DOI:10.20894/IJBI.
Periodicity: Bi Annual.
Impact Factor:
SJIF:5.065
Submission:Any Time
Publisher: IIR Groups
Language: English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJBI provides online manuscript tracking system.

Every issue of Journal of IJBI is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJCOA special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJBI website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 7 Issue 1 Date of Publication:   June 2018

Mitigation and control of Defeating Jammers using P-1 Factorization

G Krithika,K Kamala

Page(s):   20-26 ISSN:   2278-2397
DOI:   10.20894/IJBI.105.007.001.006 Publisher:   Integrated Intelligent Research (IIR)


  1. Timothy J. Ross,   "Adaptive frequency hopping algorithms for multicast rendezvous in DSA networks",   in Proc. IEEE DYSPAN Symp   ,2004
    View Artical

  2. Abdel Rahman. M, Rahbari. H and Krunz. M,   "A First Course in Electronic Warfare",   Norwood, MA, USA: Artech House   ,2012
    View Artical

  3. Adamy. D,   "Hamilton circuits with many colours in properly edge-coloured complete graphs   ,Vol.64   ,Issue 1   ,2001
    View Artical

  4. Andersen. L. D,   "Every planar map is four colourable: Part I
    View Artical

  5. Appel. K and Haken. W,   "Keyless jam resistance",   in Proc. IEEE Workshop Inf.Assurance United States   ,1977
    View Artical

  6. L. C, Bahn. W. L, Collins. M. D, Carlisle. M. C and Butler. S. C,   "SSCH: slotted seeded channel hopping for capacity improvement in IEEE 802.11 ad-hoc wireless network   ,2007
    View Artical

  7. Bahl. P, Chandra. R and Dunagan. J,   "A quorum-based framework for establishing control channels in dynamic spectrum access networks   ,2004
    View Artical

  8. Bian. K, Park. J and Chen. R,   "Broadcast control channel jamming: Resilience and identification of traitors   ,2009
    View Artical

  9. Chan. A, Liu. X, Noubir. G and Thapa. B,   "Throughput and fairness guarantees through maximal scheduling in wireless networks   ,Vol.54   ,Issue 2   ,2007
    View Artical

  10. Chaporkar. P, Kar. K, Luo. X and Sarkar. S,   "Dynamic jamming mitigation for wireless broadcast networks   ,2008
    View Artical

  11. Chiang. J. T and Hu. Y. C,   "A hill-climbing algorithm for the construction of one-factorizations and room squares   ,Vol.8   ,Issue 3   ,2008
    View Artical

  12. Dinitz. J. H and Stinson. D. R,   "Low-complexity distributed scheduling algorithms for wireless networks   ,Vol.17   ,Issue 6   ,1987
    View Artical

  13. Gupta. A, Lin. X and Srikant. R,   "Secure time synchronization in sensor networks   ,Vol.11   ,Issue 4   ,2009
    View Artical

  14. Ganeriwal. S, Popper. C, Capkun. S and Srivastava. M. B,   "Zigzag decoding: Combating hidden terminals in wireless networks   ,2008
    View Artical

  15. Gollakota. S and Katabi. D,   "Thwarting inside jamming attacks on wireless broadcast communications   ,2008
    View Artical

  16. Liu. S, Lazos. L and Krunz. M,   "Channel hopping-based communication rendezvous in cognitive radio networks   ,Vol.22   ,Issue 3   ,2011
    View Artical