


default search action
Journal of Interconnection Networks, Volume 24
Volume 24, Number 1, March 2024
- Zhiwei Guo:
Nordhaus-Gaddum-Type Results for the Strong Equitable Vertex k-Arboricity of Graphs. 2350006:1-2350006:13 - Zhao Wang, Hongfang Liu, Yuhu Liu:
Nordhaus-Gaddum-Type Results for the k-Independent Number of Graphs. 2350007:1-2350007:9 - Sheena Mohammed
, Rangu Sridevi:
To Secure the Cloud Application Using a Novel Efficient Deep Learning-Based Forensic Framework. 2350008:1-2350008:26 - Xue Feng, Shengling Geng
, Banghe Han:
The Ordinal Consistency of a Hesitant Fuzzy Preference Relation. 2350009:1-2350009:17 - Xiao Xu, Zhuoma Gao, Lei Meng, Qinghe Tong:
Tight Toughness, Isolated Toughness and Binding Number Bounds for the [1,n]-Factors and the {K2,Ci≥4}-Factors. 2350010:1-2350010:12 - Yingbin Ma
, Hui Zhang:
The k-Total-Proper Index of Graphs. 2350011:1-2350011:17
Volume 24, Number 2, June 2024
- Guoqiang Xie, Jixiang Meng:
The Strong Menger Connectivity of the Directed k-Ary n-Cube. 2350012:1-2350012:11 - Zhiqiang Ma, Fengyun Ren, Meiqin Wei, Gemaji Bao:
Sufficient Conditions of (Isolated) Toughness and Binding Number for the Existence of Component Factors. 2350013:1-2350013:14 - Merlin Thomas Ellumkalayil, Sudev Naduvath
:
On δ(k)-Coloring of Some Cycle-Related Graphs. 2350014:1-2350014:11 - Mahmoud Mezghani, Omnia Mezghani:
Holes Problem Solving in Khalimsky Topology Protocol for Wireless Sensor Networks (WSNs). 2350015:1-2350015:28 - Caixi Xue, Shuming Zhou
, Hong Zhang:
The Bounds of Generalized 4-Connectivity of Folded Divide-and-Swap Cubes. 2350016:1-2350016:13 - Dongjuan Ma
, Feng Jing
, Zehui Liu
, Min Guo
, Weizhe Jing
, Jie Liang
:
Low Delay Transmission Scheme of Power Communication Information Based on 5G Network. 2350017:1-2350017:18
Volume 24, Number 3, September 2024
- Garsukuti Mohan Ram
, E. Ilavarasan
:
Secure and Energy-Based STEERA Routing Protocol for Wireless Sensor Networks. 2350018:1-2350018:30 - Wayne Goddard, Julia VanLandingham:
On the Extremal Values of the Weighted Integrity of a Graph. 2350019:1-2350019:8 - Yifan Yao, Jinxia Liang
, Yue Li, Rongrong Ma:
Tight Toughness, Isolated Toughness and Binding Number Bounds for the Star-Path Factor. 2350020:1-2350020:8 - Ranjeet B. Kagade
, N. Vijayaraj
:
Hybrid Model-Based Intrusion Detection in Wireless Sensor Network on the Basis of Risk and Link Quality. 2350021:1-2350021:31 - M. Ganesh Raja, S. Jeyalaksshmi:
Self-Configuration and Self-Healing Framework Using Extreme Gradient Boosting (XGBoost) Classifier for IoT-WSN. 2350022:1-2350022:14 - Taha Bensiradj
:
Efficient Strategy to Exchange Road Messages Between Smart Vehicles and Wireless Sensor Networks in Hybrid Sensor and Vehicular Networks. 2350023:1-2350023:20
Volume 24, Number Supplement-1, November 2024
- A. Madhuri, Esther Jyothi Veerapaneni, Surapaneni Phani Praveen, S. Sindhura, Sai Srinivas Vellela, Dasari Lokesh Sai Kumar:
A New Multi-Level Semi-Supervised Learning Approach for Network Intrusion Detection System Based on the 'GOA'. 2143047:1-2143047:13 - R. Amutha, Sivasankari G. G, K. R. Venugopal, Thompson Stephan:
DTAR: A Dynamic Threshold Adaptive Ranking-Based Energy-Efficient Routing Algorithm for WSNs. 2149001:1-2149001:22 - Ashok Kumar Rai, A. K. Daniel:
Energy-Efficient Model for Intruder Detection Using Wireless Sensor Network. 2149002:1-2149002:22 - A. R. Suhas, Manoj Priyatham M.:
Health Ratio Optimization of Group Detection-Based Data Network Using Genetic Algorithm. 2241001:1-2241001:22 - Ying Chen, Xianjing Li, Wei Wang, Jiahao Wang, Wencheng Zhang, Yanjiao Shi, Qi Zhang:
Remote Sensing Image Registration Via Cyclic Parameter Synthesis and Spatial Transformation Network. 2242001:1-2242001:23 - Jingze Ma, Guoye Zhan, Fan Yang, Xingpei Chen:
Data-Driven Information Management Method of Power Supply Chains Using Mobile Cloud Computing. 2242002:1-2242002:13 - Zhexiong Cui, Jie Ren:
Mobile Big Data Analytics for Human Behavior Recognition in Wireless Sensor Network Based on Transfer Learning. 2242003:1-2242003:15 - Huiping Li:
Multi-Scale Segmentation Method of Remote Sensing Big Data Image Using Deep Learning. 2242004:1-2242004:16 - Erukala Suresh Babu, Ilaiah Kavati, Ramalingaswamy Cheruku, Soumya Ranjan Nayak, Uttam Ghosh:
Trust-Based Permissioned Blockchain Network for Identification and Authentication of Internet of Smart Devices: An E-Commerce Prospective. 2243001:1-2243001:30 - Niranjan L., Manoj Priyatham M.:
A Novel Incentive Routing Protocol with Virtual Projection for Mobile Packet Forwarding Nodes in Wireless Sensor Networks. 2350028:1-2350028:23

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.