default search action
International Journal of Internet Protocol Technology, Volume 14
Volume 14, Number 1, 2021
- Ying Liu, Hai Tao Liu:
Integrated monitoring algorithms for software data security situation on private cloud computing platform. 1-9 - Qingzeng Xu:
Wireless sensor networks secure routing algorithm based on trust value computation. 10-15 - Xiaohai Lan:
Big data network security index correlation measure based on the fusion of modified two order cone programming model. 16-22 - Zheng Ma, Yan Ma, Xiaohong Huang, Manjun Zhang, Bo Su, Liang Zhao:
Research on the on-demand scheduling algorithm of intelligent routing load based on SDN. 23-32 - Liejun Wang, Long Pan, Jiwei Qin:
Graph-based recommendation by trust. 33-40 - Lede Niu, Liran Xiong:
A novel optimal road layout model based on urban cloud data. 41-48 - Somnath Sinha, Aditi Paul:
A novel neuro-fuzzy-based localisation system for WSN using node proximity. 49-58
Volume 14, Number 2, 2021
- Kaibin Wei:
Simulation research of nodes target tracking algorithm based on clustering in wireless sensor network. 59-66 - Guanlin Chen, Kunlong Zhou, Yubo Peng, Liang Zhou, Yong Zhang:
A novel network intrusion prevention system based on Android platform. 67-76 - Yong Li, Bo Li, Mao Yang:
Unsaturated traffic oriented spatial clustering multiusers MAC protocol for the next generation WLAN. 77-85 - Lu Wang, Difei Jiang:
Energy management control system of prefabricated construction based on internet of things technology. 86-92 - Jingbo Hu:
Mathematical model construction of communication security assessment method based on TST switching network matrix. 93-101 - Juefu Liu:
Research on resource allocation algorithm of wireless network based on game feedback. 102-111 - Simarjeet Kaur, Navdeep Kaur, Kamaljit Singh Bhatia:
An extended mechanism to prevent distributed denial of service attack in DV-Hop localisation algorithm in wireless sensor networks. 112-119 - Abdelhakim Dafeur, Bernard Cousin, Rezki Ziani:
Multicast routing and allocation of wavelengths in a WDM network with splitters and converters. 120-130
Volume 14, Number 3, 2021
- Ruixia Feng, Tinghua Li, Junliang Dong:
New media fine art education platform based on internet of things technology. 131-138 - Huawei Wu, Chuan Sun, Yicheng Li, Yong Kuang:
Simulation on dynamic load balancing of distributed parallel computing network system. 139-146 - Shu Xu:
Deep mining method for high-dimensional big data based on association rule. 147-154 - Jia Chen, Yingkai Miao:
Research on security evaluation system of network information system based on rough set theory. 155-161 - Shu Xu:
Analysis method for structured big data feature based on hypernetwork model. 162-168 - Hao Wang, Hai Huang, Anxin Chen, Xiaoqing Li, Fangui Li:
Real-time fault diagnosis method for low-voltage power line carrier communication network based on network topology. 169-176 - Prashant Kharat, Muralidhar Kulkarni:
ModQUIC protocol performance verification with CUBIC and BBR congestion control mechanisms. 177-187
Volume 14, Number 4, 2021
- Xuelian Yang:
Iterative learning feedback control of network inverse system. 189-196 - Abdellah Nabou, My Driss Laanaoui, Mohammed Ouzzif:
The quality factor for detecting node isolation attack in mobile ad hoc networks using OLSR protocol. 197-204 - Amrit Suman, Chiranjeev Kumar, Preetam Suman:
Advance routing strategy for VANETs. 205-218 - Yanli Li, Xiaonan Wang:
Position-related content acquisition for CCM. 219-231 - Junjun Liu, Jian Wu, Lanzhong Guo:
Construction of emergency dispatching and controlling platform for multi-elevator in cloud computing. 232-239 - Jia Chen, Yingkai Miao:
Study on network security intrusion target detection method in big data environment. 240-247 - Daqin Wu, Haiyan Hu, Zheng Xie:
Design of hole repair system for wireless sensor networks based on triangle partition. 248-255
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.