Vol 5, No 1 (2013)

Table of Contents

Research Articles

SMART: A Subspace based Malicious Peers Detection algorithm for P2P Systems PDF
Xianglin Wei, Jianhua Fan, Ming Chen, Tarem Ahmed, Al-Sakib Khan Pathan
Robust Sampling Clock Recovery Algorithm for Wideband Networking Waveform of SDR pdf
Muhammad Zeeshan, Shoab Ahmed Khan
Combined-order Algorithm using Promethee Method Approach and Analytic Hierarchy Decision for Chunk Allocation in LTE Uplink Systems PDF
Arfianto Fahmi, Muhamad Asvial, Dadang Gunawan
Experimental Performance Evaluation and Frame Aggregation Enhancement in IEEE 802.11n WLANs PDF
Nasreddine Hajlaoui, Issam Jabri, Maher Ben Jemaa
Evaluation MCDM Multi-disjoint Paths Selection Algorithms Using Fuzzy-Copeland Ranking Method PDF
Hamid Naderi, Hadi Shahosseini, Amir Jafari

Surveys/ Reviews

A Survey on the Communication Protocols and Security in Cognitive Radio Networks PDF
Natarajan Meghanathan


International Journal of Communication Networks and Information Security (IJCNIS)          ISSN: 2076-0930 (Print)           ISSN: 2073-607X (Online)