Main Navigation
Main Content
Sidebar
Register
Login
Toggle navigation
About
Editorial List
Publisher information
Focus and Scope
Open Access Policy
Publication Ethics
Author Guidelines
Peer Review Process
Current
Archives
Copyrights Form
Announcements
Contacts
Privacy Statement
Abstracting/ Indexing
Article processing charge
Search
Home
Archives
Vol. 10 No. 2 (2018)
Published:
2018-08-11
Research Articles
Ferry–Based Directional Forwarding Mechanism for Improved Network Life-Time in Cluster-Based Wireless Sensor Network
Ali Ahmad Eyadeh, Mohammad Bani Amerah
PDF
Dynamic Network State Learning Model for Mobility Based WMSN Routing Protocol
Ajina A, Mydhili K. Nair
PDF
A New Multi-threaded and Interleaving Approach to Enhance String Matching for Intrusion Detection Systems
Ali M Shatnawi, Bushra AlHajouj, Moath Jarrah
PDF
Performance Analysis of User Speed Impact on IEEE 802.11ah Standard affected by Doppler Effect
Abdul Aziz Marwan, Doan Perdana, Danu Dwi Sanjoyo
PDF
Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System
Bisyron Wahyudi Masduki, Kalamullah Ramli, Hendri Murfi
PDF
PERFORMANCE ANALYSIS IN WIRELESS POWERED D2D- AIDED NON-ORTHOGONAL MULTIPLE ACCESS NETWORKS
Dinh-Thuan Do
PDF
PMSS: Producer Mobility Support Scheme Optimization with RWP Mobility Model in Named Data Networking
Muktar Hussaini, S. A. Nor, A. Ahmad
PDF
Assisted Navigation Algorithm for Wireless Sensor Actuator and Robot Networks
Franco Frattolillo
PDF
OpenDaylight vs. Floodlight: Comparative Analysis of a Load Balancing Algorithm for Software Defined Networking
Jonier Porras, Daniel Ducuara, Gustavo Puerto
PDF
Statistical-Based Heuristic for Scheduling of Independent Tasks in Cloud Computing
Ahmad Al-Qerem, Ala Hamarsheh
PDF
Fuzzy Logic based Intrusion Detection System against Black Hole Attack in Mobile Ad Hoc Networks
Houda Moudni, Mohamed Er-rouidi, Hicham Mouncif, Benachir El Hadadi
PDF
A New Approach in Expanding the Hash Size of MD5
Esmael Verano Maliberan, Ariel M Sison, Ruji P Medina
PDF
Bandwidth Allocation Mechanism based on Users' Web Usage Patterns for Campus Networks
Rolysent Paredes, Ariel M Sison, Ruji P Medina
PDF
Attacking AES-Masking Encryption Device with Correlation Power Analysis
Septafiansyah Dwi Putra, Adang Suwandi Ahmad, Sarwono Sutikno, Yusuf Kurniawan
PDF
Implementing Enhanced MIMO with F-OFDM to Increase System Efficiency for Future 5G Cellular Networks
tariqullah jan
PDF
Delay aware optimal resource allocation in MU MIMO-OFDM using enhanced spider monkey optimization
Voruganti Hindumathi, Katta Rama Linga Reddy
PDF
Resource Allocation using Genetic Algorithm in Multimedia Wireless Networks
Yaser Khamayseh, Rabiah Al-qudah
PDF
Using Quaternion Fourier Transform in Steganography Systems
Magdy Ibrahim ElSharkawy
PDF
Reliability and Failure Functions of the Consecutive k-out-of-m-from-n: F Linear and Circular System
Imad I.H. Nashwan
PDF
A Multilevel Scheduling MAC Protocol for Underwater Acoustic Sensor Networks(UASN)
Sri Lekha
PDF
Surveys/ Reviews
Internet Voting Protocols: An Analysis of the Cryptographic Operations per Phase
Cristina Satizabal, Rafael Paez
PDF
A CASE STUDY OF VARIOUS WIRELESS NETWORK SIMULATION TOOLS
V Venkataramanan, S Lakshmi
PDF