


default search action
International Journal of Wireless and Mobile Computing, Volume 6
Volume 6, Number 1, 2013
- Ahmed B. Altamimi, T. Aaron Gulliver:

On routing protocols using mobile social networks. 1-11 - Zufan Zhang, Gangzi Chen, Aiai Wu, Jing Yang, Xiaorong Jing

:
Joint cooperative analog network coding and OFDM system for wireless communication networks. 12-17 - Reinaldo Götz

, Taufik Abrão
:
Hybrid local search polynomial-expanded linear multiuser detector for DS/CDMA systems. 18-26 - Gang Su, Liang Wang, Li Tan, Xiao-Qing Peng:

An efficient scheduling scheme based on MET for MIMO systems. 27-33 - Yingying Kong, Yuqi Pan, Xiong Chen:

A kind of two-stage RRT algorithm for robotic path planning. 34-38 - Jamal Raiyn:

Handoff self-management based on SNR in mobile communication networks. 39-48 - Jun-Lin Li, Hai-Xia Cheng, Fang Wang:

Research of fracture problem of composite plate with curved crack by conformal mapping. 49-57 - Qing-Shan Zhao, Guoyan Meng, Yu-Lan Hu:

A multidimensional scaling localisation algorithm based on bacterial foraging optimisation. 58-65 - Peng Ke, Yuanxiang Li, Fuchuan Ni:

An evolvable cellular automata based data encryption algorithm. 66-71 - Guangju Chen, Zhiqiang Ma, Yong Shan, Xiaoyan Zhang:

Video stabilisation using local salient feature in particle filter framework. 72-79 - Salaja Silas

, Elijah Blessing Rajsingh
, Kirubakaran Ezra
:
An efficient service selection framework for pervasive environments. 80-90 - Yunli Bai, Xinming Ye:

Attack trace generation of cryptographic protocols based on coloured Petri nets model. 91-97
Volume 6, Number 2, 2013
- Shensheng Tang, David Myers, Jason Yuan:

Modified SIS epidemic model for analysis of virus spread in wireless sensor networks. 99-108 - Ping Wang, Fuqiang Liu, Weijun Xing, Ning Wang, Xiao Xu:

An algorithm for target cell selection based on cells' location relationship and coverage scope in LTE system. 109-114 - Antonio Sapuppo:

The influential factors for the variation of data sensitivity in ubiquitous social networking. 115-130 - Chong Yu, Xiong Chen:

Stepping robotic system based on cellular grid map. 131-142 - K. Sakthi Mala, P. Navaneethan:

Impact of IEEE 802.16 ARQ mechanism on the performance of TCP-NewReno. 143-151 - Ning Pang:

Coreference resolution with multiple semantic information based on emergency news. 152-157 - Ke Chen, Zhiping Peng, Wende Ke:

Study on image retrieval system base on multi-objective and multi-instance learning. 158-164 - Simeon Olumide Ajose, Agbotiname Lucky Imoize

:
Propagation measurements and modelling at 1800 MHz in Lagos Nigeria. 165-174 - Fengyun Li, Huan Zhang, Fuxiang Gao, Peng Li:

Location estimation for wireless sensor networks with attack tolerance. 175-181 - G. Vijayalakshmy, G. Sivaradje:

Convergence architectures to achieve QoS for WiMAX and WiFi with high mobility support. 182-192 - Jianghui Cai

, Xu-jun Zhao, Ya-lin Xun:
Association rule mining method based on weighted frequent pattern tree in mobile computing environment. 193-199
Volume 6, Number 3, 2013
- Abdel Ejnioui, Carlos E. Otero

, Ivica Kostanic:
A stochastic approach for evaluating quality of service in wireless cellular networks. 201-208 - Xiaolong Chen, Zhiping Peng:

An improved unilateral acceleration FAST TCP fairness based on history flows information. 209-214 - Changxi Ma

, Yinzhen Li, Ruichun He
, Bo Qi, Aixia Diao:
Study on the decision-making method of transportation route for hazardous materials under the hybrid language environment. 215-220 - Bruno Augusto Angélico

, Taufik Abrão
, Leonardo D. Oliveira, Paul Jean Etienne Jeszensky:
PSO-based multiuser detectors for high-order modulation DS/CDMA systems under spatial and multipath diversities. 221-235 - Xu Liu, Zhihua Cui:

Using hybrid APPM to solve Lennard-Jones cluster problems. 236-242 - Weijia Lei, Xianzhong Xie, Xiangming Li:

A novel cooperative relay scheme employing fountain codes and rotated constellations. 243-252 - A. P. Janani, M. Sakthivel

, K. Baskaran
:
A competitive performance analysis of reactive and proactive routing protocols of MANET under short time communication scenario. 253-260 - Zhentao Shi, Jianchao Zeng:

The application of particle swarm optimisation in organisational behaviour. 261-270 - Guo Xi Sun, Qing-Hua Zhang, Long-Qiu Shao, Qin Hu, Aisong Qin:

The build of a new non-dimensional indicator for fault diagnosis in rotating machinery. 271-276 - S. Syed Ameer Abbas

, S. J. Thiruvengadam
:
Realisation of 3GPP-LTE physical downlink data channel with diversity techniques using PlanAhead tool and Virtex device. 277-298 - Xiaoxue Feng, Yan Liang, Lianmeng Jiao

:
Bio-inspired optimisation approach for data association in target tracking. 299-304 - Chengming Zhu, Yanyan Chen, Changxi Ma

:
Travel mode structure optimisation based on behaviour change. 305-311
Volume 6, Number 4, 2013
- Shensheng Tang, Yi Xie, Liqiang Zhang, Chenghua Tang:

Analysis of TDOA based radar target positioning in LOS and NLOS environments. 313-320 - Chong Chen, Guowen Hu:

Fuzzy PID control of induction motor speed regulating system based on PLC. 321-330 - Dawei Sun, Guiran Chang, Chunguang Tan, Xingwei Wang, Rui Guo:

Analysing and evaluating malicious trust in cloud computing environments from a statistical perspective. 331-337 - Peter Tobbin

:
A qualitative investigation of use and adoption of mobile money in Kenya: a domestication approach. 338-354 - Hongyuan Wang, Liehuang Zhu, Zhenghe Yang, Lejian Liao:

A new hierarchical and scalable group key exchange protocol with XOR operation. 355-361 - Jiaqi Zhen, Qun Ding:

Fast DOA estimation method of two-dimensional wideband coherent signals. 362-367 - R. Kaniezhil, C. Chandrasekar

:
Evaluation of channel availability for traffic pattern prediction using cognitive radio. 368-374 - Xiaohong Li, Shasha Zhou, Dong Wang:

A sighting-aware obstacle mobility model for ad hoc network. 375-383 - Jian-Fang Cao, Jun-Jie Chen, Li-Chao Chen, Qing-Shan Zhao:

Automatic semantic annotation by using fuzzy theory for natural images. 384-391 - Keyur Rana

, Mukesh A. Zaveri:
Energy-efficient routing for wireless sensor network using genetic algorithm and particle swarm optimisation techniques. 392-406 - Ruichun He

, Changxi Ma
, Yinzhen Li:
Study on the hazardous materials' vehicle scheduling route based on uncertain operator. 407-411 - Xiao Yu, Yuanzhang Li, Qinggang Liang, Xiu-Mei Ding, Hong-Liang Chen, Yi-Hao Liu, Kai Fan, Yu-an Tan:

Design of satellite TV antenna control system for car carrying. 412-418
Volume 6, Number 5, 2013
- Esam A. Obiedat, Guo Tai Chen, Lei Cao:

Distributed turbo product codes with soft decode-and-forward and power allocation. 419-430 - Bolun Chen, Ling Chen, Shengrong Zou, Xiu-Lian Xu:

Quantitative measurement and method for detecting anti-community structures in complex networks. 431-440 - Yue Gao, Quanxin Zhang, Yulei Chu, Xiang He, Jun Wan, Zhiqiang Zhou, Jing Lin:

The research and implementation of customised launcher in Android. 441-447 - Sigrid Schefer-Wenzl, Mark Strembeck:

Modelling context-aware RBAC models for mobile business processes. 448-462 - Yu Zhang, Yan-ping Bai, Dong-Feng Zhu, Zhao-Yong Lv:

A big data based data storage systems for rock burst experiment. 463-472 - Xiangyu Yu, Shuai Li, Zucong Zhu, Tao Zhang:

An improved artificial bee colony-partial transmit sequence algorithm for PAPR reduction in OFDM systems. 473-480 - Mohamed Adel Serhani, Wassim El-Hajj

:
Movement-aware and QoS-driven indoor location and mobile service discovery framework. 481-500 - Yibo Jiang, Yu-Chen Wang, Wan-Liang Wang, Zhen Zhang, Qiong Chen:

Performance analysis of machine learning algorithms for intrusion detection in MANETs. 501-507 - Dongqi Wang, Dongming Chen, Rui Guo:

DDoS mitigation in content distribution networks. 508-514 - N. Saravanan, Ramachandran Baskaran, M. Shanmugam

, M. S. Saleem Basha
, P. Victer Paul
:
An effective model for QoS assessment in data caching in MANET environments. 515-527
Volume 6, Number 6, 2013
- Qi Zhang, Qinfu Qiu, Xiong Chen:

Design and implementation of a smart networking control system for LED lighting based on CAN. 529-534 - Song Zhang, Deshi Li:

A distance-based probabilistic routing for underwater acoustic sensor networks. 535-543 - Reza Mojtahed, José Miguel Baptista Nunes, Guo Chao Alex Peng:

Probing future banking service opportunities: a study of the intention to adopt mobile banking among young UK graduates. 544-555 - Changsheng Miao, Lu Meng, Changqing Yuan, Xingwei Wang, Guiran Chang:

Traffic classification combining flow correlation and ensemble classifier. 556-563 - Ruoyu Chen, Lejian Liao, Zhi Fang:

A concurrent constraint and pi-calculus-based language for service contracting. 564-572 - Xuesong Yan, Wenjing Luo, Qinghua Wu, Victor S. Sheng:

A hybrid intelligent data classification algorithm. 573-580 - Zhenghe Yang, Mingzhong Wang

, Liehuang Zhu, Hao Yang:
ASCDS: a smartphone confidential data storage scheme. 581-587 - K. B. Priya Iyer

, V. Shanthi:
Secured obfuscated queries in spatial networks. 588-598 - Bolun Chen, Ling Chen, Shengrong Zou, Xiu-Lian Xu:

Detecting community structure in bipartite networks based on matrix factorisation. 599-607 - Meiping Wang, Qi Tian:

Application of wavelet neural network on thermal load forecasting. 608-614 - Changxi Ma

, Fang Wu, Bo Qi, Liang Gong, Li Wang, Xinlei An:
Study on urban three-lane mixed traffic flow with buses based on the Nagel-Schreckenberg model. 615-620 - Kangshun Li, Guihua Chen:

A novel complex community network division algorithm with multi-gene families encoding. 621-627

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














