|
Issue |
Title |
|
Vol 2, No 2 (2010) |
A Proactively Maintained Quality of Service Infrastructure for Wireless Mobile Ad Hoc Networks |
Abstract
PDF
|
Moussa Ayyash, Donald Ucci and Khaled Alzoubi |
|
Vol 11, No 1 (2019) |
A Rate Control Model of MPEG-4 Encoder for Video Transmission over Wireless Sensor Network |
Abstract
PDF
|
Farizah Yunus |
|
Vol 2, No 1 (2010) |
A Review and Cryptanalysis of Similar Timestamp-Based Password Authentication Schemes Using Smart Cards |
Abstract
PDF
|
Al-Sakib Khan Pathan |
|
Vol 9, No 2 (2017) |
A Review on Features’ Robustness in High Diversity Mobile Traffic Classifications |
Abstract
PDF
|
Aun Yichiet, Selvakumar Manickam, Shankar Karuppayah |
|
Vol 4, No 3 (2012) |
A Robust Carrier Frequency Offset Estimation Algorithm in Burst Mode Multicarrier CDMA based Ad Hoc Networks |
Abstract
PDF
|
Muhammad Zeeshan, Shoab Ahmed Khan |
|
Vol 11, No 2 (2019) |
A Routing Algorithm for Extending Mobile Sensor Network’s Lifetime using Connectivity and Target Coverage |
Abstract
PDF
|
Kalpana Murugan, Al-Sakib Khan Pathan |
|
Vol 10, No 3 (2018) |
A Routing Delay Predication Based on Packet Loss and Explicit Delay Acknowledgement for Congestion Control in MANET |
Abstract
PDF
|
Y Narasimha Reddy, P. V. S. Srinivas |
|
Vol 4, No 1 (2012) |
A Secure and User Privacy-Preserving Searching Protocol for Peer-to-Peer Networks |
Abstract
PDF
|
Jaydip Sen |
|
Vol 5, No 2 (2013) |
A Secure Method for Authenticity Verification of Handwritten Signatures Through Digital Image Processing and Artificial Neural Networks |
Abstract
PDF
|
Deivison Pinheiro Franco, Felipe Dantas Barboza, Nágila Magalhães Cardoso |
|
Vol 1, No 2 (2009) |
A Secured Service Level Negotiation In Ubiquitous Environments |
Abstract
PDF
|
Mohamed Aymen Chalouf and Francine Krief |
|
Vol 2, No 3 (2010) |
A Sierpenski Slot Antenna as a TAG RFID Antenna |
Abstract
PDF
|
Ferchichi Abdelhak, Fadlallah Najib, Gharssallah Ali |
|
Vol 13, No 1 (2021) |
A STABLE CLUSTERING SCHEME WITH NODE PREDICTION IN MANET |
Abstract
PDF
|
Drishya SR, Renukadevi S, Vaidehi V |
|
Vol 12, No 1 (2020) |
A Study on Intrusion Detection System in Wireless Sensor Networks |
Abstract
PDF
|
sravanthi godala, Rama Prasad V Vaddella |
|
Vol 11, No 3 (2019) |
A Survey of ARX-based Symmetric-key Primitives |
Abstract
PDF
|
Nur Fasihah Mohd Esa, Shekh Faisal Abdul Latip, Mohd Rizuan Baharon |
|
Vol 5, No 2 (2013) |
A Survey on Dynamic Spectrum Access Techniques in Cognitive Radio Networks |
Abstract
PDF
|
Badr Benmammar, Asma Amraoui, Francine Krief |
|
Vol 5, No 1 (2013) |
A Survey on the Communication Protocols and Security in Cognitive Radio Networks |
Abstract
PDF
|
Natarajan Meghanathan |
|
Vol 1, No 2 (2009) |
A Survey on Wireless Sensor Network Security |
Abstract
PDF
|
Jaydip Sen |
|
Vol 1, No 3 (2009) |
A Traffic Signature-based Algorithm for Detecting Scanning Internet Worms |
Abstract
PDF
|
Mohammad M. Rasheed, Osman Ghazali, Norita Md Norwawi and Mohammed M. Kadhum |
|
Vol 1, No 3 (2009) |
A Wavelet Based Approach for Speaker Identification from Degraded Speech |
Abstract
PDF
|
A. Shafik, S. M. Elhalafawy, S. M. Diab, B. M. Sallam and F. E. Abd El-samie |
|
Vol 10, No 1 (2018) |
AARF-HT: Adaptive Auto Rate Fallback for High-Throughput IEEE 802.11n WLANs |
Abstract
PDF
|
Hery Munanzar, Teuku Yuliar Arif, Syiahrial Syahrial |
|
Vol 12, No 1 (2020) |
Acknowledge-Based Non-Congestion Estimation: An Indirect Queue Management Approach for Concurrent TCP and UDP-Like Flows |
Abstract
PDF
|
Luciano Mauro Arley Sup, Renato Mariz de Moraes, Adolfo Bauchspiess |
|
Vol 12, No 1 (2020) |
Adaptive Active Queue Management based on Queue Ratio of Set-point Weighting |
Abstract
PDF
|
Misbahul Fajri, Kalamullah Ramli |
|
Vol 1, No 2 (2009) |
Adaptive Modulation for OFDM Systems |
Abstract
PDF
|
J.Faezah and K.Sabira |
|
Vol 8, No 1 (2016) |
Adoption features and approach for UWB Wireless Sensor Network based on Pilot Signal assisted MAC |
Abstract
PDF
|
Kamran Ayub, Valerijs Zagurskis |
|
Vol 9, No 1 (2017) |
ADVANCED RANDOM TIME QUEUE BLOCKING WITH TRAFFIC PREDICTION FOR DEFENSE OF LOW-RATE DOS ATTACKS AGAINST APPLICATION SERVERS |
Abstract
PDF
|
Kavitha R, Padmavathi G |
|
51 - 75 of 427 Items |
<< < 1 2 3 4 5 6 7 8 9 10 > >> |