default search action
International Journal of Wireless and Mobile Computing, Volume 15
Volume 15, Number 1, 2018
- Xing Xu, Ren-Wang Li, Yun Zhao, Xin-Li Wu, Timo R. Nyberg:
Demand forecasting of transportation service network of food cold chain based on a combined model of trend double exponential smoothing and improved grey methods. 1-9 - Fei Xue, Tingting Dong, Zixiang Qi:
An improving clustering algorithm for order batching of e-commerce warehouse system based on logistics robots. 10-15 - Priyanka Mishra
, Mehboob ul-Amin:
PAPR reduction in OFDM using various coding techniques. 16-20 - Yongping Zhang, Lei Wang, Yan Liu, Jun Gao, Qiming Liu, Rong Chen:
BMROMP: a fast algorithm of block compressed sensing. 21-27 - El Arbi Abdellaoui Alaoui, Khalid Nassiri:
Stochastic analysis of DTN routing protocols in delay tolerant network routing hierarchical topology. 28-46 - Jiangjun Yuan, Jie Wang:
Fast computation method for privacy-preserving data aggregation protocol. 47-51 - P. Gnanasekaran, T. R. Rangaswamy:
Transition rate, trend and signal strength based stable routing protocol for mobile ad hoc networks. 52-57 - M. Parvathy, R. Ganesan:
Throughput enhancement of SISO parallel LTE turbo decoders using floating point turbo decoding algorithm. 58-66 - Ghazi Al-Naymat, Mouhammd Al-Kasassbeh, Eshraq Al-Hawari:
Using machine learning methods for detecting network anomalies within SNMP-MIB dataset. 67-76 - Mridul Chawla, Manoj Duhan:
An investigation on metaheuristic techniques for solving cell to switch assignment problem. 77-87 - R. Bhuvaneswari, R. Ramachandran:
Denial of service attack mitigation addressing all the security attributes in OLSR MANET. 88-95
Volume 15, Number 2, 2018
- Fatima Zohra Bouchibane, Messaoud Bensebti:
Artificial bee colony algorithm for energy efficiency optimisation in massive MIMO system. 97-104 - Yifei Mao, Yuansheng Yang:
A feature selection method based on effective range and SVM-RFE. 105-112 - Pinaki Sankar Chatterjee, Monideepa Roy:
Maximum match filtering algorithm to defend spectrum-sensing data falsification attack in CWSN. 113-122 - Yuqiang Cao, Weiguo Gong, Sen Bai:
A flexible visual quality control algorithm for perceptual video encryption based on H.264. 123-131 - Zhen Hu, Dexuan Zou, Zichen Zhang, Xin Zhang, Xin Shen:
Randomness-driven global particle swarm optimisation for unconstrained optimisation problems. 132-150 - Zhiming Zhang, Jun Sun, Binbin Lu, Yaoshuai Duan:
Turning mechanism and optimisation design of automatic screen printing machine. 151-156 - Xianfu Cheng, Jing Li, Chong Wan, Haoyang Qiu, Yongsheng Wan:
DBSCAN-based modular design for the crane grab. 157-162 - Fazhi Qi, Zhihui Sun, Shiqiang Zhang:
The trusted virtual machine cluster construction method based on particle wave equation. 163-174 - Fei Xue, Qinghua Su:
A rational threshold signature protocol based on generalised projective transformation. 175-184 - Qiang Yin, Zhichao Xiong, Shaoyun Song, Guoquan Zhang:
Modular design method of EOD robot based on genetic algorithm. 185-193
Volume 15, Number 3, 2018
- Shufang Li, Changbing Jiang
, Liang Li:
Research on productive efficiency measurement and influence factors based on DEA window analysis and Tobit model: an illustrative example of Chinese toll highway enterprises. 195-206 - Lijuan Duan, Dongkui Zhang, Zhenhu Ning, Fan Xu, Guoqin Cui, Peng Liang:
A novel image encryption method based on hyperchaotic system and pixel information association. 207-214 - Guozhang Jiang, Xiaowu Chen, Xiaoyong Li, Feng Xiang, Gongfa Li:
Model knowledge matching algorithm for steelmaking casting scheduling. 215-222 - Qiang Yin, Zhichao Xiong, Guoquan Zhang:
Path planning for EOD robots. 223-230 - Guozhang Jiang, Hushi Dong, Le Yang, Gongfa Li, Feng Xiang:
Hyperheuristic genetic algorithm for steelmaking continuous casting rescheduling based on strong disturbance of task. 231-240 - Guozhang Jiang, Zhongyuan Li, Le Yang, Feng Xiang, Gongfa Li:
Sustainable lean redesign of manufacturing enterprises. 241-250 - Qian Cai, Chengtian Ouyang, Yiwang Huang:
Improved location algorithm based on DV-hop for the indoor internet of things. 251-257 - Min Lin, Yiwen Zhong, Juan Lin, Xiaoyu Lin:
Enhanced chicken swarm optimisation for function optimisation problem. 258-269 - Arun Kumar
:
A microstrip UWB antenna for next generation communication system. 270-278 - Meiwen Chen, Yiwen Zhong, Lijin Wang:
Bat algorithm with dimension-recommended mechanism. 279-291 - Guanglan Zhou, Weihua Su, Renan Liu, Jun Hu:
An investigation into e-commerce service chain model algorithm. 292-297
Volume 15, Number 4, 2018
- Priyanka Mishra
, Chandra Kant Shukla:
Survey on different low complexity decoding algorithms for different orthogonal STBC MIMO wireless communication system under Rayleigh fading channel. 299-309 - Yinghan Hong, Zhifeng Hao, Guizhen Mai, Han Huang:
Causal feature selection method based on extended Markov blanket. 310-317 - Yuye Wang:
Smooth terminal sliding mode control of Buck converter for wireless mobile devices. 318-322 - Annie Mpolokoso, Jackson Phiri
:
Managing customary land conflicts and demarcations using mobile applications tools: a case study of Zambia. 323-334 - Yunqiang Hu, Wende Ke, Chang Lin, Xiaokun Leng:
Research on multi-objective path planning of a robot based on artificial potential field method. 335-341 - Bin Xu, Yong Tang, Zhengshan Wang, Liang Shi, Jin Qi, Zhiyuan Hu:
Cloud manufacturing service composition with service cooperation level evaluation. 342-350 - S. Elsayed Saad, Ibrahim F. Tarrad, A. A. Ammar:
Spectrum access queuing based scheme for prioritised cognitive radio networks. 351-358 - Huipeng Chen, Youping Gong, Zhangming Peng:
Research on improved H∞ control system of MEMS mirror FTS under MBSE framework. 359-365 - Dan Cui, Jianguo Chen:
Gray-information-based robustness of interdependent networks under attack on edges. 366-373 - Zheng Liu, Qingsheng Kong, Lirong Yang:
Power consumption prediction with K-nearest-neighbours and XGBoost algorithm. 374-381 - Aasheesh Shukla
, Vinay Kumar Deolia:
Analysis and design of tent map interleaver for interleave division multiple access scheme. 382-388
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.