Issue | Title | |
Vol 8, No 6 (2021) | An Efficient and Secure Text Encryption Scheme for Wireless Sensor Network (WSN) Using Dynamic Key Approach | Abstract PDF |
V. Elamurugu, D. J. Evanjaline | ||
Vol 10, No 5 (2023) | An Efficient Restricted Flooding Based Route Discovery (RFBRD) Scheme for AODV Routing | Abstract PDF |
Poonam T. Agarkar, Manish D. Chawhan, Rahul N. Nawkhare, Daljeet Singh, Narendra P. Giradkar, Prashant R. Patil | ||
Vol 1, No 1 (2014) | An Empirical Model of Job Shop Scheduling With Related To Tiny Chemical Assembly Instructions Inside of Living Things and Gels Techniques | Abstract PDF |
Ganesh Potta, P. Santosh Naidu | ||
Vol 7, No 2 (2020) | An Empirical Review on Blockchain Smart Contracts: Application and Challenges in Implementation | Abstract PDF |
Jasvant Mandloi, Pratosh Bansal | ||
Vol 8, No 5 (2021) | An Energy Aware Data Scheduling Approach in Cloud Using GK-ANFIS | Abstract PDF |
Sampath Kumar Y. R., Champa H. N. | ||
Vol 10, No 6 (2023) | An Energy-Conserved Stability and Density-Aware QoS-Enabled Topological Change Adaptable Multipath Routing in MANET | Abstract PDF |
Binuja Philomina Marydasan, Ranjith Nadarajan | ||
Vol 10, No 3 (2023) | An Enhanced Authorization Protocol in Blockchain for Personal Health Information Management System | Abstract PDF |
Thakur Saikumari, G. Victo Sudha George | ||
Vol 10, No 5 (2023) | An Interoperability Framework for Enhanced Security of Handheld Devices Using IoT-Based Secure Energy Efficient Firefly Optimization Algorithm | Abstract PDF |
G. S. Sapna, Shashikumar Dandinashivara Revanna | ||
Vol 8, No 4 (2021) | Analysis of Energy, Coverage, and Fault Issues and their Impacts on Applications of Wireless Sensor Networks: A Concise Survey | Abstract PDF |
Sandeep Sahu, Sanjay Silakari | ||
Vol 10, No 3 (2023) | Analysis of Improved Rate Adaptive Irregular Low Density Parity Check Encoding for Fifth Generation Networks Using Software Defined Radio | Abstract PDF |
Mahalakshmi Isakki Ramakrishnan, Tharini Chandrapragasam | ||
Vol 9, No 2 (2022) | Analysis of Machine Learning Classifiers to Detect Malicious Node in Vehicular Cloud Computing | Abstract PDF |
A. Sheela Rini, C. Meena | ||
Vol 2, No 1 (2015) | Analysis of VBF protocol in Underwater Sensor Network for Static and Moving Nodes | Abstract PDF |
C. Namesh, B. Ramakrishnan | ||
Vol 10, No 6 (2023) | ANFIS-RSOA Approach for Detecting and Preventing Network Layer Attacks in MANET | Abstract PDF |
Sivanesan N., Rajesh A., K. S. Archana | ||
Vol 2, No 5 (2015) | Application of Modified ACO Meta heuristic in Spray and Wait Routing | Abstract PDF |
R. Vinuraj, Sweta Jain | ||
Vol 10, No 6 (2023) | Assessing a Real-time Adaptive Traffic Route Based on Ranking Software Defined Networking (SDN) Cluster of Controllers in a Datacenter | Abstract |
Omar M. Mohamed | ||
Vol 10, No 6 (2023) | Assessing a Real-time Adaptive Traffic Route Based on Ranking Software Defined Networking (SDN) Cluster of Controllers in a Datacenter | Abstract PDF |
Omar M. Mohamed, Tarek M. Mahmoud, Abdelmgeid A. Ali | ||
Vol 1, No 1 (2014) | Automatic Feedback Framework for Deriving Educational Ontologies | Abstract PDF |
J. Stanley Jesudoss, S. Selva Kumar | ||
Vol 4, No 1 (2017) | Big Data Analysis for M2M Networks: Research Challenges and Open Research Issues | Abstract PDF |
Gurkan Tuna, Resul Das, B. Ramakrishnan, Yilmaz Kilicaslan | ||
Vol 10, No 3 (2023) | Blockchain Assisted Chaotic Chameleon Swarm Optimization Based Clustering Technique in Vehicular Ad Hoc Networks | Abstract PDF |
R. Mohan, G. Prabakaran, T. Priyaradhikadevi | ||
Vol 9, No 1 (2022) | Blockchain Powered Mutual Authentication and Access Control Protocol | Abstract PDF |
Geeta Kakarla, S. Phani Kumar | ||
Vol 9, No 4 (2022) | Blockchain-Based Model for Smart Home Network Security | Abstract PDF |
Abdualrahman Johari, Raed Alsaqour | ||
Vol 8, No 4 (2021) | Blockchain-Enabled Consensus Routing Protocol Improving the Security Data Communication in Internet of Things Applications | Abstract PDF |
Monika Parmar, Harsimran Jit Kaur | ||
Vol 11, No 3 (2024) | Broken-Stick Regressive Lightweight Speck Cryptographic Constrained Application Protocol for Data Security in IoT Aware Smart Home | Abstract |
Subhashini R, Jyothi D G | ||
Vol 9, No 2 (2022) | BTDEC: Blockchain-Based Trible Data Elliptic Curve Cryptosystem with Fine-Grained Access Control for Personal Data | Abstract PDF |
K. Mohamed Sayeed Khan, S. Shajun Nisha | ||
Vol 6, No 3 (2019) | Centroid Based Localization Utilizing Artificial Bee Colony Algorithm | Abstract PDF |
Vikas Gupta, Brahmjit Singh | ||
76 - 100 of 343 Items | First Previous 1 2 3 4 5 6 7 8 9 10 Next Last |
Browse Title Index
Scroll