Secure Wireless Image Communication Using LSB Steganography and Chaotic Baker Ciphering Sabry S. NassarNabil M. AyadOsama S. Faragallah OriginalPaper 15 November 2016 Pages: 1023 - 1049
Inter-Group Complementary Sequence Set Based on Interleaved Periodic Complementary Sequences Zhenyu ZhangFengchun TianGuixin Xuan OriginalPaper 22 July 2016 Pages: 1051 - 1064
Performance Improvement Techniques for OFDM system using Software Defined Radio B. Siva Kumar Reddy OriginalPaper 06 August 2016 Pages: 1065 - 1083
Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol Da-Zhi SunJi-Dong Zhong BriefCommunication 23 July 2016 Pages: 1085 - 1093
An Efficient Channel Reservation Technique for Improved QoS for Mobile Communication Deployment Using High Altitude Platform S. H. AlsamhiN. S. Rajput OriginalPaper 20 July 2016 Pages: 1095 - 1108
On the Security of a Self-Healing Group Key Distribution Scheme Hua GuoYandong Zheng OriginalPaper 13 August 2016 Pages: 1109 - 1121
Hybrid Overlay/Underlay Transmission Scheme with Optimal Resource Allocation for Primary User Throughput Maximization in Cooperative Cognitive Radio Networks C. S. PreethamMutchakayala Siva Ganga Prasad OriginalPaper 21 July 2016 Pages: 1123 - 1136
Performance Evaluation of \(\pi /4\)-DQPSK OFDM over Underwater Acoustic Channels Prashant KumarPreetam Kumar OriginalPaper 27 July 2016 Pages: 1137 - 1152
A Novel Design of Circular Monopole Antenna for Wireless Applications Sumeet Singh BhatiaJagtar Singh Sivia OriginalPaper 18 July 2016 Pages: 1153 - 1161
Bandwidth Enhanced L-Shaped Patch Antenna with Parasitic Element for 5.8-GHz Wireless Local Area Network Applications Lin PengYu-jie QiuXing Jiang OriginalPaper 19 July 2016 Pages: 1163 - 1170
Performance Analysis of Energy Efficient Virtual Back Bone Path Based Cluster Routing Protocol for WSN E. Golden JulieS. TamilselviY. Harold Robinson OriginalPaper 26 July 2016 Pages: 1171 - 1189
Performance Evaluation of Dynamic Burst Mapping in a WiMAX System Rudzidatul Akmam DziyauddinAngela DoufexiNorliza Mohamed OriginalPaper 20 September 2016 Pages: 1191 - 1212
Randomized Graph Coloring Algorithm for Physical Cell ID Assignment in LTE-A Femtocellular Networks Ajay PratapRajiv MisraUtkarsh Gupta OriginalPaper 25 July 2016 Pages: 1213 - 1235
The Application of RFID to Healthcare Management of Nursing House Yu-Ting LiaoTzer-Long ChenJen-Hung Hwang OriginalPaper 10 August 2016 Pages: 1237 - 1257
LPWS Algorithm for Wideband Spectrum Sensing Fulai LiuRuiyan Du OriginalPaper 25 July 2016 Pages: 1259 - 1270
Dominant Interferers in Cognitive Radio Network Yee-Loo Foo OriginalPaper 23 July 2016 Pages: 1271 - 1284
Empirical Models of the Azimuthal Reception Angle—Part II: Adaptation of the Empirical Models in Analytical and Simulation Studies Cezary ZiółkowskiJan M. Kelner OriginalPaper Open access 28 July 2016 Pages: 1285 - 1296
Improved Hierarchical Key Management Scheme (IHKMS) with Three Phase Technique for Ad-Hoc Networks Osama S. FaragallahS. F. El-Zoghdy OriginalPaper 02 September 2016 Pages: 1297 - 1319
Noise Robust Speaker Identification Using RASTA–MFCC Feature with Quadrilateral Filter Bank Structure S. Selva NidhyananthanR. Shantha Selva KumariT. Senthur Selvi OriginalPaper 08 August 2016 Pages: 1321 - 1333
An Authentication Protocol Based on Quantum Key Distribution Using Decoy-State Method for Heterogeneous IoT Hongyang MaBingquan Chen OriginalPaper 23 August 2016 Pages: 1335 - 1344
Using Improved Product-Coded Modulation Codes to Reduce the Peak-to-Average Power Ratio in Single-Carrier Frequency Division Multiple Access Systems Hsin-Ying LiangCheng-Ying YangChia-Hsin Cheng OriginalPaper 09 August 2016 Pages: 1345 - 1357
Erratum to: Using Improved Product-Coded Modulation Codes to Reduce the Peak-to-Average Power Ratio in Single-Carrier Frequency Division Multiple Access Systems Hsin-Ying LiangCheng-Ying YangChia-Hsin Cheng Erratum 29 August 2016 Pages: 1359 - 1359
A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography Dheerendra MishraAshok Kumar DasMohammad Wazid OriginalPaper 02 August 2016 Pages: 1361 - 1391
Comparative Performance Investigation of Supervised and Unsupervised Learning Outlines applied in Cognitive Radio Systems Mithra VenkatesanAnju Vijay Kumar Kulkarni OriginalPaper 29 July 2016 Pages: 1393 - 1417
Double Codebook Estimation and Feedback with Outdated CSI Dan WangYu LiuYong Liao OriginalPaper 18 August 2016 Pages: 1419 - 1433
Evaluation of Conventional and Wavelet Based OFDM System for ICI Cancellation Naresh KumarBalwinder S. Sohi OriginalPaper 02 August 2016 Pages: 1435 - 1446
A Low-Complexity Rank Indicator Determination Method for the LTE System Chi-Min LiWei-Wen TsaoPao-Jen Wang OriginalPaper 29 July 2016 Pages: 1447 - 1458
A Lightweight Public Verifiable Multi Secret Sharing Scheme Using Short Integer Solution Massoud Hadian DehkordiReza Ghasemi OriginalPaper 02 August 2016 Pages: 1459 - 1469
Performance of Dynamic Access Class Barring Method in Cellular M2M Networks Lilatul FerdouseAlagan AnpalaganMohan Nadarajah OriginalPaper 15 September 2016 Pages: 1471 - 1487
A Data Transmitting Scheme Based on Improved AODV and RSU-Assisted Forwarding for Large-Scale VANET Licai YangHaiqing Liu OriginalPaper 02 August 2016 Pages: 1489 - 1505
A Blind Recognition Algorithm for Real Orthogonal STBC MC-CDMA Underdetermined Systems Based on LPCA and SCA Bui Quang ChungZhang Tian QiAlina Labitzke OriginalPaper 03 August 2016 Pages: 1507 - 1529
An Adaptive Modulation Technique for Wireless Image Sequence Transmission Beomkeun ShinHyobeen ParkSeongjoo Lee OriginalPaper 02 August 2016 Pages: 1531 - 1547