Vol 7, No 3 (2015)

Table of Contents

Research Articles

Spectral Efficiency Evaluation for Selection Combining Diversity Schemes under Worst Case of Fading Scenario PDF
Mohammad Irfanul Hasan, Sanjay Kumar
Applying Correlation and Regression Analysis Methods for Security Incidents Detection in the Internet of Things PDF
Daria Lavrova, Alexander Pechenkin
Improved IDMA for Multiple Access of 5G PDF
BRAHIM AKBIL, DRISS ABOUTAJDINE
A Driving Path Based Opportunistic Routing in Vehicular Ad Hoc Network PDF
Nassim Mirjazaee, Neda Moghim
Coefficient of Restitution based Cross Layer Interference Aware Routing Protocol in Wireless Mesh Networks PDF
Sarasvathi V, Snehanshu Saha, N.Ch.S.N. Iyengar, Mahalaxmi Koti
Routing for capacity improvement in Multi-Channel-Width Multi-Radio Wireless Mesh Networks PDF
Celso Barbosa Carvalho, José Ferreira De Rezende

Surveys/ Reviews

Technology Implications of UWB on Wireless Sensor Network-A detailed Survey PDF
Kamran Ayub, Valerijs Zagurskis
Pitfalls in Ultralightweight RFID Authentication Protocol PDF
Umar Mujahid Khokhar, Muhammad Najam-ul-islam

Invited Paper(s)

Modeling of the PSK utilization at the signal transmission in the optical transmission medium PDF
Rastislav Roka, Martin Mokráň


International Journal of Communication Networks and Information Security (IJCNIS)          ISSN: 2076-0930 (Print)           ISSN: 2073-607X (Online)