Xiang Gu, Jinfeng Xu:
The Analysis of Information Architecture in Mobile Web Design. 2734-2742 - Hua Guan, Shi Ying, Chunwei Wang:
A Correctness Verification Approach of the BPEL Exception Handling CPN Model Based on Temporal Property. 2743-2750 - Jianjun Lang, Qigang Jiang:
Update Strategies of Global Statistics in Distributed Information Retrieval System. 2751-2757 - Xinchao Song, Yishuang Geng:
Distributed Community Detection Optimization Algorithm for Complex Networks. 2758-2765 - Liu Yang, Wei Wang:
FLAP: Flash-aware Prefetching for Improving SSD-based Disk Cache. 2766-2774 - Jianhui Cao, Yanlin Guo, Chunxiang Dong, Pengru Liu:
Personalized Recommendation for Digital Library using Gaussian Mixture Model. 2775-2781 - Xiaohong Chen, Xueli Fang:
The Micro Individual Characteristics in Non-motorized Traffic Mixed of Bicycles and Mopeds. 2782-2787 - Xiaoying Wang, Danqi Chen, Qingjie Liu, Ling Bai:
An Improvement Crypton Protocol with Higher Security Margin. 2788-2795 - Yonglong Tang:
A User Authentication Protocol based on Multiple Factors. 2796-2804 - Anyu Cheng, Xiaoyu Lin, Yongfu Li, Wei Xu:
Design and application of SAE J1939 communication protocol in electric vehicle. 2805-2812 - Xin Huang:
Construction Research of Computer Network System Security based on Distributed Intrusion Detection Technology. 2813-2820 - Cong Liao, Hongwu Huang, Xinye Wu:
Weighing Technology for High-Speed Moving Vehicle Based on Wireless Sensor Networks. 2821-2827 - Weiwei Wu, Hua Sun:
Network Topology Algorithm Based on Energy-consumption Optimization of Multi-hop Wireless Networks. 2828-2834 - Xiaomei Wang, Peng Yu, Xiaoyi Zhang, Liang Fan, Qiao Zhang:
A Forward Error-Tolerant Reassembly Method for Receiving Network Data. 2835-2842 - Hongquan Xue, Peng Zhang, Shengmin Wei, Lin Yang:
An Improved Immune Algorithm for Multi-objective Flexible Job-shop Scheduling. 2843-2850 - Jia Chen, Xian Huang:
Fault Detection of Remote Multimedia in Wireless Network Based on Fuzzy Neural Network. 2851-2857 - Guowei Wang, Guangming Xu, Manjun Xue:
Unified Identity Authentication between Heterogeneous Systems Based on LDAP and RBAC. 2858-2865 - Jinfeng Gao, Nannan Ruan:
Study on Reliable Control of Time-delay Switched Singular Systems. 2866-2873
Volume 9, Number 11, 2014
Guest Editorial
- Jemal H. Abawajy, Md. Rafiqul Islam:
Guest Editorial. 2875-2877
- Mamoun Alazab, Md. Shamsul Huda, Jemal H. Abawajy, Md. Rafiqul Islam, John Yearwood, Sitalakshmi Venkatraman, Roderic Broadhurst:
A Hybrid Wrapper-Filter Approach for Malware Detection. 2878-2891 - Juan Camilo Corena, Tomoaki Ohtsuki:
Pollution-Free Regenerating Codes With Fast Reconstruction Verification for Verifiable Cloud Storage. 2892-2904 - Naoya Kajiwara, Shinichi Matsumoto, Yuuki Nishimoto, Yoshiaki Hori, Kouichi Sakurai:
Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework. 2905-2913 - Quazi Mamun, Md. Rafiqul Islam, Mohammed Kaosar:
Anomaly Detection in Wireless Sensor Network. 2914-2924 - Belal Chowdhury, Morshed U. Chowdhury, Jemal H. Abawajy:
Securing a Smart Anti-counterfeit Web Application. 2925-2933 - Anwar Hossain Masud, Xiaodi Huang, Md. Rafiqul Islam:
A Novel Approach for the Security Remedial in a Cloud-based E-learning Network. 2934-2942 - Nabil Ghanmy, Lamia Chaari Fourati, Lotfi Kamoun:
Elliptic curve cryptography for WSN and SPA attacks method for energy evaluation. 2943-2950
- Lin Zhao, Zhibo Chen, Guodong Sun:
Dynamic Cluster-based Routing for Wireless Sensor Networks. 2951-2956 - Qiuyun Xiao, Zhihai Wu, Li Peng:
Fast Finite-Time Consensus Tracking of Second-Order Multi-Agent Systems with a Virtual Leader. 2957-2963 - Huafeng Wu, Su Nie, Junjun Li:
EA-COR: An Environment Adaptive Clustering Opportunistic Routing Protocol of WSN. 2964-2970 - Fang Wang, Yuanqing Qin, Tonghui Qian, Qi Zhang:
A Newton Iteration Based WSN Localization System in Underground Tunnels. 2971-2980 - Dan Tang, Kai Chen, Xiaosu Chen, Huiyu Liu, Xinhua Li:
A New Detection Method based on AEWMA Algorithm for LDoS attacks. 2981-2986 - Qingtao Wu, Min Cui, Mingchuan Zhang, Ruijuan Zheng, Ying Lou:
A Cloud Service Resource Classification Strategy Based on Feature Similarity. 2987-2993 - Diego Mendez, Miguel A. Labrador:
A General Framework for Participatory Sensing Systems. 2994-3004 - Yunlong Zhou, Chao Xu:
Hopf Bifurcation in a Dual Model of Internet Congestion Control System Using Dynamic Delayed Feedback. 3005-3014 - Guo H. Lei, Ting T. Liu, Wei Yang, Young-Il Kim:
A Peer-To-Peer Membership Management Protocol for Wireless Mesh Networks. 3015-3024 - Huqing Wang, Zhixin Sun:
Study on the Improvement of ELGamal Cryptosystem Based on Elliptic Curve. 3025-3029 - Yanru Xue, Min Liu, Feng Wang:
An Optimized Frequent Item Query Algorithm for Uncertain Streaming Data. 3030-3037 - Huazhu Wu, Changyou Wang, Chunguang Zhang:
Design of Servo Controller for Flying Shear Machine Based on ARM and FPGA. 3038-3045 - Lufeng Li:
Research on the Computer Recovery Technology based on the Motion Blurred Image. 3046-3052 - Qi Song, Shan Li, Ming-xiao Ma, Yan Zhu, Jun-she An:
System Design and Fault Tolerance Analysis of the Distributed Storage System with Solid State Recorder on Spacecraft. 3053-3060 - Juan Du, Yang Liu, Zhi-an Yi, E. P. Tracy:
Research on SVM Classification Algorithm Based on RS Attribute Reduction. 3061-3069 - Jingguo Qu, Yuhuan Cui, Xin Zhou:
Application of Infinitesimal Method in Determining the Best Shape of a Cake Pan. 3070-3076 - Yuhuan Cui, Jingguo Qu, Huancheng Zhang:
Modeling and Numerical Simulation of Cellular Automation Traffic Flow Model. 3077-3083 - Ningzhe Xing, Yutong Ji:
Research on Service Controlling Algorithm of Electric Power Communication Network based on QoS Traffic Recognition and Routing Optimization. 3084-3091 - Fu Xie, Fangai Liu:
Dynamic Effective Resource Allocation Based on Cloud Computing Learning Model. 3092-3097 - Chao Yang:
Research and Implementation of Low Cost Arc Fault Circuit Interrupter. 3098-3105 - Manjiang Hu, Hongmao Qing, Long Ying, Renkai Ding:
Diesel Engine Fault Diagnosis Method Based on GA-PNN. 3106-3112 - Lihua Zhang, Xichang Dai, Haiquan Fan:
Broadcast Encryption Based on Bidirectional Remote Authentication Scheme. 3113-3119 - Chao-Shan Yang, Ling Zhou, Gao-Sheng Wang:
A Flexibility-based Method for Damage Identification of Cantilever-type Structures. 3120-3126 - Guowei Wang, Zongpu Jia, Manjun Xue:
Data Migration Model and Algorithm between Heterogeneous Databases based on Web Service. 3127-3134 - Liang Hu, Bofeng Liu, Kuo Zhao, Xiangyu Meng, Feng Wang:
Research and Implementation of the Localization Algorithm Based on RSSI Technology. 3135-3142 - Yuanfang Xin, Xia Sun:
System Design for Real-time Image Processing Based on Multi-core DSP. 3143-3150 - Ling Hu:
Research on the Application of Regression Analysis Method in Data Classification. 3151-3157 - Shanhui Sun, Hong Li, Zhuangzhuang Li, Bingqiu Zhang:
Mathematical Modeling and Fractal Clustering Algorithm in Online Shopping. 3158-3165 - Yan Wu, Gang Li:
Solution of Evidence Distance in Multi-Source Information Fusion. 3166-3174 - Lijuan Liao:
Incremental Subspace Data-mining Algorithm Based on Data-flow Density of Complex Network. 3175-3181 - Yamei Li:
An Improved DV-Hop Localization Algorithm Based on Energy-saving Non-ranging Optimization. 3182-3187
Volume 9, Number 12, 2014
- Salahuddin Muhammad Salim Zabir, Jemal H. Abawajy, Farid Ahmed, Joarder Kamruzzaman, Mohammad A. Karim, Nurul I. Sarkar:
Guest Editorial. 3189-3191 - Md. Nazmul Islam Khan, Md. Jobayer Alam:
Efficient Scheme for Channel Estimation in OFDM System. 3192-3199 - M. M. Kamruzzaman:
Performance of Decode and Forward MIMO Relaying using STBC for Wireless Uplink. 3200-3206 - Duc Minh Pham, Syed Mahfuzul Aziz:
On Efficient Design of LDPC Decoders for Wireless Sensor Networks. 3207-3214 - A. K. M. Baki, Nemai Chandra Karmakar:
Performance Comparison of RFID Tag at UHF Band and Millimeter-Wave Band. 3215-3220 - Lei Wang, Jui-Yu Yang, Yu-Yun Lin, Wei-Jun Lin:
Keeping Desired QoS by a Partial Coverage Algorithm for Cluster-Based Wireless Sensor Networks. 3221-3229 - Wen-Li Li, Chun-Hung Richard Lin, Chih-Heng Ke:
Achieving VoIP Guarantee in Wireless Local Area Networks. 3230-3236
- Baobao Liu, Junying Zhang, Cong Xu:
DOA Estimation for Coherent Sources in Impulsive Noise Environments. 3237-3241 - Xue Li, Yingan Cui, Xia Hui:
Research on Structure Ontology Characteristic of Blogosphere. 3242-3250 - Xue Miao, Gang Fu, Ruitao Ma, Longshe Huo:
Source-Directed Path Diversity in the Interdomain Routing. 3251-3262 - Xiaolong Li, Donglei Feng:
Markov Chain Based Trust Management Scheme for Wireless Sensor Networks. 3263-3267 - Qiuyun Xiao, Zhihai Wu, Li Peng:
Fast Finite-Time Consensus Tracking of Second-Order Multi-Agent Systems with a Virtual Leader. 3268-3274 - Chathuranga Widanapathirana, X. Ang, Jonathan C. Li, Milosh V. Ivanovich, Paul G. Fitzpatrick, Y. Ahmet Sekercioglu:
A Hybrid Classifier Using Reduced Signatures for Automated Soft-Failure Diagnosis in Network End-User Devices. 3275-3289 - Sujoy Saha, Rohit Verma, Somir Saika, Partha Sarathi Paul, Subrata Nandi:
e-ONE: Enhanced ONE for Simulating Challenged Network Scenarios. 3290-3304 - Jingjing Yuan, Peiying Chen, Qinghua Liu, Heng Li:
A Load-Balanced On-Demand Routing for LEO Satellite Networks. 3305-3312 - AL-Museelem Waleed, Chunlin Li, Naji Hasan. A. H:
The faults of Data Security and Privacy in the Cloud Computing. 3313-3320 - Wesam A. Almobaideen, Njoud O. Al-maitah:
TTAF: TCP Timeout Adaptivity Based on Fast Retransmit over MANET. 3321-3326 - Ping He, Shuli Luan:
On-line Data Retrieval Algorithm with Restart Strategy in Wireless Networks. 3327-3335 - G. Sanjiv Rao, V. Valli Kumari:
Trail Coverage : A Coverage Model for Efficient Intruder Detection near Geographical Obstacles in WSNs. 3336-3346 - Marcelo Luiz Brocardo, Issa Traoré, Sherif Saad, Isaac Woungang:
Verifying Online User Identity using Stylometric Analysis for Short Messages. 3347-3355 - Dong Zhong, Yian Zhu, Tao You, Jie Kong:
Topology Control Mechanism Based on Link Available Probability in Aeronautical Ad Hoc Network. 3356-3365 - Guangxia Xu, Manman Wang:
An Energy-Efficient Routing Mechanism Based On Genetic Ant Colony Algorithm for Wireless Body Area Networks. 3366-3372 - Guangxia Xu, Fuyi Lin, Yu Liu:
An Improved Mix Transmission Algorithm for Privacy-Preserving. 3373-3380 - S. Fouziya Sulthana, Rangaswamy Nakkeeran:
Study of Downlink Scheduling Algorithms in LTE Networks. 3381-3391 - Adnan Huremovic, Mesud Hadzialic:
Delay and Jitter in Networks with IPP Traffic: Theoretical Model. 3392-3399 - Xiaofeng Li, Liangfeng Chen, Jianping Wang, Zhong Chu, Bing Liu:
A Novel Method to Improve the Accuracy of the RSSI Techniques Based on RSSI-D. 3400-3406 - Anil Singh, Shashikala Tapaswi:
An Adaptative Energy Efficient Routing Protocol for MANET. 3407-3414 - Muhammad Yeasir Arafat, Muhammad Morshed Alam, Feroz Ahmed:
SIP-Based QoS in IP Telephony. 3415-3426 - Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu:
A Resource-Efficient System for Detection and Verification of Anomalies Using Mobile Agents in Wireless Sensor Networks. 3427-3444 - Baoqiang Lv, Yiwen Huang, Taihua Li, Xuewu Dai, Muxi He, Wuxiong Zhang, Yang Yang:
Simulation and Performance Analysis of the IEEE1588 PTP with Kalman Filtering in Multi-hop Wireless Sensor Networks. 3445-3453 - Doan Perdana, Riri Fitri Sari:
Enhancing Channel Coordination Scheme Caused by Corrupted Nakagami Signal and Mobility Models on the IEEE 1609.4 Standard. 3454-3461 - Dingli Yang, Qiuchan Bai, Yulin Zhang, Rendong Ji, Yazhou Li, Yudong Yang:
Error Performance Analysis of Multiuser CDMA Systems with Space-time Coding in Rician Fading Channel. 3462-3469 - Nazrul Muhaimin Ahmad, Anang Hudaya Muhamad Amin, Subarmaniam Kannan, Mohd Faizal Abdollah, Robiah Yusof:
Detecting Access Point Spoofing Attacks Using Partitioning-based Clustering. 3470-3477 - Rui Zhou, Jinghan Wang, Guowei Wang, Jing Li:
Customized Interface Generation Model Based on Knowledge and Template for Web Service. 3478-3485 - Jingguo Qu, Yuhuan Cui, Weiliang Zhu:
Algorithm and Its Implementation of Vehicle Safety Distance Control Based on the Numerical Simulation. 3486-3493 - Yuhuan Cui, Jingguo Qu, Weiliang Zhu:
The Study and Improvement of Unidimensional Search about Nonlinear Optimization. 3494-3501 - Limei Ma, Guoxiu Li, Lixing Zhao:
Multi-Objective Optimal Configuration of Reconfigurable Test Platform: A Modified Discrete Particle Swarm Optimization Approach. 3502-3509
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.