default search action
International Journal of Autonomous and Adaptive Communications Systems, Volume 16
Volume 16, Number 1, 2023
- Shihong Chen:
Vulnerability detection of the authentication protocol in the IOT based on improved wavelet packet. 1-16 - Jue Ma:
Network dynamic routing and spectrum allocation algorithm based on blockchain technology. 17-30 - Liuyang Wang, Yangxin Yu:
Access control method of laboratory cloud data based on internet of things technology. 31-47 - Hongli Deng, Tao Yang:
Real time detection of intrusion trace information in sensor network based on Bayesian belief network. 48-65 - Gao Fei:
Security key distribution method of wireless sensor network based on DV-hop algorithm. 66-83 - Zixiang Yan:
Optimum design of distance education assistant system based on wireless network. 84-96 - Yun Zhao, Yong Xiao, Weibin Lin, Chao Cui, Di Xu:
Dynamic key distribution method for wireless sensor networks based on exponential algorithm. 97-111 - Liang Jin, Wei Li, Qinghui Meng:
A new IoT resource addressing method based on rough set neural network. 112-125 - Di Zhao, Jing Liu:
Design of DC measurement traceability system of charging pile by considering internet of things and fuzzy clustering. 126-140
Volume 16, Number 2, 2023
- Danxia Luo, Chang-an Ren:
Layered routing algorithm for wireless sensor networks based on energy balance. 141-158 - Xiaofei Liu, Shaohui Zhong:
Personalised recommendation algorithm of network resources based on collaborative knowledge map. 159-174 - Jiwei Qin, Honglin Dai:
Collaborative variational factorisation machine for recommender system. 175-187 - Yawen Li:
Research on e-business requirement information resource extraction method in network big data. 188-202 - Hao Yang, Yibo Xia, Wen Cai, Xin Xie:
Detection of malicious rank attack nodes in communication network based on windowed frequency shift algorithm. 203-219 - Ming Wu:
The cleaning method of duplicate big data based on association rule mining algorithm. 220-231
Volume 16, Number 3, 2023
- Li Hao, Tuanbu Wang, Chaoping Guo:
Research on parallel association rule mining of big data based on an improved K-means clustering algorithm. 233-247 - Spoorthi P. Shetty, Udaya Kumar K. Shenoy:
Performance of RPL under various mobility models in IoT. 248-269 - Hui Zhang, Su Zhang, Xiaoling Jiang:
Response efficiency optimisation of data cube online analysis for network user's behaviour. 270-283 - Jianli Guo:
Industrial internet of things for smart factory: current state and problems. 284-295 - Jing Liu, Di Zhao:
Nonintrusive power load feature recognition based on internet of things technology. 296-312 - Xiaochuan Pu, Wonchul Seo, Qingqiang Ruan:
Unsupervised clustering algorithm for databases based on density peak optimisation. 313-326
Volume 16, Number 4, 2023
- Li Sun:
The security storage method of dynamic data in internet of things based on blockchain. 327-341 - Chunzi Zhang:
Design of online monitoring method for English education resource allocation in the internet of things learning environment. 342-356 - Bingchen Lin:
Research on abnormal data recognition method of optical network based on WiFi triangular location. 357-375 - Hongli Deng, Tao Yang:
A new encryption and decryption algorithm for privacy data in wireless sensor network based on dynamic key. 376-390 - Mithun Chakraborty, Debdatta Kandar, Bansibadan Maji:
Integrated radar radio: enabling technology for smart vehicle of smart cities. 391-403 - Abderrahim El-Amrani, Bensalem Boukili, Ahmed El Hajjaji, Ismail Boumhidi:
H∞ model reduction of 2D discrete-time T-S fuzzy systems. 404-418
Volume 16, Number 5, 2023
- Jiancheng Zou, Peizhou Yan, Zhengzheng Li:
Depth information acquisition and image measurement algorithm using microarray camera. 419-435 - Yun Zhao, Ziwen Cai, Tao Huang, Bin Qian, Mi Zhou:
Heuristic positioning method for intrusion nodes in sensor networks based on quantum annealing algorithm. 436-450 - Chengsheng Yuan, Mingyu Chen, Yue Wu:
A low-rank LBP with local differential polarisation for fingerprint liveness detection. 451-460 - Ting Hu, Shaohui Zhong:
Research on a new multipath transmission optimisation algorithm for multichannel wireless sensors based on optimised clustering and multi-hop. 461-475 - Yue Wu, Peipeng Yu, Chengsheng Yuan:
A survey on neural network-based image data hiding for secure communication. 476-493 - Ridhima Mehta:
Performance modelling of Aloha wireless networks under the influence of varying traffic load characteristics. 494-512
Volume 16, Number 6, 2023
- Yanguang Cai, Gewen Huang, Yuanhang Qi, Helie Huang, Yunjian Xu:
Memetic grey wolf optimiser algorithm for solving the cumulative CVRP. 513-535 - Lunzheng Tan, Guoluan Chen, Rui Ding, Limin Xia:
Unsupervised learning of local features for person re-identification with loss function. 536-551 - Huajun Chen, Yanguang Cai:
A discrete salp swarm algorithm for the vehicle routing problem with time windows. 552-563 - Mingyu Chen, Chengsheng Yuan, Ying Lv:
Fingerprint liveness detection approaches: a survey. 564-583 - Yuguang Ye:
Detection of false data attacks in sensor networks based on the APIT location algorithm. 584-596 - Liming Wang, Wenxue Liu, Huichuan Liu:
An optimal matching algorithm for e-commerce recommendation information based on matrix decomposition. 597-610 - Mingfang Jiang:
Reversible data hiding algorithm in encrypted images using adaptive total variation and cross-cyclic shift. 611-631
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.