This document lists the most cited articles from 2011 and 2010 in the International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC). It provides the article titles, authors, publication details including volume, issue and page numbers, and digital object identifiers for 6 articles in 2011 and 5 articles in 2010 that were highly cited based on the journal's metrics. The articles covered topics related to wireless sensor networks, mobile ad hoc networks, and vehicular ad hoc networks.
The document discusses prototyping and provides examples of different types of prototypes including paper prototypes, digital prototypes, storyboards, role plays, and space prototypes. It explains that prototyping is used to make ideas tangible and test reactions from users in order to gain insights. Prototypes should be iterated on and fail early to push ideas further and save time and money. Both low and high fidelity prototypes are mentioned as ways to test ideas at different stages of the design process.
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
In an ever-changing landscape of one digital disruption after another, companies and organisations are looking for new ways to understand their target markets and engage them better. Increasingly they invest in user experience (UX) and customer experience design (CX) capabilities by working with a specialist UX agency or developing their own UX lab. Some UX practitioners are touting leaner and faster ways of developing customer-centric products and services, via methodologies such as guerilla research, rapid prototyping and Agile UX. Others seek innovation and fulfilment by spending more time in research, being more inclusive, and designing for social goods.
Experience is more than just an interface. It is a relationship, as well as a series of touch points between your brand and your customer. Here are our top 10 highlights and takeaways from the recent UX Australia conference to help you transform your customer experience design.
For full article, continue reading at https://yump.com.au/10-ways-supercharge-customer-experience-design/
http://inarocket.com
Learn BEM fundamentals as fast as possible. What is BEM (Block, element, modifier), BEM syntax, how it works with a real example, etc.
How to Build a Dynamic Social Media PlanPost Planner
Stop guessing and wasting your time on networks and strategies that don’t work!
Join Rebekah Radice and Katie Lance to learn how to optimize your social networks, the best kept secrets for hot content, top time management tools, and much more!
Watch the replay here: bit.ly/socialmedia-plan
The document discusses how personalization and dynamic content are becoming increasingly important on websites. It notes that 52% of marketers see content personalization as critical and 75% of consumers like it when brands personalize their content. However, personalization can create issues for search engine optimization as dynamic URLs and content are more difficult for search engines to index than static pages. The document provides tips for SEOs to help address these personalization and SEO challenges, such as using static URLs when possible and submitting accurate sitemaps.
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
How can we take UX and Data Storytelling out of the tech context and use them to change the way government behaves?
Showcasing the truth is the highest goal of data storytelling. Because the design of a chart can affect the interpretation of data in a major way, one must wield visual tools with care and deliberation. Using quantitative facts to evoke an emotional response is best achieved with the combination of UX and data storytelling.
This document summarizes a study of CEO succession events among the largest 100 U.S. corporations between 2005-2015. The study analyzed executives who were passed over for the CEO role ("succession losers") and their subsequent careers. It found that 74% of passed over executives left their companies, with 30% eventually becoming CEOs elsewhere. However, companies led by succession losers saw average stock price declines of 13% over 3 years, compared to gains for companies whose CEO selections remained unchanged. The findings suggest that boards generally identify the most qualified CEO candidates, though differences between internal and external hires complicate comparisons.
International Journal of Wireless & Mobile Networks (IJWMN)ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
This document lists the most cited articles from 2009 to 2012 that were published in the International Journal of Computer Networks & Communications (IJCNC). It provides the article title, authors, publication details such as volume, issue, and page numbers, and a DOI link for each of the top cited articles from each year. The articles cover topics related to wireless networks, routing protocols, multimedia transmission, and network security.
This document provides summaries of the most cited articles from the International Journal of Computer Science & Information Technology (IJCSIT) from 2009 to 2012. It lists the article title, authors, publication details, and a short description or focus of each of the most cited articles from each year. There are over 50 highly cited articles summarized from the journal during this four year period covering topics in various areas of computer science and information technology.
This document lists the most cited articles from 2012-2009 in the International Journal of Network Security & Its Applications (IJNSA). It provides the article titles, authors, publication details including volume, issue and page numbers, and digital object identifiers (DOIs) for each of the cited articles. The articles cover topics related to network security, intrusion detection systems, encryption, authentication, and wireless sensor networks.
This document provides a summary of the most cited articles from 2012, 2011, and 2010 in the International Journal of VLSI Design & Communication Systems (VLSICS). The articles cover topics related to reducing leakage power in sequential circuits, comparing adder topologies, Wishbone bus architecture, designing reversible logic circuits, and low power phase locked loop circuits. Many of the articles focus on designing circuits and systems for low power VLSI applications.
This document lists the most cited articles from the International Journal of Artificial Intelligence & Applications between 2010-2012. It provides the article titles, authors, year published, page numbers and DOI numbers for several papers on topics relating to artificial intelligence, machine learning, neural networks and other intelligent systems applications.
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...IJCSES Journal
Advances in wireless sensor network (WSN) technology has provided the availability of small
and low-costsensor nodes with capability of sensing various types of physical and environmental
conditions, data processing, and wireless communication. Variety of sensing capabilities results
in profusion of application areas. However, the characteristics of wireless sensor networks
require more effective methods for data forwarding and processing. In WSN, the sensor nodes
have a limited transmission range, and their processing and storage capabilities , as well as their
energy resources, are also limited. Routing protocols for wireless sensor networks are
responsible for maintaining the routes in the network and have to ensure reliable multi-hop
communication under these conditions. In this paper, we give a survey of routing protocols for
Wireless Sensor Network and compare their strengths and limitations.
International journal of computer networks & communications (ijcnc) --no...IJCNCJournal
This document summarizes a research paper that proposes a technique to improve the detection of false report attacks in wireless sensor networks (WSNs) using machine learning and a neural network. The technique evaluates report information gathered from base stations to identify invalid data and detect false report attacks, even when MAC information is compromised. This is an improvement over existing security protocols that rely on MAC-dependent validation, which cannot defend against extreme false report attacks. The proposed method uses a machine learning-based prediction model and evaluation function to verify false report attacks based on analyzing reports from the base station. This intelligent approach aims to help WSNs better defend against evolving attacks.
Most Cited Survey Article in Computer Science And EngineeringIJCSES Journal
Advances in wireless sensor network (WSN) technology has provided the availability of small and low-cost sensor nodes with capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. Variety of sensing capabilities results in profusion of application areas. However, the characteristics of wireless sensor networks require more effective methods for data forwarding and processing. In WSN, the sensor nodes have a limited transmission range, and their processing and storage capabilities as well as their energy resources are also limited. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication under these conditions. In this paper, we give a survey of routing protocols for Wireless Sensor Network and compare their strengths and limitations.
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Dr. E.N. Ganesh has over 19 years of experience in teaching and research. He received his PhD in nano electronics from JNTU Hyderabad and is currently the Dean of R&D at RIT Chennai. He has published over 30 papers in various journals and conferences and is currently working on two projects related to eye disease detection and traffic congestion analysis worth Rs. 15 lakhs.
This document lists the most cited articles from the International Journal of Distributed and Parallel systems (IJDPS) between 2010-2012. It provides the article titles, authors, publication details including volume, issue and page numbers. The articles cover topics such as mobile learning, parallel task scheduling, hazardous gas detection, traffic load evaluation in mobile ad hoc networks, and an overview of techniques to reduce peak-to-average power ratio in code division multiple access systems.
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing.
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Most Downloaded Article for an Year in Academia - International Journal of Ub...ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user.
This document lists the most cited articles from the International Journal of Database Management Systems between 2009-2012. It provides the article titles, authors, publication details including volume, issue and page numbers, and digital object identifiers for each of the top cited articles over this four year period. The articles cover topics related to database management systems including data modeling, querying, warehousing, normalization, and security.
This document summarizes a book and 28 journal articles and conference papers authored or co-authored by C.G. Dethe. It includes the following key information:
- A book on performance evaluation of intelligent WLAN systems in multipath fading environments.
- 28 journal articles published in various international journals between 2009-2012 related to topics like UWB antenna design, resource allocation in MC-CDMA, medical image analysis, and video processing.
- 22 papers presented at international conferences between 2003-2013 on similar topics as the journal articles.
- 7 papers presented at national conferences in India between 2009-2014 related to wireless sensor networks, network traffic analysis, and intelligent transportation systems.
Prasanna Raut is a postdoctoral research associate at National Sun Yat-sen University in Taiwan. He received his Ph.D. in Electronics and Communication Engineering from Visvesvaraya National Institute of Technology in India. His research focuses on ultra-reliable low-latency communication, UAV communications, and machine learning applications for wireless communications. He has published several journal and conference papers in these areas and received grants from the Government of India and Ministry of EIT.
This document provides 5 references for wireless sensor network technologies. The references cover topics like wireless sensor network applications for information, security issues in wireless sensor networks, clustering algorithms for wireless sensor networks, an application-specific protocol for wireless microsensor networks, and an analytical model for information retrieval using an enhanced wireless sensor network protocol.
Publications and Honors (Ming-Long Fan)Ming-Long Fan
This document lists 22 journal articles and 14 conference papers authored by Ming-Long Fan and his collaborators between 2009-2015. The papers investigate FinFET and ultra-thin body SOI MOSFET devices and circuits such as SRAM cells. They analyze variability effects, noise, stability, and low-voltage and sub-threshold performance. The work aims to optimize FinFET and SOI technology for use in nanoscale memory and logic circuits.
Blockchain technology is transforming industries and reshaping the way we conduct business, manage data, and secure transactions. Whether you're new to blockchain or looking to deepen your knowledge, our guidebook, "Blockchain for Dummies", is your ultimate resource.
YOUR RELIABLE WEB DESIGN & DEVELOPMENT TEAM — FOR LASTING SUCCESS
WPRiders is a web development company specialized in WordPress and WooCommerce websites and plugins for customers around the world. The company is headquartered in Bucharest, Romania, but our team members are located all over the world. Our customers are primarily from the US and Western Europe, but we have clients from Australia, Canada and other areas as well.
Some facts about WPRiders and why we are one of the best firms around:
More than 700 five-star reviews! You can check them here.
1500 WordPress projects delivered.
We respond 80% faster than other firms! Data provided by Freshdesk.
We’ve been in business since 2015.
We are located in 7 countries and have 22 team members.
With so many projects delivered, our team knows what works and what doesn’t when it comes to WordPress and WooCommerce.
Our team members are:
- highly experienced developers (employees & contractors with 5 -10+ years of experience),
- great designers with an eye for UX/UI with 10+ years of experience
- project managers with development background who speak both tech and non-tech
- QA specialists
- Conversion Rate Optimisation - CRO experts
They are all working together to provide you with the best possible service. We are passionate about WordPress, and we love creating custom solutions that help our clients achieve their goals.
At WPRiders, we are committed to building long-term relationships with our clients. We believe in accountability, in doing the right thing, as well as in transparency and open communication. You can read more about WPRiders on the About us page.
How RPA Help in the Transportation and Logistics Industry.pptxSynapseIndia
Revolutionize your transportation processes with our cutting-edge RPA software. Automate repetitive tasks, reduce costs, and enhance efficiency in the logistics sector with our advanced solutions.
Implementations of Fused Deposition Modeling in real worldEmerging Tech
The presentation showcases the diverse real-world applications of Fused Deposition Modeling (FDM) across multiple industries:
1. **Manufacturing**: FDM is utilized in manufacturing for rapid prototyping, creating custom tools and fixtures, and producing functional end-use parts. Companies leverage its cost-effectiveness and flexibility to streamline production processes.
2. **Medical**: In the medical field, FDM is used to create patient-specific anatomical models, surgical guides, and prosthetics. Its ability to produce precise and biocompatible parts supports advancements in personalized healthcare solutions.
3. **Education**: FDM plays a crucial role in education by enabling students to learn about design and engineering through hands-on 3D printing projects. It promotes innovation and practical skill development in STEM disciplines.
4. **Science**: Researchers use FDM to prototype equipment for scientific experiments, build custom laboratory tools, and create models for visualization and testing purposes. It facilitates rapid iteration and customization in scientific endeavors.
5. **Automotive**: Automotive manufacturers employ FDM for prototyping vehicle components, tooling for assembly lines, and customized parts. It speeds up the design validation process and enhances efficiency in automotive engineering.
6. **Consumer Electronics**: FDM is utilized in consumer electronics for designing and prototyping product enclosures, casings, and internal components. It enables rapid iteration and customization to meet evolving consumer demands.
7. **Robotics**: Robotics engineers leverage FDM to prototype robot parts, create lightweight and durable components, and customize robot designs for specific applications. It supports innovation and optimization in robotic systems.
8. **Aerospace**: In aerospace, FDM is used to manufacture lightweight parts, complex geometries, and prototypes of aircraft components. It contributes to cost reduction, faster production cycles, and weight savings in aerospace engineering.
9. **Architecture**: Architects utilize FDM for creating detailed architectural models, prototypes of building components, and intricate designs. It aids in visualizing concepts, testing structural integrity, and communicating design ideas effectively.
Each industry example demonstrates how FDM enhances innovation, accelerates product development, and addresses specific challenges through advanced manufacturing capabilities.
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Bert Blevins
Today’s digitally connected world presents a wide range of security challenges for enterprises. Insider security threats are particularly noteworthy because they have the potential to cause significant harm. Unlike external threats, insider risks originate from within the company, making them more subtle and challenging to identify. This blog aims to provide a comprehensive understanding of insider security threats, including their types, examples, effects, and mitigation techniques.
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfNeo4j
Presented at Gartner Data & Analytics, London Maty 2024. BT Group has used the Neo4j Graph Database to enable impressive digital transformation programs over the last 6 years. By re-imagining their operational support systems to adopt self-serve and data lead principles they have substantially reduced the number of applications and complexity of their operations. The result has been a substantial reduction in risk and costs while improving time to value, innovation, and process automation. Join this session to hear their story, the lessons they learned along the way and how their future innovation plans include the exploration of uses of EKG + Generative AI.
Choose our Linux Web Hosting for a seamless and successful online presencerajancomputerfbd
Our Linux Web Hosting plans offer unbeatable performance, security, and scalability, ensuring your website runs smoothly and efficiently.
Visit- https://onliveserver.com/linux-web-hosting/
Support en anglais diffusé lors de l'événement 100% IA organisé dans les locaux parisiens d'Iguane Solutions, le mardi 2 juillet 2024 :
- Présentation de notre plateforme IA plug and play : ses fonctionnalités avancées, telles que son interface utilisateur intuitive, son copilot puissant et des outils de monitoring performants.
- REX client : Cyril Janssens, CTO d’ easybourse, partage son expérience d’utilisation de notre plateforme IA plug & play.
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsMydbops
This presentation, delivered at the Postgres Bangalore (PGBLR) Meetup-2 on June 29th, 2024, dives deep into connection pooling for PostgreSQL databases. Aakash M, a PostgreSQL Tech Lead at Mydbops, explores the challenges of managing numerous connections and explains how connection pooling optimizes performance and resource utilization.
Key Takeaways:
* Understand why connection pooling is essential for high-traffic applications
* Explore various connection poolers available for PostgreSQL, including pgbouncer
* Learn the configuration options and functionalities of pgbouncer
* Discover best practices for monitoring and troubleshooting connection pooling setups
* Gain insights into real-world use cases and considerations for production environments
This presentation is ideal for:
* Database administrators (DBAs)
* Developers working with PostgreSQL
* DevOps engineers
* Anyone interested in optimizing PostgreSQL performance
Contact info@mydbops.com for PostgreSQL Managed, Consulting and Remote DBA Services
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionBert Blevins
Cybersecurity is a major concern in today's connected digital world. Threats to organizations are constantly evolving and have the potential to compromise sensitive information, disrupt operations, and lead to significant financial losses. Traditional cybersecurity techniques often fall short against modern attackers. Therefore, advanced techniques for cyber security analysis and anomaly detection are essential for protecting digital assets. This blog explores these cutting-edge methods, providing a comprehensive overview of their application and importance.
Quantum Communications Q&A with Gemini LLM. These are based on Shannon's Noisy channel Theorem and offers how the classical theory applies to the quantum world.
UiPath Community Day Kraków: Devs4Devs ConferenceUiPathCommunity
We are honored to launch and host this event for our UiPath Polish Community, with the help of our partners - Proservartner!
We certainly hope we have managed to spike your interest in the subjects to be presented and the incredible networking opportunities at hand, too!
Check out our proposed agenda below 👇👇
08:30 ☕ Welcome coffee (30')
09:00 Opening note/ Intro to UiPath Community (10')
Cristina Vidu, Global Manager, Marketing Community @UiPath
Dawid Kot, Digital Transformation Lead @Proservartner
09:10 Cloud migration - Proservartner & DOVISTA case study (30')
Marcin Drozdowski, Automation CoE Manager @DOVISTA
Pawel Kamiński, RPA developer @DOVISTA
Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner
09:40 From bottlenecks to breakthroughs: Citizen Development in action (25')
Pawel Poplawski, Director, Improvement and Automation @McCormick & Company
Michał Cieślak, Senior Manager, Automation Programs @McCormick & Company
10:05 Next-level bots: API integration in UiPath Studio (30')
Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner
10:35 ☕ Coffee Break (15')
10:50 Document Understanding with my RPA Companion (45')
Ewa Gruszka, Enterprise Sales Specialist, AI & ML @UiPath
11:35 Power up your Robots: GenAI and GPT in REFramework (45')
Krzysztof Karaszewski, Global RPA Product Manager
12:20 🍕 Lunch Break (1hr)
13:20 From Concept to Quality: UiPath Test Suite for AI-powered Knowledge Bots (30')
Kamil Miśko, UiPath MVP, Senior RPA Developer @Zurich Insurance
13:50 Communications Mining - focus on AI capabilities (30')
Thomasz Wierzbicki, Business Analyst @Office Samurai
14:20 Polish MVP panel: Insights on MVP award achievements and career profiling
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc
Six months into 2024, and it is clear the privacy ecosystem takes no days off!! Regulators continue to implement and enforce new regulations, businesses strive to meet requirements, and technology advances like AI have privacy professionals scratching their heads about managing risk.
What can we learn about the first six months of data privacy trends and events in 2024? How should this inform your privacy program management for the rest of the year?
Join TrustArc, Goodwin, and Snyk privacy experts as they discuss the changes we’ve seen in the first half of 2024 and gain insight into the concrete, actionable steps you can take to up-level your privacy program in the second half of the year.
This webinar will review:
- Key changes to privacy regulations in 2024
- Key themes in privacy and data governance in 2024
- How to maximize your privacy program in the second half of 2024
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Erasmo Purificato
Slide of the tutorial entitled "Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Emerging Trends" held at UMAP'24: 32nd ACM Conference on User Modeling, Adaptation and Personalization (July 1, 2024 | Cagliari, Italy)
Mitigating the Impact of State Management in Cloud Stream Processing SystemsScyllaDB
Stream processing is a crucial component of modern data infrastructure, but constructing an efficient and scalable stream processing system can be challenging. Decoupling compute and storage architecture has emerged as an effective solution to these challenges, but it can introduce high latency issues, especially when dealing with complex continuous queries that necessitate managing extra-large internal states.
In this talk, we focus on addressing the high latency issues associated with S3 storage in stream processing systems that employ a decoupled compute and storage architecture. We delve into the root causes of latency in this context and explore various techniques to minimize the impact of S3 latency on stream processing performance. Our proposed approach is to implement a tiered storage mechanism that leverages a blend of high-performance and low-cost storage tiers to reduce data movement between the compute and storage layers while maintaining efficient processing.
Throughout the talk, we will present experimental results that demonstrate the effectiveness of our approach in mitigating the impact of S3 latency on stream processing. By the end of the talk, attendees will have gained insights into how to optimize their stream processing systems for reduced latency and improved cost-efficiency.
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Ijasuc(most cited articles)
1. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
ISSN : 0976 - 1764 (Online); 0976 - 2205 (Print)
http://airccse.org/journal/ijasuc/ijasuc.html
Most Cited Articles – 2011
A reference Based, Tree Structured Time Synchronization Approach and Its Analysis in WSN
Surendra Rahamatkar and Ajay Agarwal, IJASUC Journal, Vol.2, No.1, March 2011, PP. 20-31
DOI : 10.5121/ijasuc.2011.2103
Performance Evalution of MANET Routing Protocols Using Reference
Point Group Mobility and Random Waypoint Models
M.Sreerama Murty and M.Venkat Das, IJASUC Journal, Vol.2, No.1, March 2011, PP. 33-43
DOI : 10.5121/ijasuc.2011.2104
Intelligent Information Dissemination in Vehicular Ad Hoc Networks
M. S. Kakkasageri and S. S. Manvi, IJASUC Journal, Vol.2, No.1, March 2011, PP. 112-123
DOI : 10.5121/ijasuc.2011.2110
Vehicular Ad Hoc and Sensor Networks; Principles and Challenges
Mohammad Jalil Piran, G. Rama Murthy and G. Praveen Babu, IJASUC Journal, Vol.2, No.2,
June 2011, PP. 38-49 DOI : 10.5121/ijasuc.2011.2204
Energy Efficient Routing Algorithm for Maximizing the Minimum Lifetime of Wireless Sensor
Network: A Review
Praveen Kaushik and Jyoti Singhai, IJASUC Journal, Vol.2, No.2, June 2011, PP. 25-36
DOI : 10.5121/ijasuc.2011.2203
QoS Routing and Performance Evaluation for Mobile Ad Hoc Networks using OLSR Protocol
Mohamed Amnai , Youssef Fakhri and Jaafar Abouchabaka, IJASUC Journal, Vol.2, No.2, June
2011, PP. 12-23
DOI : 10.5121/ijasuc.2011.2202
A Simulation Model for the Lifetime of Wireless Sensor Networks
Abdelrahman Elleithy and Gonhsin Liu , IJASUC Journal, Vol.2, No.4, December 2011, PP. 1-1 5
DOI : 10.5121/ijasuc.2011.2401
Most Cited Articles - 2010
A Faster Routing Scheme for Stationary Wireless Sensor Networks-A Hybrid Approach
Jasmine Norman , J.Paulraj Joseph and P.Prapoorna Roja, IJASUC Journal, Vol.1, No.1, March
2010, PP. 1-10 DOI : 10.5121/ijasuc.2010.1101
2. Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
P. Samundiswary, D.Sathian and P. Dananjayan, IJASUC Journal, Vol.1, No.2, June 2010, PP. 09-
20 DOI : 10.5121/ijasuc.2010.1202
A Quality of Service Architecture for Resource Provisioning and Rate Control in Mobile Ad Hoc
Networks
S.Venkatasubramanian and N.P.Gopalan, IJASUC Journal, Vol.1, No.3, September 2010, PP. 106-
120 DOI : 10.5121/ijasuc.2010.1309
Energy-Efficient Target Coverage in Wireless Sensor Networks Based on Modified ant Colony
Algorithm
Salma Begum, Nazma Tara and Sharmin Sultana,, IJASUC Journal, Vol.1, No.4, December 2010,
PP. 29-36 DOI : 10.5121/ijasuc.2010.1403
Data Gathering Algorithms for Wireless Sensor Networks: A Survey
K.Ramanan and E.Baburaj, IJASUC Journal, Vol.1, No.4, December 2010, PP. 102-114
DOI : 10.5121/ijasuc.2010.1410
Intelligent Lighting System Using Wireless Sensor Networks
A.A.Nippun Kumaar, Kiran.G and Sudarshan TSB, IJASUC Journal, Vol.1, No.4, December 2010,
PP. 17-27 DOI : 10.5121/ijasuc.2010.1402
AIRCC Publishing Corporation
www.airccse.org