default search action
Wireless Personal Communications, Volume 89
Volume 89, Number 1, July 2016
- Mingjun Dai, Zexin Lu, Dan Shen, Hui Wang, Bin Chen, Xiaohui Lin, Shengli Zhang, Li Zhang, Hongwei Liu:
Design of (4, 8) Binary Code with MDS and Zigzag-Decodable Property. 1-13 - P. Malarvezhi, R. Kumar:
A Diversity Enhanced Particle Filter for Carrier Frequency Offset Estimation in Nonlinear OFDM System. 15-26 - M. Usha, C. N. Vanitha:
Pruning Route Modifiers in Wireless Sensor Networks. 27-43 - Enyu Li, Xinjie Wang, Yunquan Dong, Yansheng Li:
Research on the Nth-best Relay Selection with Outdated Feedback in Selection Cooperation Systems. 45-59 - Priyanka Rathee, Rishipal Singh, Sushil Kumar:
Performance Analysis of IEEE 802.11p in the Presence of Hidden Terminals. 61-78 - Gaurav Kumar Pandey, Hari Shankar Singh, Pradutt Kumar Bharti, Manoj Kumar Meshram:
Design and Analysis of Ψ-Shaped UWB Antenna with Dual Band Notched Characteristics. 79-92 - Kayiparambil S. Deepak, Anchare V. Babu:
Enhancing Reliability of IEEE 802.15.6 Wireless Body Area Networks in Scheduled Access Mode and Error Prone Channels. 93-118 - Sandeep Kumar, Binod Kumar Kanaujia, Santanu Dwari, Ganga Prasad Pandey, Dinesh Kumar Singh:
Analysis and Design of Switchable Rectangular Monopole Antenna Using Asymmetric Cross Slot for Wireless Communication. 119-133 - Rui Chen, Changle Li, Jiandong Li, Xuelian Cai:
Performance of Vector Perturbation MU-MIMO Systems in a Composite Fading Channel. 135-147 - Xiaochen Xia, Kui Xu, Youyun Xu:
Asynchronous Physical-layer Network Coding Scheme for Broadband Two-Way Relay Channels. 149-163 - Tung-Linh Pham, Dong-Seong Kim:
Efficient Forwarding Protocol for Dual-Hop Relaying Wireless Networks. 165-180 - Tai-Kuo Woo:
FISH: Finite Projective Plane Based Interference Cancellation for Slotted ALOHA. 181-194 - Muthusamy Madheswaran, R. N. Shanmugasundaram:
Performance Evaluation of Balanced Partitioning Dynamic Cluster Head Algorithm (BP-DCA) for Wireless Sensor Networks. 195-210 - Feriel Bouakkaz, Mawloud Omar, Souad Laib, Lilia Guermouz, Abdelkamel Tari, Abdelmadjid Bouabdallah:
Lightweight Sharing Scheme for Data Integrity Protection in WSNs. 211-226 - Priya Aggarwal, Anubha Gupta, Vivek Ashok Bohara:
Recursive Least Squares Channel Estimation for Rapidly Time-Varying Scenarios in IEEE 802.11p. 227-240 - Neeraj Kumar Rathore, Inderveer Chana:
Job Migration Policies for Grid Environment. 241-269 - Geunseok Choi, Wonsik Yoon:
Distributed Joint Rate Control, Resource Allocation, and Congestion Control for Throughput Optimization in Multirate Multiradio Multichannel Wireless Network with Intersession/Intrasession Network Coding. 271-287 - Chi-Min Li, Szu-Hsien Lu:
Energy-Based Maximum Likelihood Spectrum Sensing Method for the Cognitive Radio. 289-302
Volume 89, Number 2, July 2016
- Kuo-Ching Fu, Yung-Fang Chen:
Subspace-Based Algorithms for Blind ML Frequency and Transition Time Estimation in Frequency Hopping Systems. 303-318 - Aouatif Amine, Adil Belhaj, Moulay Brahim Sedra:
The Hexagonal Geometrical Structure of the N-Coverage Networks in the G2-Lie Algebra Framework. 319-330 - Siddig Gomha, Abdel-Aziz T. Shalaby, El-Sayed M. El-Rabaie, Ahmed S. ElKorany:
Thin Film Ferroelectric Compact Branch-Line Coupler Based on D-CRLH Unit Cell and YBCO HTS Microstrip. 331-349 - R. Juliana, P. Uma Maheswari:
An Energy Efficient Cluster Head Selection Technique Using Network Trust and Swarm Intelligence. 351-364 - Chao Ning, Rui Li, Kejiong Li:
Outdoor Location Estimation Using Received Signal Strength-Based Fingerprinting. 365-384 - Xiaojuan Wang, Mei Song, Yinglei Teng, Anqi Xing, Deyu Yuan:
Coverage and Capacity Optimization Analysis in Heterogeneous Cellular Networks Based on Truncated Function. 385-403 - Pai Wang, Yongqing Wang, Xiuli Yu, Siliang Wu:
Performance Comparison of Code Discriminators in the Presence of CW Interference. 405-426 - Yi-Jia Bu, Min Lin, Kang An, Jian Ouyang, Can Yuan:
Performance Analysis of Hybrid Satellite-Terrestrial Cooperative Systems with Fixed Gain Relaying. 427-445 - Chin-Chen Chang, Wei-Yuan Hsueh, Ting-Fang Cheng:
A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks. 447-465 - Sabri M. Hanshi, Mohammad M. Kadhum, Tat Chee Wan:
Efficient Approximated Q-Function Form for Error Probability over Rayleigh Fading Channels. 467-478 - Mukhridinkhon Ibragimov, Jae-Hoon Lee, Muppalla Kalyani, Jung-Il Namgung, Soo-Hyun Park, Okyeon Yi, Changhwa Kim, Yong-Kon Lim:
CCM-UW Security Modes for Low-band Underwater Acoustic Sensor Networks. 479-499 - BeomSeok Kim, Jinsung Cho, Seokhee Jeon, Ben Lee:
An AHP-Based Flexible Relay Node Selection Scheme for WBANs. 501-520 - Yalin Wang, Jie Zhou, Hisakazu Kikuchi:
Performance of a Three-Dimensional Antenna Array and Its Application in DOA Estimation. 521-537 - James Osuru Mark Amok, Naufal Mohamad Saad:
Performance Analysis of Multiantenna MC DS CDMA System Over Correlated η-µ Multipath Fading Channels. 539-568 - Xiong Li, Jianwei Niu, Saru Kumari, SK Hafizul Islam, Fan Wu, Muhammad Khurram Khan, Ashok Kumar Das:
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security. 569-597 - Cornelia-Ionela Badoi, Neeli R. Prasad, Ramjee Prasad:
Virtualization and Scheduling Methods for 5G Cognitive Radio Based Wireless Networks. 599-619 - Sonam Devgan Kaul, Amit K. Awasthi:
Security Enhancement of an Improved Remote User Authentication Scheme with Key Agreement. 621-637 - Shixin Peng, Yingzhuang Liu, Zhengmin Kong, Wei Lv:
Spatial Degrees of Freedom for MIMO Interference Channel with Local Channel State Information at Transmitters. 639-662 - Yongqun Chen, Huaibei Zhou, Ruoshan Kong, Junyuan Huang, Bo Chen:
QoS-Based Blind Spectrum Selection with Multi-armed Bandit Problem in Cognitive Radio Networks. 663-685 - Nitin Goyal, Mayank Dave, Anil Kumar Verma:
Energy Efficient Architecture for Intra and Inter Cluster Communication for Underwater Wireless Sensor Networks. 687-707
Volume 89, Number 3, August 2016
- Yu-Keum Jeong, Joong-Kyung Ryu:
Convergence Interaction for Communication. 709-713 - Hyung-Jin Mun, Sejong Oh:
Injecting Subject Policy into Access Control for Strengthening the Protection of Personal Information. 715-728 - Jihyun Lee, Sunmyung Hwang:
Variability Change Management Using the Orthogonal Variability Model-Based Traceability. 729-745 - Kyungyong Chung, Sang Yeob Oh:
Voice Activity Detection Using an Improved Unvoiced Feature Normalization Process in Noisy Environments. 747-759 - Kyoo-Sung Noh:
A Study on the Authentication and Security of Financial Settlement Using the Finger Vein Technology in Wireless Internet Environment. 761-775 - Seokmo Kim, Robert Young Chul Kim, Young B. Park:
Software Vulnerability Detection Methodology Combined with Static and Dynamic Analysis. 777-793 - Hangoo Jeon, Kwang-Kyu Seo:
A New Performance Assessment Modeling and Development of a Performance Assessment System for a Cloud Service. 795-818 - Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi:
Information Interoperability System Using Multi-agent with Security. 819-832 - Joon Koo Choi, Ki-Bong Kim, Gha Jung Kim:
Image Selection Algorithm Proposal for Digital Radiography Training Simulator. 833-845 - Sang Un Ahn, Jin Kim:
A Conceptual Design of Job Pre-processing Flow for Heterogeneous Batch Systems in Data Center. 847-861 - Jeongbae Park, Hyesung Ji, Jaechoon Jo, Heuiseok Lim:
A Method for Measuring Cooperative Activities in a Social Network Supported Learning Environment. 863-879 - Jeong-Heon Kim, Duseok Jin, Pillwoo Lee:
Cyber Physical System-Based Convergence Operation of Data Intensive Computing Resources. 881-891 - Young Jung Kim, Jong Yun Lee:
Algorithm of a Perspective Transform-Based PDF417 Barcode Recognition. 893-911 - Young-Man Je, Yen-Yoo You, Kwan-Sik Na:
Information Security Evaluation Using Multi-Attribute Threat Index. 913-925 - JongMin Kim, Hoill Jung, Myung A. Kang, Kyung-Yong Chung:
3D Human-Gesture Interface for Fighting Games Using Motion Recognition Sensor. 927-940 - Kigon Lyu, Hyeoncheol Kim:
Sentiment Analysis Using Word Polarity of Social Media. 941-958 - Kwang-Ho Ko, Byung-Koo Moon, Tong-Won Lee, Won-Ho Lee, Ink-Yoon Yoo, Sooh-Yung Lee, Dae-Seok Han, Seung-Hyun Jeong:
An Economic Calibration Method for Fuel Consumption Model in HDM4. 959-975 - Yong-Ki Kim, Hanjo Jeong:
A Cloud Computing-Based Analysis System for the National R&D Information Concerning with the Data Security. 977-992 - Jihoon Kim, Sanghun Lee, Gangseong Lee, YoungSoo Park, YeongPyo Hong:
Using a Method Based on a Modified K-Means Clustering and Mean Shift Segmentation to Reduce File Sizes and Detect Brain Tumors from Magnetic Resonance (MRI) Images. 993-1008 - Joo-Chang Kim, Hoill Jung, Kyungyong Chung:
Mining Based Urban Climate Disaster Index Service According to Potential Risk. 1009-1025
Volume 89, Number 4, August 2016
- Meiqin Tang, Yalin Xin, Chengnian Long, Xinjiang Wei, Xiaohua Liu:
Optimizing Power and Rate in Cognitive Radio Networks using Improved Particle Swarm Optimization with Mutation Strategy. 1027-1043 - Mani Zarei, Amir Masoud Rahmani:
Renewal Process of Information Propagation in Delay Tolerant VANETs. 1045-1063 - Xiaoheng Deng, Lifang He, Congxu Zhu, Mianxiong Dong, Kaoru Ota, Lin Cai:
QoS-Aware and Load-Balance Routing for IEEE 802.11s Based Neighborhood Area Network in Smart Grid. 1065-1088 - Francisco Rubén Castillo Soria, Jaime Sánchez-García, Ramón Parra-Michel:
Multiuser MIMO Downlink Transmission Using SSK and Orthogonal Walsh Codes. 1089-1102 - Hojin Ha, Changhoon Yim:
Unequal Luby Transform Based on Block Weight Shift (ULT-BWS) for Error Resilient Video Transmission. 1103-1121 - C. S. Anita, R. M. Suresh:
On Demand Stable Routing with Channel Allocation and Backoff Countdown Optimization in Wireless Mesh Networks. 1123-1145 - Yu Du, Fengye Hu, Xiaolan Liu, Ling Cen, Wei Xiong:
Planar Sparse Array Synthesis for Sensor Selection by Convex Optimization with Constrained Beam Pattern. 1147-1163 - Divya Lohani, Shirshu Varma:
Energy Efficient Data Aggregation in Mobile Agent Based Wireless Sensor Network. 1165-1176 - Simon D. Barnes, Bodhaswar T. Maharaj, Attahiru Sule Alfa:
Cooperative Prediction for Cognitive Radio Networks. 1177-1202 - Takahiro Yazaki, Yukitoshi Sanada:
Effect of Joint Detection in Far User on Non-orthogonal Multiple Access Downlink. 1203-1219 - P. Vijayakumar, V. Vijayalakshmi, G. Zayaraz:
An Improved Level of Security for DNA Steganography Using Hyperelliptic Curve Cryptography. 1221-1242 - T. R. Reshmi, Krishnan Murugan:
Secure and Reliable Autoconfiguration Protocol (SRACP) for MANETs. 1243-1264 - Manjula R. Bharamagoudra, Sunil Kumar S. Manvi:
Deployment Scheme for Enhancing Coverage and Connectivity in Underwater Acoustic Sensor Networks. 1265-1293 - Jiahui Hu, Qing Qian, An Fang, Sizhu Wu, Yi Xie:
Optimal Data Transmission Strategy for Healthcare-Based Wireless Sensor Networks: A Stochastic Differential Game Approach. 1295-1313 - Vajihe Zeinali, Hossein Khaleghi Bizaki:
Shared Secret Key Generation Protocol in Wireless Networks Based on the Phase of MIMO Fading Channels. 1315-1334 - Saaidal Razalli Azzuhri, Harith Ahmad, Marius Portmann, Ismail Ahmedy, Ranjana Pathak:
An Efficient Hybrid MANET-DTN Routing Scheme for OLSR. 1335-1354 - Linshu Lv, Qi Zhu, Guangjun Liang:
Distributed Resource Allocation for Multi-cell Cooperative OFDMA Networks with Decode-and-Forward Relaying. 1355-1370 - Kerem Ok, Vedat Coskun, Binboga Siddik Yarman, Cem Cevikbas, Busra Ozdenizci:
SIMSec: A Key Exchange Protocol Between SIM Card and Service Provider. 1371-1390 - Fagen Li, Yanan Han, Chunhua Jin:
Practical Signcryption for Secure Communication of Wireless Sensor Networks. 1391-1412 - Nasreddine Mallouki, Bechir Nsiri, Sofien Mhatli, Mohammad Ghanbarisabagh, Walid Hakimi, Mahmoud Ammar:
Analysis of Full Volterra and Sparse Volterra Nonlinear Equalization for Downlink LTE System. 1413-1432 - Nasreddine Mallouki, Bechir Nsiri, Sofien Mhatli, Mohammad Ghanbarisabagh, Walid Hakimi, Mahmoud Ammar:
Erratum to: Analysis of Full Volterra and Sparse Volterra Nonlinear Equalization for Downlink LTE System. 1433 - (Withdrawn) Mobile Cloud Computing: The Taxonomy and Comparison of Mobile Cloud Computing Application Models. 1435
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.