International Journal of Ad Hoc and Ubiquitous Computing
Published by Inderscience Publishers
ISSN : 1743-8225 eISSN : 1743-8233
Abbreviation : Int. J. Ad Hoc Ubiquitous Comput.
Aims & Scope
IJAHUC publishes papers that address networking or computing problems in the context of mobile and wireless ad hoc networks, wireless sensor networks, ad hoc computing systems, and ubiquitous computing systems.
View Aims & ScopeMetrics & Ranking
Impact Factor
Year | Value |
---|---|
2024 | 0.70 |
Journal Rank
Year | Value |
---|---|
2024 | 20399 |
Journal Citation Indicator
Year | Value |
---|---|
2024 | 204 |
SJR (SCImago Journal Rank)
Year | Value |
---|---|
2024 | 0.214 |
Quartile
Year | Value |
---|---|
2024 | Q4 |
h-index
Year | Value |
---|---|
2024 | 27 |
Impact Factor Trend
Abstracting & Indexing
Journal is indexed in leading academic databases, ensuring global visibility and accessibility of our peer-reviewed research.
Subjects & Keywords
Journal’s research areas, covering key disciplines and specialized sub-topics in Computer Science, designed to support cutting-edge academic discovery.
Most Cited Articles
The Most Cited Articles section features the journal's most impactful research, based on citation counts. These articles have been referenced frequently by other researchers, indicating their significant contribution to their respective fields.
-
Jamming and anti-jamming techniques in wireless networks: a survey
Citation: 306
Authors: Kanika, Alvin, Qing
-
Elapsed time on arrival: a simple and versatile primitive for canonical time synchronisation services
Citation: 88
Authors: Branislav, Prabal, Philip, Miklos, Akos, David
-
Performance evaluation of routing protocols in vehicular ad-hoc networks
Citation: 72
Authors: R.A., A., R.M., N.L.
-
Implementation of terminal middleware platform for mobile RFID computing
Citation: 72
Authors: Namje
-
Enabling cyber-physical systems with machine-to-machine technologies
Citation: 62
Authors: Jiafu, Hehua, Qiang, Keliang, Rongshuang, Di
-
Hybrid cluster-based geographical routing protocol to mitigate malicious nodes in mobile ad hoc network
Citation: 52
Authors: Sengan, S. Chenthur
-
DDoS detection and traceback with decision tree and grey relational analysis
Citation: 52
Authors: Yi Chi, Huei Ru, Wuu, Rong Hong
-
Urban pseudonym changing strategy for location privacy in VANETs
Citation: 46
Authors: Abdelwahab, Samira