Journal Contents: International Journal of Mobile Computing and Multimedia Communications (IJMCMC)

Volume 15 (2024)
Issue 1
Article 81
An End-to-End Network Evaluation Method for Differentiated Multi-Service Bearing in VPP (pages 1-16)
Wanqiao Wang (China Electric Power Research Institute, China), Jian Su (China Electric Power Research Institute, China), Hui Zhang (China Electric Power Research Institute, China), Luyao Guan (China Electric Power Research Institute, China), Qingrong Zheng (State Grid Shanghai Municipal Electric Power Company, China), Zhuofan Tang (State Grid Shanghai Municipal Electric Power Company, China), Huixia Ding (China Electric Power Research Institute, China)
Volume 14 (2023)
Issue 1
Article 29
Using Eye Tracking to Measure Overall Usability of Online Grocery Shopping Websites (pages 1-24)
Ali Bonyadi Naeini (Iran University of Science and Technology, Iran), Ali Golbazi Mahdipour (Iran University of Science and Technology, Iran), Rasam Dorri (Iran University of Science and Technology, Iran)
Article 30
Biometric Authentication Methods on Mobile Platforms: An Introduction to Fingerprint Strong Feature Extraction (pages 1-16)
Agnitè Maxim Wilfrid Straiker Edoh (University of Abomey-Calavi, Benin), Tahirou Djara (University of Abomey-Calavi, Benin), Abdou-Aziz Sobabe Ali Tahirou (University of Abomey-Calavi, Benin), Antoine Vianou (Université d'Abomey-Calavi, Benin)
Article 49
Deep Learning-Based Machine Color Emotion Generation (pages 1-14)
Tongyao Nie (Packaging Engineering Institute, China), Xinguang Lv (Packaging Engineering Institute, China)
Article 76
Epsilon-Greedy-Based MQTT QoS Mode Selection and Power Control Algorithm for Power Distribution IoT (pages 1-18)
Xinhong You (Shandong Electric Power Research Institute, State Grid Corporation of China, China), Pengping Zhang (Shandong Electric Power Research Institute, State Grid Corporation of China, China), Minglin Liu (Shandong Electric Power Research Institute, State Grid Corporation of China, China), Lingqi Lin (Shandong Electric Power Research Institute, State Grid Corporation of China, China), Shuai Li (Shandong Electric Power Research Institute, State Grid Corporation of China, China)
Article 90
Multi-Agent Reinforcement Learning-Based Resource Management for V2X Communication (pages 1-17)
Nan Zhao (Hubei University of Technology, China), Jiaye Wang (Hubei University of Technology, China), Bo Jin (Hubei University of Technology, China), Ru Wang (Hubei University of Technology, China), Minghu Wu (Hubei University of Technology, China), Yu Liu (The First Construction and Installation Co., Ltd. of China Construction Third Engineering Bureau, China), Lufeng Zheng (The First Construction and Installation Co., Ltd. of China Construction Third Engineering Bureau, China)
Volume 13 (2022)
Issue 1
Article 28
Decision Framework for Cross-Platform Mobile Development Frameworks Using an Integrated Multi-Criteria Decision-Making Methodology (pages 1-22)
Mohamed Lachgar (LTI Laboratory, ENSA, Chouaib Doukkali University, El Jadida, Morocco), Mohamed Hanine (LTI Laboratory, ENSA, Chouaib Doukkali University, El Jadida, Morocco), Hanane Benouda (EST Khenifra, Sultan Moulay Slimane University, Beni Mellal, Morocco), Younes Ommane (MSDA, Mohamed VI Polytechnic University (UM6P), Ben Guerir, Morocco)
Article 61
Multi-Level ECDH-Based Authentication Protocol for Secure Software-Defined VANET Interaction (pages 1-28)
Umesh K. Raut (Oriental University, India, and), Vishwamitra L. K. (Oriental University, India)
Article 62
Amalgamated Evolutionary Approach for Optimized Routing in Time Varying Ultra Dense Heterogeneous Networks (pages 1-22)
Debashis Dev Misra (Royal Global University, Guwahati, India), Kandarpa Kumar Sarma (Gauhati University, India), Pradyut Kumar Goswami (Assam Science and Technology University, India), Subhrajyoti Bordoloi (Assam Engineering College, India), Utpal Bhattacharjee (Rajiv Gandhi University, India)
Article 63
A Deep Autoencoder-Based Hybrid Recommender System (pages 1-19)
Yahya Bougteb (LM2I Laboratory, ENSAM, Moulay Ismail University, Morocco), Brahim Ouhbi (LM2I Laboratory, ENSAM, Moulay Ismail University, Morocco), Bouchra Frikh (École Nationale des Sciences Appliquées de Fès, Morocco), Elmoukhtar Zemmouri (ENSAM, Moulay Ismail University, Morocco)
Article 64
A Novel Power-Efficient Data Aggregation Scheme for Cloud-Based Sensor Networks (pages 1-14)
Abhishek Bajpai (Rajkiya Engineering College, Kannuaj, India), Shashank Yadav (Rajkiya Engineering College, Kannuaj, India), Naveen Tiwari (Rajkiya Engineering College, Kannuaj, India), Anita Yadav (Harcourt Butler Technical University, India), Mansi Chaurasia (Rajkiya Engineering College, Kannuaj, India)
Article 65
Large-Scale Commodity Knowledge Organization and Intelligent Query Optimization (pages 1-25)
Ya Zhou (Hunan International Economics University, China)
Article 66
High-Efficiency Multihomed Multimedia Transmission in Wireless Sensors (pages 1-19)
Haitao Wang (Hunan International Economics University, China), Yanli Chen (Hunan University of International Economics, China)
Article 67
Mobile Location-Based Services: Current Use and Future Prospects (pages 1-17)
Heon Baek (Sogang University, South Korea)
Article 68
Optimal Weighted Logarithmic Transformation Converted HMOG Features for Automatic Smart Phone Authentication (pages 1-23)
Vinod P. R. (Noorul Islam Centre for Higher Education, India), Anitha A. (Noorul Islam Centre for Higher Education, India)
Article 75
A Fingerprint-Based Indoor Localization System Using IEEE 802.15.4 for Staying Room Detection (pages 1-21)
Pradini Puspitaningayu (Okayama University, Japan), Nobuo Funabiki (Okayama University, Japan), Yuanzhi Huo (Okayama University, Japan), Kazushi Hamazaki (Okayama University, Japan), Minoru Kuribayashi (Okayama University, Japan), Wen-Chung Kao (National Taiwan Normal University, Taiwan)
Issue 2
Special Issue on Intelligent Data Mining and Engineering-Assisted Mobile Software System Analysis and Design
Guest Editorial Preface
Jing Chai (Yunnan University, China), Pooja Jain (Indian Institute of Information Technology, India)
Article 45
Intelligent Data Mining-Based Method for Efficient English Teaching and Cultural Analysis (pages 1-14)
Qing Ai (Zhujiang College, South China Agricultural University, China), Hongyu Guo (Zhejiang Gongshang University, China)
Article 46
Article 47
Mobile Edge Computing to Assist the Online Ideological and Political Education (pages 1-11)
Dan Wang (Jilin Engineering Vocational College, China), Jian Zhao (Northeast Normal University, China)
Article 48
Online Music Style Recognition via Mobile Computing (pages 1-12)
Lizhu Yuan (Jilin Normal University, China), Yue Zhang (Jilin Normal University, China)
Article 49
Prediction of Football Match Results Based on Edge Computing and Machine Learning Technology (pages 1-10)
Yunfei Li (Jilin Institute of Physical Education, China), Yubin Hong (Jilin Institute of Physical Education, China)
Article 50
Video Sequence Analysis for On-Table Tennis Player Ranking and Analysis (pages 1-9)
Xiaoni Wei (Hechi University, China)
Article 51
English Article Style Recognition and Matching by Using Web Semantics (pages 1-13)
Mi Zhou (Dalian University of Science and Technology, China), Lina Peng (Dalian Naval Academy, China)
Article 52
Aesthetic Evaluation of Interior Design Based on Visual Features (pages 1-12)
Zhen Zhang (Hebei Academy of Fine Arts, China), Jianwei Ban (Hebei Academy of Fine Arts, China)
Issue 3
Issue 4
Volume 12 (2021)
Issue 1
Article 1
An Improved Gravitational Clustering Based on Local Density (pages 1-22)
Lei Chen (School of Information and Electrical Engineering, Hunan University of Science and Technology, China), Qinghua Guo (School of Information and Electrical Engineering, Hunan University of Science and Technology, China), Zhaohua Liu (State Key Laboratory of Advanced Design and Manufacturing for Vehicle Body, Hunan University, China), Long Chen (School of Information and Electrical Engineering, Hunan University of Science and Technology, China), HuiQin Ning (School of Information and Electrical Engineering, Hunan University of Science and Technology, China), Youwei Zhang (School of Information and Electrical Engineering, Hunan University of Science and Technology, China), Yu Jin (School of Information and Electrical Engineering, Hunan University of Science and Technology, China)
Article 2
Enhanced Adaptive Call Admission Control Scheme With Bandwidth Reservation for LTE Networks (pages 23-42)
Maniru Malami Umar (Usmanu Danfodiyo University, Sokoto, Nigeria), Amimu Mohammed (Usmanu Danfodiyo University, Sokoto, Nigeria), Abubakar Roko (Usmanu Danfodiyo University, Sokoto, Nigeria), Ahmed Yusuf Tambuwal (Usmanu Danfodiyo University, Sokoto, Nigeria), Abdulhakeem Abdulazeez (Usmanu Danfodiyo University, Sokoto, Nigeria)
Article 3
Dynamic Scheduling Model of Rail-Guided Vehicle (RGV) Based on Genetic Algorithms in the Context of Mobile Computing (pages 43-62)
Chen Xu (Zhongnan University of Economics and Law, China), Xueyan Xiong (Zhongnan University of Economics and Law, China), Qianyi Du (Zhongnan University of Economics and Law, China), Shudong Liu (Zhongnan University of Economics and Law, China), Yipeng Li (Zhongnan University of Economics and Law, China), Deliang Zhong (Zhongnan University of Economics and Law, China), Liu Yaqi (Zhongnan University of Economics and Law, China)
Article 4
Super Lightweight Mobile RFID Authentication Protocol for Bit Replacement Operation (pages 63-77)
Yubao Hou (Hunan International Economics University, China), Hua Liang (Hunan International Economics University, China), Juan Liu (Hunan Software Vocational Institute, China)
Issue 2
Article 1
A High Density WSN Cluster Positioning Approach (pages 1-17)
Qinqing Kang (Hunan International Economics University, China)
Article 2
Application of Fuzzy Logic for Slice QoS in 5G Networks: A Comparison Study of Two Fuzzy-Based Schemes for Admission Control (pages 18-35)
Phudit Ampririt (Fukuoka Institute of Technology, Japan), Ermioni Qafzezi (Fukuoka Institute of Technology, Japan), Kevin Bylykbashi (Fukuoka Institute of Technology, Japan), Makoto Ikeda (Fukuoka Institute of Technology, Japan), Keita Matsuo (Fukuoka Institute of Technology, Japan), Leonard Barolli (Fukuoka Institute of Technology, Japan)
Article 3
Secure-Aware Multipath Routing Using Atom Search Rider Optimization Algorithm in Wireless Sensor Networks (pages 36-55)
M. B. Shyjith (Dept of CSE, Noorul Islam Centre for Higher Education, Kumaracoil, India), C. P. Maheswaran (Dept of CSE, Noorul Islam Centre for Higher Education, Kumaracoil, India), V. K. Reshma (Dept of CSE, Jawaharlal College of Engineering and Technology, Palakkad, India)
Article 4
Analysis of the Current Situation and Characteristics of College Student “Online Fraud Cases” (pages 56-73)
Mingyue Qiu (Nanjing Forest Police College, China), Yitao Yang (Nanjing Forest Police College, China)
Article 5
A Sensor Data Stream Collection Scheme Considering Phase Differences for Load Balancing (pages 75-89)
Tomoya Kawakami (Graduate School of Engineering, University of Fukui, Japan), Tomoki Yoshihisa (Cybermedia Center, Osaka University, Japan), Yuuichi Teranishi (National Institute of Information and Communications Technology, Japan)
Issue 3
Article 1
Decentralized Intelligent Search of Tourist Routes Based on Check-In Data (pages 1-16)
Jie Su (Hunan International Economics University, China), Jun Li (Hunan International Economics University, China)
Article 2
A Location-Tracking Method With a Convolutional Neural Network (pages 17-26)
Shiori Kawakami (Seikei University, Japan), Shinji Sakamoto (Seikei University, Japan), Shusuke Okamoto (Seikei University, Japan)
Article 3
Outsourced Secure Face Recognition Based on CKKS Homomorphic Encryption in Cloud Computing (pages 27-43)
Liu Jiasen (Independent Researcher, China), Wang Xu An (Independent Researcher, China), Chen Bowei (Independent Researcher, China), Tu Zheng (Independent Researcher, China), Zhao Kaiyang (Independent Researcher, China)
Article 4
Identification of a Person From Live Video Streaming Using Machine Learning in the Internet of Things (IoT) (pages 44-59)
Sana Zeba (Department of Computer Engineering, Jamia Millia Islamia University, New Delhi, India), Mohammad Amjad (Department of Computer Engineering, Jamia Millia Islamia University, New Delhi, India)
Article 5
Development of Learning Systems for Children to Promote Self-Directed Choosing of Learning Tasks (pages 60-77)
Yoshihiro Kawano (Tokyo University of Information Sciences, Japan), Yuka Kawano (Candy, Japan)
Issue 4
Article 1
A QoS-Aware Fuzzy-Based System for Assessment of Edge Computing Resources in SDN-VANETs: System Implementation and Performance Evaluation (pages 1-16)
Ermioni Qafzezi (Fukuoka Institute of Technology, Japan), Kevin Bylykbashi (Fukuoka Institute of Technology, Japan), Phudit Ampririt (Fukuoka Institute of Technology, Japan), Makoto Ikeda (Fukuoka Institute of Technology, Japan), Keita Matsuo (Fukuoka Institute of Technology, Japan), Leonard Barolli (Fukuoka Institute of Technology, Japan)
Article 2
Estimate Risks Eate for Android Applications Using Android Permissions (pages 17-31)
Latifa Er-Rajy (FSSM Marrakech, Morocco), My Ahmed El Kiram (Cadi Ayyad University, Morocco), Mohamed El Ghazouani (Faculty of Science, Semlalia, Morocco)
Article 3
Deep Reinforcement Learning for Task Offloading and Power Allocation in UAV-Assisted MEC System (pages 32-51)
Nan Zhao (Hubei University of Technology, China), Fan Ren (Hubei University of Technology, China), Wei Du (Hubei University of Technology, China), Zhiyang Ye (Hubei University of Technology, China)
Article 4
A Novel Approach for Privacy Preservation in Blockchain Network Using Tensor Product and a Hybrid Swarm Intelligence (pages 52-71)
Yogesh Sharma (Galgotias University, India), Balamurugan Balusamy (Galgotias University, India)
Volume 11 (2020)
Issue 1
Article 1
Implementation of an Interactive Information Sharing System for Disaster Measure Operation (pages 1-22)
Ryo Nakai (Ibaraki University, Mito, Japan), Tomoyuki Ishida (Fukuoka Institute of Technology, Fukuoka, Japan)
Article 2
Multi-Agent Actor Critic for Channel Allocation in Heterogeneous Networks (pages 23-41)
Nan Zhao (Hubei University of Technology, China), Zehua Liu (Hubei University of Technology, China), Yiqiang Cheng (Hubei University of Technology, China), Chao Tian (Hubei University of Technology, China)
Article 3
A Hybrid Recommender Method Based on Multiple Dimension Attention Analysis (pages 42-57)
Minghu Wu (Hubei Collaborative Innovation Center for High-efficiency Utilization of Solar Energy, Hubei University of Technology, Wuhan, China), Songnan Lv (Hubei University of technology, Wuhan, China), Chunyan Zeng (Hubei University of technology, Wuhan, China), Zhifeng Wang (Central China Normal University, Wuhan, China), Nan Zhao (Hubei Collaborative Innovation Center for High-efficiency Utilization of Solar Energy, Hubei University of Technology, Wuhan, China), Li Zhu (Hubei Collaborative Innovation Center for High-efficiency Utilization of Solar Energy, Hubei University of Technology, Wuhan, China), Juan Wang (Hubei Collaborative Innovation Center for High-efficiency Utilization of Solar Energy, Hubei University of Technology, Wuhan, China), Ming Wu (Hubei University of technology, Wuhan, China)
Article 4
An Improved Network Congestion Control Strategy Based on Active Source and Link Management (pages 58-73)
Xushi Mei (Jinhua Polytechnic, Jinhua, China), Xiaolong Chen (Jinhua Polytechnic, Jinhua, China)
Issue 2
Article 1
Exploiting User Check-In Data for Geo-Friend Recommendations in Location-Based Social Networks (pages 1-17)
Shudong Liu (School of Information and Security Engineering, Zhongnan University of Economics and Law, Wuhan, China), Ke Zhang (School of Information and Security Engineering, Zhongnan University of Economics and Law, China)
Article 2
A Generalized TCP Fairness Control Method for Multiple-Host Concurrent Communications in Elastic WLAN System Using Raspberry Pi Access Point (pages 18-40)
Rahardhita Widyatra Sudibyo (Okayama University, Japan), Nobuo Funabiki (Okayama University, Japan), Minoru Kuribayashi (Okayama University, Japan), Kwenga Ismael Munene (Okayama University, Japan), Hendy Briantoro (Okayama University, Japan), Md. Manowarul Islam (Jagannath University, Bangladesh), Wen-Chung Kao (National Taiwan Normal University, Taiwan)
Article 3
Machine Learning-Based Coding Decision Making in H.265/HEVC CTU Division and Intra Prediction (pages 41-60)
Wenchan Jiang (Americold Logistics, USA), Ming Yang (Kennesaw State University, USA), Ying Xie (Kennesaw State University, USA), Zhigang Li (Kennesaw State University, USA)
Article 4
Intelligent Early Warning of Internet Financial Risks Based on Mobile Computing (pages 61-78)
Mu Sheng Dong (Collaborative Innovation Center for Green Development in the Wulin San, Yangtze Normal University, China)
Issue 3
Article 1
Adaptive Edge Process Migration for IoT in Heterogeneous Fog and Edge Computing Environments (pages 1-21)
Chii Chang (University of Tartu, Estonia), Amnir Hadachi (University of Tartu, Estonia), Satish Narayana Srirama (University of Tartu, Estonia)
Article 2
FBPCQS-Fuzzy-Based Peer Coordination Quality Systems for P2P Networks: Implementation and Performance Evaluation (pages 22-37)
Yi Liu (National Institute of Technology, Oita College, Japan), Ermioni Qafzezi (Fukuoka Institute of Technology, Japan), Phudit Ampririt (Fukuoka Institute of Technology, Japan), Seiji Ohara (Fukuoka Institute of Technology, Japan), Leonard Barolli (Fukuoka Institute of Technology, Japan)
Article 3
Differing Perceptions of Mobile Devices: Company-Issued Devices and Bring Your Own Device (BYOD) (pages 38-47)
Wiley S. Brown (North Carolina Agricultural and Technical State University, USA), Prashant C. Palvia (The University of North Carolina at Greensboro, USA)
Article 4
HanLP-Based Technology Function Matrix Construction on Chinese Process Patents (pages 48-64)
Yuexin Yang (Shaanxi University of Science and Technology, China), Gongchang Ren (Shaanxi University of Science and Technology, China)
Issue 4
Article 1
Transmission Power Optimization of Concurrently Communicating Two Access Points in Wireless Local Area Network (pages 1-25)
Hendy Briantoro (Okayama University, Japan), Nobuo Funabiki (Okayama University, Japan), Minoru Kuribayashi (Okayama University, Japan), Kwenga Ismael Munene (Okayama University, Japan), Rahardhita Widyatra Sudibyo (Politeknik Elektronika Negeri Surabaya, Indonesia), Md. Manowarul Islam (Jagannath University, Bangladesh), Wen-Chung Kao (National Taiwan Normal University, Taiwan)
Article 2
Big Data Research in the Tourism Industry: Requirements and Challenges (pages 26-41)
Imadeddine Mountasser (National Higher School of Arts and Craft, Moulay Ismail University, Morocco), Brahim Ouhbi (National Higher School of Arts and Craft, Moulay Ismail University, Morocco), Bouchra Frikh (Higher School of Technology, Sidi Mohamed Ben Abdellah University, Morocco), Ferdaous Hdioud (Faculty of Science, Mohammed V University, Morocco)
Article 3
JSCC-UFMC and Large MIMO Technology for High Data Rate Wireless Communication (pages 42-66)
Surajit Deka (Gauhati University, India), Kandarpa Kumar Sarma (Gauhati University, India)
Article 4
Clustering-Based Optimal Relay Vehicle Selection Scheme for Vehicular Adhoc Networks (VANETs) (pages 67-83)
Virender Kumar (Chandigarh University, Mohali, Punjab, India), Pawan Kumar Dahiya (Deenbandhu Chhotu Ram University of Science and Technology, Murthal, Haryana, India)
Article 5
Performance Evaluation of 2-Wavelength Cognitive Wireless Network for V2R and V2V Communication (pages 84-101)
Akira Sakuraba (Iwate Prefectural University, Japan), Yoshitaka Shibata (Iwate Prefectural University, Japan), Goshi Sato (Resilient ICT Research Center, National Institute of Information and Communications Technology, Japan), Noriki Uchida (Fukuoka Institute of Technology, Japan)
Volume 10 (2019)
Issue 1
Special Issue of Introduction of Advanced Theory and Application for Mobile Hybrid Information
Guest Editorial Preface
Shuai Liu (College of Computer Science, Inner Mongolia University, Hohhot, China), Zhaojun Li (Department of Industrial Engineering and Engineering Management, Western New England University, USA), Xiaochun Cheng (School of Computing Science, Middlesex University, London, UK)
Article 1
Security Model of Internet of Things Based on Binary Wavelet and Sparse Neural Network (pages 1-17)
Zhihui Wang (School of Information Science and Engineering, Hebei North University, Zhangjiakou, China), Jingjing Yang (School of Information Science and Engineering, Hebei North University, Zhangjiakou, China), Benzhen Guo (School of Information Science and Engineering, Hebei North University, Zhangjiakou, China), Xiaochun Cheng (Middlesex University, London, UK)
Article 2
Research on Reliability and Validity of Mobile Networks-Based Automated Writing Evaluation (pages 18-31)
Fei Lang (School of Foreign Languages, Harbin University of Science and Technology, Harbin, China), Siyan Li (School of Foreign Languages, Harbin University of Science and Technology, Harbin, China), Siwen Zhang (School of Foreign Languages, Harbin University of Science and Technology, Harbin, China)
Article 3
Online Teaching System of Sports Training Based on Mobile Multimedia Communication Platform (pages 32-48)
Tianxiang Yue (Physical Education Department, Jiangxi University of Traditional Chinese Medicine, Nanchang, China), Yebing Zou (Physical Education Department, Jiangxi University of Traditional Chinese Medicine, Nanchang, China)
Article 4
Location Tracking Prediction of Network Users Based on Online Learning Method With Python (pages 49-64)
Xin Xu (School of Management, Fudan University, Shanghai, China), Hui Lu (College of Computer Science, Inner Mongolia University, Hohhot, China)
Article 5
Research on Human Resource Allocation Model Based on SOM Neural Network (pages 65-76)
Jing Xu (Department of Economics Management, Shanxi Institute of Technology, Xi'an, China), Bo Wang (Department of Electrical Engineering, Shanxi Institute of Technology, Xi'an, China), Gihong Min (Department of Game Engineering, Paichai University, Daejeon, South Korea)
Issue 2
Article 1
A Self-Configurable Event Coverage Approach for Wireless Sensor Networks (pages 1-18)
Ajay Kaushik (Delhi Technological University, Delhi, India), Ravi Teja Yakkali (NXP Semiconductors, Delhi, India), S. Indu (Delhi Technological University, Delhi, India), Feroz Ahmed (Delhi Technological University, Delhi, India), Daya Gupta (Delhi Technological University, Delhi, India), Raunaq Nayar (Nanyang Technological University, Delhi, India), Sahil Yadav (Delhi Technological University, Delhi, India)
Article 2
Human Linguistic Perception of Distances for Location-Aware Systems (pages 19-41)
Akeem Olowolayemo (Universiti Malaysia Sarawak, Kota Samarahan, Malaysia), Teddy Mantoro (Sampoerna University, Jakarta, Indonesia)
Article 3
Fuzzy Holoentropy-Based Adaptive Inter-Prediction Mode Selection for H.264 Video Coding (pages 42-60)
Srinivas Bachu (Department of ECE, Marri Laxman Reddy Institute of Technology and Management, Dubdigal, Hyderabad, Telangana, India), N. Ramya Teja (Department of ECE, Guru Nanak Institutions Technical Campus (Autonomous), Ibrahimpatnam, Hyderabad, Telangana, India)
Issue 3
Article 1
Adaptive Mobile Sink for Energy Efficient WSN Using Biogeography-Based Optimization (pages 1-22)
Ajay Kaushik (Department of Computer Science and Engineering, Delhi Technological University, Delhi, India), S. Indu (Department of Electronics and Communication Engineering, Delhi Technological University, Delhi, India), Daya Gupta (Department of Computer Science and Engineering, Delhi Technological University, Delhi, India)
Article 2
Mobile Edge Computing: Cost-Efficient Content Delivery in Resource-Constrained Mobile Computing Environment (pages 23-46)
Michael P. J. Mahenge (Wuhan University of Technology, China & Sokoine University of Agriculture, Morogoro, Tanzania), Chunlin Li (Wuhan University of Technology, Wuhan, China), Camilius A. Sanga (Sokoine University of Agriculture, Morogoro, Tanzania)
Article 3
Analysis of Bargaining Game Policy in the Internet Content Distribution Chain (pages 47-73)
Driss Ait Omar (University of Sultan Moulay Slimane, Beni-Mellal, Morocco), Hamid Garmani (University of Sultan Moulay Slimane, Beni-Mellal, Morocco), Mohamed El Amrani (University of Sultan Moulay Slimane, Beni-Mellal, Morocco), Mohamed Baslam (University of Sultan Moulay Slimane, Beni-Mellal, Morocco), Mohamed Fakir (University of Sultan Moulay Slimane, Beni-Mellal, Morocco)
Issue 4
Article 1
A New Fuzzy-Based Resource Management System for SDN-VANETs (pages 1-12)
Ermioni Qafzezi (Fukuoka Institute of Technology, Fukuoka, Japan), Kevin Bylykbashi (Fukuoka Institute of Technology, Fukuoka, Japan), Evjola Spaho (Polytechnic University of Tirana, Tirana, Albania), Leonard Barolli (Fukuoka Institute of Technology, Fukuoka, Japan)
Article 2
Information Flow Control Based on the CapBAC (Capability-Based Access Control) Model in the IoT (pages 13-25)
Shigenari Nakamura (Hosei University, Tokyo, Japan), Tomoya Enokido (Rissho University, Tokyo, Japan), Makoto Takizawa (Hosei University, Tokyo, Japan)
Article 3
Physical Layer Security in Military Communications: A Three Levels Approach (pages 26-40)
Elias Yaacoub (Arab Open University, Beirut, Lebanon)
Article 4
A Pricing Model for Effective Radio Spectrum Utilization (pages 41-65)
Sunil Kumar Singh (Department of Computer Science & Information Technology, Mahatma Gandhi Central University, Bihar, India), Deo Prakash Vidyarthi (School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi, India)
Volume 9 (2018)
Issue 1
Article 1
An Enhanced Mobile Device-Based Navigation Model: Ubiquitous Computing (pages 1-20)
Emmanuel Ajayi Olajubu (Department of Computer Science and Engineering, Obafemi Awolowo University, Ile-Ife, Nigeria), John E. Efiong (Wesley University, Ondo, Nigeria), Aderounmu G. Adesola (Obafemi Awolowo University, Ile-Ife, Nigeria)
Article 2
GNSS Positioning Enhancement Based on NLOS Multipath Biases Estimation Using Gaussian Mixture Noise (pages 21-39)
Guermah Bassma (STRS Laboratory, National Institute of Posts and Telecommunication, Morocco), Sadiki Tayeb (Faculty of Computing and Logistics, TICLab, International University of Rabat (UIR), Morocco), El Ghazi Hassan (STRS Laboratory, National Institute of Posts and Telecommunication, Morocco)
Article 3
Fast HEVC Inter-Prediction Algorithm Based on Matching Block Features (pages 40-61)
Meifeng Liu (East China University of Technology, Nanchang, China), Guoyun Zhong (East China University of Technology, Nanchang, China), Yueshun He (East China University of Technology, Nanchang, China), Kai Zhong (East China University of Technology, Nanchang, China), Hongmao Chen (East China University of Technology, Nanchang, China), Mingliang Gao (Shandong University of Technology, Zibo, China)
Article 4
Performance Measurement Study on Two Video Service Providers in China (pages 62-78)
Jiali You (Institute of Acoustics, Chinese Academy of Sciences, Beijing, China), Hanxing Xue (Institute of Acoustics, Chinese Academy of Sciences, Beijing, China), Yu Zhuo (Institute of Acoustics, Chinese Academy of Sciences, Beijing, China), Guoqiang Zhang (School of Computer Science and Technology, Nanjing Normal University, Nanjing, China), Jinlin Wang (Institute of Acoustics, Chinese Academy of Sciences, Beijing, China), Weining Qi (Institute of Acoustics, Chinese Academy of Sciences, Beijing, China)
Issue 2
Special Issue on Mobile Solutions Applied to Social Inclusion
Guest Editorial Preface
Sara Paiva (Escola Superior de Tecnologia e Gestão, Instituto Politécnico de Viana do Castelo, Viana do Castelo, Portugal), Carlos Abreu (Escola Superior de Tecnologia e Gestão, Instituto Politécnico de Viana do Castelo, Viana do Castelo, Portugal)
Article 1
Headache App: Usability Assessment and Criterion Validity (pages 1-11)
Tânia Dantas (Medical Science Department, University of Aveiro, Aveiro, Portugal), Milton Rodrigues dos Santos (Health Sciences School, University of Aveiro, Aveiro, Portugal), Alexandra Queirós (Health Sciences School, University of Aveiro, Aveiro, Portugal), Anabela G. Silva (Health Sciences School, University of Aveiro, Aveiro, Portugal)
Article 2
An Investigation into Permissions Requested by Mobile Banking on Android Platform (pages 12-30)
Latifa Er-Rajy (Cadi Ayyad University, Marrakesh, Morocco), M. Ahmed El Kiram (Cadi Ayyad University, Marrakesh, Morocco)
Article 3
A New Framework for Accessible Tourism Mobile Application Development (pages 31-46)
Fernando Reinaldo Ribeiro (R&D Unit in Digital Services, Applications and Content, Polytechnic Institute of Castelo Branco, Castelo Branco, Portugal), Arlindo Silva (R&D Unit in Digital Services, Applications and Content, Polytechnic Institute of Castelo Branco, Castelo Branco, Portugal), José C. Metrôlho (R&D Unit in Digital Services, Applications and Content, Polytechnic Institute of Castelo Branco, Castelo Branco, Portugal), Ana Paula Silva (R&D Unit in Digital Services, Applications and Content, Polytechnic Institute of Castelo Branco, Castelo Branco, Portugal), Fernando Sérgio Barbosa (R&D Unit in Digital Services, Applications and Content, Polytechnic Institute of Castelo Branco, Castelo Branco, Portugal)
Article 4
An Assessment of Mobile Internet Usage in a Rural Setting of a Developing Country (pages 47-59)
Emmanuel Eilu (School of Computing and Informatic Technology, Makerere University Kampala, Kampala, Uganda)
Issue 3
Article 1
A Unique Method of Constructing Brand Perceptual Maps by the Text Mining of Multimedia Consumer Reviews (pages 1-22)
Amir Ekhlassi (Faculty of Entrepreneurship, University of Tehran, Tehran, Iran), Amirhosein Zahedi (University of Tehran, Tehran, Iran)
Article 2
A Dynamic Security Scheme for OppNets Using Cognitive Computing (pages 23-44)
Seema B. Hegde (Department of E&C, Siddaganga Institute of Technology, Tumkur, India), B. Sathish Babu (Department of Computer Science and Engineering, R V College of Engineering, Bangalore, India), Pallapa Venkatram (Department of Electrical Communication and Engineering, Indian Institute of Science(IISc), Bangalore, India)
Article 3
A Slotted Multichannel MAC Protocol for Fair Resource Allocation in VANET (pages 45-59)
Pant Varun Prakash (Motilal Nehru National Institute of Technology Allahabad, Allahabad, India), Saumya Tripathi (APJ Abdul Kalam Technical University, Lucknow, India), Raghavendra Pal (Motilal Nehru National Institute of Technology Allahabad, Allahabad, India), Arun Prakash (Motilal Nehru National Institute of Technology Allahabad, Allahabad, India)
Article 4
Packet Dropping Counter Measures in a MANET Through Reliable Routing Protocol Leveraging a Trust Management Framework (pages 60-75)
Shirina Samreen (Anurag Group of Institutions, Hyderabad, India)
Issue 4
Special Issue of Intelligent Techniques and Tools for Multimedia Processing
Guest Editorial Preface
Fatos Xhafa (Technical University of Catalonia, Barcelona, Spain)
Article 1
Fall Behavior Recognition Based on Deep Learning and Image Processing (pages 1-15)
He Xu (School of Computer Science and Jiangsu High Technology Research Key Laboratory for WSN, Nanjing University of Posts and Telecommunications, Nanjing, China), Leixian Shen (Nanjing University of Posts and Telecommunications, Nanjing, China), Qingyun Zhang (Nanjing University of Posts and Telecommunications, Nanjing, China), Guoxu Cao (Nanjing University of Posts and Telecommunications, Nanjing, China)
Article 2
Residual Reconstruction Algorithm Based on Half-Pixel Multi-Hypothesis Prediction for Distributed Compressive Video Sensing (pages 16-33)
Ying Tong (PLA University of Science and Technology, Nanjing, China), Rui Chen (Nanjing Institute of Technology, Nanjing, China), Jie Yang (Nanjing Institute of Technology, Nanjing, China), Minghu Wu (Hubei Collaborative Innovation Center for High-efficiency Utilization of Solar Energy, Hubei University of Technology, Wuhan, China)
Article 3
Deep Reinforcement Learning for Mobile Video Offloading in Heterogeneous Cellular Networks (pages 34-57)
Nan Zhao (Hubei Collaborative Innovation Center for High-efficiency Utilization of Solar Energy, Hubei University of Technology, Wuhan, China), Chao Tian (Hubei University of Technology, Wuhan, China), Menglin Fan (Hubei University of Technology, Wuhan, China), Minghu Wu (Hubei Collaborative Innovation Center for High-efficiency Utilization of Solar Energy, Hubei University of Technology, Wuhan, China), Xiao He (Hubei University of Technology, Wuhan, China), Pengfei Fan (Hubei University of Technology, Wuhan, China)
Article 4
Image-Based 3D Reconstruction on Distributed Hash Network (pages 58-75)
Jin Hua Zhong (Hubei University of Technology, Wuhan, China), Wan Fang (Hubei University of Technology, Wuhan, China)
Article 5
Reversible Data Hiding for Encrypted Image Based on Interpolation Error Expansion (pages 76-96)
Fuqiang Di (Engineering University of Chinese PAP, Xi'an, China), Minqing Zhang (Engineering University of PAP, Xi'an, China), Yingnan Zhang (Engineering University of Chinese PAP, Xi'an, China), Jia Liu (Engineering Univeisity of PAP, Xi'an, China)
Volume 8 (2017)
Issue 1
Security, Privacy, and Trust in Mobile and Multimedia Computing (SecPriTrust)
Guest Editorial Preface
C. P. Gupta (Department of Computer Engineering, Rajasthan Technical University, Rajasthan, India), Nishtha Kesswani (Department of Computer Science, Central University of Rajasthan, Rajasthan, India)
Article 1
Secure Modified Ad Hoc On-Demand Distance Vector (MAODV) Routing Protocol (pages 1-18)
Geetanjali Rathee (Jaypee University of Information Technology, Department of Computer Science and Engineering, Waknaghat, India), Hemraj Saini (Jaypee University of Information Technology, Department of Computer Science and Engineering, Waknaghat, India)
Article 2
Crisis Management Using Centrality Measurement in Social Networks (pages 19-33)
Ruchi Verma (Jaypee University of Information Technology, Department of Computer Science and Engineering, Waknaghat, India), Vivek Kumar Sehgal (Jaypee University of Information Technology, Department of Computer Science and Engineering, Waknaghat, India), Nitin (Jaypee Institute of Information Technology, Department of Computer Science and Engineering, Noida, India)
Article 3
A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security (pages 34-47)
Pratiksha Gautam (Jaypee University of Information Technology, Department of Computer Science, and Engineering, Waknaghat, India), Hemraj Saini (Jaypee University of Information Technology, Department of Computer Science, and Engineering, Waknaghat, India)
Article 4
Certain Investigation on Secured Data Transmission in Wireless Sensor Networks (pages 48-61)
P. Padmaja (S. V. U. College of Engineering, Department of Electrical and Electronic Engineering, Tirupati, India), G.V. Marutheswar (S. V. U. College of Engineering, Department of Electrical and Electronic Engineering, Tirupati, India)
Issue 2
Article 1
Testing a Commercial BCI Device for In-Vehicle Interfaces Evaluation: A Simulator and Real-World Driving Study (pages 1-13)
Nicolas Louveton (University of Luxembourg, Interdisciplinary Centre for Security, Reliability and Trust, Luxembourg City, Luxembourg), Korok Sengupta (University of Koblenz, Koblenz, Germany), Rod McCall (Luxembourg Institute of Science and Technology, Esch-sur-Alzette, Luxembourg), Raphael Frank (University of Luxembourg, Interdisciplinary Centre for Security, Reliability and Trust, Luxembourg City, Luxembourg), Thomas Engel (University of Luxembourg, Interdisciplinary Centre for Security, Reliability and Trust, Luxembourg City, Luxembourg)
Article 2
A Trusted Ubiquitous Healthcare Monitoring System for Hospital Environment (pages 14-26)
Durga Prasad (NMAM Institute of Technology, Department of Electronics and Communication, Nitte, India), Niranjan N. Chiplunkar (NMAM Institute of Technology, Department of Computer Science and Engineering, Nitte, India), K. Prabhakar Nayak (Manipal Institute of Technology, Department of Electronics and Communication, Manipal, India)
Article 3
Exact and Efficient Heuristic Deployment in WSN under Coverage, Connectivity, and Lifetime Constraints (pages 27-43)
Soumaya Fellah (University of Oran1 Ahmed Ben Bella, Laboratory LITIO, Oran, Algeria), Mejdi Kaddour (University of Oran1 Ahmed Ben Bella, Laboratory LITIO, Oran, Algeria)
Article 4
Indonesian Mobile Learning Information System Using Social Media Platforms (pages 44-67)
Mario Tulenan Parinsi (Manado State University, Manado, Indonesia), Keith Francis Ratumbuisang (Yogyakarta State University, Yogyakarta, Indonesia)
Issue 3
Special Issue on Recent Advance of Multimedia Big Data
Editorial Preface
Zhigao Zheng (Central China Normal University, Wuhan, China), Ford Lumban Gaol (Bina Nusantara University, Republik, Indonesia), Krishn K. Mishra (University of Missouri, Columbia, MO, USA)
Article 1
A Method for Angular Super-Resolution via Big Data Radar System (pages 1-20)
Xin Zhang (School of Information Science and Technology, Dalian Maritime University, Dalian, China), Xiaoming Liu (School of Information Science and Technology, Dalian Maritime University, Dalian, China), Zhenyu Na (School of Information Science and Technology, Dalian Maritime University, Dalian, China)
Article 2
A New Intelligent Optimization Network Online Learning Behavior in Multimedia Big Data Environment (pages 21-31)
Shao Heng (School of Information Science and Engineering, Qilu Normal University, Jinan, China)
Article 3
Article 4
A Novel Fast Hierarchical Projection Algorithm for Skew Detection in Multimedia Big Data Environment (pages 44-65)
Li Cheng (School of Power and Mechanical Engineering, Wuhan University, Wuhan, China & School of Computer Science, South-Central University for Nationalities, Wuhan, China), Gongping Wu (School of Power and Mechanical Engineering, Wuhan University, Wuhan, China)
Article 5
A Comparative Study of Shape and Texture Features for Finger Spelling Recognition in Big Data Applications (pages 66-78)
Yong Hu (Jinling Institute of Technology, Nanjing, China)
Article 6
Towards A Virtual Machine Migration Algorithm Based On Multi-Objective Optimization (pages 79-89)
Xiang Chen (School of Civil Engineering, Xi'an Technological University, Xi'an, China), Jun-rong Tang (School of Computer Science and Engineering, Xi'an Technological University, Xi'an, China), Yong Zhang (Wuhan University of Science and Technology, Wuhan, Hubei, China)
Article 7
Modulation Recognition of Digital Multimedia Signal Based on Data Feature Selection (pages 90-111)
Hui Wang (College of Information and Communication Engineering, Harbin Engineering University, Harbin, China), Li Li Guo (College of Information and Communication Engineering, Harbin Engineering University, Harbin, China), Yun Lin (College of Information and Communication Engineering, Harbin Engineering University, Harbin, China)
Issue 4
Article 1
Proactive Mobile Fog Computing using Work Stealing: Data Processing at the Edge (pages 1-19)
Sander Soo (University of Tartu, Tartu, Estonia), Chii Chang (University of Tartu, Tartu, Estonia), Seng W. Loke (Deakin University, Melbourne, Australia), Satish Narayana Srirama (University of Tartu, Tartu, Estonia)
Article 2
Multi-Criteria Recommender Systems: A Survey and a Method to Learn New User's Profile (pages 20-48)
Ferdaous Hdioud (High School of Technology, Lab LTTI, Sidi Mohammed Benabdellah University, Fez, Morocco), Bouchra Frikh (High School of Technology, Lab LTTI, Sidi Mohammed Benabdellah University, Fez, Morocco), Brahim Ouhbi (High School of Arts and Crafts, Lab. M2I, Moulay Ismail University, Meknes, Morocco), Ismail Khalil (Department of Telecooperation, Johannes Kepler University, Linz, Austria)
Article 3
TEEM: Technology-Enhanced Emergency Management for Supporting Data Communication During Patient Transportation (pages 49-65)
Massimo Canonico (University of Piemonte Orientale, Alessandria, Italy), Stefania Montani (University of Piemonte Orientale, Alessandria, Italy), Diego Gazzolo (Neonatal Intensive Care Unit of Alessandria Children Hospital, Alessandria, Italy), Mariachiara Strozzi (Neonatal Intensive Care Unit of Alessandria Children Hospital, Alessandria, Italy), Manuel Striani (University of Turin, Turin, Italy)
Article 4
Mobile Data Offloading Using Opportunistic Communication and AP Deployment: A Case Study (pages 66-84)
Sanjit Kumar Dash (College of Engineering and Technology, Bhubaneswar, India), Sasmita Mishra (Indira Gandhi Institute of Technology, Saranga, India), Jibitesh Mishra (College of Engineering and Technology, Bhubaneswar, India)
Volume 7 (2016)
Issue 1
Article 1
Apps, Apps, and More Apps: Motivations and User Behaviours (pages 1-14)
Matthew J. Haught (Department of Journalism, University of Memphis, Memphis, TN, USA), Ran Wei (School of Journalism and Mass Communications, University of South Carolina, Columbia, SC, USA), Jack V. Karlis (SUNY Buffalo State, Buffalo, NY, USA)
Article 2
Awareness of Mobile Device Security: A Survey of User's Attitudes (pages 15-31)
Nathan Clarke (Plymouth University, Plymouth, UK), Jane Symes (Plymouth University, Plymouth, UK), Hataichanok Saevanee (Plymouth University, Plymouth, UK), Steve Furnell (Plymouth University, Plymouth, UK)
Article 3
Maximizing Power Saving for VoIP over WiMAX Systems (pages 32-40)
Tamer Z. Emara (Higher Institute of Engineering and Technology Kafr El-Sheikh, Kafr El-Sheikh, Egypt)
Article 4
Throughput-Delay Evaluation of a Hybrid-MAC Protocol for M2M Communications (pages 41-60)
Pawan Kumar Verma (Motilal Nehru National Institute of Technology, Allahabad - 211004, India), Rajesh Verma (Ideal Institute of Technology, Ghaziabad - 201003, India), Arun Prakash (Motilal Nehru National Institute of Technology, Allahabad - 211004, India), Rajeev Tripathi (Motilal Nehru National Institute of Technology, Allahabad - 211004, India)
Issue 2
Article 1
Secure Deployment with Optimal Connectivity in Wireless Sensor Networks (pages 1-21)
Anju Sangwan (Guru Jambheshwar University of Science & Technology, Hisar, India), Rishipal Singh (Guru Jambheshwar University of Science & Technology, Hisar, India)
Article 2
Mobile GPU Computing Based Filter Bank Convolution for Three-Dimensional Wavelet Transform (pages 22-35)
Di Zhao (Computer Network Information Center, Chinese Academy of Sciences, Beijing, China)
Article 3
How can Mobile Accounting Reporting Benefit from the ‘Imagined Communities'?: A Conceptual Communication Framework (pages 36-52)
Androniki Kavoura (Technological Educational Institute of Athens, Athens, Greece)
Article 4
Research on Soft Computing Techniques for Cognitive Radio (pages 53-73)
Subhashree Mishra (School of Electronics Engineering, KIIT University, Bhubaneswar, India), Sudhansu Sekhar Singh (KIIT University, Bhubaneswar, India), Bhabani Shankar Prasad Mishra (School of Computer Engineering, KIIT University, Bhubaneswar, India), Prabin Kumar Panigrahi (KIIT University, Bhubaneswar, India)
Issue 3
Article 1
Garment Simulation and Collision Detection on a Mobile Device (pages 1-15)
Tzvetomir Ivanov Vassilev (University of Ruse, Ruse, Bulgaria)
Article 2
Multilayer Perceptron Based Equalizer with an Improved Back Propagation Algorithm for Nonlinear Channels (pages 16-31)
Zohra Zerdoumi (Batna University, Batna, Algeria), Djamel Chikouche (M'sila University, M'sila, Algeria), Djamel Benatia (Batna University, Batna, Algeria)
Article 3
Social Media Communication in the Artisan Economy (pages 32-41)
Angela Au (Higher Learning Institute, Tucson, AZ, USA), Peter J. Anthony (Walden University, Minneapolis, MN, USA)
Article 4
LEAP Enhanced: A Lightweight Symmetric Cryptography Scheme for Identifying Compromised Node in WSN (pages 42-66)
Maleh Yassine (Hassan 1st University Settat, Morocco), Abdellah Ezzati (Hassan 1st University, Morocco)
Issue 4
Article 1
AODV Energy Routing Mechanism for Multi-Channel Multi-Interface Ad Hoc Networks (EMCMI-AODV) Using a Dynamic Programming Algorithm (pages 1-16)
Hassan Faouzi (Sultan Moulay Slimane University, Faculty of Science and Techniques, Beni Mellal, Morocco), Hicham Mouncif (Sultan Moulay Slimane University, Polydisciplinary Faculty, Laboratory LIRST, Beni Mellal, Morocco), Mohamed Lamsaadi (Sultan Moulay Slimane University, Polydisciplinary Faculty, Beni Mellal, Morocco)
Article 2
A Novel Adaptive Scanning Approach for Effective H.265/HEVC Entropy Coding (pages 17-27)
Wei Li (Xi'an University of Technology, Xi'an, China), Fan Zhao (Xi'an University of Technology, Xi'an, China), Peng Ren (Xidian University, Xi'an, China), Zheng Xiang (Xidian University, Xi'an, China)
Article 3
SRMIP: A Software-Defined RAN Mobile IP Framework for Real Time Applications in Wide Area Motion (pages 28-49)
Walaa Farouk Elsadek (American University in Cairo, Computer Science and Engineering Department, Cairo, Egypt), Mikhail N. Mikhail (American University in Cairo, Computer Science and Engineering Department, Cairo, Egypt)
Article 4
Dict-Based Energy and Latency Efficient Air Indexing Technique for Full Text Search Over Wireless Broadcast Stream (pages 50-72)
Vikas Goel (Ajay Kumar Garg Engineering College, Department of Computer Science & Engineering, Ghaziabad, India), Anil Kumar Ahlawat (Krishna Institute of Engineering & Technology, Department of Computer Application, Ghaziabad, India), M N Gupta (Amity School of Engineering & Technology, Department of Computer Science & Engineering, New Delhi, India)
Volume 6 (2014)
Issue 1
Article 1
Web Algorithms for Information Retrieval: A Performance Comparative Study (pages 1-16)
Bouchra Frikh (LTTI Laboratory, Ecole Supérieure de Technologie, Fes, Morocco), Brahim Ouhbi (LM2I Laboratory, Ecole Nationale Supérieure d'Arts et Métiers, Moulay Ismaïl University, Meknes, Morocco)
Article 2
A Hybrid Technique Using PCA and Wavelets in Network Traffic Anomaly Detection (pages 17-53)
Stevan Novakov (Department of Systems and Computer Engineering, Carleton University, Ottawa, Canada), Chung-Horng Lung (Department of Systems and Computer Engineering, Carleton University, Ottawa, Canada), Ioannis Lambadaris (Department of Systems and Computer Engineering, Carleton University, Ottawa, Canada), Nabil Seddigh (Solana Networks, Ottawa, Canada)
Article 3
Optimal Channel Assignment Algorithm for Least Interfered Wireless Mesh Networks (pages 54-67)
Tarik Mountassir (IR2M Laboratory, Hassan 1st University, Settat, Morocco), Bouchaib Nassereddine (IR2M Laboratory, Hassan 1st University, Settat, Morocco), Abdelkrim Haqiq (IR2M Laboratory, Hassan 1st University, Settat, Morocco), Samir Bennani (RIME Laboratory, Mohammedia Engineering School, Rabat, Morocco)
Issue 2
Special Issue on Security and Optimization Techniques for Mobile and Multimedia Computing
Guest Editorial Preface
Xiaofeng Chen (School of Telecommunications Engineering, Xidian University, Xi'an, China), Fatos Xhafa (Department of Languages and Informatics Systems, Technical University of Catalonia, Barcelona, Spain), Leonard Barolli (Department of Information and Communication Engineering, Fukuoka Institute of Technology, Fukuoka, Japan)
Article 1
Reconstructing Handwriting Character Font Models with Incorrect Stroke Order (pages 1-12)
Hirotsugu Matsukida (Fukuoka Institute of Technology, Fukuoka, Japan), Yuta Mieno (Fukuoka Institute of Technology, Fukuoka, Japan), Hiroyuki Fujioka (Fukuoka Institute of Technology, Fukuoka, Japan)
Article 2
Application of WMN-SA Simulation System for Node Placement in Wireless Mesh Networks: A Case Study for a Realistic Scenario (pages 13-21)
Shinji Sakamoto (Fukuoka Institute of Technology, Fukuoka, Japan), Algenti Lala (Polytechnic University of Tirana, Tirana, Albania), Tetsuya Oda (Fukuoka Institute of Technology, Fukuoka, Japan), Vladi Kolici (Polytechnic University of Tirana, Tirana, Albania), Leonard Barolli (Fukuoka Institute of Technology, Fukuoka, Japan), Fatos Xhafa (Technical University of Catalonia, Barcelona, Spain)
Article 3
An Improved Counter-Forensic Algorithm to Erase the JPEG Compression Artifacts (pages 22-32)
Guorui Sheng (College of Information and Electric Engineering, LuDong University, YanTai, China), Bo Yang (Yantai Vocational College, Yantai, China)
Article 4
A Local Statistical Information Active Contour Model for Image Segmentation (pages 33-49)
Shigang Liu (Key Laboratory of Modern Teaching Technology, Ministry of Education, Xi'an, China), Yali Peng (Key Laboratory of Modern Teaching Technology, Ministry of Education, Xi'an, China), Guoyong Qiu (School of Computer Science, Shaanxi Normal University, Xi'an, China), Xuanwen Hao (School of Computer Science, Shaanxi Normal University, Xi'an, China)
Article 5
A Distributed and Scalable Solution for Applying Semantic Techniques to Big Data (pages 50-67)
Alba Amato (Second University of Naples, Aversa, Italy), Salvatore Venticinque (Second University of Naples, Aversa, Italy), Beniamino Di Martino (Second University of Naples, Aversa, Italy)
Article 6
Relay Selection Scheme for Cooperative Communication Systems in Fixed Decode-and-Forward Mode (pages 68-77)
Jyh-Horng Wen (Department of Electrical Engineering, Tunghai University, Taichung, Taiwan), Jheng-Sian Li (Department of Communications Engineering, National Chung Cheng University, Minxiong, Taiwan), Hsiang-Shan Hou (Department of Electrical Engineering, Tunghai University, Taichung, Taiwan), Cheng-Ying Yang (Department of Computer Science, University of Taipei, Taipei, Taiwan)
Issue 3
Special Issue on Physical Layer Security Techniques and Applications in Wireless Networks
Guest Editorial Preface
Saeed Ur Rehman (Unitec Institute of Technology, Auckland, New Zealand), Shafiq Alam (The University of Auckland, Auckland, New Zealand), Iman Tabatabaei Ardekani (Unitec Institute of Technology, Auckland, New Zealand)
Article 1
An Overview of Radio Frequency Fingerprinting for Low-End Devices (pages 1-21)
Saeed Ur Rehman (Unitec Institute of Technology, Auckland, New Zealand), Shafiq Alam (The University of Auckland, Auckland, New Zealand), Iman T. Ardekani (Unitec Institute of Technology, Auckland, New Zealand)
Article 2
MIMO-Based Secret Key Generation Strategies: Rate Analysis (pages 22-55)
Kan Chen (Kansas State University, Manhattan, KS, USA), Bala Natarajan (Kansas State University, Manhattan, KS, USA)
Article 3
A Context Transfer Model for Secure Handover in WiMAX/LTE Integrated Networks (pages 56-74)
E. Prince Edward (Sri Krishna Polytechnic College, Coimbatore, India)
Article 4
Improving the Security of Storage Systems: Bahrain Case Study (pages 75-105)
Wasan Shaker Awad (Ahlia University, Manama, Bahrain), Hanin Mohammed Abdullah (University of Bahrain, Sakheer, Bahrain)
Issue 4
Emerging Security Threats and Defense Technologies in Mobile Computing and Networking
Guest Editorial Preface
Ilsun You (Korean Bible University, Seoul, South Korea), Xianglin Wei (Nanjing Telecommunication Technology Research Institute, Nanjing, China), Chunfu Jia (College of Computer and Control Engineering, Nankai University, Tianjin, China)
Article 1
Jammer Location-Oriented Noise Node Elimination Method for MHWN (pages 1-19)
Jianhua Fan (PLA University of Science and Technology, Nanjing, China), Qiping Wang (College of Communications Engineering, PLA University of Science and Technology, Nanjing, China), Xianglin Wei (PLA University of Science and Technology, Nanjing, China), Tongxiang Wang (College of Communications Engineering, PLA University of Science and Technology, Nanjing, China)
Article 2
A Strategy on Selecting Performance Metrics for Classifier Evaluation (pages 20-35)
Yangguang Liu (Ningbo Institute of Technology, Zhejiang University, Ningbo, China), Yangming Zhou (Ningbo Institute of Technology, Zhejiang University, Ningbo, China), Shiting Wen (Ningbo Institute of Technology, Zhejiang University, Ningbo, China), Chaogang Tang (China University of Mining and Technology, Xuzhou, China)
Article 3
What is New about the Internet Delay Space? (pages 36-55)
Zhang Guomin (Department of Network Engineering, PLA University of Science and Technology, Nanjing, China), Wang Zhanfeng (Department of Network Engineering, PLA University of Science and Technology, Nanjing, China), Wang Rui (College of Command Information System, PLA University of Science and Technology, Nanjing, China), Wang Na (Department of Electronic Technology, PLA University of Science and Technology, Nanjing, China), Xing Changyou (Department of Network Engineering, PLA University of Science and Technology, Nanjing, China)
Article 4
Machine Learning Based Prediction and Prevention of Malicious Inventory Occupied Orders (pages 56-72)
Qinghong Yang (School of Economics and Management, Beihang University, Beijing, China), Xiangquan Hu (School of Software, Beihang University, Beijing, China), Zhichao Cheng (School of Economics and Management, Beihang University, Beijing, China), Kang Miao (School of Software, Beihang University, Beijing, China)
Article 5
Interactive Multi-View Visualization for Fraud Detection in Mobile Money Transfer Services (pages 73-97)
Evgenia Novikova (Saint Petersburg Institute for Informatics and Automation (SPIIRAS), Saint Petersburg, Russia), Igor Kotenko (Saint Petersburg Institute for Informatics and Automation (SPIIRAS), Saint Petersburg, Russia), Evgenii Fedotov (Saint Petersburg Electrotechnical University (LETI), Saint Petersburg, Russia)
Article 6
Framework for Infrastructure Attack Modeling in Hybrid Networks (pages 98-114)
Konstantin Borisenko (Saint Petersburg Electrotechnical University, Saint Petersburg, Russia), Ivan Kholod (Saint Petersburg Electrotechnical University, Saint Petersburg, Russia), Andrey Shorov (Saint Petersburg Electrotechnical University, Saint Petersburg, Russia)
Volume 5 (2013)
Issue 1
Article 1
Reconnaissance Attack on IPv6 to IPv4 Tunneling (pages 1-9)
Nazrulazhar Bahama (Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia), Anton Satria Prabuwono (Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia), Teddy Mantoro (Advanced Informatics School, Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia)
Article 2
The Novel Method of Adaptive Multiplayer Games for Mobile Application using Neural Networks (pages 10-24)
Widodo Budiharto (Bina Nusantara University, Jakarta, Indonesia), Michael Yoseph Ricky (Bina Nusantara University, Jakarta, Indonesia), Ro’fah Nur Rachmawati (Bina Nusantara University, Jakarta, Indonesia)
Article 3
Exploration and Development of the JPEG Compression for Mobile Communications System (pages 25-46)
Andik Setyono (Faculty of Computing and Informatics, Multimedia University, Cyberjaya, Malaysia & Faculty of Computer Science, Dian Nuswantoro University, Semarang,, Indonesia), Md. Jahangir Alam (Faculty of Computing and Informatics, Multimedia University, Cyberjaya, Sepang, Selangor, Malaysia), C. Eswaran (Faculty of Computing and Informatics, Multimedia University, Cyberjaya, Malaysia)
Article 4
Path Loss Model Tuning at GSM 900 for a Single Cell Base Station (pages 47-56)
Allam Mousa (Department of Electrical Engineering, An-Najah National University, Nablus, Palestine), Mahmoud Najjar (Department of Electrical Engineering, An-Najah National University, Nablus, Palestine), Bashar Alsayeh (Department of Electrical Engineering, An-Najah National University, Nablus, Palestine)
Article 5
Power Layer Energy Efficient Routing Protocol in Wireless Sensor Network (PLRP) (pages 57-68)
Sardjoeni Moedjiono (Budi Luhur University, Jalan Raya Ciledug Petukangan Utara, Jakarta Selatan, Indonesia), Aries Kusdaryono (Budi Luhur University, Jalan Raya Ciledug Petukangan Utara, Jakarta Selatan, Indonesia)
Article 6
Effects of Web Accessibility on Search Engines and Webometrics Ranking (pages 69-94)
Media Anugerah Ayu (Department of Information Systems, International Islamic University Malaysia, Kuala Lumpur, Malaysia), Mohamed Ahmed Elgharabawy (Department of Information Systems, International Islamic University Malaysia, Kuala Lumpur, Malaysia)
Issue 2
Article 1
Statistically Enhanced Multi-Dimensional Trust Computing Mechanism for Cloud Computing (pages 1-17)
Mohamed Firdhous (InterNetWorks Research Lab, School of Computing, Universiti Utara Malaysia, Sintok Kedah, Malaysia, & Faculty of Information Technology, University of Moratuwa, Moratuwa, Sri Lanka), Suhaidi Hassan (InterNetWorks Research Lab, School of Computing, Universiti Utara Malaysia, Sintok Kedah, Malaysia), Osman Ghazali (InterNetWorks Research Lab, School of Computing, Universiti Utara Malaysia, Sintok Kedah, Malaysia)
Article 2
Node Placement Strategy in Wireless Sensor Network (pages 18-31)
Puteri Azwa Ahmad (School of Computing, College of Arts and Sciences, Universiti Utara Malaysia, Sintok, Kedah, Malaysia), M. Mahmuddin (School of Computing, College of Arts and Sciences, Universiti Utara Malaysia, Sintok, Kedah, Malaysia), Mohd Hasbullah Omar (School of Computing, College of Arts and Sciences, Universiti Utara Malaysia, Sintok, Kedah, Malaysia)
Article 3
Handoff and Route Optimization in Mobile Networks over IEEE 802.16e (pages 32-45)
Badiea Abdulkarem Mohammed (School of Computer Sciences, Universiti Sains Malaysia, Penang, Malaysia), Tat-Chee Wan (School of Computer Sciences/ National Advanced IPv6 Centre (NAV6), Universiti Sains Malaysia, Penang, Malaysia)
Article 4
The Robustness of RM-DSR Multipath Routing Protocol with Different Network Size in MANET (pages 46-57)
Naseer Ali Husieen (InterNetWorks Research Lab, School of Computing, Universiti Utara Malaysia, Sintok Kedah, Malaysia), Suhaidi Hassan (InterNetWorks Research Lab, School of Computing, Universiti Utara Malaysia, Sintok Kedah, Malaysia), Osman Ghazali (InterNetWorks Research Lab, School of Computing, Universiti Utara Malaysia, Sintok Kedah, Malaysia), Lelyzar Siregar (Faculty of Computer Science and Information Technology, Universitas Sumatra Utara, Medan, Indonesia)
Article 5
Wireless Communication Technologies for Vehicular Nodes: A Survey (pages 58-77)
Vasuky Mohanan (School of Computer Science, Universiti Sains Malaysia, Sintok Kedah, Malaysia), Rahmat Budiarto (School of Computing, Universiti Utara Malaysia, Sintok Kedah, Malaysia)
Article 6
ICMPV6 Vulnerability: The Importance of Threat Model and SF-ICMP6 (pages 78-100)
Abidah Hj Mat Taib (Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA, Shah Alam, Selangor, Malaysia), Wan Nor Ashiqin Wan Ali (Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA, Shah Alam, Selangor, Malaysia), Nurul Sharidah Shaari (Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA, Shah Alam, Selangor, Malaysia)
Issue 3
Article 1
Secure Broadcast with One-Time Signatures in Controller Area Networks (pages 1-18)
Bogdan Groza (Department of Automatics and Computer Science, Politehnica University of Timisoara, Timi?oara, Romania), Pal-Stefan Murvay (Department of Automatics and Computer Science, Politehnica University of Timisoara, Timi?oara, Romania)
Article 2
Adaptive Dynamic Path Planning Algorithm for Interception of a Moving Target (pages 19-33)
H. H. Triharminto (Department of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia), A.S. Prabuwono (Department of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia), T. B. Adji (Department of Electrical Engineering and Information Technology, Gadjah Mada University, Yogyakarta, Indonesia), N. A. Setiawan (Department of Electrical Engineering and Information Technology, Gadjah Mada University, Yogyakarta, Indonesia)
Article 3
A Trustworthy Usage Control Enforcement Framework (pages 34-49)
Ricardo Neisse (Information Systems Quality (ISQ), Fraunhofer IESE, Kaiserslautern, Germany), Alexander Pretschner (Department of Computer Science, TU München, Garching, Germany), Valentina Di Giacomo (Engineering Ingegneria Informatica, Rome, Italy)
Article 4
Classification and Recovery of Fragmented Multimedia Files using the File Carving Approach (pages 50-67)
Rainer Poisel (Institute of IT Security Research, St. Poelten University of Applied Sciences, Sankt Pölten, Austria), Marlies Rybnicek (Institute of IT Security Research, St. Poelten University of Applied Sciences, Sankt Pölten, Austria), Bernhard Schildendorfer (Institute of IT Security Research, St. Poelten University of Applied Sciences, Sankt Pölten, Austria), Simon Tjoa (Institute of IT Security Research, St. Poelten University of Applied Sciences, Sankt Pölten, Austria)
Article 5
Neighborhood-Based Route Discovery Protocols for Mobile Ad Hoc Networks (pages 68-87)
Sanaa A. Alwidian (Department of Computer Science and Applications, The Hashemite University, Zarqa, Jordan), Ismail M. Ababneh (Department of Computer Science, Al al-Bayt University, Mafraq, Jordan), Muneer O. Bani Yassein (Department of Computer Science, Jordan University of Science and Technology, Irbid, Jordan)
Article 6
3D Maps in Mobile Devices: Pathway Analysis for Interactive Navigation Aid (pages 88-106)
Teddy Mantoro (Department of Informatics, Advanced Informatics School, Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia), Adamu I. Abubakar (Department of Information System, KICT, International Islamic University, Kuala Lumpur, Malaysia), Media A. Ayu (Department of Information System, KICT, International Islamic University, Kuala Lumpur, Malaysia)
Issue 4
Article 1
Estimation of Always Best Connected Network in Heterogeneous Environment Based on Prediction of Recent Call History and Call Blocking Probability (pages 1-14)
Bhuvaneswari Mariappan (Electronics & Communication Engineering, Bharathidasan Institute of Technology, Anna University Chennai, Chennai, Tamil Nadu, India), Shanmugalakshmi Ramachandran (Government College of Technology, Coimbatore, Tamil Nadu, India)
Article 2
A Novel Prediction-Based Location Management Technique for Mobile Networks (pages 15-34)
Sanjay Kumar Biswash (Department of Informatics Engineering, Faculty of Science & Technology, University of Coimbra Polo II, Coimbra, Portugal), Chiranjeev Kumar (Department of Computer Science and Engineering, Indian School of Mines (ISM), Dhanbad, Jharkhand, India)
Article 3
Towards Scalable Certificate Status Validation in Mobile Ad Hoc Networks (pages 35-48)
Mohammad Masdari (Department of Computer Engineering, Islamic Azad University, Urmia, Iran), Javad Pashaei Barbin (Department of Computer Engineering, Islamic Azad University, Naghadeh, Iran), Moazam Bidaki (Department of Computer Engineering, Islamic Azad University, Neyshabur, Iran)
Article 4
Proposal of a Hierarchical and Distributed Method for Selecting a Radio Network and a Transmission Mode (pages 49-81)
J. Penhoat (Orange Labs, Paris, France), K. Guillouard (Orange Labs, Paris, France), N. Omnès (Orange Labs, Paris, France), J. Zhang (Orange Labs, Paris, France), T. Lemlouma (IRISA Labs, Lannion, France), M. Salaun (Ecole des Mines, Nantes, France)
Article 5
Vision-Based Human Face Recognition Using Extended Principal Component Analysis (pages 82-94)
A. F. M. Saifuddin Saif (Faculty of Information Science and Technology, University Kebangsaan, Bangi, Selangor, Malaysia), Anton Satria Prabuwono (Faculty of Computing and Information Technology, King Abdulaziz University, Rabigh, Saudi Arabia), Zainal Rasyid Mahayuddin (Faculty of Information Science and Technology, University Kebangsaan, Bangi, Selangor, Malaysia), Teddy Mantoro (Faculty Science and Technology, Universitas Siswa Bangsa International, Jakarta, Indonesia)
Volume 4 (2012)
Issue 1
Article 1
A Secure Architecture for Nomadic User in IMS Network (pages 1-17)
A. Abou El Kalam (Université de Toulouse, France, and Université Cadi-Ayyad, Morocco), M. Maachaoui (Université de Toulouse, France, and Université Cadi-Ayyad, Morocco), N. Idboufker (Université Cadi-Ayyad, Morocco), H. Ait Lahcen (Université de Toulouse, France, and Université Cadi-Ayyad, Morocco), A.Ait Ouahman (Université Cadi-Ayyad, Morocco)
Article 2
Householder Algorithm Applied to Localization for Wireless Sensor Networks (pages 18-30)
Abderrahim Beni Hssane (Chouaïb Doukkali University, Morocco), Moulay Lahcen Hasnaoui (Chouaïb Doukkali University, Morocco), Said Benkirane (Chouaïb Doukkali University, Morocco), Driss El Ouadghiri (Moulay Ismail University, Morocco), Mohamed Laghdir (Chouaïb Doukkali University, Morocco)
Article 3
LTE-A Implementation Scenarios: RF Planning Comparison (pages 31-42)
Mohammed Jaloun (EMI School, Morocco), Zouhair Guennoun (EMI School, Morocco)
Article 4
Delivery of Unified Communications over Thin-IMS (pages 43-56)
T. Rachidi (Al Akhawayn University in Ifrane, Morocco), A. Mourhir (Al Akhawayn University Ifrane, Morocco), F. Chaatit (Al Akhawayn University in Ifrane, Morocco)
Article 5
Combined Queue Management and Scheduling Mechanism to Improve Intra-User Multi-Flow QoS in a Beyond 3,5G Network (pages 57-68)
Amine Berqia (University of Algarve, Portugal), Mohamed Hanini (Hassan I University, Morocco), Abdelkrim Haqiq (Hassan I University, Morocco)
Article 6
Advances on Adaptive Systems in NGN (pages 69-78)
Yves-Gael Billet (Université de Lyon, France), Christophe Gravier (Université de Saint-Etienne, France), Jacques Fayolle (Télécom Saint-Etienne, France)
Issue 2
Article 1
Prediction and Validation Approach with Accumulation Applied to Video Segmentation (pages 1-10)
Larbi Guezouli (University of Batna, Algeria), Hassane Essafi (French Atomic Energy Commission (CEA), France), Lahcene Guezouli (University of Batna, Algeria)
Article 2
Hajj Crowd Tracking System in a Pervasive Environment (pages 11-29)
Teddy Mantoro (University of Technology Malaysia, Malaysia), Media Ayu (International Islamic University Malaysia, Malaysia), Murni Mahmud (International Islamic University Malaysia, Malaysia)
Article 3
Multipath Extension of the ZigBee Tree Routing in Cluster-Tree Wireless Sensor Networks (pages 30-48)
Zahia Bidai (Oran Es-Sénia University, Algeria), Moufida Maimour (CNRS—Nancy University, France), Hafid Haffaf (Oran Es-Sénia University, Algeria)
Article 4
Distributed Resource Allocation: Generic Model and Solution Based on Constraint Programming and Multi-Agent System for Machine to Machine Services (pages 49-62)
Kamal Moummadi (Casablanca University, Morocco), Rachida Abidar (Casablanca University, Morocco), Hicham Medromi (Casablanca University, Morocco)
Article 5
Edge Features and Geometrical Properties Based Approach for Vehicle License Plate Detection and Localization (pages 63-75)
Hinde Anoual (Mohammed V University, Rabat, Morocco), Sanaa El Fkihi (Mohammed V University, Souissi, Morocco), Abdelilah Jilbab (ENSET-Rabat Ecole Normale Supérieure de l’Enseignement Technique, Morocco), Driss Aboutajdine (Mohammed V University, Rabat, Morocco)
Article 6
Securing EPR Data Using Cryptography and Image Watermarking (pages 76-87)
Youssef Zaz (Abdelmalek Essaâdi University, Morocco), Lhoussain El Fadil (Ibn Zohr University, Morocco), Mohamed El Kayyali (Universidad Technologica del Peru, Peru)
Issue 3
Article 1
Progressive Data Synchronization Model for Mobile Devices (pages 1-20)
Mehdi Adda (University of Quebec at Rimouski, Canada)
Article 2
Ontology-Based Knowledge Model for Multi-View KDD Process (pages 21-33)
EL Moukhtar Zemmouri (Ecole Nationale Supérieure d’Arts et Métiers, Morocco), Hicham Behja (Ecole Nationale Supérieure d’Arts et Métiers, Morocco, and INRIA Sophia Antipolis, France), Abdelaziz Marzak (Universite Hassan II Mohammedia - Casablanca, Morocco), Brigitte Trousse (INRIA Sophia Antipolis, France)
Article 3
Collaborative Access to Ancient Documents: Towards a Distributed Comparison of Pre-Processing Approaches (pages 34-53)
Ines Ben Messaoud Ben Arbia (École Nationale d’Ingénieurs de Tunis, Tunisia), Haikal El Abed (Technische Universität Braunschweig, Germany), Volker Märgner (Technische Universität Braunschweig, Germany), Hamid Amiri (École Nationale d’Ingénieurs de Tunis, Tunisia)
Article 4
Quality of Service Analysis and Queuing Performance Modeling of Orthogonal Frequency Division Multiple Access Based IEEE 802.16/WiMAX System (pages 54-70)
Abdelali El Bouchti (Hassan 1st University and e-Next Generation Networks Research Group, Morocco), Abdelkrim Haqiq (Hassan 1st University and e-Next Generation Networks Research Group, Morocco), Said El Kafhali (Hassan 1st University and e-Next Generation Networks Research Group, Morocco)
Article 5
Performance Evaluation of Space-Time and Harq Diversity in MIMO HSDPA (pages 71-86)
Walid Hakimi (Sys’Com Laboratory,National School of Engineering, Tunis, Tunisia), Ammar Mahmoud (Sys’Com Laboratory, National School of Engineering, Tunis, Tunisia)
Article 6
Performance Evaluation of Multimedia Traffic Transmission Under Binomial and Poissonian Primary Traffics in Cognitive Radio Networks (pages 87-105)
Abdelaali Chaoub (Electronic and Communication Laboratory, Mohammadia School of Engineers, Mohammed V-Agdal University, Morocco), Elhassane Ibn-Elhaj (National Institute of Posts and Telecommunications, Morocco)
Issue 4
Article 1
Inspired Social Spider Behavior for Secure Wireless Sensor Networks (pages 1-10)
Khelifa Benahmed (School of Computing & Mathematical Sciences, Liverpool John Moores University, Liverpool, UK & University of Es-Sénia Oran, Oran, Algeria), Madjid Merabti (School of Computing & Mathematical Sciences, Liverpool John Moores University, Liverpool, UK), Hafid Haffaf (University of Es-Sénia Oran, Oran, Algeria)
Article 2
Face Recognition System using Discrete Cosine Transform combined with MLP and RBF Neural Networks (pages 11-35)
Fatma Zohra Chelali (Speech Communication and Signal Processing Laboratory, Houari Boumedienne University of Sciences and Technologies, El Alia, Algeria), Amar Djeradi (Speech Communication and Signal Processing Laboratory, Houari Boumedienne University of Sciences and Technologies, El Alia, Algeria)
Article 3
Location Leveling (pages 36-61)
Ayse Yasemin Seydim (Central Bank of the Republic of Turkey, Ankara, Turkey), Margaret H. Dunham (Department of Computer Science and Engineering, Southern Methodist University, Dallas, TX, USA), Yu Meng (Department of Computer Science and Engineering, Southern Methodist University, Dallas, TX, USA)
Article 4
An Interactive Device for Quick Arabic News Story Browsing (pages 62-82)
Hichem Karray (Department of Electrical Engineering, Research Group on Intelligent Machines, University of Sfax, Sfax, Tunisia), Monji Kherallah (Department of Electrical Engineering, Research Group on Intelligent Machines, University of Sfax, Sfax, Tunisia), Mohamed Ben Halima (Department of Electrical Engineering, Research Group on Intelligent Machines, University of Sfax, Sfax, Tunisia), Adel M. Alimi (Department of Electrical Engineering, Research Group on Intelligent Machines, University of Sfax, Sfax, Tunisia)
Volume 3 (2011)
Issue 1
Article 1
Dual-Level Attack Detection, Characterization and Response for Networks Under DDoS Attacks (pages 1-20)
Anjali Sardana (Indian Institute of Technology Roorkee, India), Ramesh C. Joshi (Indian Institute of Technology Roorkee, India)
Article 2
Improving Effectiveness of Intrusion Detection by Correlation Feature Selection (pages 21-34)
Hai Thanh Nguyen (Gjøvik University College, Norway), Katrin Franke (Gjøvik University College, Norway), Slobodan Petrovic (Gjøvik University College, Norway)
Article 3
Threat and Risk-Driven Security Requirements Engineering (pages 35-50)
Holger Schmidt (Technical University of Dortmund, Germany)
Article 4
Analysis of Sensors’ Coverage through Application-Specific WSN Provisioning Tool (pages 51-62)
Sami J. Habib (Kuwait University, Kuwait)
Article 5
Establishing A Personalized Information Security Culture (pages 63-79)
Shuhaili Talib (University of Plymouth, UK and International Islamic University, Malaysia), Nathan L. Clarke (University of Plymouth, UK and Edith Cowan University, Australia), Steven M. Furnell (University of Plymouth, UK and Edith Cowan University, Australia)
Issue 2
Article 1
2-clickAuth: Optical Challenge-Response Authentication Using Mobile Handsets (pages 1-18)
Anna Vapen (Linköping University, Sweden), Nahid Shahmehri (Linköping University, Sweden)
Article 2
FlexRFID Middleware in the Supply Chain: Strategic Values and Challenges (pages 19-32)
M. E. Ajana (ENSIAS Rabat, Morocco), H. Harroud (Alakhawayn University in Ifrane, Morocco), M. Boulmalf (Alakhawayn University in Ifrane, Morocco), M. Elkoutbi (ENSIAS Rabat, Morocco)
Article 3
An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations (pages 33-51)
Yehia Elrakaiby (TELECOM Bretagne, France), Frédéric Cuppens (TELECOM Bretagne, France), Nora Cuppens-Boulahia (TELECOM Bretagne, France)
Article 4
Prioritization Schemes in Queuing Handoff and New Calls to Reduce Call Drops in Cellular Systems (pages 52-61)
Allam Mousa (An-Najah National University, Palestine)
Article 5
A Proposal for Enhancing the Mobility Management in the Future 3GPP Architectures (pages 62-81)
J. Penhoat (Orange Labs, France), K. Guillouard (Orange Labs, France), S. Bonjour (Orange Labs, France), P. Seïté (Orange Labs, France)
Issue 3
Article 1
An Adaptive Backoff Algorithm for Mobile Ad-Hoc Networks (pages 1-19)
Yaser Khamayseh (Jordan University of Science and Technology, Jordan), Muneer Bani Yassein (Jordan University of Science and Technology, Jordan), Iman I. Badran (Jordan University of Science and Technology, Jordan), Wail Mardini (Jordan University of Science and Technology, Jordan)
Article 2
Cooperative Caching in Mobile Ad Hoc Networks (pages 20-35)
Naveen Chauhan (National Institute of Technology, Hamirpur, India), Lalit K. Awasthi (National Institute of Technology, Hamirpur, India), Narottam Chand (National Institute of Technology, Hamirpur, India), R.C. Joshi (Indian Institute of Technolgy, Roorkee, India), Manoj Misra (Indian Institute of Technolgy, Roorkee, India)
Article 3
Resource Allocation for Multi Access MIMO Systems (pages 36-50)
Shailendra Mishra (Kumaon Engineering College, India), D. S. Chauhan (Uttrakhand Technical University, India)
Article 4
Reducing Network Overhead with Common Junction Methodology (pages 51-61)
Shashi Bhushan (Haryana Engineering College, Jagadhri, India), M. Dave (National Institute of Technology Kurukshetra, India), R.B. Patel (DCRUST, Murthal, India)
Article 5
An Energy-Efficient Multilevel Clustering Algorithm for Heterogeneous Wireless Sensor Networks (pages 62-79)
Surender Soni (National Institute of Technology Hamirpur, India), Vivek Katiyar (National Institute of Technology Hamirpur, India), Narottam Chand (National Institute of Technology Hamirpur, India)
Issue 4
Article 1
Primary Research on Arabic Visemes, Analysis in Space and Frequency Domain (pages 1-19)
Fatma Zohra Chelali (Houari Boumedienne University of Sciences and Technologies, Algeria), Amar Djeradi (Houari Boumedienne University of Sciences and Technologies, Algeria)
Article 2
On Cryptographically Strong Bindings of SAML Assertions to Transport Layer Security (pages 20-35)
Florian Kohlar (Ruhr University Bochum, Germany), Jörg Schwenk (Ruhr University Bochum, Germany), Meiko Jensen (Ruhr University Bochum, Germany), Sebastian Gajek (Tel Aviv University, Israel)
Article 3
Systems Development Methodology for Mobile Commerce Applications (pages 36-52)
Muazzan Binsaleh (Prince of Songkla University, Thailand), Shahizan Hassan (Universiti Utara Malaysia, Malaysia)
Article 4
Enhancing Data Availability in MANETs with Cooperative Caching (pages 53-66)
Prashant Kumar (National Institute of Technology, Hamirpur, India), Naveen Chauhan (National Institute of Technology, Hamirpur, India), LK Awasthi (National Institute of Technology, Hamirpur, India), Narottam Chand (National Institute of Technology, Hamirpur, India)
Article 5
Online Authentication Using Smart Card Technology in Mobile Phone Infrastructure (pages 67-83)
Teddy Mantoro (International Islamic University Malaysia, Malaysia), Admir Milišic (International Islamic University Malaysia, Malaysia), Media Ayu (International Islamic University Malaysia, Malaysia)
Volume 2 (2010)
Issue 1
Article 1
Security Management for Mobile Ad Hoc Network of Networks (MANoN) (pages 1-19)
Ali H. Al-Bayatti (De Montfort University, UK), Hussein Zedan (De Montfort University, UK), Antoniuo Cau (De Montfort University, UK), François Siewe (De Montfort Universtiy, UK)
Article 2
A Proposed Intelligent Denoising Technique for Spatial Video Denoising for Real-Time Applications (pages 20-39)
Amany Sarhan (Mansoura University, Egypt), Mohamed T. Faheem (Tanta University, Egypt), Rasha Orban Mahmoud (Nile Institute of Commerce & Computer Technology, Egypt)
Article 3
Building an Intelligent Mobile Advertising System (pages 40-67)
Jerry Zeyu Gao (San Jose State University, USA), Angela Ji (Acresso Software, USA)
Article 4
Improving Throughput of Starved TCP Flow by Sidestepping Bottleneck Nodes Using Concurrent Transmission (pages 68-83)
Rajesh Verma (MNNIT, India), Arun Prakash (MNNIT, India), Rajeev Tripathi (MNNIT, India), Neeraj Tyagi (MNNIT, India)
Issue 2
Article 1
Extended Mobile IPv6 Route Optimization for Mobile Networks in Local and Global Mobility Domain (pages 1-17)
Arun Prakash (Motilal Nehru National Institute of Technology, India), Rajesh Verma (Motilal Nehru National Institute of Technology, India), Rajeev Tripathi (Motilal Nehru National Institute of Technology, India), Kshirasagar Naik (University of Waterloo, Canada)
Article 2
Pertinent Prosodic Features for Speaker Identification by Voice (pages 18-33)
Halim Sayoud (USTHB University, Algeria), Siham Ouamour (USTHB University, Algeria)
Article 3
A CASE Tool for Java Mobile Computing Applications (pages 34-48)
Ioannis T. Christou (Athens Information Technology, Greece), Sofoklis Efremidis (Athens Information Technology, Greece), Aikaterini Roukounaki (Athens Information Technology, Greece)
Article 4
Options for WiMAX Uplink Media Streaming (pages 49-66)
Salah Saleh (University of Essex, UK), Martin Fleury (University of Essex, UK)
Article 5
On Uplink Channel Estimation in WiMAX Systems (pages 67-77)
Yushi Shen (Microsoft, USA), Pamela C. Cosman (University of California, San Diego, USA), Laurence B. Milstein (University of California, San Diego, USA), Eduardo F. Martinez (Freescale Semiconductor Inc., USA)
Issue 3
Article 1
Utilization of an Improvement Manual Configuration for Multimedia in 6to4 Tunneling (pages 1-14)
Abdellah Jamali (INPT and FSTM, Morocco), Najib Naja (INPT, Morocco), Driss El Ouadghiri (Meknes, Morocco)
Article 2
Automatic Speaker Localization and Tracking: Using a Fusion of the Filtered Correlation with the Energy Differential (pages 15-33)
Siham Ouamour (USTHB University, Algeria), Halim Sayoud (USTHB University, Algeria), Salah Khennouf (USTHB University, Algeria)
Article 3
An Inter-Domain Agent Based Secure Authorization and Communication for Mobile Clients in Wireless AdHoc Networks (pages 34-46)
Neeraj Kumar (SMVD University, India), R. B. Patel (MM University, India)
Article 4
Network Layer Mobility Management Schemes for IP-Based Mobile Networks: A Survey (pages 47-60)
Paramesh C. Upadhyay (Sant Longowal Institute of Engineering & Technology, India), Sudarshan Tiwari (Motilal Nehru National Institute of Technology, India)
Article 5
Throughput Analysis of IEEE 802.11 DCF with Modified Binary Exponential Backoff in Mobile Ad Hoc Networks (pages 61-70)
Rishipal Singh (Jawaharlal Nehru University, India), D. K. Lobiyal (Jawaharlal Nehru University, India)
Issue 4
Article 1
Quality of Experience Models for Multimedia Streaming (pages 1-20)
Vlado Menkovski (Eindhoven University of Technology, The Netherlands), Georgios Exarchakos (Eindhoven University of Technology, The Netherlands), Antonio Liotta (Eindhoven University of Technology, The Netherlands), Antonio Cuadra Sánchez (Telefonica R&D, Spain)
Article 2
A Probabilistic Routing Protocol in VANET (pages 21-37)
Gongjun Yan (Indiana University Kokomo, USA), Stephan Olariu (Old Dominion University, USA), Shaharuddin Salleh (Universiti Teknologi Malaysia, Malaysia)
Article 3
Building Wireless Sensor Network Applications with LooCI (pages 38-64)
Daniel Hughes (Xi’an Jiaotong-Liverpool University, USA), Klaas Thoelen (Katholieke Universiteit Leuven, Belgium), Wouter Horré (Katholieke Universiteit Leuven, Belgium), Nelson Matthys (Katholieke Universiteit Leuven, Belgium), Javier Del Cid (Katholieke Universiteit Leuven, Belgium), Sam Michiels (Katholieke Universiteit Leuven, Belgium), Christophe Huygens (Katholieke Universiteit Leuven, Belgium), Wouter Joosen (Katholieke Universiteit Leuven, Belgium), Jo Ueyama (University of São Paulo, Brazil)
Article 4
Memorizing Algorithm: Protecting User Privacy using Historical Information of Location–Based Services (pages 65-86)
Quynh Chi Truong (National University of Ho Chi Minh City, Vietnam), Anh Tuan Truong (National University of Ho Chi Minh City, Vietnam), Tran Khanh Dang (National University of Ho Chi Minh City, Vietnam)
Volume 1 (2009)
Issue 1
Article 1
Scenario-Based Cluster Formation and Management in Mobile Ad Hoc Networks (pages 1-15)
V. S. Anitha (National Institute of Technology - Calicut, India), M. P. Sebastian (National Institute of Technology - Calicut, India)
Article 2
Fast Vector Quantization Encoding Algorithms for Image Compression (pages 16-28)
Ahmed Swilem (Minia University, Egypt)
Article 3
FCVW: Experiments in Groupware (pages 29-52)
Ivan Tomek (Acadia University, Canada), Elhadi Shakshuki (Acadia University, Canada)
Article 4
A Cross-Layer Model for Video Multicast Based TCP-Adaptive FEC over Heterogeneous Networks (pages 53-69)
Ghaida A. AL-Suhail (University of Basrah, Iraq), Liansheng Tan (Central China Normal University, China), Rodney A. Kennedy (The Australian National University, Australia)
Article 5
A Model for Mobile Learning Service Quality in University Environment (pages 70-91)
Nabeel Farouq Al-Mushasha (Jerash Private University, Jordan), Shahizan Hassan (Universiti Utara Malaysia, Malaysia)
Article 6
Evaluating E-Communities of Wireless Networks Worldwide (pages 92-109)
Theodoros I. Kavaliotis (University of Macedonia, Greece), Anastasios A. Economides (University of Macedonia, Greece)
Issue 2
Article 1
The Accuracy of Location Prediction Algorithms Based on Markovian Mobility Models (pages 1-21)
Péter Fülöp (Budapest University of Technology and Economics, Hungary), Sándor Imre (Budapest University of Technology and Economics, Hungary), Sándor Szabó (Budapest University of Technology and Economics, Hungary), Tamás Szálka (Budapest University of Technology and Economics, Hungary)
Article 2
Optimizing Message Verbosity and Energy Consumption in Secured Wireless Mobile Networks (pages 22-35)
P. P. Abdul Haleem (National Institute of Technology Calicut, India), M. P. Sebastian (National Institute of Technology Calicut, India)
Article 3
Optimal Spectral Resolution in Speaker Authentication Application in Noisy Environment and Telephony (pages 36-47)
Siham Ouamour (USTHB University, Algeria), Halim Sayoud (University of Bab-Ezzouar, Algeria), Mhania Guerti (ENS.Polytechnique, Algeria)
Article 4
Improving Energy Efficiency and Throughput in Heterogeneous Mobile Ad Hoc Networks (pages 48-60)
Manu.J. Pillai (Kerala University, India), M. P. Sebastian (National Institute of Technology Calicut, India)
Article 5
Mobile Community Networks: Evolution and Challenges (pages 61-79)
Vijayan Sugumaran (Oakland University, USA), Shriram Raghunathan (VIT Bhopal University, India), K. Vivekanandan (Bharathiar University, India)
Issue 3
Article 1
Frequency Domain Equalization And Adaptive Ofdm Vs Single Carrier Modulation (pages 1-7)
Inderjeet Kaur (Ajay Kumar Garg Engineering College, India)
Article 2
A Secure and Trustworthy Framework for Mobile Agent-Based E-Marketplace with Digital Forensics and Security Protocols (pages 8-26)
Qi Wei (University Kebangsaan Malaysia, Malaysia), Ahmed Patel (University Kebangsaan Malaysia, Malaysia)
Article 3
Performance Enhancement of Routing Protocols in Mobile Ad hoc Networks (pages 27-39)
Kais Mnif (University of Sfax, Tunisia), Michel Kadoch (University of Quebec, Canada)
Article 4
Definition and Analysis of a Fixed Mobile Convergent Architecture for Enterprise VoIP Services (pages 40-56)
Joel Penhoat (France Telecom Orange Labs, France), Olivier Le Grand (France Telecom Orange Labs, France), Mikael Salaun (France Telecom Orange Labs, France), Tayeb Lemlouma (Université de Rennes 1 IRISA, France)
Article 5
Realization of Route Reconstructing Scheme for Mobile Ad hoc Network (pages 57-77)
Qin Danyang (Harbin Institute of Technology, China), Ma Lin (Harbin Institute of Technology, China), Sha Xuejun (Harbin Institute of Technology, China), Xu Yubin (Harbin Institute of Technology, China)
Article 6
Buffer Management in Cellular IP Network using PSO (pages 78-93)
Mohammad Anbar (Jawaharlal Nehru University, New Delhi, India), Deo Prakash Vidyarthi (Jawaharlal Nehru University, New Delhi, India)
Issue 4
Article 1
A Fast Image Encoding Algorithm Based on the Pyramid Structure of Codewords (pages 1-13)
Ahmed A. Radwan (Minia University, Egypt), Ahmed Swilem (Minia University, Egypt), Mamdouh M. Gomaa (Minia University, Egypt)
Article 2
Analysis and Modeling of H.264 Unconstrained VBR Video Traffic (pages 14-31)
Harilaos Koumaras (Business College of Athens (BCA), Greece), Charalampos Skianis (University of Aegean, Greece), Anastasios Kourtis (Institute of Informatics and Telecommunications NCSR, Greece)
Article 3
Throughput Optimization of Cooperative Teleoperated UGV Network (pages 32-46)
Ibrahim Y. Abualhaol (Broadcom Corporation, USA), Mustafa M. Matalgah (The University of Mississippi, USA)
Article 4
Speaker Discrimination on Broadcast News and Telephonic Calls Using a Fusion of Neural and Statistical Classifiers (pages 47-63)
Siham Ouamour (USTHB University, Algeria), Halim Sayoud (USTHB University, Algeria)
Article 5
Mobile Application Benchmarking Based on the Resource Usage Monitoring (pages 64-75)
Reza Rawassizadeh (University of Vienna, Austria)