


default search action
Journal of Networks, Volume 9
Volume 9, Number 1, 2014
- Ameen Banjar, Pakawat Pupatwibul

, Robin Braun
:
DAIM: a Mechanism to Distribute Control Functions within OpenFlow Switches. 1-9 - Fang Zuo, Wei Zhang:

An Evolutionary Game-Based Mechanism for Routing P2P Network Flow among Selfish Peers. 10-17 - Yangyang Gao, Fei Song, Yajuan Qin:

IDDTL: A Novel Identified Internet Data Transport Layer Mechanism. 18-27 - Qingling Cai, Yiju Zhan, Jian Yang:

The Improvement of RFID Authentication Protocols Based on R-RAPSE. 28-35 - Hang Zhou:

An Upper Bound on the Coding Capacity of Matroidal Network Associated with R8. 36-41 - Stanislav Milanovic:

Case Study for a GPON Deployment in the Enterprise Environment. 42-47 - Jianjun Lang, Qigang Jiang:

Artificial Intelligence based Profit-Sharing Algorithm in Multi-Agent Systems. 48-55 - Bing Cheng:

Modified Particle Swarm Optimization for Hybrid Wireless Sensor Networks Coverage. 56-62 - Chunyu Miao, Lina Chen:

Infrastructure Communication Reliability for WSN on Cluster Topology and Tree Topology. 63-70 - Zhaoning Zhang, Ping Wang:

Computing Model of Airspace Utilization Rate Based on Airspace Load. 71-77 - Ligang Cai, Bo Xu, Jianwu Yang, Sen Zhang:

Parameters Tracking Differentiator based on the Fuzzy Control and Varied Sliding Mode. 78-84 - Yan Li, Zhiyong Zhang, Xiaohua Sun, Fushun Wang:

A Curvature-based Manifold Learning Algorithm. 85-91 - Jin Li:

Blow-up in the Parablic Problems under Nonlinear Boundary Conditions. 92-99 - Pinghui Zou, Yun Liu:

A Data-aggregation Scheme for WSN based on Optimal Weight Allocation. 100-107 - Yuhuan Cui, Jingguo Qu, Aimin Yang, Yamian Peng:

Fast Multipole Boundary Element Method of Potential Problems. 108-114 - Chunfeng Liu, Jingguo Qu, Yuhuan Cui, Aimin Yang:

Research on Potential Problem based on Singular Decomposition and Boundary FM-BEM Algorithm. 115-122 - Zhicheng Bian, Weijian Mi, Xiaoming Yang, Ning Zhao, Chao Mi:

Modified Hungarian Algorithm for Real-Time ALV Dispatching Problem in Huge Container Terminals. 123-130 - Xiaoxiang Han:

Mobile Node Deployment based on Improved Probability Model and Dynamic Particle Swarm Algorithm. 131-137 - Xuehua Zhao, Liping Shi:

DC Voltage Balance Control Strategy for Medium Voltage Cascaded STATCOM Based on Distributed Control. 138-146 - Guifeng Wang, Jianguo Jiang, Shutong Qiao, Lifeng Guo:

Research on the Multilevel STATCOM based on the H-bridge Cascaded. 147-152 - Mingxin Wu:

Inter-cell Interference Mitigation in Multi-cell Cooperating System Based on SLNR Method. 153-160 - Xiuchang Huang, Wei Su:

An Improved K-means Clustering Algorithm. 161-167 - Xiaolong Huang:

Target Localization Based on Improved DV-Hop Algorithm in Wireless Sensor Networks. 168-175 - Kun Jiang, Li Yao, Juan Feng:

Wireless Sensor Networks Target Localization Based on Least Square Method and DV-Hop Algorithm. 176-182 - Shyi-Ching Liang, LunHao Liao, Yen-Chun Lee:

Localization Algorithm based on Improved Weighted Centroid in Wireless Sensor Networks. 183-189 - Zhenyu Shu, Dianhong Wang, Cheng Zhou:

Road Geometric Features Extraction based on Self-Organizing Map (SOM) Neural Network. 190-197 - Nan Chen, Rui Jiang:

Security Analysis and Improvement of User Authentication Framework for Cloud Computing. 198-203 - ChengGang Liu, Zhenhong Jia, Xizhong Qin, Lei Sheng, Li Chen:

Improvement Priority Handoff Scheme for Multi-Service Wireless Mobile Networks. 204-209 - Chang-Peng Ji, Hong-Hong Ji, Wei-Ping Guo, Jun Wang:

APA with Evolving Order and Variable Regularization for Echo Cancellation. 210-215 - Min Liu, Ying Li:

Global Trust Value Grading Calculation Method in P2P Network. 216-222 - Xianwen Wu, Zhiliang Xue, Jingwen Zuo:

The PeerBehavior Model based on Continuous Behavioral Observation P2P Network Neighbors. 223-230 - Liangyu Luan, Yingfang Fu, Peng Xiao:

Access Authentication Scheme Based on Authorized Certificate in Wireless Mesh Networks. 231-237
Volume 9, Number 2, 2014
- Taha Sochi

:
Testing the Connectivity of Networks. 239-243 - Jianqi Li, Fuwen Wang, Xiaofeng Li, Binfang Cao, Zhen Tan:

Wireless Monitoring System Based on the Non-uniform Stratified WSN in Viticulture. 244-251 - Jingyu Chen, Ping Chen:

Sequential Pattern Mining for Uncertain Data Streams using Sequential Sketch. 252-258 - Amjad Ali, Huiqiang Wang, Hongwu Lv, Xiaoming Chen:

Asynchronous Session Reservation Multi-Channel MAC for Ad Hoc Networks. 259-268 - Guikai Liu, Qing Li:

Fair and Efficient Packet Scheduling Using Resilient Quantum Round-Robin. 269-276 - Kun Mu, Li Li:

An Efficient Pairwise Key Predistribution Scheme for Wireless Sensor Networks. 277-282 - Ruijuan Zheng, Wangyang Wei, Mingchuan Zhang, Qingtao Wu, Dan Zhang:

Network Security Situation Evaluation Strategy Based on Cloud Gravity Center Judgment. 283-290 - Guang Jin, Qian Wang, Xianliang Jiang:

A New Stateless Packet Classification and Filter against DoS Attacks. 291-296 - Abdallah E. Al Sabbagh

, Robin Braun
, Mehran Abolhasan
:
Intelligent Hybrid Cheapest Cost and Mobility Optimization RAT Selection Approaches for Heterogeneous Wireless Networks. 297-305 - Jianwei Zhang, Wei Xing, Yongchao Wang, Dongming Lu:

LR2: Improving Push-Based Live Streaming and File Sharing in Peer-to-Peer Network. 306-314 - Quan Liu, Huachen Liu, Wenjun Xu:

TCP-Adaptive in High Speed Long Distance Networks. 315-322 - Yi Ding:

Joint Optimization of Asymmetry and Diversity of Bit-Interleaved Space-Time code. 323-327 - George Adam, Christos Bouras, Apostolos Gkamas

, Vaggelis Kapoulas
, Georgios Kioumourtzis
:
Cross Layer Design for Video Streaming in MANETs. 328-338 - Ling Xing, Ling Jiang, Guohai Yang, Bin Wen:

A Novel Trusted Computing Model for Network Security Authentication. 339-343 - Guofeng Yan, Yuxing Peng, Ying Hu, Junyi Liu:

Effective Hierarchical Routing Algorithm for Large-scale Wireless Mobile Networks. 344-352 - Zuojie Deng, Xiaolan Tan:

Overload Control for the Wireless Intelligent Network. 353-359 - Tingting Yang, Zhonghua Sun, Chengming Yang:

Towards Resource Allocation Algorithm in Opportunistic Relaying Cooperative UWB Communication System. 360-366 - Mei Peng, Huajian Mou:

A Novel Computer Virus Model and Its Stability. 367-374 - Qingjia Huang, Kai Shuang, Peng Xu, Jian Li, Xu Liu, Sen Su:

Prediction-based Dynamic Resource Scheduling for Virtualized Cloud Systems. 375-383 - Xi Chen:

Semi-Supervised Classification Method Based on Spectral Clustering. 384-392 - Fucai Wang, Bingrong Li, Luping Zhou:

Routing Strategy Based on Local Density Sensing in Delay Tolerant Network. 393-399 - Xu Chang:

Compressible Data Fusion Based on Minimum Energy Consumption in Wireless Sensor Network. 400-408 - Xiao-yong Chen, Hui Gu, Zhi-juan Peng:

Iterative Detecting and Decoding Based on VBLAST of LDPC in Coded Cooperation System. 409-414 - Xiang Zhou, Xiaoqiang Liu:

Multiple Computing Task Scheduling Method Based on Dynamic Data Replication and Hierarchical Strategy. 415-422 - Yuhuan Cui, Jingguo Qu, Hongbo Shao, Aimin Yang, Yamian Peng:

Research on Elasto-plastic Contact with Friction Multipole BEM and Rolling Process. 423-429 - Jingguo Qu, Yuhuan Cui, Chunfeng Liu, Aimin Yang:

Adaptive Boundary Elements and Error Estimation for Elastic Problems. 430-436 - Geng Sui, Hong Qiao:

Emotional Tendency Contrast Recommendation Algorithm Based on Cloud Model. 437-442 - Xuan Huang, Zhijun Song:

Clustering Analysis on E-commerce Transaction Based on K-means Clustering. 443-450 - Liping Wang:

Channel Estimation and Combining Orthogonal Pilot Design in MIMO-OFDM System. 451-457 - Huabei Nie, Jianqiao Shen, Xiaoping Li:

Research on Glowworm Swarm Optimization with Ethnic Division. 458-465 - Jun Zhang, Da-Yong Luo:

Analysis of Time Delay and Packet Dropouts Based on State Observer for a Kind of Networked Control System. 466-473 - Cai-xia Wang:

Clustering Model Based on Improved LEACH Algorithm in Sensor Network. 474-480 - Yong Jin

, Peng Ruan:
Adaptive Cooperative FEC Based on Combination of Network Coding and Channel Coding for Wireless Sensor Networks. 481-487 - Hongbo Zhao, Lina Feng:

An Improved Adaptive Dynamic Particle Swarm Optimization Algorithm. 488-494 - Zhibo Wang, Hui Tian, Nannan Chen:

Reliability Improvement Using Power Control in Device-to-Device Networks. 495-500 - Nianyi Wang, Yide Ma, Weilan Wang, Shijie Zhou:

An Image Fusion Method Based on NSCT and Dual-channel PCNN Model. 501-506 - Chaoyu Yang, Minli Song:

Access Path Planning of Mobile Agent in Wireless Sensor Networks. 507-514 - Weiwei Zhang, Yongyu Chang, Yitong Liu, Atif Hameed, Yuan Tian:

Study on the QoE for VoIP Networks. 515-522
Volume 9, Number 3, 2014
- Kazeem I. Rufai, Ravie Chandren Muniyandi

, Zulaiha Ali Othman:
Improving Bee Algorithm Based Feature Selection in Intrusion Detection System Using Membrane Computing. 523-529 - Ittipong Khemapech

:
Power Preservation Friendly Congestion Control. 530-540 - Jiagao Wu, Hang Yuan, Ying He, Zhiqiang Zou:

ChordMR: A P2P-based Job Management Scheme in Cloud. 541-548 - Anbao Wang, Bin Zhu:

An Improved Algorithm of the Node Localization in Ad Hoc Network. 549-557 - Fannian Meng, Quanlin Dong, Xintao Xia:

True Value Estimation of Centrifugal Fan Vibration Data Based on Fusion Method. 558-564 - Tongguang Zhang:

QoS-aware Web Service Selection based on Particle Swarm Optimization. 565-570 - Xiangyang Luo, Lin Yang, Dai Hao, Fenlin Liu, Daoshun Wang:

On Data and Virtualization Security Risks and Solutions of Cloud Computing. 571-581 - Yingqiang Ding, Dongsheng Yang, Gangtao Han:

Multidimensional Scaling-Based Localization Algorithm for Wireless Sensor Network with Geometric Correction. 582-587 - Somia Natouri, Chidung Lac, Ahmed Serhrouchni:

A Model-Based Resilience Analysis for IMS. 588-603 - Zhijun Wu, Yi Cui, Meng Yue, Lan Ma, Lu Wang:

Cross-correlation Based Synchronization Mechanism of LDDoS Attacks. 604-611 - Shailendra Shukla

, Rajiv Misra
:
Angle Based Double Boundary Detection in Wireless Sensor Networks. 612-619 - Hongyu Li, Yuxin Wang, Jiazheng Yuan:

The Calculation of QoS Aggregation Functions for Composite Web Services. 620-628 - Bayu Kanigoro

, Andreas Calvin Gotandra, Yansen Jayawinata, Ricky:
Mobile Ad-Hoc Network Based Child Monitoring with DSDV Routing. 629-634 - Abdallah E. Al Sabbagh

, Robin Braun
, Mehran Abolhasan
:
Performance Analysis of the Intelligent Mobility Optimization CRRM Approach Using a Markovian Chain Model. 635-644 - Xiaolu Zhang, Liang Hu, Shinan Song, Zhenzhen Xie, Xiangyu Meng, Kuo Zhao:

Windows Volatile Memory Forensics Based on Correlation Analysis. 645-652 - Shuona Xu, Biqing Zeng:

Network Traffic Prediction Model Based on Auto-regressive Moving Average. 653-659 - Junjie Peng, Rong Shen:

An Optical Tri-valued Computing System. 660-665 - Jing Peng:

A New Model of Data Protection on Cloud Storage. 666-671 - Yu Liu, You He, Kai Dong, Haipeng Wang:

Fuzzy Binary Track Correlation Algorithms for Multisensor Information Fusion. 672-681 - Li Li, Hui Song, Jianya Chen:

Self-Adaptive Genetic Algorithm for LTE Backhaul Network. 682-688 - Mu Zhang:

Optimization of Inter-network Bandwidth Resources for Large-Scale Data Transmission. 689-694 - Weijia Lu:

Parameters of Network Traffic Prediction Model Jointly Optimized by Genetic Algorithm. 695-702 - Zhijun Hu, Hongbin Wang, Huibin Zhang:

Bandwidth Allocation Algorithm of Heterogeneous Network. 703-710 - Shihua Cao, Qihui Wang, Yaping Yuan, Junyang Yu:

Anomaly Event Detection Method Based on Compressive Sensing and Iteration in Wireless Sensor Networks. 711-718 - Na Lu, Caiwu Lu, Zhen Yang

, Yishuang Geng:
Modeling Framework for Mining Lifecycle Management. 719-725 - Li Shu, Ke-wei Cheng, Xiaowen Zhang, Jiliu Zhou:

Periodic Sweep Coverage Scheme Based on Periodic Vehicle Routing Problem. 726-732 - Jin Li:

Blow-up in the Parabolic Problems under Nonlinear Boundary Conditions. 733-738 - Jiayou Luo, Xingqun Zhan:

Characterization of Smart Phone Received Signal Strength Indication for WLAN Indoor Positioning Accuracy Improvement. 739-746 - Yuxiang Li, Changquan Ren, Jingyi Bo, Qianying Cai, Yanrong Dong:

The Application of GMKL Algorithm to Fault Diagnosis of Local Area Network. 747-753 - Biqiang Yu, Wei Li, Ming Zhang:

Redundancy Transmission System Based on Multidisciplinary Object Compatibility Design Optimization. 754-761 - Hua Sun:

Congestion Control Based on Reliable Transmission in Wireless Sensor Networks. 762-768 - Teng Geng, Fu Xu, Han Mei, Wei Meng, Zhibo Chen, Changqing Lai:

A Practical GLR Parser Generator for Software Reverse Engineering. 769-776 - Yongxia Li:

Networked Analysis Approach of Supply Chain Network. 777-784 - Yuan Sun:

Optimal Scheduling Algorithm in Vehicular Real Time System. 785-792 - Kai Huang, Fujiang Jin:

An Improved Signal Detection Algorithm of LTE System in Interference Environment. 793-798 - Hai Shen, Yunlong Zhu:

Adaptive Bacterial Foraging Optimization Algorithm Based on Social Foraging Strategy. 799-806
Volume 9, Number 4, 2014
- Keiichiro Tsukamoto, Masato Ohtani, Yuki Koizumi

, Hiroyuki Ohsaki, Kunio Hato, Junichi Murayama:
Virtual Content-Centric Networking. 807-815 - Xiao Ma:

Adaptive Distributed Load Balancing Routing Mechanism for LEO Satellite IP Networks. 816-821 - Wanni Liu, Long Zhang, Yanping Li:

A Noise-Correlated Cancellation Transmission Scheme for Cooperative MIMO Ad Hoc Networks. 822-827 - Yousef Dashti, Martin Reisslein

:
CluLoR: Clustered Localized Routing for FiWi Networks. 828-839 - Daudi S. Simbeye

, Shi-Feng Yang:
Water Quality Monitoring and Control for Aquaculture Based on Wireless Sensor Networks. 840-849 - Jie Ma, Jinlong E:

An NFC-based Scenic Service System. 850-858 - Qiuling Yang, Zhigang Jin, Xiangdang Huang:

Research on Delay and Packet Loss Control Mechanism in Wireless Mesh Networks. 859-865 - Song Zha, Jijun Huang, Ning Li:

Compressed Wideband Spectrum Sensing with Partially Known Occupancy Status by Weighted l1 Minimization. 866-873 - Yulong Wang, Rui Sun:

An IP-Traceback-based Packet Filtering Scheme for Eliminating DDoS Attacks. 874-881 - Rong Chai, Bin Yang, Li Cai, Xizhe Yang, Qianbin Chen

:
Multi-Object Optimization Based RV Selection Algorithm for VCN. 882-888 - Zhihua Li, Bin Lian, Zhongcheng Wei, Liang Xue, Jijun Zhao:

The Effect of MAC Parameters on Energy Efficiency and Delay in Wireless Sensor Networks. 889-895 - Yanpeng Ma, Xiaofeng Wang, Jinshu Su

, Chunqing Wu, Wanrong Yu, Baokang Zhao:
A Multicast Routing Algorithm for Datagram Service in Delta LEO Satellite Constellation Networks. 896-907 - Sri Wahjuni

, Anak Agung Putri Ratna, Kalamullah Ramli
:
Bandwidth Consumption Efficiency Using Collective Rejoin in Hierarchical Peer-To-Peer. 908-913 - Yuhuai Wang, Hong Jia, Xiaojing Zhu:

A Method of Case Retrieval for Web-based Remote Customization Platform. 914-920 - Sheng Zhong, Chun Yang, Jian Zhang:

Symbol Timing Estimation with Multi-h CPM Signals. 921-926 - Jianyun Lei, Yanhong Li:

Vector-Based Sensitive Information Protecting Scheme in Automatic Trust Negotiation. 927-931 - Yi Tian:

An Improved Byzantine Fault-tolerant Program for WSNs. 932-940 - Pei Zhang, Lu Feng:

EESA Algorithm in Wireless Sensor Networks. 941-947 - Gan Yan, Yuxiang Lv, Qiyin Wang, Yishuang Geng:

Routing Algorithm Based on Delay Rate in Wireless Cognitive Radio Network. 948-955 - Yuting Lu, Weiyang Wang:

Energy Hole Solution Algorithm in Wireless Sensor Network. 956-963 - Wenhua Huang, Yishuang Geng:

Identification Method of Attack Path Based on Immune Intrusion Detection. 964-971 - Yuanyuan Zhao, Qian Chen:

Online Order Priority Evaluation Based on Hybrid Harmony Search Algorithm of Optimized Support Vector Machines. 972-978 - Xianwang Li, Yuchuan Song, Ping Yan, Xuehai Chen:

Framework and Modeling Method for Heterogeneous Systems Information Integration Base on Semantic Gateway. 979-985 - Yu Wang, Zhiqiang Wu, Xin-hua Zhu:

Satellite Formation based on SDDF Method. 986-992 - Cui Cheng:

Heterogeneous Web Data Extraction Algorithm Based On Modified Hidden Conditional Random Fields. 993-999 - Zimao Li, Wenying Xiao:

Nearly Optimal Solution for Restricted Euclidean Bottleneck Steiner Tree Problem. 1000-1004 - Ying Wang, Xinguang Peng, Jing Bian:

Computer Crime Forensics Based on Improved Decision Tree Algorithm. 1005-1011 - Zhenhua Xu:

Demand-oriented Traffic Measuring Method for Network Security Situation Assessment. 1012-1019 - Lin Gong, Dingjun Hu:

Visual Simulation of Explosion Effects Based on Mathematical Model and Particle System. 1020-1026 - Kan Luo, Hua Wang, Shyi-Ching Liang:

Reliable Transmission Protocol based on Network Coding in Delay Tolerant Mobile Sensor Network. 1027-1032 - Hongxue Yang, Lingling Xuan:

Routing Optimization Based on Taboo Search Algorithm for Logistic Distribution. 1033-1039 - Hua Guo, Sheng-Wen Yu, Douglas J. Leith

:
Opportunistic Cooperative Reliable Transmission Protocol for Wireless Sensor Networks. 1040-1046 - Jianning Yang, Kun Lin, Xie Zhao:

An Improved Channel Estimation Method based on Jointly Preprocessing of Time-frequency Domain in TD-LTE System. 1047-1054 - Dongfeng Xu:

Dynamic Routing Algorithm Based on the Channel Quality Control for Farmland Sensor Networks. 1055-1060 - Keqiang Yue, Lingling Sun, Bin You, Shengzhou Zhang:

DCSK Multi-Access Scheme for UHF RFID System. 1061-1066 - Xiaosong Wu, Xingshu Chen, Haizhou Wang:

An Effective Scheme for Performance Improvement of P2P Live Streaming Systems. 1067-1073
Volume 9, Number 5, 2014
- Giorgos Adam, Christos Bouras, Ioannis Kalligeros, Kostas Stamos

, Giannis Zaoudis:
Multi-domain Information Exchange in a Bandwidth on Demand Tool. 1075-1085 - Hongli Zhang, Panpan Li, Zhigang Zhou, Junchao Wu, Xiang-Zhan Yu:

A Privacy-aware Virtual Machine Migration Framework on Hybrid Clouds. 1086-1095 - Liya Xu, Chuanhe Huang, Jinhai Wang, Junyu Zhu, Lianzhen Zhang:

An Efficient Traffic Geographic Static-Node-Assisted Routing in VANET. 1096-1102 - Fangmin Sun, Zhan Zhao, Zhen Fang, Lidong Du

, Zhihong Xu, Diliang Chen:
A Review of Attacks and Security Protocols for Wireless Sensor Networks. 1103-1113 - Jia-Ning Luo

, Ming-Hour Yang:
An Efficient Offline Delegation Protocol in Mobile RFID Environment. 1114-1120 - Muhammad Zubair, Xiangwei Kong, Saeed Mahfooz:

Secure Session Mobility using Hierarchical Authentication Key Management in Next Generation Networks. 1121-1131 - Dengyin Zhang

, Min Yang, Lei Cui:
Congestion Control Strategy for Opportunistic Network Based on Message Values. 1132-1138 - Aihan Yin, Hongchao Liang, Ming Zhu:

Authentication Protocol using MYK-NTRUSign Signature Algorithm in Wireless Network Environment. 1139-1144 - Huanliang Xu, Duo Li, Jianhua Che, Haoyun Wang:

Cooperative Localization Algorithm based on Coverage Optimization of Actors for Wireless Sensor and Actor Networks. 1145-1156 - Mande Xie:

The Optimal Partition Algorithm for Multiple Video Sequences in Streaming Media System. 1157-1162 - Yi Xu, Yixian Yang, Yang Xin, Hongliang Zhu:

An Improved Directed Diffusion Protocol based on Opportunistic Routing. 1163-1168 - Jinzhi Lin, Ying Wu, Gongyi Wu, Jingdong Xu:

An Adaptive Approach for Multi-Agent Formation Control in MANET Based on CPS Perspective. 1169-1177 - Jinping Liu, Gang Zhu, Bo Cheng, Shengfeng Xu:

Optimal-sampling Active Interference Cancellation under the Minimax Criterion. 1178-1182 - Lin Xue, Cheng Cui, Suman Kumar, Seung-Jong Park

:
Impact of Queue Management Schemes and TCP Variants on the Performance of 10Gbps High Speed Networks: An Experimental Study. 1183-1192 - Daming Gu:

Uncertain Networks Optimization Based on Random ADD Algorithm. 1193-1200 - Jianbin Xiong, Qinhua Zhang, Guoxi Sun, Zhiping Peng, Qiong Liang:

Fusion of the Dimensionless Parameters and Filtering Methods in Rotating Machinery Fault Diagnosis. 1201-1207 - Wenqing Fan, Xue Lei, Jing An:

Obfuscated Malicious Code Detection with Path Condition Analysis. 1208-1214 - Wen Zhong, Zhuoying Tan, Xiaojun Wang, Jin Wang, Tianshou Hu:

Numerical Simulation of Stability Analyzing for Unsaturated Slope with Rainfall Infiltration. 1215-1222 - Zheng Guan, Hongwei Ding, Wenhua Qian:

Delay Analysis of an Enhancing IEEE 802.11 Point Coordination Function MAC Protocol. 1223-1228 - Degui Zeng, Yishuang Geng:

Content Distribution Mechanism in Mobile P2P Network. 1229-1236 - Shenghan Zhou, Wenbing Chang:

Research of Network System Reconfigurable Model Based on the Finite State Automation. 1237-1244 - Jian Xu:

KSC Centralized Index Model in Complex Network. 1245-1251 - Xianwang Li, Yuchuan Song, Ping Yan, Xuehai Chen:

Network Topology Connection Optimization Control Algorithm Based on Network Efficiency and Average Connectivity. 1252-1259 - Yuan Gao, Na Zhen, Nan Hao, Yuanqing Liu:

Impulsive Neural Networks Algorithm Based on the Artificial Genome Model. 1260-1267 - Yan Zhang, Fengfan Yang, Guobing Hu:

LDPC Coded Combined with Space-Time Codes in Cooperative MIMO System. 1268-1273 - Liang He:

An Improved Intrusion Detection based on Neural Network and Fuzzy Algorithm. 1274-1280 - Liwei Deng:

Traffic Load Constrained Routing Algorithm for Wireless Sensor Networks. 1281-1286 - Huiqiang Wang, Yanqiu Xing, Weilian Sun:

Study on Measuring System of Casing Machine Based on PLC. 1287-1294 - Pengfei Zhang, Xiang-Yang Li, Lei Ma:

Grid Computing based on Game Optimization Theory for Networks Scheduling. 1295-1300 - Jian-xin Zhu, Gihwan Cho:

Broadcast Networks based on the Virus Evolutionary Algorithm. 1301-1308 - Qihui Wang, Lidong Wang, Kang An, Zhouxiang Shou, Huixi Zhang:

DOA Estimation of Smart Antenna Signal Based on MUSIC Algorithm. 1309-1316 - Dali Li:

Complexity Measurement of Large-Scale Software System Based on Complex Network. 1317-1324 - Wei Wang, Zi-Jing Zhang:

Design of Digital Synthesis Filters for Hybrid Filter Bank A/D Converters Using Semidefinite Programming. 1325-1332 - Fu-gui He, Yanping Zhang, Xiancun Zhou, Renjin Liu, Ling Zhang:

Multi-granularity-based Routing Algorithm for Dynamic Networks. 1333-1338 - Wenjing Zhang, Donglai Ma, Wei Yao:

Medical Diagnosis Data Mining Based on Improved Apriori Algorithm. 1339-1345 - Hui Nie, Bo Liu

, Pumo Xie, Zhenbing Liu, Huihua Yang:
A Cuckoo Search Algorithm for Scheduling Multiskilled Workforce. 1346-1353 - Meng Wang, Jianfeng Teng, Erlin Liu:

Global Exponential Synchronization of Delayed BAM Neural Networks. 1354-1360
Volume 9, Number 6, 2014
- Rosario Culmone

:
Light Routing Algorithm for Utility Networks. 1361-1367 - Huamei Xin, Fangzhen Cheng, Dapeng Zhang:

MPSK Symbol-based Soft-Information-Forwarding Scheme in Rayleigh Fading Channels. 1368-1373 - Hao Zhang, Lingwei Xu

, Chunlei Wu, Jingjing Wang, T. Aaron Gulliver:
On the Capacity of Spatially Correlated MIMO Channels in a 60 GHz Indoor Environment. 1374-1379 - Zhicai Shi, Yongxiang Xia, Fei Wu, Jian Dai:

The Discretization Algorithm for Rough Data and Its Application to Intrusion Detection. 1380-1387 - Coskun Cetinkaya:

Achieving per Node Throughput Fairness in a Single-Branch of Mesh Networks. 1388-1398 - Chunhong Zhang, Yaxi He:

Network Coordination Algorithm Based on Distributed Probability Matrix Factorization. 1399-1408 - Yunfeng Yang, Hao Jin:

Ratio Tests for Persistence Change with Heavy Tailed Observations. 1409-1415 - Xiaoguo Zhang, Wei Ding:

Flow-aggregation Accelerating Strategy for TCP Traffic. 1416-1425 - Tian Shen, Zairong Tian:

Utility-based joint Power and Rate Control Game with Interference Threshold Elasticity for Cooperative Cognitive Networks. 1426-1431 - Boqi Li, Chao Yang, Song Huang:

Study on Supply Chain Disruption Management under Service Level Dependent Demand. 1432-1439 - Lihua Zhang, Guangjie Liu, Yuewei Dai:

Network Packet Length Covert Channel Based on Empirical Distribution Function. 1440-1446 - Bo Yang:

A Scheme for Securing Traffic Transport among Autonomous Systems. 1447-1453 - Hai Fang, Quan Zhou, Xiaojun Li:

Robust Reversible Data Hiding for Multispectral Images. 1454-1463 - Chao Feng, Yang Xin, Hongliang Zhu, Yixian Yang:

A Weakly Homomorphic Encryption with LDN. 1464-1470 - Weimin Xie, Liejun Wang, Mingwei Wang:

A Bloom Filter and Matrix-based Protocol for Detecting Node Replication Attack. 1471-1476 - Yi Zhang, Li Yu, Liyue Wang:

High Access Performance Strategy for Next Generation Healthcare Networks. 1477-1484 - Sébastien Demmel, Alain Lambert, Dominique Gruyer, Grégoire S. Larue

, Andry Rakotonirainy
:
IEEE 802.11p Empirical Performance Model from Evaluations on Test Tracks. 1485-1495 - Yangguang Sun, Zhihua Cai:

An Improved Character Segmentation Algorithm Based on Local Adaptive Thresholding Technique for Chinese NvShu Documents. 1496-1501 - Wentao Zhang, Wenhua Zhao, Xinhui Du:

Short-term Forecast Technology in Load of Electrified Railway based on Wavelet-extreme Learning Machine. 1502-1508 - Rongrong Song, Zili Chen:

Design of PID Controller for Maglev System Based on an Improved PSO with Mixed Inertia Weight. 1509-1517 - Jun Shuai, Xuli Han:

New Basis Functions for Model Reduction of Nonlinear PDEs. 1518-1525 - Dong Zhao, Ming Zhu, Ming Xu:

Leveraging SDN and OpenFlow to Mitigate Interference in Enterprise WLAN. 1526-1533 - Junyong Tang, Haiyan Hao, Woundlss Y. Marden:

Aware Ant Routing Algorithm in Mobile Peer-To-Peer Networks. 1534-1541 - Xin Zhang, Zhanwen Wu:

Optimization Planning based on Improved Ant Colony Algorithm for Robot. 1542-1549 - Zhenduo Wang, Jing Wang, Weigang Cheng, Qi Zhang:

Local Linear Embedding Algorithm with Adaptively Determining Neighborhood. 1550-1557 - Fushun Wang, Bin Wang, Xiaohua Sun, Zhenjiang Cai:

Data Merging Method by Protecting Energy in Wireless Sensor Networks. 1558-1564 - Junya Lv:

An Improved Clustering Algorithm based on Intelligent Computing. 1565-1571 - Xinlei Li:

Improved Joint Probabilistic Data Association Method based on Interacting Multiple Model. 1572-1579 - Dongqi Lu, Zhonghao Dongye, Zichuan Wu, Lin Chen, Zheng Wei, Xinyu Si, Chao Wang:

Global Network Model based on Earth Grid and Cellular. 1580-1587 - Zhanjie Wang, Ting Fang:

Task Scheduling Model Based on Multi-Agent and Multi-Objective Dynamical Scheduling Algorithm. 1588-1595 - Hua Li, Zhenkui Wu, Jihong Zhang, Hanshan Li:

Wind-Solar-Storage Hybrid Micro grid Control Strategy Based on SVPWM Converter. 1596-1602 - Jun Tian:

Game-theory Model based on Carrier Sense Multiple Access Protocol in Wireless Network. 1603-1609 - Changchun Deng, Yongxia Li:

A New Optimization Model with Bee Colony Algorithm on Land-Use Network. 1610-1616 - Xiubin Zhu:

Face Representation with Local Gabor Phase Quantization. 1617-1623 - Yu Zhao, Yazi Wang, Gang Wang:

Network Anti-interference Technology Based on Hybrid Optimization Algorithm. 1624-1631 - Bo Xu, Ligang Cai, Jianwu Yang, Sen Zhang:

Application of Self-optimization Closed-Loop Input-shaping with Parameter of Chaotic Particle Swarm in Coaxial Drive Printing System. 1632-1639 - Ke Xu, Cui Wen, Qiong Yuan, Xiangzhu He, Jun Tie:

A MapReduce based Parallel SVM for Email Classification. 1640-1647 - Ying Wang, Fenfen Yang, Zhuolin Yan:

Design and Development of Decision Support System for Equipping Farm Machines. 1648-1655 - Hao Wang, Lei Wu:

Adaptively Anonymous Public-Key Broadcast Encryption Scheme without Random Oracle. 1656-1663
Volume 9, Number 7, 2014
- Keiichi Endo, Akinobu Imaoka, Dai Okano, Kaname Amano:

A Search Method Using Temporary Links for Unstructured P2P Networks. 1665-1673 - Anbao Wang, Bin Zhu:

Improving MPR Selection Algorithm in OLSR Protocol Based on Node Localization Technology. 1674-1681 - Nitul Dutta

, Iti Saha Misra, Kushal Pokhrel, Mrinal Kanti Ghose
:
Performance Analysis of Multilayer MIPv6 Architecture through Experimental Testbed. 1682-1691 - Quan Liang, Jiu-mei Liang, Fumin Zou:

The Resource Configuration Method with Lower Energy Consumption Based on Prediction in Cloud Data Center. 1692-1700 - Yecai Guo, Tao Yuan, Xiuzai Zhang:

Satellite Channel Markov Model of Ka-band based on Principal Component. 1701-1706 - Bo Yang:

A Lightweight Scheme for Protecting AS-PATH Attributes of Update Messages. 1707-1713 - Xianfan Xu, Fan Guo, Dawei Ding, Sen Qiu, Kun Zhang, Haixu Zhang:

Nonlinear Dynamics in High-speed Wireless Networks Congestion Control Model with TCP LogWestwood+ under RED. 1714-1720 - Yun He, Zhongyang Xiong, Xiaolin Tan:

Optimal Rate Allocation for ISP-friendly P2P VoD Systems. 1721-1731 - Nur Arzilawati Md Yunus, Mohamed Othman:

Reliability Evaluation and Routing Integration in Shuffle Exchange Omega Network. 1732-1737 - Kai Liu, Guang Jin, Daheng Rao, Jiaming He, Xianliang Jiang:

A Participation-Based Trust Model for Mobile P2P Networks. 1738-1746 - Changxiao Zhao

, Zheng Li, Ying Xiong:
An Energy-efficient MAC Protocol with Delay-bounded Downlink Traffic Scheduling Strategy for 802.11 Wireless LANs. 1747-1755 - Chun-Hui Wu, Qin Li, Chuan Lin:

New Identity-based Key-exposure Free Chameleon Hash from Bilinear Pairings. 1756-1763 - Yong Lan, Bo Zhang, Zhicheng Chen:

QoS Performance Analysis for Slotted CSMA/CA in IEEE802.15.4. 1764-1769 - Fei Wang, Xiaofeng Liao, Songtao Guo:

A Newton-Like Optimal Resource Allocation Algorithm and its Convergence for Wireless Ad Hoc Networks. 1770-1782 - Ye Li, Yan Chen:

An improved Genetic Algorithm of Bi-level Coding for Flexible Job Shop Scheduling Problems. 1783-1789 - Nan Jiang, Yan Guo, Yueshun He:

A Local-world Evolving Model for WSNs with the Self-regulating Attractiveness. 1790-1797 - Yao-Hsu Tsai, Chieh-Heng Ko, Kuo-Chung Lin

:
Using CommonKADS Method to Build Prototype System in Medical Insurance Fraud Detection. 1798-1802 - Fang Wu, Dianhong Wang, Yong Wang:

Collaborative Nodes Strategy for Target Tracking in Two-tier Wireless Multimedia Sensor Networks. 1803-1810 - Yichao Zhou, Zhenmin Tang

, Xiyuan Hu
:
Fast Single Image Super Resolution Reconstruction via Image Separation. 1811-1818 - Shaojie Wen, Zhenyu Zhang, Wenzhong Yang, Siquan Hou:

An Energy-efficient Opportunistic Multicast Routing Protocol in Mobile Wireless Sensor Networks. 1819-1827 - Xing Liu, Kun Mean Hou, Christophe de Vaulx

, Khalid El Gholami
:
Real-time Embedded Java Virtual Machine for Application Development in Wireless Sensor Network. 1828-1837 - Jianzhong Zhou, Ji'an Li, Yongchuan Zhang:

Efficient Deployment Scheme Selection Based On TOPSIS for Clustering Protocols of WSN. 1838-1845 - Hao Wang, Lei Wu:

Unbounded Anonymous Hierarchical Identity-Based Encryption in the Standard Model. 1846-1853 - Chunhong Guo, Yu Zhou, Qingwei Ye, Xiaodong Wang:

A Zigbee and Bluetooth Protocol Converter Based on Multi-sinks Wireless Sensor Network. 1854-1860 - Ke Xiao, Haiying Jiang, Yuanyao Lu:

A Physical Layer Scheme in Two-Way Relay Networks with Soft Network Coding. 1861-1867 - Han Yan, Zhihong Zou:

Water Quality Evaluation Based on Entropy Coefficient and Blind Number Theory Measure Model. 1868-1874 - Pu Wang, Liying Fang, Lei Yu:

Research on Application of Improved Smart Data Aggregation Algorithm in Wireless Sensor Network. 1875-1882 - Xinlei Li, Di Li:

A Network Attack Model based on Colored Petri Net. 1883-1891 - Gang Ni, Bixi Zhang, Pangpang Wu:

Layered Workflow Process Model Based on Extended Synchronizer. 1892-1899 - Qiang Xian, Wanting Zhang:

Adaptive Localization Algorithm Based on Distributed Compressed Sensing in Wireless Sensor Networks. 1900-1907 - Xuequan Tian, Yi Yang, Hongke Wang:

Oscillation Criteria for Damping Quasi-Linear Neutral Differential Equations with Distributed Deviating Arguments. 1908-1913 - Zhuo Zhang, Qinruo Wang, Qiyu Yang, Cheng Zhang:

Study on Network Remote Controlling Huge-Power Chopping Cascade Speed Regulation System Based on State-Space Averaging Model. 1914-1920 - Wenjing Xu:

Vehicle Travel Time Predication based on Multiple Kernel Regression. 1921-1926 - Xuebing Dai, Yan Zhang, Chaojing Wang:

An Reliable Transmission Scheme Based on Opportunistic Cooperation for Wireless Body Sensor Networks. 1927-1934 - Yang Gao:

Wireless Sensor Network Adaptive Energy Optimization Clustering Algorithm based on Routing Rules. 1935-1940 - Yannan Yu, Rongfeng Yang, Jichi Yan, Chang Qu:

Research on Cascaded H-bridge SVG. 1941-1947 - Wenqing Ge, Yanjun Zhao, Bo Li, Binbin Sun

:
Numerical Simulation of Electric Controlled Injection Device Equipped on Gas Fuel Engine. 1948-1954 - Yanli Hou:

Multiple-sensor Fusion Tracking Based on Square-root Cubature Kalman Filtering. 1955-1961 - Rui Ouyang, Miaochan Zhao:

Study on Signal Intersection Traffic Flow Characteristics in Ice Conditions. 1962-1969
Volume 9, Number 8, 2014
- Mohamed K. Watfa

, Mohamed Moubarak:
A Benchmarking Tool for Wireless Sensor Network Embedded Operating Systems. 1971-1984 - Wei Wang, Hao Huang, Changsheng Xie, Lin Han:

CBSNTS: A Chaotic Based Security Network Transmission System. 1985-1992 - Zongjian He, Huijuan Zhang:

Density Adaptive Urban Data Collection in Vehicular Sensor Networks. 1993-2002 - Shiyu Du, Jiayin Qi:

Multi-agent Modeling and Simulation on Group Polarization Behavior in Web 2.0. 2003-2012 - Reza Adinehnia, Mohamed Othman:

Direction-based TCP Fairness Enhancement in High speed IEEE 802.11n. 2013-2020 - Heng Shao, Juan Li:

Research on Resource Sharing and Concurrency Access Based on E-learning Platform. 2021-2025 - Jun Xu, Yann-Hang Lee, Chengcheng Guo, Jianfeng Yang:

Resource Allocation in City-wide Real-Time Wireless Mesh Networks. 2026-2036 - Yufeng Xiao:

An Efficient Network Reliability Computation Method Based on Isomorphism Judgment. 2037-2044 - Hongxia Shi:

Adaptive Packet Context-Constrained KL-Divergence Model for Intrusion Detection. 2045-2050 - Chuan-Min Lee

:
Remarks on the Complexity of Non-negative Signed Domination. 2051-2058 - Wei Li, Yan Wang:

Design and Implementation of Distance Learning Platform Based on Information Technology and Cloud Computing. 2059-2065 - Jinfeng Li, Jilong Bian, Limei Wang, Liu Yang:

Small Baseline Stereo Matching Method based on Maximum Likelihood Estimation. 2066-2071 - Hailiang Wang, Zhihui Ge, Taoshen Li:

E2-DLNA: An Improved Energy-Efficiency Mechanism for DLNA. 2072-2078 - Lijun Dong

, Jinxia Wu, Cheng Gong, Benjie Pi:
A Network-Cliques Based Role Mining Model. 2079-2088 - Jemal H. Abawajy, Gleb Beliakov

, Andrei V. Kelarev, Morshed U. Chowdhury
:
Iterative Construction of Hierarchical Classifiers for Phishing Website Detection. 2089-2098 - Yi Liu, Tianri Wang, Mingzhong Yang:

Research on Concept Clustering of Order Task Ontology based on Modified PART. 2099-2105 - Jinmin Guo, Congshuang Luo:

Study on Application of Electromagnetic Tomography Advanced Geological Prediction in Tunnel Construction. 2106-2113 - Yi Han, Yuan Yao, Haiyang Liu:

Design and Implementation of Driving Behavior Analysis System. 2114-2120 - Guo Pan, Aijia Ouyang:

Medium and Long Term Power Load Forecasting using CPSO-GM Model. 2121-2128 - Nanli Zhu, Yibo Wang, Cheng Cheng, Wei Xu, Yongping Zhang, Ping Zou, M. S. K. Awan:

Regression-Based Microblogging Influence Detection Framework for Stock Market. 2129-2136 - Jiali Wang, Qingnian Zhang:

Model and Algorithm Design for Cargo Shipping Safety Based on Fuzzy- Precise Bayesian Network. 2137-2144 - Jian Zhang:

Adaptive Fault Diagnosis Method Based on FNN. 2145-2152 - Zhiqing Zheng:

Cooperative Networks Power Allocation Scheme for Two-Way Opportunistic Relaying. 2153-2160 - Xueqin Kou, Lichen Gu:

Research of Long Range Accurate Ranging Technology Based on Ultrasonic Sensor Measurement. 2161-2167 - Shaoxiong Zheng, Weixing Wang, Baoxia Sun, Gang Lei:

Design of a Gateway Based on Directional Antenna WSN in Paddy Field. 2168-2175 - Feng Liu, Xiaoxing Gao:

A New Construction of Pseudorandom Number Generator. 2176-2182 - Jianhui Lai, Yanyan Chen, Weiwei Zhang, Zhihong Chen:

Identification Method of Residence and Employment Locations Based on Cellular Phone Data. 2183-2188 - Gang Cao:

Secure and Efficient Electronic Auction Scheme with Strong Anonymity. 2189-2194 - Wei Liu

, Shumei Yang:
Research on the Distribution of Attention in the Course of Maintenance Training. 2195-2202 - Yourui Huang, Jing Wang, Liguo Qu:

FPGA Implementation of Temperature Controller for PCR Based on Microfluidic Chip. 2203-2210 - Zhangbing Li, Zilan Zhu, Shaobo Zhang

:
A Locking Mechanism for Distributed Database Systems. 2211-2217 - Hong Wu, Peng Lin, Kun Chen:

A Novel Frequency Offset Estimation Algorithm with Wide Range and High Accuracy for OFDM System. 2218-2223 - Jiamin Qi, Jiapin Chen, Yu Geng:

Unambiguous Synchronization Scheme for GNSS BOC(n, n) Signals. 2224-2231 - Jing Zhao:

Self-adaptive Particle Swarm Optimization Algorithm based on Directed-weighted Complex Networks. 2232-2238 - Xingjun Shi, Huibin Xu:

An Effective Scheme for Location Privacy in VANETs. 2239-2244 - Fushun Wang, Bin Wang, Xiaohua Sun, Zhenjiang Cai:

Data Merging Method by Protecting Energy in Wireless Sensor Networks. 2245-2251 - Xuefei Gao, Yongli An, Kaiyu Zhu:

2FSK Modem Based on the Microcontroller AT89C51. 2252-2258
Volume 9, Number 9, 2014
- Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury:

Automatic Generation of Meta Classifiers with Large Levels for Distributed Computing and Networking. 2259-2268 - Peipeng Liu, Lihong Wang, Qingfeng Tan, Quangang Li

, Xuebin Wang, Jinqiao Shi:
Empirical Measurement and Analysis of I2P Routers. 2269-2278 - Lei Yang, Yifang Qin, Xu Zhou, Hongjia Li, Song Ci, Hui Tang:

Social Relation Based Cache Distribution Policy in Wireless Mobile Networks. 2279-2288 - Yang Li, Ying Sha, Jixi Shan, Bo Jiang, Jianjun Wu:

An Improved Community Partition Algorithm Integrating Mutual Information. 2289-2298 - Jikang Xia, Lan Chen, Ying Li, Endong Tong

:
A Physical Layer Key Negotiation Mechanism to Secure Wireless Networks. 2299-2308 - Ahmed K. Elsherif, Chunming Tang, Lei Zhang:

Radar Detection Based on Fuzzy Hypotheses with Fuzzy Data. 2309-2318 - Bo Zeng, Yabo Dong:

A Collaboration-based Distributed TDMA Scheduling Algorithm for Data Collection in Wireless Sensor Networks. 2319-2327 - Weiting Gao, Hui Li:

A Blind Adaptive Kalman-PIC MUD Algorithm for the Multiple Access Communication Network. 2328-2335 - Meijuan Chen, Xiaorong Zhu, Hongbo Zhu:

Service Adaptively Medium Access Control Algorithm Based on Fuzzy Logical for Energy Harvesting Wireless Sensor Networks. 2336-2341 - Quazi Mamun

, Ashfaqur Rahman:
A Robust Data Gathering Technique for Large Scaled Wireless Sensor Networks. 2342-2352 - Jian Zhou, Fan Yang, Ke Wang:

An Inverse Shortest Path Problem on an Uncertain Graph. 2353-2359 - Tingrui Pei, Yuxin Cao, Zhetao Li, Gengming Zhu:

Overlapping Community Detection by Local Community Gravitation in Social Networks. 2360-2364 - I. Chandra, K. Helenprabha

:
Efficient Resource Allocation with QoS Guarantee on LTE-A Downlink Network Systems. 2365-2370 - Qi Yang, Yuebo Cao:

The value distribution of fm + a(f(k))n and normal families of meromorphic functions. 2371-2375 - Na Wang, Xiaogang Qi, Li Duan, Hua Jiang, Xiaofei Liu:

Clustering-based Routing Algorithm in Wireless Sensor Networks with Mobile Sink. 2376-2383 - Ji'an Li, Jianzhong Zhou, Yongchuan Zhang:

Cluster Head Selection Based on an Information Factor for Wireless Sensor Network Protocol. 2384-2391 - Mingyi Duan, Yajun Yang, Wei Wang:

An RFID Data and Location Parameter Joint Estimation Based on an Improved MCMC Method. 2392-2401 - Donglan Zou:

Research on the New Algorithm using Multi-Array Computation Signal Direction. 2402-2410 - Li Daniel, Xi Li, Ming-Jie Li, Jun Wang, Zheng-yu Huang:

Application of the Grey System Theory to Predict the Strength Retrogression of Concrete with Gangue Subjected to Corrosion by Sulphate. 2411-2416 - Wei Wang, Wei Wei, Jie Hu, Junting Ye, Qinghua Zheng:

Knowledge Unit Relation Recognition Based on Markov Logic Networks. 2417-2423 - Rui-hui Mu:

Node-Based Resource Optimization Algorithm of Wireless Network. 2424-2432 - Jincheng Huang, Huihui Xiang, Yaheng Zhang:

Stable AODV Routing Protocol with Energy-aware in Mobile Ad Hoc Network. 2433-2440 - Jun Gong, Manru Li:

Queuing Time Decision Model with the Consideration on Call Center Customer Abandonment Behavior. 2441-2447 - Fengxiang Wu:

A Novel Opportunistic Relay and Energy Efficient Power Allocation Algorithm in Cooperative Wireless Sensor Networks. 2448-2455 - Yajun Hou:

P2P Network Traffic Identification Based on Random Forest Algorithm. 2456-2461 - Yiping Zheng, F. Liu:

Filtering Network Spam Message using Approximated Logistic Regression. 2462-2467 - Liang Yuan, Chuan Cai:

An Improved Clustering Routing Algorithm in Wireless Sensor Network Based on ZigBee. 2468-2473 - Ningzhe Xing:

Optimization Algorithm of Power Communication Network Based on the Equivalent Network. 2474-2481 - Hongdong Zhang, Yuli Song:

Study on the Survival of Wireless Sensor Networks Based on Hierarchical Topology Control Method. 2482-2489 - Hengshan Zong, Guozhu Jia, Feng Jin, Jili Kong:

Evolutionary Game Analysis of Knowledge Sharing in Asymmetric Upstream and Downstream Enterprises of Supply Chain. 2490-2497 - Xingguang Liu, Zi John:

Active Mechanism Network Coding Algorithm based on Multi-channel Sensing. 2498-2503 - P. Ni, Y. L. Liu, Z. H. He:

A New Estimation Method for Burnout Point Parameters of Ballistic Missile Based on Closest Distance Method. 2504-2513 - Xiaohui Su, Tongxin Hu:

Flue Gas Analysis Based on Recursive Iteration Algorithm. 2514-2520 - Hui Hu, Zhongxiao Hao, Peng Guo, Xilong Qu:

Output Feedback Tracking Control Based on Neural Network for a Class of SISO Strict Feedback Nonlinear Systems. 2521-2528 - Yu Liu, Shihong Chen, Yunhua Wang:

SOFERS: Scenario Ontology for Emergency Response System. 2529-2535 - Dandan Cheng, Qingwei Ye, Yu Zhou, Xiaodong Wang:

A Compression Sampling System based on Sparse AR Model. 2536-2542 - Zhi Bai, Yigang He, Sainan Wang:

Research of RFID Tag Anti-collision Algorithm based on Binary Tree. 2543-2548 - Linqin Cai, Youdong Zhang, Jianrong Zhang, Binbin Liu:

Controller Design for Nonlinear Networked Control Systems with Time-varying Delay Based on T-S Fuzzy Model. 2549-2555 - Kete Wang, Lisheng Wang, Xinkao Liao, George Albert:

An Auto-Matching Model with Pattern Recognition Using Bayesian Classifier for Parallel Programming on A Multi-Core Processor. 2556-2566
Volume 9, Number 10, 2014
- Mohammad Ahmadinia, Hamid Alinejad-Rokny, Hojjatollah Ahangarikiasari:

Data Aggregation in Wireless Sensor Networks Based on Environmental Similarity: A Learning Automata Approach. 2567-2573 - Xiaoping Yang, Chunfeng Song, Jiwei Sun, Xiaojing Wang:

Simulation and Implementation of Adaptive Fuzzy PID. 2574-2581 - Ning Huang:

An Enhanced Hill Cipher and Its Application in Software Copy Protection. 2582-2590 - Lubos Matejka, Jindrich Skupa, Radek Strejc, Ladislav Pesicka, Jirí Safarík:

Dynamic Routing in Distributed File System. 2591-2597 - Fan Zhao, Jin Li:

Pedestrian Motion Tracking and Crowd Abnormal Behavior Detection Based on Intelligent Video Surveillance. 2598-2605 - Cheng Yuan, Xiaodong Wang, Shu-ming Xiong, Lijing Ma, Qishi Miu:

A Fair Data Transmission Strategy in Underwater Acoustic Sensor Networks. 2606-2614 - Cheng Wang, Zhicong Liang:

Android-based Vehicular Distributed Intelligent Video Collection System. 2615-2621 - Tianshu Wang, Gongxuan Zhang, Xichen Yang, Longxia Huang:

A New Architecture in Greenhouse Soil Solution Monitoring System Based on ZigBee Protocol. 2622-2628 - Song Yang, Feng Hu, Chaoshi Cai:

An Improved Tone Reservation Scheme Based Nearly Optimal Peak Reduction for Adaptive Amplitude Clipping. 2629-2632 - Giovanni B. Vece, Eros Mazza, Massimo Conti:

A System-Level Protocol-Based Methodology for Noise Analysis of Digital Networked Systems. 2633-2644 - Wei Feng, Haixia Wu:

Stability of Genetic Regulatory Networks with Interval Time-Varying Delays via Convex Combination Method. 2645-2654 - Yila Huang, Qiwei Lu, Yan Xiong:

Collaborative Outsourced Data Mining for Secure Cloud Computing. 2655-2664 - Lujuan Ma, Henry Leung, Deshi Li:

Hybrid TDMA/CDMA MAC Protocol for Wireless Sensor Networks. 2665-2673 - Dan Tang, Kai Chen, Xiaosu Chen, Huiyu Liu, Xinhua Li:

A New Collaborative Detection Method for LDoS Attacks. 2674-2681 - Jianqing Li, Weiming Wang, Chuanhuang Li, Julong Lan:

Research on the Function Consistency of the Network Element based on Atomic Capability Architecture. 2682-2689 - Li Zhou, Junshe An:

Research on Wireless MIL-STD-1553B Bus Based on Infrared Technology. 2690-2696 - Xueyan Zhou, Jing Yang, Zehong Lin, Yali Ji:

Research on the Spread Control of Unconfirmed Information after the Emergency Occurs based on the Topic Model. 2697-2701 - Shangfeng Mo, Yongjian Fan, Yinglong Li, Xiaoliang Wang:

Multi-Attribute Join Query Processing in Sensor Networks. 2702-2712 - Meihong Liu, Xingqun Zhan, Wei Li, Maolin Chen:

MSK-BCS Modulation for GNSS Radio Frequency Compatibility in C Band. 2713-2720 - Dongyi Ling, Shihai Wang, Bin Liu, Xiaoqi Xing:

Reliability Evaluation based on the AADL Architecture Model. 2721-2727 - Peiyi Shen, Liang Zhang, Juan Song, Hu Xu, Lianjie Qin, Wei Wei, Wenzheng Zhang, Bin Leng, Mengqi Zeng:

A Near-Infrared Face Detection and Recognition System Using ASM and PCA+LDA. 2728-2733 - Xiaoli Chen, Xiang Gu, Jinfeng Xu:

The Analysis of Information Architecture in Mobile Web Design. 2734-2742 - Hua Guan, Shi Ying, Chunwei Wang:

A Correctness Verification Approach of the BPEL Exception Handling CPN Model Based on Temporal Property. 2743-2750 - Jianjun Lang, Qigang Jiang:

Update Strategies of Global Statistics in Distributed Information Retrieval System. 2751-2757 - Xinchao Song, Yishuang Geng:

Distributed Community Detection Optimization Algorithm for Complex Networks. 2758-2765 - Liu Yang, Wei Wang:

FLAP: Flash-aware Prefetching for Improving SSD-based Disk Cache. 2766-2774 - Jianhui Cao, Yanlin Guo, Chunxiang Dong, Pengru Liu:

Personalized Recommendation for Digital Library using Gaussian Mixture Model. 2775-2781 - Xiaohong Chen, Xueli Fang:

The Micro Individual Characteristics in Non-motorized Traffic Mixed of Bicycles and Mopeds. 2782-2787 - Xiaoying Wang, Danqi Chen, Qingjie Liu, Ling Bai:

An Improvement Crypton Protocol with Higher Security Margin. 2788-2795 - Yonglong Tang:

A User Authentication Protocol based on Multiple Factors. 2796-2804 - Anyu Cheng, Xiaoyu Lin, Yongfu Li, Wei Xu:

Design and application of SAE J1939 communication protocol in electric vehicle. 2805-2812 - Xin Huang:

Construction Research of Computer Network System Security based on Distributed Intrusion Detection Technology. 2813-2820 - Cong Liao, Hongwu Huang, Xinye Wu:

Weighing Technology for High-Speed Moving Vehicle Based on Wireless Sensor Networks. 2821-2827 - Weiwei Wu, Hua Sun:

Network Topology Algorithm Based on Energy-consumption Optimization of Multi-hop Wireless Networks. 2828-2834 - Xiaomei Wang, Peng Yu, Xiaoyi Zhang, Liang Fan, Qiao Zhang:

A Forward Error-Tolerant Reassembly Method for Receiving Network Data. 2835-2842 - Hongquan Xue, Peng Zhang, Shengmin Wei, Lin Yang:

An Improved Immune Algorithm for Multi-objective Flexible Job-shop Scheduling. 2843-2850 - Jia Chen, Xian Huang:

Fault Detection of Remote Multimedia in Wireless Network Based on Fuzzy Neural Network. 2851-2857 - Guowei Wang, Guangming Xu, Manjun Xue:

Unified Identity Authentication between Heterogeneous Systems Based on LDAP and RBAC. 2858-2865 - Jinfeng Gao, Nannan Ruan:

Study on Reliable Control of Time-delay Switched Singular Systems. 2866-2873
Volume 9, Number 11, 2014
Guest Editorial
- Jemal H. Abawajy, Md. Rafiqul Islam:

Guest Editorial. 2875-2877
- Mamoun Alazab

, Md. Shamsul Huda, Jemal H. Abawajy, Md. Rafiqul Islam, John Yearwood, Sitalakshmi Venkatraman, Roderic Broadhurst:
A Hybrid Wrapper-Filter Approach for Malware Detection. 2878-2891 - Juan Camilo Corena, Tomoaki Ohtsuki:

Pollution-Free Regenerating Codes With Fast Reconstruction Verification for Verifiable Cloud Storage. 2892-2904 - Naoya Kajiwara, Shinichi Matsumoto, Yuuki Nishimoto, Yoshiaki Hori, Kouichi Sakurai:

Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework. 2905-2913 - Quazi Mamun

, Md. Rafiqul Islam
, Mohammed Kaosar
:
Anomaly Detection in Wireless Sensor Network. 2914-2924 - Belal Chowdhury, Morshed U. Chowdhury, Jemal H. Abawajy:

Securing a Smart Anti-counterfeit Web Application. 2925-2933 - Anwar Hossain Masud, Xiaodi Huang

, Md. Rafiqul Islam
:
A Novel Approach for the Security Remedial in a Cloud-based E-learning Network. 2934-2942 - Nabil Ghanmy, Lamia Chaari Fourati, Lotfi Kamoun:

Elliptic curve cryptography for WSN and SPA attacks method for energy evaluation. 2943-2950
- Lin Zhao, Zhibo Chen, Guodong Sun:

Dynamic Cluster-based Routing for Wireless Sensor Networks. 2951-2956 - Qiuyun Xiao, Zhihai Wu, Li Peng:

Fast Finite-Time Consensus Tracking of Second-Order Multi-Agent Systems with a Virtual Leader. 2957-2963 - Huafeng Wu, Su Nie, Junjun Li:

EA-COR: An Environment Adaptive Clustering Opportunistic Routing Protocol of WSN. 2964-2970 - Fang Wang, Yuanqing Qin, Tonghui Qian, Qi Zhang:

A Newton Iteration Based WSN Localization System in Underground Tunnels. 2971-2980 - Dan Tang, Kai Chen, Xiaosu Chen, Huiyu Liu, Xinhua Li:

A New Detection Method based on AEWMA Algorithm for LDoS attacks. 2981-2986 - Qingtao Wu, Min Cui, Mingchuan Zhang, Ruijuan Zheng, Ying Lou:

A Cloud Service Resource Classification Strategy Based on Feature Similarity. 2987-2993 - Diego Mendez, Miguel A. Labrador:

A General Framework for Participatory Sensing Systems. 2994-3004 - Yunlong Zhou, Chao Xu:

Hopf Bifurcation in a Dual Model of Internet Congestion Control System Using Dynamic Delayed Feedback. 3005-3014 - Guo H. Lei, Ting T. Liu, Wei Yang, Young-Il Kim:

A Peer-To-Peer Membership Management Protocol for Wireless Mesh Networks. 3015-3024 - Huqing Wang, Zhixin Sun:

Study on the Improvement of ELGamal Cryptosystem Based on Elliptic Curve. 3025-3029 - Yanru Xue, Min Liu, Feng Wang:

An Optimized Frequent Item Query Algorithm for Uncertain Streaming Data. 3030-3037 - Huazhu Wu, Changyou Wang, Chunguang Zhang:

Design of Servo Controller for Flying Shear Machine Based on ARM and FPGA. 3038-3045 - Lufeng Li:

Research on the Computer Recovery Technology based on the Motion Blurred Image. 3046-3052 - Qi Song, Shan Li, Ming-xiao Ma, Yan Zhu, Jun-she An:

System Design and Fault Tolerance Analysis of the Distributed Storage System with Solid State Recorder on Spacecraft. 3053-3060 - Juan Du, Yang Liu, Zhi-an Yi, E. P. Tracy:

Research on SVM Classification Algorithm Based on RS Attribute Reduction. 3061-3069 - Jingguo Qu, Yuhuan Cui, Xin Zhou:

Application of Infinitesimal Method in Determining the Best Shape of a Cake Pan. 3070-3076 - Yuhuan Cui, Jingguo Qu, Huancheng Zhang:

Modeling and Numerical Simulation of Cellular Automation Traffic Flow Model. 3077-3083 - Ningzhe Xing, Yutong Ji:

Research on Service Controlling Algorithm of Electric Power Communication Network based on QoS Traffic Recognition and Routing Optimization. 3084-3091 - Fu Xie, Fangai Liu:

Dynamic Effective Resource Allocation Based on Cloud Computing Learning Model. 3092-3097 - Chao Yang:

Research and Implementation of Low Cost Arc Fault Circuit Interrupter. 3098-3105 - Manjiang Hu, Hongmao Qing, Long Ying, Renkai Ding:

Diesel Engine Fault Diagnosis Method Based on GA-PNN. 3106-3112 - Lihua Zhang, Xichang Dai, Haiquan Fan:

Broadcast Encryption Based on Bidirectional Remote Authentication Scheme. 3113-3119 - Chao-Shan Yang, Ling Zhou, Gao-Sheng Wang:

A Flexibility-based Method for Damage Identification of Cantilever-type Structures. 3120-3126 - Guowei Wang, Zongpu Jia, Manjun Xue:

Data Migration Model and Algorithm between Heterogeneous Databases based on Web Service. 3127-3134 - Liang Hu, Bofeng Liu, Kuo Zhao, Xiangyu Meng, Feng Wang:

Research and Implementation of the Localization Algorithm Based on RSSI Technology. 3135-3142 - Yuanfang Xin, Xia Sun:

System Design for Real-time Image Processing Based on Multi-core DSP. 3143-3150 - Ling Hu:

Research on the Application of Regression Analysis Method in Data Classification. 3151-3157 - Shanhui Sun, Hong Li, Zhuangzhuang Li, Bingqiu Zhang:

Mathematical Modeling and Fractal Clustering Algorithm in Online Shopping. 3158-3165 - Yan Wu, Gang Li:

Solution of Evidence Distance in Multi-Source Information Fusion. 3166-3174 - Lijuan Liao:

Incremental Subspace Data-mining Algorithm Based on Data-flow Density of Complex Network. 3175-3181 - Yamei Li:

An Improved DV-Hop Localization Algorithm Based on Energy-saving Non-ranging Optimization. 3182-3187
Volume 9, Number 12, 2014
- Salahuddin Muhammad Salim Zabir, Jemal H. Abawajy, Farid Ahmed, Joarder Kamruzzaman, Mohammad A. Karim, Nurul I. Sarkar

:
Guest Editorial. 3189-3191 - Md. Nazmul Islam Khan, Md. Jobayer Alam:

Efficient Scheme for Channel Estimation in OFDM System. 3192-3199 - M. M. Kamruzzaman

:
Performance of Decode and Forward MIMO Relaying using STBC for Wireless Uplink. 3200-3206 - Duc Minh Pham, Syed Mahfuzul Aziz

:
On Efficient Design of LDPC Decoders for Wireless Sensor Networks. 3207-3214 - A. K. M. Baki, Nemai Chandra Karmakar:

Performance Comparison of RFID Tag at UHF Band and Millimeter-Wave Band. 3215-3220 - Lei Wang, Jui-Yu Yang, Yu-Yun Lin, Wei-Jun Lin:

Keeping Desired QoS by a Partial Coverage Algorithm for Cluster-Based Wireless Sensor Networks. 3221-3229 - Wen-Li Li, Chun-Hung Richard Lin, Chih-Heng Ke:

Achieving VoIP Guarantee in Wireless Local Area Networks. 3230-3236
- Baobao Liu, Junying Zhang, Cong Xu:

DOA Estimation for Coherent Sources in Impulsive Noise Environments. 3237-3241 - Xue Li, Yingan Cui, Xia Hui:

Research on Structure Ontology Characteristic of Blogosphere. 3242-3250 - Xue Miao, Gang Fu, Ruitao Ma, Longshe Huo:

Source-Directed Path Diversity in the Interdomain Routing. 3251-3262 - Xiaolong Li, Donglei Feng:

Markov Chain Based Trust Management Scheme for Wireless Sensor Networks. 3263-3267 - Qiuyun Xiao, Zhihai Wu, Li Peng:

Fast Finite-Time Consensus Tracking of Second-Order Multi-Agent Systems with a Virtual Leader. 3268-3274 - Chathuranga Widanapathirana, X. Ang, Jonathan C. Li

, Milosh V. Ivanovich, Paul G. Fitzpatrick, Y. Ahmet Sekercioglu:
A Hybrid Classifier Using Reduced Signatures for Automated Soft-Failure Diagnosis in Network End-User Devices. 3275-3289 - Sujoy Saha, Rohit Verma

, Somir Saika, Partha Sarathi Paul
, Subrata Nandi:
e-ONE: Enhanced ONE for Simulating Challenged Network Scenarios. 3290-3304 - Jingjing Yuan, Peiying Chen, Qinghua Liu, Heng Li:

A Load-Balanced On-Demand Routing for LEO Satellite Networks. 3305-3312 - AL-Museelem Waleed, Chunlin Li, Naji Hasan A. H:

The faults of Data Security and Privacy in the Cloud Computing. 3313-3320 - Wesam A. Almobaideen, Njoud O. Al-maitah:

TTAF: TCP Timeout Adaptivity Based on Fast Retransmit over MANET. 3321-3326 - Ping He, Shuli Luan:

On-line Data Retrieval Algorithm with Restart Strategy in Wireless Networks. 3327-3335 - G. Sanjiv Rao

, V. Valli Kumari:
Trail Coverage : A Coverage Model for Efficient Intruder Detection near Geographical Obstacles in WSNs. 3336-3346 - Marcelo Luiz Brocardo, Issa Traoré, Sherif Saad, Isaac Woungang:

Verifying Online User Identity using Stylometric Analysis for Short Messages. 3347-3355 - Dong Zhong, Yian Zhu, Tao You, Jie Kong:

Topology Control Mechanism Based on Link Available Probability in Aeronautical Ad Hoc Network. 3356-3365 - Guangxia Xu, Manman Wang:

An Energy-Efficient Routing Mechanism Based On Genetic Ant Colony Algorithm for Wireless Body Area Networks. 3366-3372 - Guangxia Xu, Fuyi Lin, Yu Liu:

An Improved Mix Transmission Algorithm for Privacy-Preserving. 3373-3380 - S. Fouziya Sulthana

, Rangaswamy Nakkeeran:
Study of Downlink Scheduling Algorithms in LTE Networks. 3381-3391 - Adnan Huremovic, Mesud Hadzialic:

Delay and Jitter in Networks with IPP Traffic: Theoretical Model. 3392-3399 - Xiaofeng Li, Liangfeng Chen, Jianping Wang, Zhong Chu, Bing Liu:

A Novel Method to Improve the Accuracy of the RSSI Techniques Based on RSSI-D. 3400-3406 - Anil Singh, Shashikala Tapaswi:

An Adaptative Energy Efficient Routing Protocol for MANET. 3407-3414 - Muhammad Yeasir Arafat

, Muhammad Morshed Alam, Feroz Ahmed:
SIP-Based QoS in IP Telephony. 3415-3426 - Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu:

A Resource-Efficient System for Detection and Verification of Anomalies Using Mobile Agents in Wireless Sensor Networks. 3427-3444 - Baoqiang Lv, Yiwen Huang, Taihua Li, Xuewu Dai, Muxi He, Wuxiong Zhang, Yang Yang:

Simulation and Performance Analysis of the IEEE1588 PTP with Kalman Filtering in Multi-hop Wireless Sensor Networks. 3445-3453 - Doan Perdana, Riri Fitri Sari:

Enhancing Channel Coordination Scheme Caused by Corrupted Nakagami Signal and Mobility Models on the IEEE 1609.4 Standard. 3454-3461 - Dingli Yang, Qiuchan Bai, Yulin Zhang, Rendong Ji, Yazhou Li, Yudong Yang:

Error Performance Analysis of Multiuser CDMA Systems with Space-time Coding in Rician Fading Channel. 3462-3469 - Nazrul Muhaimin Ahmad, Anang Hudaya Muhamad Amin, Subarmaniam Kannan, Mohd Faizal Abdollah, Robiah Yusof:

Detecting Access Point Spoofing Attacks Using Partitioning-based Clustering. 3470-3477 - Rui Zhou, Jinghan Wang, Guowei Wang, Jing Li:

Customized Interface Generation Model Based on Knowledge and Template for Web Service. 3478-3485 - Jingguo Qu, Yuhuan Cui, Weiliang Zhu:

Algorithm and Its Implementation of Vehicle Safety Distance Control Based on the Numerical Simulation. 3486-3493 - Yuhuan Cui, Jingguo Qu, Weiliang Zhu:

The Study and Improvement of Unidimensional Search about Nonlinear Optimization. 3494-3501 - Limei Ma, Guoxiu Li, Lixing Zhao:

Multi-Objective Optimal Configuration of Reconfigurable Test Platform: A Modified Discrete Particle Swarm Optimization Approach. 3502-3509

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














