Report date: Mar 26, 2024 Conflict count: 356923 Publisher: Inderscience Enterprises Ltd. Title count: 329 Conflict count: 3279 ========================================================== Created: 2018-03-28 07:30:09.0 ConfID: 5355058 CauseID: 1423784653 OtherID: 1423348967 JT: International Journal of Autonomous and Adaptive Communications Systems MD: Yuan, 11 ,1,39,2018,A method of determining maximum transmission rate in wireless sensor network DOI: 10.1504/IJAACS.2018.10011794(Journal) (5355058-N ) DOI: 10.1504/IJAACS.2018.090662(Journal) ========================================================== Created: 2023-03-18 08:30:21.0 ConfID: 6760735 CauseID: 1565382386 OtherID: 1485117427 JT: International Journal of Autonomous and Adaptive Communications Systems MD: Chen, 16 ,1,1,2023,Vulnerability Detection Of The Authentication Protocol In The Iot Based On Improved Wavelet Packet DOI: 10.1504/IJAACS.2023.10034567(Journal) (6760735-N ) DOI: 10.1504/IJAACS.2023.129598(Journal) ========================================================== Created: 2023-07-26 07:30:10.0 ConfID: 6908969 CauseID: 1583088772 OtherID: 1582702310 JT: International Journal of Autonomous and Adaptive Communications Systems MD: Lin, 16 ,4,357,2023,Research on abnormal data recognition method of optical network based on WiFi triangular location DOI: 10.1504/IJAACS.2023.10057909(Journal) (6908969-N ) DOI: 10.1504/IJAACS.2023.132506(Journal) ========================================================== Created: 2023-11-15 07:30:13.0 ConfID: 7026647 CauseID: 1597267626 OtherID: 1596625811 JT: International Journal of Autonomous and Adaptive Communications Systems MD: Jiang, 16 ,6,611,2023,Reversible data hiding algorithm in encrypted images using adaptive total variation and cross-cyclic shift DOI: 10.1504/IJAACS.2023.10060344(Journal) (7026647-N ) DOI: 10.1504/IJAACS.2023.134851(Journal)