Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Wireless and Microwave Technologies

ISSN: 2076--1449
Publisher: MECS Publisher


ADD TO MY LIST
 
A Structured Multi-signature Scheme Against Forgery Attack

Author(s): Wenjun Luo | Changying Li
Volume: 1
Issue: 6
Year: 2011
Defending Against LDoS Attacks Using Fair AQM

Author(s): Bianqin Wang | Shunzheng Yu
Volume: 1
Issue: 6
Year: 2011
Analysis of Trusted Identity Based Encryption (IBE-Trust) Protocol for Wireless Sensor Networks

Author(s): Yusnani Mohd Yussoff | Habibah Hashim
Volume: 1
Issue: 6
Year: 2011
A New Half-blind Algorithm of Smart Antenna for Mobile Terminal

Author(s): Yuan Li | Wei Zhang | Jia Guo
Volume: 1
Issue: 6
Year: 2011
Design and Implementation of Anti-phishing Authentication System

Author(s): Wang Binjun | Wei Yang | Yang Yanyan | Han Jia
Volume: 1
Issue: 6
Year: 2011
EEACE: Energy Efficient ACE Algorithm for Wireless Sensor Networks

Author(s): ZHANG Meiyan | ZHENG Xiaodan | CAI Wenyu
Volume: 1
Issue: 6
Year: 2011
Simulation Design of AOS Cross Layer Transmission

Author(s): Bi Mingxue | Wang Hongxia
Volume: 1
Issue: 6
Year: 2011
Positioning Algorithm for Wireless Sensor Network Based on Adaptive Genetic Algorithm

Author(s): Ting Gong | Xiuying Cao
Volume: 1
Issue: 6
Year: 2011
Joint Beam-Power Coordinative Scheduling of Neighboring Sectors in Cellular Systems

Author(s): Fei Ji | Ying Liu | Fangjiong Chen | Xiaodong Chen | Shangkun Xiong
Volume: 1
Issue: 6
Year: 2011
A Density Control Algorithm For Wireless Sensor Network

Author(s): Danyan Luo | Haiying Zhou | Zhan Zhang | Decheng Zuo
Volume: 1
Issue: 6
Year: 2011
An Epistemic Model Checking Approach to Web Service Compositions

Author(s): Xiangyu Luo | Kun Wang | Fengchai Wang
Volume: 2
Issue: 6
Year: 2012
A Source-Based Multicast Scheme in IEEE 802.16 Mesh Mode

Author(s): Mortaza Maleki | Saleh Yousefi | Ali Azarpeyvand
Volume: 2
Issue: 6
Year: 2012
A Wireless Solution to Collecting and Displaying Oil Temperature Data Based on Zigbee Network

Author(s): Cui Jingcong | Chen Lidong | Li Xunming | Huang Chunhai
Volume: 2
Issue: 6
Year: 2012
Evaluation of Performance for Wireless Sensor Networks Based on Gray Theory

Author(s): JING Jun-li | YANG Jie
Volume: 2
Issue: 6
Year: 2012
TCP/IP Jumbo Frames Network Performance Evaluation on A Testbed Infrastructure

Author(s): Shaneel Narayan | Paula Raymond Lutui
Volume: 2
Issue: 6
Year: 2012
Study on System Architecture Design of University Students Quality Evaluation

Author(s): He Yongqiang | Wang Jiaxin
Volume: 2
Issue: 6
Year: 2012
Software Defect Detection-oriented Static Analysis Techniques Hua ZHANG

Author(s): Hua ZHANG
Volume: 2
Issue: 6
Year: 2012
A New Solution of Multicast Packets Management for Managed Ethernet Switch

Author(s): Sheng LU
Volume: 2
Issue: 6
Year: 2012
Design and Simulation Implementation of an Improved PPM Approach

Author(s): Guo Fan | Feng Bo | Yu Min
Volume: 2
Issue: 6
Year: 2012
Feature Dimension Reduction Algorithm Based Prediction Method for Protein Quaternary Structure

Author(s): Tong Wang | Tian Xia | Xiaoxia Cao
Volume: 2
Issue: 5
Year: 2012
Empirical Network Performance Evaluation of Security Protocols on Operating Systems

Author(s): Shaneel Narayan | Michael Fitzgerald
Volume: 2
Issue: 5
Year: 2012
Luminous Intensity Control System Based on ZigBee Wireless Sensor Networks

Author(s): PEI Yan-ming | LIU Yun-hong
Volume: 2
Issue: 5
Year: 2012
Doppler Simulation and Analysis of SCME Channel Model

Author(s): Xiaoyan Huang | Xinhong Wang | Yi Zhou | Ping Wang | Fuqiang Liu
Volume: 2
Issue: 5
Year: 2012
Cross Layer Design and Performance Analysis of HARQ Schemes in Multi-Relay Networks

Author(s): Cui-Qin Dai | Li Jiang | Qian-Bin Chen | Guang-Yu Wang
Volume: 1
Issue: 5
Year: 2011
A Trust Evaluation Model for Industrial Control Ethernet Network

Author(s): ZHOU Sen-xin | HAN Jiang-hong | TANG Hao
Volume: 1
Issue: 5
Year: 2011
The Existence of Homoclinic Solutions for Second Order Hamiltonian System

Author(s): Jie Gao
Volume: 1
Issue: 5
Year: 2011
A Multicast Routing Mechanism in Mobile Ad Hoc Network Through Label Switching

Author(s): Li MengYang | Duan YunNa | Zhang ChunFei
Volume: 1
Issue: 5
Year: 2011
Power Allocation for Balancing Spectrum Efficiency and Power Consumption in Cognitive Relay Networks

Author(s): Lun Tang | Qing Li | Qian-Bin Chen
Volume: 1
Issue: 5
Year: 2011
Reduction of Feedback Based-on User Traffic Rate in OFDM Relay System

Author(s): Qian-Bin Chen | Guang-Jian Jiang | Lun Tang
Volume: 1
Issue: 5
Year: 2011
An Improved Dynamic Probabilistic Packet Marking Algorithm

Author(s): Qiao Yan | Xiaoming He | Tuwen Ning
Volume: 1
Issue: 5
Year: 2011
Geometric Invariant Robust Image Hashing Via Zernike Moment

Author(s): Rui Sun | Xiaoxing Yan | Wenjun Zeng
Volume: 1
Issue: 5
Year: 2011
Frameproof Codes Based on The Generalized Difference Function Families

Author(s): Qingjun CAI | Yuli ZHANG
Volume: 1
Issue: 5
Year: 2011
New Downlink Scheduling Framework for Hybrid Unicast and Multicast Traffic in WiMAX Networks

Author(s): Rashid Karimi | Saleh Yousefi | Ali Azarpeyvand | Vahid.K.Alilou
Volume: 2
Issue: 5
Year: 2012
A Combining Rate Adaptation Scheme of Channel Coding and Network Coding in None-relay Downlink Wireless System

Author(s): ZiJun Shi | ZhiPing Shi | Gu Li
Volume: 2
Issue: 5
Year: 2012
An Approach to Micro-blog Sentiment Intensity Computing Based on Public Opinion Corpus

Author(s): Wu Hanxiang | Xin Mingjun | Li Weimin | Niu Zhihua
Volume: 2
Issue: 5
Year: 2012
Dynamical Frequency Assignment of WSN Based on Cloud Computing Technology

Author(s): JING Jun-li | YANG Jie
Volume: 2
Issue: 5
Year: 2012
Crash Recovery for Embedded Main Memory Database

Author(s): Yi-bing Li | Shuang Wang | Fang Ye
Volume: 2
Issue: 5
Year: 2012
Keywords Review of IT Security Literature in Recent 20 Years

Author(s): QIAN Liping | LIN Yan | WANG Lidong
Volume: 2
Issue: 5
Year: 2012
A Scheme on PN Code Tracking of DS/FH Signals for Telemetry, Tracking, and Commanding (TT&C)

Author(s): Shaohua Chen | Jiaqi Li | Ju Wang
Volume: 1
Issue: 4
Year: 2011
Study on the Distribution of Networked Devices’ Clock Skew

Author(s): Jiao Chengbo | Zheng Hui
Volume: 1
Issue: 4
Year: 2011
Privacy Preserving Similarity Measurement

Author(s): ZHANG Guo-rong
Volume: 1
Issue: 4
Year: 2011
A New Ranging Technique for IEEE 802.16e Uplink

Author(s): Wang Shi | Wang Yingchun | Guan Jianxin
Volume: 1
Issue: 4
Year: 2011
Construction of Periodic Complementary Multiphase Sequences Based on Perfect Sequences

Author(s): Zhenyu Zhang | Fanxin Zeng | Guixin Xuan
Volume: 2
Issue: 4
Year: 2012
A modified semi-supervised color image segmentation method

Author(s): Wei Hongru | Chai Fangyong
Volume: 2
Issue: 4
Year: 2012
Data Collection Method with A Mobile Sink Node in Wireless Sensor Network

Author(s): Hu Chang Jun | Yao Shan Hua
Volume: 2
Issue: 4
Year: 2012
A Novel Method of Web Services Selection Based on Weighted Grey Relational Model in Ubiquitous Computing Environments

Author(s): Xiaocong Xiao | Yijiang Zhao | Kaiyao Fu | Xiangqun Wang
Volume: 2
Issue: 4
Year: 2012
A Robust Autofocusing Approach for Estimating Directions-ofArrival of Wideband Signals

Author(s): GONG Bing | XU Yi-tao | LI Jia | LIU Zhong-jun
Volume: 2
Issue: 4
Year: 2012
A New Secure Strategy for Small-Scale IEEE 802.11 Wireless Local Area Networ

Author(s): Huiting Liu | Hua Zhang | Weilin Xu | Yigang Yang
Volume: 2
Issue: 4
Year: 2012
Adaptive HEC-VPS: The Real-time Reliable Wireless Multimedia Multicast Scheme

Author(s): Guoping Tan | Yueheng Li | Lili Zhang | Yong Lu
Volume: 2
Issue: 4
Year: 2012
Identifying Protein Structural Classes Using MVP Algorithm

Author(s): Tong Wang | Xiaoming Hu | Xiaoxia Cao
Volume: 2
Issue: 4
Year: 2012
Securing Peer-to-Peer Distributions with Trusted Platform Modules

Author(s): Hao Li | Yu Qin | Qianying Zhang | Shijun Zhao
Volume: 2
Issue: 4
Year: 2012
Relative Distance Based Routing for Delay Tolerant Mobile Sensor Network

Author(s): Jieyan Liu | Jiazhi Zeng
Volume: 1
Issue: 4
Year: 2011
A New Three-party Key Exchange Protocol Based on Diffie-Hellman

Author(s): Chunling Liu | Yufeng Wang | Qinxi Bai
Volume: 1
Issue: 4
Year: 2011
A New Joint Antenna Selection Algorithm Based on Capacity

Author(s): Li Yuan | Liu Ping | Li Jianlan
Volume: 1
Issue: 4
Year: 2011
Next Generation Campus Network Deployment Project Based on Softswitch

Author(s): HU Feng | LIU Ziyan
Volume: 1
Issue: 4
Year: 2011
A New R*Q-tree Spatial Index based on the Delaying Selection and Clustering Splitting

Author(s): Quanyou Song | Wan-gao Li
Volume: 1
Issue: 4
Year: 2011
The Study on Formal Verification of OS Kernel

Author(s): Zhang Yu | Dong Yunwei | Zhang Zhongqiu | Huo Hong | Zhang Fan
Volume: 1
Issue: 3
Year: 2011
Format-Compliant Encryption of JPEG2000 Codestreams

Author(s): Zhiguo Chang | Jian Xu
Volume: 1
Issue: 3
Year: 2011
The Study of Access Control for Service-Oriented Computing in Internet of Things

Author(s): Guoping Zhang | Jing Liu
Volume: 2
Issue: 3
Year: 2012
A QoS Multicast Routing in TDMA-Based MANET Using Directional Antennas

Author(s): Yuan Li | Xing Luo
Volume: 1
Issue: 3
Year: 2011
Compose Real-world Service With Context

Author(s): Guoping Zhang | Jiazheng Tian
Volume: 1
Issue: 3
Year: 2011
The Channels and Demands Analysis for Chinese Farmers’ Agricultural Information Acquisition

Author(s): Tingting Zhang | Zhensheng Tao
Volume: 2
Issue: 3
Year: 2012
A Simple Algorithm to Strengthen the Brightness of Color Images

Author(s): Hua ZHANG
Volume: 1
Issue: 3
Year: 2011
Study on Quality Evaluation System for University Students

Author(s): He Yongqiang | Yang Mingming
Volume: 1
Issue: 3
Year: 2011
Research on Trustworthy Distributed System

Author(s): LUO Chen | HE Ming | LIU Xiao-Ming | LI Yuan
Volume: 2
Issue: 3
Year: 2012
A Scalable Simulation Method for Network Attack

Author(s): Jinsong Wang | Wenchao Dou | Kai Shi
Volume: 1
Issue: 3
Year: 2011
A Data Flow Behavior Constraints Model for Branch Decisionmaking Variables

Author(s): Lu Yan | Wang Dan | Zhao Wen Bing
Volume: 2
Issue: 3
Year: 2012
Enlightenment on Computer Network Reliability From Transportation Network Reliability

Author(s): Hu Wenjun | Zhou Xizhao
Volume: 1
Issue: 3
Year: 2011
Two Noise Addition Methods For Privacy-Preserving Data Mining

Author(s): Likun Liu | liang Hu | Di Wang | Yanmei Huo | Lei Yang | Kexin Yang
Volume: 2
Issue: 3
Year: 2012
Polynomial Algorithm for Node Deployment in Hybrid Wireless Sensor Networks

Author(s): Lili Zhang | Jing Yuan | Yingchi Mao | Xiwei Zhang | Guihai Chen
Volume: 1
Issue: 3
Year: 2011
The Economic Evaluation of Lighting Energy-saving Modification Program

Author(s): YANG Yuan | LI Wei-hua | ZHANG Xing-zheng | YANG Chu-qi
Volume: 2
Issue: 3
Year: 2012
A Comprhensive CBVR System Based on Spatiotemporal Features Such as Motion,Quantized Color and Edge Density Features

Author(s): Kalpana S.Thakre | Archana M.Rajurkar
Volume: 1
Issue: 3
Year: 2011
The Research and Application of Webpage Temper-proofing System

Author(s): Wu Beihua | Wang Yongquan
Volume: 2
Issue: 3
Year: 2012
The Research of On-line Monitoring System of Power Cable Joint Temperature

Author(s): Jianwen Wang | Zhengfeng Wang | Peng Li
Volume: 2
Issue: 3
Year: 2012
Matlab Simulink of COST231-WI Model

Author(s): Yihuai Yang | Dongya Shen | Yonggang Xie c | Xiangde Li
Volume: 2
Issue: 3
Year: 2012
A Real-Time Directed Routing Protocol Based on Projection of Convex Holes on Underwater Acoustic Networks

Author(s): Hu HongNing | Liu Zhong | Li Lu
Volume: 2
Issue: 2
Year: 2012
Research of Virtual Channels Scheduling Algorithm Based on Priority in Packet Telemetry System

Author(s): TIAN Ye | ZHANG Zi-jing | ZHANG Yan-qin | XIAO Guang-yuan
Volume: 2
Issue: 2
Year: 2012
Estimate BER Distributions of Turbo Codes

Author(s): Shao Xia | Zhang Weidang
Volume: 2
Issue: 2
Year: 2012
Research on Excessive Road Fuel Problem Based on Extension Strategy Generating Method

Author(s): Li Shu fei | Ye Guang zai
Volume: 2
Issue: 2
Year: 2012
The Selective Forwarding Attack in Sensor Networks: Detections and Countermeasures

Author(s): Wazir Zada Khan | Yang Xiang | Mohammed Y Aalsalem | Quratulain Arshad
Volume: 2
Issue: 2
Year: 2012
An Approach Towards Dynamic Opportunistic Routing in Wireless Mesh Networks

Author(s): Sudhanshu Kulshrestha | Aditya Trivedi
Volume: 2
Issue: 2
Year: 2012
A Multi-step Attack Recognition and Prediction Method Via Mining Attacks Conversion Frequencies

Author(s): MAN Da-peng | LI Xue-zhen | YANG Wu | WANG Wei | XUAN Shi-chang
Volume: 2
Issue: 2
Year: 2012
The Application of Federated Kalman Filtering in SINS/GPS/CNS Intergrated Navigation System

Author(s): DENG Hong | LIU Guang-bin | CHEN Hao-ming | DENG Chun-lin
Volume: 2
Issue: 2
Year: 2012
The Comparison of Machine Learning Algorithms on Online Classification of Network Flows

Author(s): Keji Wei | Shaolong Cao | Jian Yu
Volume: 2
Issue: 2
Year: 2012
Research on Diffusion Strategy About Resource Index of MP2P

Author(s): Fangfang Guo | Jing Xu
Volume: 2
Issue: 2
Year: 2012
A Security Routing Protocol Protecting Mobile Agent Against Cluster Attack

Author(s): Wenbing Wang | Zhifeng Zhang
Volume: 1
Issue: 2
Year: 2011
An Incentive Compatible Reputation Model for P2P Networks

Author(s): Jianli Hu | Bin Zhou
Volume: 1
Issue: 2
Year: 2011
A Speech Enhancement Method Based on Kalman Filtering

Author(s): Chaogang Wu | Bo Li | Jin Zheng
Volume: 1
Issue: 2
Year: 2011
Discussion on IGMP Snooping and Its Sequence in Industrial Applicaiton

Author(s): Sheng LU | Chuan WEN
Volume: 1
Issue: 2
Year: 2011
Fast Matching Algorithm Based on Fingerprint Classification Information

Author(s): Na Li | Wenbi Rao | Tiecheng Xu
Volume: 1
Issue: 2
Year: 2011
A Novel Approach to Simulate DDoS Attack

Author(s): Qing LI | LeJun CHI | ZhaoXin ZHANG
Volume: 1
Issue: 2
Year: 2011
A Weighed Least Square TDOA Location Algorithm for TDMA Multi-target

Author(s): WANG XU | HE ZI-SHU
Volume: 1
Issue: 2
Year: 2011
Demand-Driven Dynamic Spectrum Allocation in Heterogeneous Cellular Networks

Author(s): Li Wang | Huiyue Yi | Honglin Hu | Jianan Liu | Bin Chen
Volume: 1
Issue: 2
Year: 2011
Research and Design of The Firewall Penetration Technology Serving to Informati on Sharing Systems

Author(s): GAO Shou-ping | WANG Lu-da
Volume: 1
Issue: 2
Year: 2011
ACO Algorithm Applied to Multi-Objectives Optimization of Capacity Expansion in Next Generation Wireless Network

Author(s): Dac-Nhuong Le | Son HongNgo | Vinh Trong Le
Volume: 3
Issue: 1
Year: 2013
Channel Capacity and BER Performance Analysis of MIMO System with Linear Receiver in Nakagami Channel

Author(s): Samarendra Nath Sur | Debjyoti Ghosh
Volume: 3
Issue: 1
Year: 2013
Optimal Spectrum Access for Users in Multi-Channel Cognitive Radio Networks

Author(s): Vivek Agrawal | Utkarsh Tiwari | Vishal Agarwal | Palaniandavar Venkateswaran
Volume: 3
Issue: 1
Year: 2013
Novel Hybrid Spectrum Handoff for Cognitive Radio Networks

Author(s): Nisar A. Lala | Moin Uddin | N A Sheikh
Volume: 3
Issue: 1
Year: 2013
Adaptive Cross-layer Resource Allocation by HNN in OFDM-MISO System

Author(s): Mingyan Jiang | Yulong Liu
Volume: 2
Issue: 1
Year: 2012
A double auction scheme based on secret sharing and safe comparing protocol

Author(s): Bin Zhang | Qiuliang Xu | Han Jiang
Volume: 2
Issue: 1
Year: 2012
Efficient Proxy Re-encryption with Private Searching in the Untrusted Cloud

Author(s): Xi Chen | Yong Li
Volume: 2
Issue: 1
Year: 2012
An Unconditionally Secure Authentication Code For Multi-Source Network Coding

Author(s): Hong Yang | Mingxi Yang
Volume: 2
Issue: 1
Year: 2012
Defense on Split-Network Attack in Wireless Sensor Network

Author(s): Du Chunlai | hang Jianshun | Ma Li
Volume: 2
Issue: 1
Year: 2012
Research on Audience Rating Statistics of Two-way Digital TV Based on OpenSSL

Author(s): Chen Junhua | Yang Fan
Volume: 2
Issue: 1
Year: 2012
A Method of Target Detection in Remote Sensing Image Captured based for Sensor Network

Author(s): Yingchun Shen | Hai Jin
Volume: 2
Issue: 1
Year: 2012
HACCP and the Risk Assessment of Cold-chain

Author(s): Zhang QingYing | Chen Zhimin
Volume: 1
Issue: 1
Year: 2011
Study on Thickness Calculation Method for Undigraph

Author(s): Yan Cui | Chao-Dong Cui
Volume: 1
Issue: 1
Year: 2011
A Design of Trust Degree Transfer Algorithm for P2P Network

Author(s): Wang Hao-yu | Ge Tong-min | Ji Xiao-juan | Hu Bao-an
Volume: 2
Issue: 1
Year: 2012
Design of NAND FLASH File System Based on Loss of Balance Algorithm

Author(s): Jinwu Ju | Lecai Cai
Volume: 1
Issue: 1
Year: 2011
Identifying Sentiment in Web Multi-topic Documents

Author(s): Na Fan
Volume: 2
Issue: 1
Year: 2012
Study on Replica Strategy in the Grid Environment

Author(s): Rui-qiong Zhong | Yun-jia Xi | De-zhi Han
Volume: 1
Issue: 1
Year: 2011
Efficient Homomorphic Hashing Approach for Secure Reprogramming in Wireless Sensor Networks

Author(s): Yu Zhang | Xing She Zhou | Yee Wei Law | Marimuthu Palaniswami
Volume: 2
Issue: 1
Year: 2012
Structure and Control of Flywheel Energy Converter

Author(s): Yiming He | Xianyi Qian
Volume: 1
Issue: 1
Year: 2011
A Group-oriented Access Control Scheme for P2P Networks

Author(s): Wang Xiaoming | Cheng Fan
Volume: 1
Issue: 1
Year: 2011
Power Factor Analysis of the Linear Motor in Mines

Author(s): Xianyi Qian
Volume: 1
Issue: 1
Year: 2011
Detecting Polymorphic Buffer Overflow Exploits with a Static Analysis Approach

Author(s): Guo Fan | Lu JiaXing | Yu Min
Volume: 1
Issue: 1
Year: 2011
Application of Digital Mockup Technology

Author(s): Gaoming Ding
Volume: 1
Issue: 1
Year: 2011
Save time & money - Smart Internet Solutions      Why do you need a reservation system?