About this Journal Submit a Manuscript Table of Contents

Citations to this Journal [2,077 citations: 101–200 of 1,597 articles]

Articles published in International Journal of Distributed Sensor Networks have been cited 2,077 times. The following is a list of the 1,597 articles that have cited the articles published in International Journal of Distributed Sensor Networks.

  • Young-Sik Jeong, Mohammad S. Obaidat, Jianhua Ma, and Laurence T. Yang, “Advanced Mathematics and Numerical Modeling of IoT,” Journal of Applied Mathematics, vol. 2015, pp. 1–5, 2015. View at Publisher · View at Google Scholar
  • Atiq-Ur -Rahman, M.M. Al-Shomran, Irshad Ahmad, and Halabi Hasbullah, “Two Echelon Architecture Using Relay Node Placement in Wireless Sensor Network,” Journal of Applied Sciences, vol. 15, no. 2, pp. 214–222, 2015. View at Publisher · View at Google Scholar
  • Hong-Nan Li, Liang Ren, Zi-Guang Jia, Ting-Hua Yi, and Dong-Sheng Li, “State-of-the-art in structural health monitoring of large and complex civil infrastructures,” Journal of Civil Structural Health Monitoring, 2015. View at Publisher · View at Google Scholar
  • Kejia Zhang, Qilong Han, Guisheng Yin, and Haiwei Pan, “OFDP: a distributed algorithm for finding disjoint paths with minimum total length in wireless sensor networks,” Journal of Combinatorial Optimization, 2015. View at Publisher · View at Google Scholar
  • Vaibhav Soni, and Dheeresh K. Mallick, “A Novel Scheme to Minimize Hop Count for GAF in Wireless Sensor Networks: Two-Level GAF,” Journal of Computer Networks and Communications, vol. 2015, pp. 1–9, 2015. View at Publisher · View at Google Scholar
  • Xiaoyin Li, Lianshan Yan, Wei Pan, and Bin Luo, “Optimization of DV-hop localization algorithm in hybrid optical wireless sensor networks,” Journal Of Heuristics, vol. 21, no. 2, pp. 177–195, 2015. View at Publisher · View at Google Scholar
  • R. Anitha, and Saswati Mukherjee, “‘MaaS’: fast retrieval of E-file in cloud using metadata as a service,” Journal of Intelligent Manufacturing, 2015. View at Publisher · View at Google Scholar
  • Lili Xu, and Fan Wu, “Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care,” Journal Of Medical Systems, vol. 39, no. 2, 2015. View at Publisher · View at Google Scholar
  • Yanrong Lu, Lixiang Li, Haipeng Peng, Dong Xie, and Yixian Yang, “Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps,” Journal of Medical Systems, vol. 39, no. 6, 2015. View at Publisher · View at Google Scholar
  • Qazi Mamoon Ashraf, and Mohamed Hadi Habaebi, “Autonomic schemes for threat mitigation in Internet of Things,” Journal Of Network And Computer Applications, vol. 49, pp. 112–127, 2015. View at Publisher · View at Google Scholar
  • Jinfang Jiang, Guangjie Han, Hui Guo, Lei Shu, and Joel J.P.C Rodrigues, “Geographic Multipath Routing based on Geospatial Division in Duty-cycled Underwater Wireless Sensor Networks,” Journal of Network and Computer Applications, 2015. View at Publisher · View at Google Scholar
  • Guodong Sun, Lin Zhao, Zhibo Chen, and Guofu Qiao, “Effective Link Interference Model in Topology Control of Wireless Ad Hoc and Sensor Networks,” Journal of Network and Computer Applications, 2015. View at Publisher · View at Google Scholar
  • Raja Wasim Ahmad, Abdullah Gani, Siti Hafizah Ab Hamid, Muhammad Shiraz, Abdullah Yousafzai, and Feng Xia, “A Survey on Virtual Machine Migration and Server Consolidation Techniques for Cloud Data Centers,” Journal of Network and Computer Applications, 2015. View at Publisher · View at Google Scholar
  • Navdeep Kaur Kapoor, Shikharesh Majumdar, and Biswajit Nandy, “Techniques for Allocation of Sensors in Shared Wireless Sensor Networks,” Journal of Networks, vol. 10, no. 01, 2015. View at Publisher · View at Google Scholar
  • Jing Zhou, Aihuang Guo, Hung T. Nguyen, and Steven Su, “Intelligent Management of Multiple Access Schemes in Wireless Body Area Network,” Journal of Networks, vol. 10, no. 2, 2015. View at Publisher · View at Google Scholar
  • Farhan Siddiqui, Sherali Zeadally, and Khaled Salah, “Gigabit Wireless Networking with IEEE 802.11ac:Technical Overview and Challenges,” Journal of Networks, vol. 10, no. 3, 2015. View at Publisher · View at Google Scholar
  • Andrea Lupia, and Floriano De Rango, “Evaluation of the Energy Consumption Introduced by a Trust Management Scheme on Mobile Ad-hoc Networks,” Journal of Networks, vol. 10, no. 4, 2015. View at Publisher · View at Google Scholar
  • Jun Long, Anfeng Liu, Mianxiong Dong, and Zhi Li, “An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing,” Journal of Parallel and Distributed Computing, 2015. View at Publisher · View at Google Scholar
  • Simon Fong, Justin Liang, Iztok Fister, Iztok Fister, and Sabah Mohammed, “Gesture Recognition from Data Streams of Human Motion Sensor Using Accelerated PSO Swarm Search Feature Selection Algorithm,” Journal of Sensors, vol. 2015, pp. 1–16, 2015. View at Publisher · View at Google Scholar
  • Parivash Pirasteh, Dosam Hwang, and Jason J. Jung, “Exploiting Matrix Factorization to Asymmetric User Similarities in Recommendation Systems,” Knowledge-Based Systems, 2015. View at Publisher · View at Google Scholar
  • Shuhao Yu, Shoubao Su, and Li Huang, “A simple diversity guided firefly algorithm,” Kybernetes, vol. 44, no. 1, pp. 43–56, 2015. View at Publisher · View at Google Scholar
  • Junchang Xin, Zhiqiong Wang, Mei Bai, Linlin Ding, and Guoren Wang, “ Energy-Efficient β -Approximate Skylines Processing in Wireless Sensor Networks ,” Mathematical Problems in Engineering, vol. 2015, pp. 1–11, 2015. View at Publisher · View at Google Scholar
  • Huan-Ming Chuang, Chyuan-Yuh Lin, and You-Shyang Chen, “Exploring the Triple Reciprocity Nature of Organizational Value Cocreation Behavior Using Multicriteria Decision Making Analysis,” Mathematical Problems in Engineering, vol. 2015, pp. 1–15, 2015. View at Publisher · View at Google Scholar
  • Kang Xie, Yixian Yang, Yang Xin, and Guangsheng Xia, “Cellular Neural Network-Based Methods for Distributed Network Intrusion Detection,” Mathematical Problems in Engineering, vol. 2015, pp. 1–10, 2015. View at Publisher · View at Google Scholar
  • Mohammad Jalil Piran, Amjad Ali, and Doug Young Suh, “Fuzzy-Based Sensor Fusion for Cognitive Radio-Based Vehicular Ad Hoc and Sensor Networks,” Mathematical Problems in Engineering, vol. 2015, pp. 1–9, 2015. View at Publisher · View at Google Scholar
  • Mary Opokua Ansong, Jun Steed Huang, Mary Ann Yeboah, Han Dun, and Hongxing Yao, “Non-Gaussian Hybrid Transfer Functions: Memorizing Mine Survivability Calculations,” Mathematical Problems in Engineering, vol. 2015, pp. 1–18, 2015. View at Publisher · View at Google Scholar
  • Can He, Jianchun Xing, Juelong Li, Qiliang Yang, Ronghao Wang, and Xun Zhang, “A New Optimal Sensor Placement Strategy Based on Modified Modal Assurance Criterion and Improved Adaptive Genetic Algorithm for Structural Health Monitoring,” Mathematical Problems in Engineering, vol. 2015, pp. 1–10, 2015. View at Publisher · View at Google Scholar
  • Jun Du, Daoxing Guo, Bangning Zhang, and Yunxia Su, “A Robust Cooperative Spectrum Sensing-Assisted Multiuser Resource Allocation Scheme,” Mathematical Problems in Engineering, vol. 2015, pp. 1–12, 2015. View at Publisher · View at Google Scholar
  • Haixia Peng, Hai Zhao, Yuanguo Bi, Shuaizong Si, and Wei Cai, “A Reliability-Oriented Local-Area Model for Large-Scale Wireless Sensor Networks,” Mathematical Problems in Engineering, vol. 2015, pp. 1–17, 2015. View at Publisher · View at Google Scholar
  • Yilei Wang, Chuan Zhao, Qiuliang Xu, Zhihua Zheng, Zhenhua Chen, and Zhe Liu, “Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks,” Mobile Information Systems, vol. 2015, pp. 1–8, 2015. View at Publisher · View at Google Scholar
  • Amilcare Francesco Santamaria, Cesare Sottile, Floriano De Rango, and Salvatore Marano, “Safety Enhancement and Carbon Dioxide (C O 2) reduction in VANETs,” Mobile Networks and Applications, 2015. View at Publisher · View at Google Scholar
  • M. Shamim Hossain, and Ghulam Muhammad, “Cloud-Assisted Speech and Face Recognition Framework for Health Monitoring,” Mobile Networks and Applications, 2015. View at Publisher · View at Google Scholar
  • Gangyong Jia, Guangjie Han, Jinfang Jiang, and Aohan Li, “Dynamic Time-slice Scaling for Addressing OS Problems Incurred by Main Memory DVFS in Intelligent System,” Mobile Networks and Applications, vol. 20, no. 2, pp. 157–168, 2015. View at Publisher · View at Google Scholar
  • Meng Li, Caiwen Li, Jinfeng Wang, and Shuqun Song, “Immune response and gene expression in hemocytes of Portunus trituberculatus inoculated with the parasitic dinoflagellate Hematodinium,” Molecular Immunology, vol. 65, no. 1, pp. 113–122, 2015. View at Publisher · View at Google Scholar
  • Debiao He, Neeraj Kumar, Jianhua Chen, Cheng-Chi Lee, Naveen Chilamkurti, and Seng-Soo Yeo, “Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks,” Multimedia Systems, vol. 21, no. 1, pp. 49–60, 2015. View at Publisher · View at Google Scholar
  • Hyunhee Park, Seunghyun Park, Taeshik Shon, and Eui-Jik Kim, “Multi-hop-based opportunistic concurrent directional transmission in 60 GHz WPANs,” Multimedia Tools And Applications, vol. 74, no. 5, pp. 1627–1644, 2015. View at Publisher · View at Google Scholar
  • Musab Ghadi, Lamri Laouamer, and Tarek Moulahi, “Securing data exchange in wireless multimedia sensor networks: perspectives and challenges,” Multimedia Tools and Applications, 2015. View at Publisher · View at Google Scholar
  • Shuai Liu, Zhibin Zhang, Lingyun Qi, and Ming Ma, “A fractal image encoding method based on statistical loss used in agricultural image compression,” Multimedia Tools and Applications, 2015. View at Publisher · View at Google Scholar
  • Mehdi Sookhak, Adnan Akhundzada, Alireza Sookhak, Mohammadreza Eslaminejad, Abdullah Gani, Muhammad Khurram Khan, Xiong Li, and Xiaomin Wang, “Geographic Wormhole Detection in Wireless Sensor Networks,” Plos One, vol. 10, no. 1, 2015. View at Publisher · View at Google Scholar
  • Jose-Antonio Sanchez-Alcon, Lourdes Lopez-Santidrian, and Jose-Fernan Martinez, “Solution to ensure privacy in the internet of things,” Profesional De La Informacion, vol. 24, no. 1, pp. 62–70, 2015. View at Publisher · View at Google Scholar
  • Gao Yicong, Yixiong Feng, Zixian Zhang, and Jianrong Tan, “An optimal Dynamic Interval Preventive Maintenance Scheduling for Series Systems,” Reliability Engineering & System Safety, 2015. View at Publisher · View at Google Scholar
  • Charlotte J. Houldcroft, and Paul Kellam, “Host genetics of Epstein-Barr virus infection, latency and disease,” Reviews In Medical Virology, vol. 25, no. 2, pp. 71–84, 2015. View at Publisher · View at Google Scholar
  • Naouel Ayari, Abdelghani Chibani, Yacine Amirat, and Eric Matson, “A semantic approach for enhancing assistive services in ubiquitous robotics,” Robotics and Autonomous Systems, 2015. View at Publisher · View at Google Scholar
  • Peng Lin, Xiaoxu Zhu, Qingbin Li, Hongyuan Liu, and Yongjun Yu, “Study on Optimal Grouting Timing for Controlling Uplift Deformation of a Super High Arch Dam,” Rock Mechanics and Rock Engineering, 2015. View at Publisher · View at Google Scholar
  • So-Young Lee, and Jeong-Tae Kim, “Effects of foundation damage and water-level change on vibration modal parameters of gravity-type caisson structure,” Science China-Technological Sciences, vol. 58, no. 2, pp. 316–329, 2015. View at Publisher · View at Google Scholar
  • Hiroyuki K. M. Tanaka, “Muographic mapping of the subsurface density structures in Miura, Boso and Izu peninsulas, Japan,” Scientific Reports, vol. 5, pp. 1–10, 2015. View at Publisher · View at Google Scholar
  • A. Zaoui, and W. Sekkal, “Can clays ensure nuclear waste repositories?,” Scientific Reports, vol. 5, 2015. View at Publisher · View at Google Scholar
  • Muhammad Altaf Khan, Shafiullah Khan, Bilal Shams, and Jaime Lloret, “Distributed flood attack detection mechanism using artificial neural network in wireless mesh networks,” Security and Communication Networks, 2015. View at Publisher · View at Google Scholar
  • Jin Cao, Maode Ma, and Hui Li, “GBAAM: group-based access authentication for MTC in LTE networks,” Security and Communication Networks, 2015. View at Publisher · View at Google Scholar
  • Parnasree Chakraborty, and C. Tharini, “Analysis of suitable modulation scheme for compressive sensing algorithm in wireless sensor network,” Sensor Review, vol. 35, no. 2, pp. 168–173, 2015. View at Publisher · View at Google Scholar
  • Mohammad Abdur Razzaque, Saeideh S. Javadi, Yahaya Coulibaly, and Muta Tah Hira, “QoS-Aware Error Recovery in Wireless Body Sensor Networks Using Adaptive Network Coding,” Sensors, vol. 15, no. 1, pp. 440–464, 2015. View at Publisher · View at Google Scholar
  • Marco Baldi, Graziano Cerri, Franco Chiaraluce, Lorenzo Eusebi, and Paola Russo, “Non-Invasive UWB Sensing of Astronauts' Breathing Activity,” Sensors, vol. 15, no. 1, pp. 565–591, 2015. View at Publisher · View at Google Scholar
  • Daniel G. Costa, Luiz Affonso Guedes, Francisco Vasques, and Paulo Portugal, “Research Trends in Wireless Visual Sensor Networks When Exploiting Prioritization,” Sensors, vol. 15, no. 1, pp. 1760–1784, 2015. View at Publisher · View at Google Scholar
  • Muhammad Shoaib, Stephan Bosch, Ozlem Durmaz Incel, Hans Scholten, and Paul J. M. Havinga, “A Survey of Online Activity Recognition Using Mobile Phones,” Sensors, vol. 15, no. 1, pp. 2059–2085, 2015. View at Publisher · View at Google Scholar
  • Long Cheng, Yan Wang, Hao Wu, Nan Hu, and Chengdong Wu, “Non-Parametric Location Estimation in Rough Wireless Environments for Wireless Sensor Network,” Sensors and Actuators A: Physical, 2015. View at Publisher · View at Google Scholar
  • Bing Dai, Guoyan Zhao, Longjun Dong, and Chen Yang, “Mechanical Characteristics for Rocks under Different Paths and Unloading Rates under Confining Pressures,” Shock and Vibration, vol. 2015, pp. 1–8, 2015. View at Publisher · View at Google Scholar
  • Haoxiang He, Ruifeng Li, and Kui Chen, “Characteristics of Jerk Response Spectra for Elastic and Inelastic Systems,” Shock and Vibration, vol. 2015, pp. 1–12, 2015. View at Publisher · View at Google Scholar
  • Niranjan Panigrahi, and Pabitra Mohan Khilar, “An evolutionary based topological optimization strategy for consensus based clock synchronization protocols in wireless sensor network,” Swarm and Evolutionary Computation, 2015. View at Publisher · View at Google Scholar
  • Sudhanshu Tyagi, Sudeep Tanwar, Sumit Kumar Gupta, Neeraj Kumar, and Joel J. P. C. Rodrigues, “A lifetime extended multi-levels heterogeneous routing protocol for wireless sensor networks,” Telecommunication Systems, 2015. View at Publisher · View at Google Scholar
  • Seyed Mahdi Jameii, Karim Faez, and Mehdi Dehghan, “AMOF: adaptive multi-objective optimization framework for coverage and topology control in heterogeneous wireless sensor networks,” Telecommunication Systems, 2015. View at Publisher · View at Google Scholar
  • Raja Wasim Ahmad, Abdullah Gani, Siti Hafizah Ab. Hamid, Muhammad Shiraz, Feng Xia, and Sajjad A. Madani, “Virtual machine migration in cloud data centers: a review, taxonomy, and open research issues,” The Journal of Supercomputing, 2015. View at Publisher · View at Google Scholar
  • Shanmugasundaram Thilagavathi, and Bhavani Gnanasambandan Geetha, “Energy Aware Swarm Optimization with Intercluster Search for Wireless Sensor Network,” The Scientific World Journal, vol. 2015, pp. 1–8, 2015. View at Publisher · View at Google Scholar
  • Suresh Koneri Chandrasekaran, Prakash Savarimuthu, Priya Andi Elumalai, and Kathirvel Ayyaswamy, “Primary Path Reservation Using Enhanced Slot Assignment in TDMA for Session Admission,” The Scientific World Journal, vol. 2015, pp. 1–11, 2015. View at Publisher · View at Google Scholar
  • Deepa Devasenapathy, and Kathiravan Kannan, “An Energy-Efficient Cluster-Based Vehicle Detection on Road Network Using Intention Numeration Method,” The Scientific World Journal, vol. 2015, pp. 1–9, 2015. View at Publisher · View at Google Scholar
  • Duen-Yian Yeh, and Ching-Hsue Cheng, “Recommendation system for popular tourist attractions in Taiwan using Delphi panel and repertory grid techniques,” Tourism Management, vol. 46, pp. 164–176, 2015. View at Publisher · View at Google Scholar
  • Inn-Ho Tsai, Ying-Ming Wang, and Kai-Fa Huang, “Effects of single N-glycosylation site knockout on folding and defibrinogenating activities of acutobin recombinants from HEK293T,” Toxicon, vol. 94, pp. 50–59, 2015. View at Publisher · View at Google Scholar
  • Long-jun Dong, Xi-bing Li, Zi-long Zhou, Guang-hui Chen, and Ju Ma, “Three-dimensional analytical solution of acoustic emission source location for cuboid monitoring network without pre-measured wave velocity,” Transactions of Nonferrous Metals Society of China, vol. 25, no. 1, pp. 293–302, 2015. View at Publisher · View at Google Scholar
  • Leena Kumari, K. Narsaiah, M.K. Grewal, and R.K. Anurag, “Application of RFID in Agri-food sector-A review,” Trends in Food Science & Technology, 2015. View at Publisher · View at Google Scholar
  • Jie Chai, Shan Wang, Dali Han, Wei Dong, Chao Xie, and Hongliang Guo, “MicroRNA-455 inhibits proliferation and invasion of colorectal cancer by targeting RAF proto-oncogene serine/threonine-protein kinase,” Tumor Biology, vol. 36, no. 2, pp. 1313–1321, 2015. View at Publisher · View at Google Scholar
  • M. Mouton, G. Castignani, R. Frank, and T. Engel, “Enabling vehicular mobility in city-wide IEEE 802.11 networks through predictive handovers,” Vehicular Communications, 2015. View at Publisher · View at Google Scholar
  • Alfredo Navarra, Cristina M. Pinotti, Mario Di Francesco, and Sajal K. Das, “Interference-free scheduling with minimum latency in cluster-based wireless sensor networks,” Wireless Networks, 2015. View at Publisher · View at Google Scholar
  • Abhimanyu Kumar, and Sachin Tripathi, “A Pairing Free Anonymous Certificateless Group Key Agreement Protocol for Dynamic Group,” Wireless Personal Communications, 2015. View at Publisher · View at Google Scholar
  • Mohammad Bsoul, Yousef Kilani, Maen Hammad, Emad E. Abdallah, and Ayoub Alsarhan, “An Index-Based Approach for Wireless Sensor Networks,” Wireless Personal Communications, 2015. View at Publisher · View at Google Scholar
  • Cheng Bo, Zhao Shuai, and Tang Haina, “Wireless Machine to Machine Monitoring Using Cross-Platform Smart Phone for District Heating,” Wireless Personal Communications, 2015. View at Publisher · View at Google Scholar
  • K. S. Geethu, and A. V. Babu, “Minimizing the Total Energy Consumption in Multi-hop UWASNs,” Wireless Personal Communications, 2015. View at Publisher · View at Google Scholar
  • Kanaga Suba Raja, and Usha Kiruthika, “An Energy Efficient Method for Secure and Reliable Data Transmission in Wireless Body Area Networks Using RelAODV,” Wireless Personal Communications, 2015. View at Publisher · View at Google Scholar
  • Wei Sun, He-Sheng Zhang, Cheng Pan, and Jun Yang, “Comprehensive Performance Evaluation of VANETs for Safety-Related Applications,” Wireless Personal Communications, 2015. View at Publisher · View at Google Scholar
  • De Gu, Jishuai Wang, and Ji Li, “Boundary Recognition by Simulating a Diffusion Process in Wireless Sensor Networks,” Abstract and Applied Analysis, vol. 2014, pp. 1–11, 2014. View at Publisher · View at Google Scholar
  • Longjun Dong, Xibing Li, and Gongnan Xie, “Nonlinear Methodologies for Identifying Seismic Event and Nuclear Explosion Using Random Forest, Support Vector Machine, and Naive Bayes Classification,” Abstract and Applied Analysis, vol. 2014, pp. 1–8, 2014. View at Publisher · View at Google Scholar
  • E. Ghazizadeh, Z. S. Shams Dolatabadi, R. Khaleghparast, M. Zamani, A. A. Manaf, and M. S. Abdullah, “Secure OpenID Authentication Model by Using Trusted Computing,” Abstract and Applied Analysis, vol. 2014, pp. 1–15, 2014. View at Publisher · View at Google Scholar
  • Yuanjiang Huang, Raúl M. del Toro, José-Fernán Martínez, Vicente Hernández, and Rodolfo Haber, “Connectivity control in WSN based on fuzzy logic control,” ACM SIGBED Review, vol. 11, no. 3, pp. 54–57, 2014. View at Publisher · View at Google Scholar
  • Thomas La Porta, Chiara Petrioli, Cynthia Phillips, and Dora Spenza, “Sensor Mission Assignment in Rechargeable Wireless Sensor Networks,” ACM Transactions on Sensor Networks, vol. 10, no. 4, pp. 1–39, 2014. View at Publisher · View at Google Scholar
  • Shusen Yang, and Julie A. Mccann, “Distributed Optimal Lexicographic Max-Min Rate Allocation in Solar-Powered Wireless Sensor Networks,” ACM Transactions on Sensor Networks, vol. 11, no. 1, pp. 1–35, 2014. View at Publisher · View at Google Scholar
  • Inès El Korbi, and Sherali Zeadally, “Energy-Aware Sensor Node Relocation in Mobile Sensor Networks,” Ad Hoc Networks, 2014. View at Publisher · View at Google Scholar
  • Ding Wang, and Ping Wang, “Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks,” Ad Hoc Networks, 2014. View at Publisher · View at Google Scholar
  • Dilan Sahin, Vehbi Cagri Gungor, Taskin Kocak, and Gurkan Tuna, “Quality-of-service differentiation in single-path and multi-path routing for wireless sensor network-based smart grid applications,” Ad Hoc Networks, 2014. View at Publisher · View at Google Scholar
  • Huang Cheng, Xin Fei, Azzedine Boukerche, and Mohammed Almulla, “GeoCover: An Efficient Sparse Coverage Protocol For RSU Deployment Over Urban VANETs,” Ad Hoc Networks, 2014. View at Publisher · View at Google Scholar
  • Fatih Senel, Kemal Akkaya, Melike Erol-Kantarci, and Turgay Yilmaz, “Self-deployment of mobile underwater acoustic sensor networks for maximized coverage and guaranteed connectivity,” Ad Hoc Networks, 2014. View at Publisher · View at Google Scholar
  • Haitao Yu, Nianmin Yao, and Jun Liu, “An Adaptive Routing Protocol in Underwater Sparse Acoustic Sensor Networks,” Ad Hoc Networks, 2014. View at Publisher · View at Google Scholar
  • Meenakshi Panda, and P.M. Khilar, “Distributed self fault diagnosis algorithm for large scale wireless sensor networks using modified three sigma edit test,” Ad Hoc Networks, 2014. View at Publisher · View at Google Scholar
  • Saru Kumari, Muhammad Khurram Khan, and Mohammed Atiquzzaman, “User Authentication Schemes for Wireless Sensor Networks: A Review,” Ad Hoc Networks, 2014. View at Publisher · View at Google Scholar
  • Yinggui Wang, Jun Huang, Le Yang, and Yanbo Xue, “TOA-based Joint Synchronization and Source Localization with Random Errors in Sensor Positions and Sensor Clock Biases,” Ad Hoc Networks, 2014. View at Publisher · View at Google Scholar
  • Oleg Novik, Sergey Ershov, Yuri Ruzhin, Fedor Smirnov, and Maxim Volgin., “Theory and detection sheme of seismic EM signals transferred into the atmosphere from the oceanic and continental lithosphere,” Advances in Space Research, 2014. View at Publisher · View at Google Scholar
  • Guang-Dong Zhou, Ting-Hua Yi, and Hong-Nan Li, “Sensor Placement Optimization in Structural Health Monitoring Using Cluster-in-Cluster Firefly Algorithm,” Advances in Structural Engineering, vol. 17, no. 8, pp. 1103–1115, 2014. View at Publisher · View at Google Scholar
  • X. G. Hua, Z. Q. Chen, J. B. Yang, H. W. Niu, and B. Chen, “Turbulence Integral Scale Corrections to Experimental Results of Aeroelastic Models with Large Geometric Scales: Application to Gust Loading Factor of a Transmission Line Tower,” Advances in Structural Engineering, vol. 17, no. 8, pp. 1189–1198, 2014. View at Publisher · View at Google Scholar
  • Azam Khalili, Wael M. Bazzi, Amir Rastegarnia, and Saeid Sanei, “Analysis of cooperation gain for adaptive networks in different communication scenarios,” AEU - International Journal of Electronics and Communications, 2014. View at Publisher · View at Google Scholar
  • Xibing Li, and Longjun Dong, “An efficient closed-form solution for acoustic emission source location in three-dimensional structures,” AIP Advances, vol. 4, no. 2, pp. 027110, 2014. View at Publisher · View at Google Scholar
  • Bo Zhao, Pengpeng Chen, and Huazhong Yang, “Design of RF transceivers for wireless sensor networks in hazardous applications,” Analog Integrated Circuits and Signal Processing, 2014. View at Publisher · View at Google Scholar
  • Andrea Montecucco, Jonathan Siviter, and Andrew R. Knox, “The effect of temperature mismatch on thermoelectric generators electrically connected in series and parallel,” Applied Energy, vol. 123, pp. 47–54, 2014. View at Publisher · View at Google Scholar
  • Shuai Liu, Xiaochun Cheng, Weina Fu, Yunpeng Zhou, and Qianzhong Li, “Numeric characteristics of generalized M-set with its asymptote,” Applied Mathematics and Computation, vol. 243, pp. 767–774, 2014. View at Publisher · View at Google Scholar