International Journal of Ad Hoc and Ubiquitous Computing

Papers
(The median citation count of International Journal of Ad Hoc and Ubiquitous Computing is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Recent advances in blockchain technology: a survey on applications and challenges21
Performance and communication energy constrained embedded benchmark for fault tolerant core mapping onto NoC architectures18
An intrusion detection model using improved convolutional deep belief networks for wireless sensor networks14
Auto insurance fraud identification based on a CNN-LSTM fusion deep learning model11
Performance and communication energy constrained embedded benchmark for fault tolerant core mapping onto NoC architectures10
An adaptive stochastic central force optimisation algorithm for node localisation in wireless sensor networks9
Privacy-preserving smart contracts for fuzzy WordNet-based document representation and clustering using regularised K-means method8
Monitoring in fog computing: state-of-the-art and research challenges8
5G network traffic control: a temporal analysis and forecasting of cumulative network activity using machine learning and deep learning technologies8
Architecture and routing protocols for internet of vehicles: a review7
Efficiency evaluation of HRF mechanism on EDoS attacks in cloud computing services7
Research on optimisation of energy efficient routing protocol based on LEACH6
Behaviour-based grey wolf optimiser for a wireless sensor network deployment problem6
RCAPChA: RSU controlled AHP-based prioritised channel allocation protocol for hybrid VANETs5
Provably secure authenticated content key distribution framework for IoT-enabled enterprise digital rights management systems5
RSSI-based node selection using neural network parameterised by particle swarm optimisation5
Detecting LDoS in NB-IoTs by using metaheuristic-based CNN5
SHA-AMD: sample-efficient hyper-tuned approach for detection and identification of Android malware family and category5
Enhancing data privacy through a decentralised predictive model with blockchain-based revenue4
Propagation models and their effect on the congestion control in vehicular ad hoc network4
AI and machine learning for the analysis of data flow characteristics in industrial network communication security4
A compact GBMO applied to modify DV-Hop based on layers in a wireless sensor network4
Development of internet finance industry with the core of e-commerce platform services optimised by the edge computing of the internet of things based on artificial intelligence4
Research on multi-feature fusion entity relation extraction based on deep learning4
Black hole attack prevention scheme using a blockchain-block approach in SDN-enabled WSN4
An ICT-based solid waste management system for smart cities: a case of municipality in India4
Time and energy-efficient hybrid job scheduling scheme for mobile cloud computing empowered wireless sensor networks3
Optimisation of K-means algorithm based on sample density canopy3
Efficient hardware architectures of Lilliput lightweight algorithm for image encryption3
Research on spam filtering algorithm based on mutual information and weighted naive Bayesian classification3
Security analysis of image CAPTCHA using a mask R-CNN-based attack model3
Energy-efficient fault-tolerant scheduling in a fog-based smart monitoring application3
Gene expression data classification with robust sparse logistic regression using fused regularisation3
A survey of intelligent load monitoring in IoT-enabled distributed smart grids3
Optimal dense convolutional network model for image classification in unmanned aerial vehicles based ad hoc networks3
User participation behaviour in crowdsourcing initiatives: influencing factors, related theories and incentive strategies3
Learning automata and lexical composition method for optimal and load balanced RPL routing in IoT3
Real-time face mask position recognition system using YOLO models for preventing COVID-19 disease spread in public places3
Design and implementation of a mobility support adaptive trickle algorithm for RPL in vehicular IoT networks3
A bigraphical approach to model and verify ontology alignment2
Secure exchange and effectual verification of educational academic records using hyperledger fabric block chain system2
A simulation study on the necessity of working breakdown in a state dependent bulk arrival queue with disaster and optional re-service2
Fuzzy independent circular zones protocol for heterogeneous wireless sensor networks2
An optimised Darknet traffic detection system using modified locally connected CNN - BiLSTM network2
Colour image encryption using an improved version of stream cipher and chaos2
Hybrid meta-heuristic-based inventory management using block chain technology in cloud sector2
Energy consumption models in VANET simulation tools for electric vehicles: a literature survey2
Efficiency Evaluation of HRF mechanism on EDoS attacks in Cloud Computing Services2
On fast Fourier transform-based decoding of Reed-Solomon codes2
A machine learning approach for celebrity profiling2
Optimised routing algorithm in low Earth orbit satellite networks2
UAV deployment and channel allocation considering diverse QoS constraints and service importance2
Mobility aware and reliable multipath routing protocol for MANETs2
Reducing the internet traffic in IoT-based monitoring and control system through a combination of WSN and LoRaWAN networks2
Botnet detection used fast-flux technique, based on adaptive dynamic evolving spiking neural network algorithm2
Cuckoo search assisted fuzzy logic algorithm for smart WSN routing system2
A CA-GRU-based model for air quality prediction2
A recommendation algorithm based on modified similarity and text content to optimise aggregate diversity2
Cooperative evolution of SVM-based resource allocation for 5G cloud-radio access network system with D2D communication2
Computational trust evaluation algorithm for cloud models using fuzzy logic approach1
Comparative performance of deep learning architectures in classification of diabetic retinopathy1
Forecasting the decision making process of Supreme Court using hierarchical convolutional neural network1
An e-healthcare authentication protocol employing cloud computing1
FETES: a fast, emergency timeslot allocation, and three-tier energy saving-based task execution strategy for wireless body area network1
Two-stage adaptive weight vector design method for decomposition based many-objective evolutionary algorithm1
A location-based multi-factor authentication scheme for mobile devices1
Coordinated sensing coverage optimisation in sensor networks using RSSI1
A novel compact radiator for WLAN, WiMAX and 5G applications1
Knowledge-based flexible resource allocation optimisation strategy for multi-tenant radio access network slicing in 5G and B5G1
Merit: an on-demand IoT service delivery and resource scheduling scheme for federated learning and blockchain empowered 6G edge networks with reduced time and energy cost1
Detection of phishing attacks using probabilistic neural network with a novel training algorithm for reduced Gaussian kernels and optimal smoothing parameter adaptation for mobile web services1
Efficient multi-receiver signcryption scheme based on ring signature1
Secured personal health records using pattern-based verification and two-way polynomial protocol in cloud infrastructure1
Accurate identification of economic hardship students: a data-driven approach1
Multi-cluster flying ad-hoc network for disaster monitoring applications1
Disaster evacuation route planning strategy based on traffic prediction1
Identity-based ring signature scheme with multi-designated verifiers1
A robust guaranteed time slots allotment scheme for real-time and reliable communication in WBANs1
Consumer IoT device deployment optimisation through deep learning: a CNN-LSTM solution for traffic classification and service identification1
A method for constructing connected dominating set for consensus in ad hoc wireless network1
F-CHILS maps - a novel encryption scheme for secured medical data transmission using FoG-ban environment1
A feature ranking-based deep learning secure framework for multi-class leaf disease detection1
Auto insurance fraud identification based on a CNN-LSTM fusion deep learning model1
Data security enhancement in internet of things using optimised hashing algorithm1
FETES: a fast, emergency timeslot allocation, and three-tier energy saving-based task execution strategy for wireless body area network1
A hybrid approach for feature selection using SFFS and SBFS with extra-tree and classification using XGBoost1
Simple design of QCA-based T-flipflop with energy dissipation analysis for nanocomputing1
A survey of intelligent load monitoring in IoT-enabled distributed smart grids1
Detection of image recognition forgery technology under machine vision1
Intelligent reflecting surfaces for cognitive radio networks1
Botnet detection used fast-flux technique, based on adaptive dynamic evolving spiking neural network algorithm1
A multi-group dragonfly algorithm for application in wireless sensor network deployment problem1
A two dimensional Markov chain model for aggregation-enabled 802.11 networks1
Icon: an intelligent resource slicing and task coordination framework for Web 3.0 and metaverse-based service execution over 6G-based immersive edge computing network1
Evaluation of functional maturity for a network information service - design and case analysis1
A hybrid approach for feature selection using SFS with extra-tree and classification using AdaBoost with extra-tree1
Real-time road object segmentation using improved light-weight convolutional neural network based on 3D LiDAR point cloud1
Reliability improvement of frame-based equipment for ultra-reliable and low latency communication in unlicensed spectrum1
Mobility modelling for urban traffic surveillance by a team of unmanned aerial vehicles1
<i>ERMAP</i>: ECC-based robust mutual authentication protocol for smart grid communication with AVISPA simulations1
Black hole attack prevention scheme using a blockchain-block approach in SDN-enabled WSN1
Resource provisioning optimisation for cloud computing systems serving multi-class requests1
Time and energy-efficient hybrid job scheduling scheme for mobile cloud computing empowered wireless sensor networks1
Optimal allocation of renewable distributed generators and shunt capacitors in distribution system using hybrid intelligent approach1
A hybrid approach for feature selection using SFFS and SBFS with extra-tree and classification using XGBoost1
Collaborative editing over opportunistic networks1
Reward-based service provisioning scheme for UAV-MEC assisted IoT infrastructures1
An adaptive stochastic central force optimisation algorithm for node localisation in wireless sensor networks1
A state-of-the-art review on person re-identification with deep learning1
Tree reconstruction using energy aware sink mobility to prolong network lifetime in WSN1
Knowledge-based flexible resource allocation optimisation strategy for multi-tenant radio access network slicing in 5G and B5G1
Recent advances in blockchain technology: a survey on applications and challenges1
An ICT-based solid waste management system for smart cities: a case of municipality in India1
Comparative Performance of Deep Learning Architectures in Classification of Diabetic Retinopathy1
A two dimensional Markov chain model for aggregation-enabled 802.11 networks0
Optimal solar panel placement in mobile edge computing0
Optimal harvesting duration for CDMA systems0
Secured Personal Health Records using Pattern Based Verification and 2-Way Polynomial Protocol in Cloud Infrastructure0
A feature ranking-based deep learning secure framework for multi-class leaf disease detection0
Accurate Identification of Economic Hardship Students: A Data-Driven Approach0
Lion plus firefly algorithm for ternary-based anomaly detection in semantic graphs in smart cities0
Learning stereo disparity with feature consistency and confidence0
Cuckoo search assisted fuzzy logic algorithm for smart WSN routing system0
A novel optimised apnea classification with AA-CNN method by utilising the EDR and ECG features0
Efficacious tuning in energy efficient street lighting0
A CA-GRU-based model for air quality prediction0
A hybrid channel transmission method for effective spectrum access in cognitive radio networks0
TEPM: Traveller Enrolment Prediction Mechanism using BERT-based Feature Clustering and LSTM Models0
Relay-based spectrum sensing with wind energy harvesting0
Detection of Deepfake Technology in Images and Videos0
A general and efficient distance bounding protocol with multi-objective optimisation for RFID applications over a noisy channel0
Mobility-Aware Optical Random Waypoint and Transfer Learning-Based Load Balancing0
FORECASTING THE DECISION MAKING PROCESS OF SUPREME COURT USING HIERARCHICAL CONVOLUTIONAL NEURAL NETWORK0
Accelerated Multi-Objective Task Learning using Modified Q-Learning Algorithm0
Computational trust evaluation algorithm for cloud models using fuzzy logic approach0
Data trading, power control and resource allocation algorithms for metaverse platform0
Wireless Communications with Hybrid Solar and RF Energy Harvesting0
A reliable transmission scheme for 3D point cloud based on partial decode-and-forward relay over burst error fading channel0
Energy efficient random forest classifier-based secure routing for opportunistic internet of things0
Throughput Enhancement of RIS and STARRIS Using Adaptive Modulation and Coding for 6G Systems0
Fitness approximation with RF algorithm dedicated to WSN node deployment for a soil monitoring application0
Architecture and Routing Protocols for Internet of Vehicles: A Review0
Analysis of sponsoring and caching data: the case of competing ISPs in information-centric networks0
STARRIS with Hybrid Wind and RF Energy Harvesting0
Adapting Mobile User Interfaces based on users' application usage behaviours0
FOESG: anonymous session key agreement protocol for fog assisted smart grid communication0
An e-healthcare authentication protocol employing cloud computing0
Efficacious tuning in energy efficient street lighting0
Q-DenseNet for Heart Disease Prediction in Spark Framework0
Leveraging Constitutive Artificial Neural Networks for Plant Leaf Disease Detection0
MECProMo: Producer Mobility Management Based on MEC in Named Data Networking0
Joint resource allocation and cluster-head selection for energy aware D2D multi-casting0
Comparative analysis of image classification with retrieval system0
Data Trading, Power Control and Resource Allocation Algorithms for Metaverse Platform0
A dynamic preserving-based WSN framework for medical disease prediction0
Design of Trust Identification System for Cloud Services0
An energy and delay aware routing protocol for wireless sensor network assisted IoT to maximise network lifetime0
Satisfaction-driven cooperative trajectory optimisation for multi-UAV-assisted mobile edge computing0
FC-CACPHS: fog-cloud assisted context-aware framework for cyber-physical healthcare system0
Efficient multi-receiver signcryption scheme based on ring signature0
Certificateless Searchable Attribute Based Encryption Approach for Cloud Data Based on Blockchain0
Hop-based void avoidance routing protocol for underwater acoustic sensor networks0
Modelling and optimisation of high-speed KLEIN architectures on FPGA and ASIC platforms for IoT applications0
Application of artificial intelligence technology in CNC system0
Tree reconstruction using energy aware sink mobility to prolong network lifetime in WSN0
Sliding window assisted mutual redundancy-based feature selection for intrusion detection system0
A state-of-the-art review on person re-identification with deep learning0
Device and method for dynamic image display of financial transaction operation data0
Provably secure authenticated content key distribution framework for IoT-enabled enterprise digital rights management systems0
An optimised machine learning algorithm for classification of epileptic seizures using EMD-based dynamic features of EEG0
Intercept analysis with threshold-based diversity reception for cognitive network0
Insider threat detection and prevention using semantic score and dynamic multi-fuzzy classifier0
Device and method for dynamic image display of financial transaction operation data0
Hybrid optimisation enabled deep learning for sentiment rating prediction towards text summarisation and question answering system0
A hybrid deep learning approach for cervical cancer segmentation and classification0
Security of STARRIS using solar energy harvesting0
Detection of Image Recognition Forgery Technology under Machine Vision0
Transcend: An Ownership Based Resource Allocation Strategy for Service Function Chaining in NFV Empowered 6G Network Using Latency and User Cost-awareness0
CDMA extension using STARRIS0
Resource provisioning optimisation for cloud computing systems serving multi-class requests0
Joint Resource Allocation and Cluster-Head Selection for Energy Aware D2D Multicasting.0
Development of image-guided puncture robot used in trigeminal neuralgia treatment0
Distributed Denial of Service Attack Detection Using Machine Learning Classifiers0
Uncertainties evaluation and analysis using quantitative technique for a software project0
A method for constructing connected dominating set for consensus in ad hoc wireless network0
Reconfigurable lower-part approximate adder with error-tolerant application: an approach using QCA computing0
Reconfigurable Intelligent Surfaces with Energy Harvesting From a Water Flow and Adaptive Power0
Routing techniques for millimetre wave communications0
Coordinated sensing coverage optimisation in sensor networks using RSSI0
Throughput optimisation with wind energy harvesting0
Research on Optimization of Energy Efficient Routing Protocol Based on LEACH0
A TDMA protocol with reinforcement learning slot selection for MANETs0
5G Network Traffic Control: A Temporal Analysis and Forecasting of Cumulative Network Activity using Machine Learning and Deep Learning technologies0
Mobility modelling for urban traffic surveillance by a team of unmanned aerial vehicles0
Clustering-Assisted Privacy Perseveration Model for Data Mining0
Ensemble Deep Learning Approach with Hybrid Optimisation for Enhanced Underwater Acoustic OFDM Communication Systems0
Evaluating Multidimensional RSSI-Based Approaches for Identifying Sybil Nodes in VANETs to Improve Vehicle Network Security0
Design of trust identification system for cloud services0
Adolescent identity search algorithm with optimised video-based activity classification using hierarchical auto-associative polynomial convolutional neural network0
Game-based congestion-aware routing algorithm in wireless network on chips0
Lightweight and Personalized E-commerce Recommendation based on Collaborative Filtering and LSH0
A filter-based machine learning classification framework for cloud-based medical databases0
Intrusion Detection System using Resampled Dataset - A Comparative Study0
Computational offloading in vehicular edge computing using multiple agent-based deterministic policy gradient algorithm and generative adversarial networks0
Artificial Intelligence Technology in Internet Finance and Analysis of Security Risk0
A fault tolerant algorithm for integrated coverage and connectivity in wireless sensor networks0
Research on multi-feature fusion entity relation extraction based on deep learning0
A Hybrid Optimisation Enabled Deep Learning for Object Detection and Multi-Object Tracking0
Game-based congestion-aware routing algorithm in wireless network on chips0
Comparative analysis of image classification with retrieval system0
Enhancing Data Privacy through Decentralized Predictive Model with Blockchain-based Revenue0
An approach using heuristic pheromones-based ACO modelling for green vehicle routing optimisation0
A Comparative Analysis of Elliptic Curve Based Cryptographic Techniques for Internet of Things0
DATA SECURITY ENHANCEMENT IN INTERNET OF THINGS USING OPTIMIZED HASHING ALGORITHM0
Optimal harvesting duration for CDMA systems0
Lattice-based lightweight cryptosystem0
An overview of continuous device-to-device authentication techniques for the internet of things0
Simultaneously Transmitting and Reflecting Reconfigurable Intelligent Surfaces (STAR-RIS) with Multi-antenna Energy Harvesting and Adaptive Power0
A filter-based machine learning classification framework for cloud-based medical databases0
Messed up(): A Key Generator based image cryptosystem0
Software Vulnerability Detection using SFDMN Deep Learning Model0
Secure Exchange and Effectual Verification of Educational Academic Records Using Hyperledger Fabric Block chain System0
Ubiquitous monitoring of liver transplantation patients0
FOESG: Anonymous session key agreement protocol for fog assisted smart grid communication0
BISECTION: BlockchaIn-enabled SECure healTh Insurance prOcessiNg0
An approach using heuristic pheromones-based ACO modelling for green vehicle routing optimisation0
Optimal Hybrid Classifier with Fine-tuned Hyper parameter and Improved Fuzzy C Means Segmentation: Skin Cancer Detection0
Optimal allocation of renewable distributed generators and shunt capacitors in distribution system using hybrid intelligent approach0
Performance Evaluation of Strapdown Inertial Navigation and Beidou Satellite Navigation System Based on Intelligent Image Processing Technology0
Design, implementation, and evaluation of a shared LoRa network application architecture0
Routing techniques for millimetre wave communications0
Optimisation of K-means algorithm based on sample density canopy0
Transcend: an ownership-based resource allocation strategy for service function chaining in NFV empowered 6G network using latency and user cost-awareness0
Impact: a mission-driven, human-centric, super-smart service orchestration scheme for Society 5.0 and Industry 4.0 application execution over CPSS enhanced 6G networks0
Fast fuzzy C-means clustering and deep Q network for personalised web directories recommendation0
Energy Efficient Power Allocation with Antenna Selection for Interference Alignment based MIMO-OFDM Cognitive Radio Networks0
Secure proof of the sum of all the elements of a matrix of finite field elements in zero-knowledge0
Functional feature-aware APP recommendation with personalised PageRank0
Cryptographic Analysis and Construction of Complete Permutations using a Recursive Approach0
Outage probability analysis for relay-based cognitive radio network0
An Optimized Darknet Traffic Detection System using Modified Locally Connected CNN - BiLSTM Network0
Approximation algorithms for profit maximisation in multicast D2D networks0
Recurrent Shephard convolutional neural network for heart disease prediction in spark framework0
Target node selection for data offloading in partially connected vehicular ad hoc networks0
An intrusion detection model using improved convolutional deep belief networks for wireless sensor networks0
Horse herd optimised elliptic curve cryptography for secure data aggregation in WSN0
Merit: An On-demand IoT Service Delivery and Resource Scheduling Scheme for Federated Learning and Blockchain Empowered 6G Edge Networks With Reduced Time and Energy Cost0
A Hybrid Channel Transmission Method for Effective Spectrum Access in Cognitive Radio Networks0
A Trusted and Adaptive Security Mechanism for Wearable E-Healthcare Systems0
Graph-based optimal routing in clustered WSNs0
0.042845010757446