|
A Framework for Securing Personal Data Shared by Users on the Digital Platforms Full Text |
|
Simulated Annealing-Salp Swarm Algorithm based Variational Autoencoder for Peakto-Average Power Ratio Reduction Full Text |
|
Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental Noise Full Text |
|
An Optimized Energy-Efficient Hello Routing Protocol for Underwater Wireless Sensor Network Full Text |
|
Energy Efficient Virtual MIMO Communication Designed for Cluster based on Cooperative WSN using Oleach Protocol Full Text |
|
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc Networks Full Text |
|
Classification of Network Traffic using Machine Learning Models on the NetML Dataset Full Text |
|
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and Sustainable Operations in Desalination Plants Full Text |
Performance of Aloha-Q with Adaptive Transmission Probability Full Text
Katsumi Sakakibara, Okayama Prefectural University, Japan
Enhancing Congestion Control using a Load-Balanced Routing Algorithm for Distributed Networks Full Text
Jogendra Kumar, G.B.Pant Institute of Engineering and Technology, India
A Novel Stable Path Selection Algorithm for Enhancing Qos and Network Lifetime in RPL-Contiki-based IoT Networks Full Text
Mohamed Achref BOUKHOBZA 1, Mehdi ROUISSAT 1,2, Mohammed BELKHEIR 3, Allel MOKADDEM 3 and Pascal LORENZ 4 1 NourBachir University Center, Algeria, 2 STICLaboratory,UniversityAboubekrBelkaid, Algeria , 3 Nour Bachir University, Center El-Bayadh, Algeria, 4 Haute Alsace University, France
Enhanced Papr Reduction in OFDM Systems using Adaptive Clipping with Dynamic Thresholds Full Text
Fatma Ben Salah 1, Abdelhakim Khlifi 2, Marwa Rjili 1, Amina Darghouthi 1 and Belgacem Chibani 1, 1 University of Gabes, Tunisia, 2 Sup’COM, University of Carthage, Tunisia
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Attack Detection in Industrial IoT Full Text
Bebin Josey T and D.S.Misbha, Nesamony Memorial Christian College Marthandam, India
Load Balanced Attack Defense System with Lightweight Authentication and Modified Blockchain in SDN for B5G Full Text
Ihsan H. Abdulqadder 1 and Israa T. Aziz 2, 1 University of Kirkuk, Iraq, 2 University of Mosul, Iraq
FSHAHA: Feature Selection using Hybrid Ant Harris Algorithm for IoT Network Security Enhancement Full Text
Priyanka and Anoop Kumar, Banasthali Vidyapith, India
A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network Lifespan Full Text
Almamoon Alauthman 1 and Wan NorShuhadah Wan Nik 2, 1 Al-Balqa Applied University, Jordan, 2 University Sultan Zainal Abidin, Malaysia
A Comparative Study of Cooperative and Non-Cooperative Wideband Spectrum Sensing in Cognitive Radio Networks for 5g Applications Full Text
Blessing C. Dike, Cajetan M. Akujuobi and Shumon Alam, A&M University Prairie, USA
Outstanding Framework for Simulating and Generating Anchor Trajectory in Wireless Sensor Networks Full Text
Abdelhady Naguib1, 2, 1Jouf University, Saudi Arabia, 2Al-Azhar University, Egypt
Prioritized Scheduling Routing Protocol for Minimizing Packet Drop in Wireless Body Area Network Full Text
Md. Taslim Arefin1, 2 and Md Abul Kalam Azad1, 1Jahangirnagar University, Bangladesh, 2Daffodil International University, Bangladesh
Fuzzy-Based Clustering of Wireless Sensor Networks for Multiple Mobile Agent Itinerary Planning Full Text
Nidhi Kashyap1, Shuchita Upadhyaya1, Monika Poriye1 and Sachin Lalar2, 1Kurukshetra University, India, Gurugram University Gurugram, India
Intrusion Detection Model using Machine Learning Algorithms on NSL-KDD Dataset Full Text
Reem Alshamy and Muhammet Ali Akcayol, Gazi University, Turkey
Routing Performances in Wireless Sensor Networks: Determining Shortest Path Algorithms Effectiveness Full Text
Khine Thazin Min1 and N. Jeyanthi2, 1Myanmar Institute of Information Technology, Myanmar, 2Vellore Institute of Technology, India
An Innovative Hybrid Model for Effective DDOS Attack Detection in Software Defined Networks Full Text
Quang Truong Can, Tien Dat Nguyen, Minh Bao Pham, Thanh Tung Nguyen, Thi Hanh AnTran and Thi Thai Mai Dinh, VNU University of Engineering and Technology, Viet Nam
Modeling Low-Cost Inertial Navigation Systems and their Errors Full Text
Mohammed AFTATAH, Khalid ZEBBARA and Soufiane EL ASRI, Ibn Zohr University, Morocco
July 2024, Volume 16, Number 4
| Enhancing IoT Security: A Novel Approach with Federated Learning and Differential Privacy Integration Full TextAziz Ullah Karimy and P. Chandrasekhar Reddy, Jawaharlal Nehru Technological University, IndiaEnhancing Cybersecurity Defenses: A Multicriteria Decision-Making Approach to Mitre ATT&CK Mitigation Strategy Full Text Ihab Mohamed, Hesham A. Hefny and Nagy R. Darwish, Cairo University, Egypt |
|
Enhancing IoT Routing Security and Efficiency: Towards AI-Enabled RPL Protocol Full Text Abubakar Wakili and Sara Bakkali, Euromed University of Fez (UEMF), Morocco Extending Network Intrusion Detection with Enhanced Particle Swarm Optimization Techniques Full Text |
| An Anti-Jamming Technique by Jammer Localization for Multi-Channel Wireless Sensor Networks Full Text Maoyejatun Hasana1 and Hossen Asiful Mustafa2, 1Asian University of Bangladesh, Bangladesh,2Bangladesh University of Engineering and Technology (BUET), Bangladesh |
|
Real Time Parameter Estimation for Adaptive OFDM/OTFS Selection Full Text |
|
Modified Route Request Broadcasting for Improving Multipath Routing Scheme Performance in MANET Full Text |
| IRLR: an Improved Reinforcement Learning-Based Routing Algorithm for Wireless Mesh Networks Full Text Le Huu Binh1, Tu T. Vo1 and Le Duc Huy2, 1Hue University, Vietnam, 2Ha Noi University of Business and Technology, Vietnam |
May 2024, Volume 16, Number 3
An Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation Full Text
Amina Darghouthi1, Abdelhakim Khlifi2, Hmaied Shaiek3, Fatma Ben Salah1 and Belgacem Chibani1, 1University of Gabes, Tunisia, 2Sup’COM, University of Carthage, Tunisia, 3CEDRIC/LAETITIA Laboratory, France
March 2024, Volume 16, Number 2
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection Full Text
P Sumalatha and G.S. Mahalakshmi, Anna University, India
January 2024, Volume 16, Number 1
Feature Selection using the Concept of Peafowl Mating in IDS Full Text
Partha Ghosh, Joy Sharma and Nilesh Pandey, Netaji Subhash Engineering College, India
November 2023, Volume 15, Number 6September 2023, Volume 15, Number 5July 2023, Volume 15, Number 4May 2023, Volume 15, Number 3March 2023, Volume 15, Number 2January 2023, Volume 15, Number 1September 2022, Volume 14, Number 5Mobility and Routing based Channel Estimation for Hybrid Millimeter-Wave MIMO WSNsFull TextGeeta and A.M. Bhavikatti, Bheemanna Khandre Institute of Technology, IndiaPerformance Improvement for the Single Carrier in FBMC Systems by PAPR Reduction Full Text
Mohammed A. Salem1, Mohamed A. Aboul-Dahab2, Sherine M. Abd El-kader3 and Radwa A. Roshdy1, 1Higher Technological Institute, Tenth of Ramadan city, Egypt, 2Arab Academy for Science & Technology and Maritime Transport, Egypt, 3Electronics Research Institute, EgyptHybrid Red Deer Algorithm with Physical Unclonable Function for Security Enhancement in IoT-WSN Full TextShilpa Venkata Rao and Vidya Anantha, Vivekananda Institute of Technology, IndiaControlling Adaptive Contention Window to Improve Safe Message Received Rate in VANET Full Text
Nguyen Hoang Chien1 and Pham Thanh Giang2, 1University of Economics – Technology for Industries, Vietnam, 2Vietnam Academy of Science and Technology, Vietnam
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation with Hybrid Beam Forming Power Transfer in WSN-IoT Applications Full Text
Reginald Jude Sixtus J and Tamilarasi Muthu, Puducherry Technological University, India
Multi-Layer Digital Validation of Candidate Service Appointment with Digital Signature and Bio-Metric Authentication Approach Full Text
Saikat Bose1, Tripti Arjariya1, Anirban Goswami2, Soumit Chowdhury3, 1Bhabha University, India, 2Techno Main Salt Lake, Sec – V, India, 3Government College of Engineering & Ceramic Technology, India
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures Full Text
Maurizio D’Arienzo1, Manfredi Napolitano1 and Simon Pietro Romano2, 1Dipartimento di Scienze Politiche Universita della Campania ”L.Vanvitelli”, Italy, 2DIETI Universita di Napoli ”Federico II”, Italy
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machine for Trust Model and Link Reliability Full Text Shalini Sharma and Syed Zeeshan Hussain, Jamia Millia Islamia University New Delhi, IndiaJuly 2022, Volume 14, Number 4May 2022, Volume 14, Number 3Mach 2022, Volume 14, Number 2January 2022, Volume 14, Number 1On The Performance of Intrusion Detection Systems with Hidden Multilayer Neural Network using DSD Training Full Text
Trong Thua Huynh, Hoang Thanh Nguyen, Posts and Telecommunications Institute of Technology, VietnamDecember 2021, Volume 13, Number 6November 2021, Volume 13, Number 6September 2021, Volume 13, Number 5July 2021, Volume 13, Number 4May 2021, Volume 13, Number 3March 2021, Volume 13, Number 2January 2021, Volume 13, Number 1November 2020, Volume 12, Number 6September 2020, Volume 12, Number 5July 2020, Volume 12, Number4May 2020, Volume 12, Number3March 2020, Volume 12, Number2January 2020, Volume 12, Number1November 2019, Volume 11, Number 6 September 2019, Volume 11, Number 5 July 2019, Volume 11, Number 4 May 2019, Volume 11. Number 3 March 2019, Volume 11. Number 2January 2019, Volume 11. Number 1November 2018, Volume 10. Number 6July 2018, Volume 10. Number 4May 2018, Volume 10. Number 3March 2018, Volume 10. Number 2January 2018, Volume 10. Number 1November 2017, Volume 9. Number 6September 2017, Volume 9. Number 5July 2017, Volume 9. Number 4May 2017, Volume 9. Number 3March 2017, Volume 9. Number 2January 2017, Volume 9. Number 1November 2016, Volume 8. Number 6September 2016, Volume 8. Number 5July 2016, Volume 8. Number 4May 2016, Volume 8. Number 3March 2016, Volume 8. Number 2January 2016, Volume 8. Number 1November 2015, Volume 7. Number 6September 2015, Volume 7. Number 5July 2015, Volume 7. Number 4May 2015, Volume 7. Number 3March 2015, Volume 7. Number 2January 2015, Volume 7. Number 1
November 2022, Volume 14, Number 6Machine Learning based Frame Size Optimization in WLAN Downlink MU-MIMO Channel with the Least Cost of DelayFull TextLemlem Kassa1, Jianhua Deng1, Mark Davis2 and Jingye Cai1, 1University of Electronic Science and Technology China (UESTC) China, 2Communication Network Research Institute (CNRI), Technological University Dublin, IrelandImprovements for Uplink Long Term Evolution (UL-LTE) in Heterogeneous Network using Dynamic Spectrum Allocation Technique Full Text
Nurzati Iwani Othman1, Ahmad Fadzil Ismail1, Khairayu Badron1, Wahidah Hashim2 and Sofia Pinardi3, 1International Islamic University Malaysia, Malaysia, 2Universiti Tenaga Nasional, Kajang, Malaysia, 3Universitas Muhammadiyah Prof. Dr. Hamka IndonesiaWS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying Search Algorithm Full TextWaleed Khalid Ahmed1, MohdNazri bin Mohd Warip1, Waleed Khalid Abduljabbar2 and Mohamed Elshaikh11University Malaysia Perlis (UniMAP), Malaysia, 2College of Administration and Economics University of Fallujah, IraqRTL-DL: A Hybrid Deep Learning Framework for DDoS Attack Detection in a Big Data Environment Full TextHassan A Afolabi and Abdurazzag A Aburas, University of Kwazulu-Natal South AfricaEfficient Scrambling-Substitution Image Security Scheme using Chaotic Arnold-Logistic Maps in the Discrete Cosine TransformFull TextMohammed A. AlZain, Taif University, Saudi ArabiaWeb Attack Prediction using Stepwise Conditional Parameter Tuning in Machine Learning Algorithms with Usage Data Full TextMeena1 and Dr. A. Pethalakshmi2, 1Mother Teresa Women’s University, India, 2Alagappa Government Arts College, IndiaTwin-Node Neighbour Attack on AODV based Wireless Ad Hoc Network Full Text
Alok Singh, Saurabh Sharma and Rajneesh Kumar Srivastava, University of Allahabad, IndiaBlockchain-based Security Mechanisms for Internet of Medical Things (IOMT)Full Text JAMAL Elhachmi and ABDELLATIF Kobbane, Mohammed V University in Rabat, MoroccoSeptember 2022, Volume 14, Number 5Mobility and Routing based Channel Estimation for Hybrid Millimeter-Wave MIMO WSNsFull TextGeeta and A.M. Bhavikatti, Bheemanna Khandre Institute of Technology, IndiaPerformance Improvement for the Single Carrier in FBMC Systems by PAPR Reduction Full Text
Mohammed A. Salem1, Mohamed A. Aboul-Dahab2, Sherine M. Abd El-kader3 and Radwa A. Roshdy1, 1Higher Technological Institute, Tenth of Ramadan city, Egypt, 2Arab Academy for Science & Technology and Maritime Transport, Egypt, 3Electronics Research Institute, EgyptHybrid Red Deer Algorithm with Physical Unclonable Function for Security Enhancement in IoT-WSN Full TextShilpa Venkata Rao and Vidya Anantha, Vivekananda Institute of Technology, IndiaControlling Adaptive Contention Window to Improve Safe Message Received Rate in VANET Full Text
Nguyen Hoang Chien1 and Pham Thanh Giang2, 1University of Economics – Technology for Industries, Vietnam, 2Vietnam Academy of Science and Technology, Vietnam
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation with Hybrid Beam Forming Power Transfer in WSN-IoT Applications Full Text
Reginald Jude Sixtus J and Tamilarasi Muthu, Puducherry Technological University, India
Multi-Layer Digital Validation of Candidate Service Appointment with Digital Signature and Bio-Metric Authentication Approach Full Text
Saikat Bose1, Tripti Arjariya1, Anirban Goswami2, Soumit Chowdhury3, 1Bhabha University, India, 2Techno Main Salt Lake, Sec – V, India, 3Government College of Engineering & Ceramic Technology, India
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures Full Text
Maurizio D’Arienzo1, Manfredi Napolitano1 and Simon Pietro Romano2, 1Dipartimento di Scienze Politiche Universita della Campania ”L.Vanvitelli”, Italy, 2DIETI Universita di Napoli ”Federico II”, Italy
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machine for Trust Model and Link Reliability Full Text Shalini Sharma and Syed Zeeshan Hussain, Jamia Millia Islamia University New Delhi, IndiaJuly 2022, Volume 14, Number 4May 2022, Volume 14, Number 3A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique over WLAN SDN ArchitectureFull Text
Pacharakit Vanitchasatit and Teerapat Sanguankotchakorn, Asian Institute of Technology, ThailandA Class-based Adaptive QoS Control Scheme Adopting Optimization Technique over WLAN SDN ArchitectureFull Text
Pacharakit Vanitchasatit and Teerapat Sanguankotchakorn, Asian Institute of Technology, ThailandProbabilistic based Optimal Node Localization in Wireless Sensor NetworksFull Text
Souparnika Jadhav and Nagesh K. N, Nagarjuna College of Engineering & Technology, IndiaAdvanced Service Data Provisioning for Real-Time Management of Ongoing Cellular Communication NetworksFull Text
Mikhail E. Belkin1, Leonid Zhukov1, Alexander S. Sigov1 and Mikhail G. Vasil’ev2, 1Russian Technological University MIREA, Russia, 2Kurnakov Institute of General and Inorganic Chemistry of the RAS, RussiaA New Approach to Improve the Performance of OFDM Signal for 6G CommunicationFull Text
Usha S.M1 and Mahesh H.B2, 1Visveswaraya Technological University, India, 2PES University, India
Mach 2022, Volume 14, Number 2January 2022, Volume 14, Number 1December 2021, Volume 13, Number 6November 2021, Volume 13, Number 6September 2021, Volume 13, Number 5July 2021, Volume 13, Number 4May 2021, Volume 13, Number 3March 2021, Volume 13, Number 2January 2021, Volume 13, Number 1November 2020, Volume 12, Number 6September 2020, Volume 12, Number 5July 2020, Volume 12, Number4May 2020, Volume 12, Number3March 2020, Volume 12, Number2January 2020, Volume 12, Number1November 2019, Volume 11, Number 6 September 2019, Volume 11, Number 5 July 2019, Volume 11, Number 4 May 2019, Volume 11. Number 3 March 2019, Volume 11. Number 2January 2019, Volume 11. Number 1November 2018, Volume 10. Number 6July 2018, Volume 10. Number 4May 2018, Volume 10. Number 3March 2018, Volume 10. Number 2January 2018, Volume 10. Number 1November 2017, Volume 9. Number 6September 2017, Volume 9. Number 5July 2017, Volume 9. Number 4May 2017, Volume 9. Number 3March 2017, Volume 9. Number 2January 2017, Volume 9. Number 1November 2016, Volume 8. Number 6September 2016, Volume 8. Number 5July 2016, Volume 8. Number 4May 2016, Volume 8. Number 3March 2016, Volume 8. Number 2January 2016, Volume 8. Number 1November 2015, Volume 7. Number 6September 2015, Volume 7. Number 5July 2015, Volume 7. Number 4May 2015, Volume 7. Number 3March 2015, Volume 7. Number 2January 2015, Volume 7. Number 1
| Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol Full TextWaleed Khalid Ahmed, Mohd Nazri bin Mohd Warip, Mohamed Elshaikh Elobaid Said Ahmed and Phaklen Ehkan, Universiti Malaysia Perlis, Malaysia | |
|
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post-Disaster Scenario Full Text |
|
|
Enhanced Traffic Congestion Management with Fog Computing – A Simulation-Based Investigation using IFOG-Simulator Full Text Alzahraa Elsayed, Khalil Mohamed and Hany Harb, Al Azhar University, Egypt |
|
| Optimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis Full Text Asmaa BENCHAMA and Khalid ZEBBARA, Ibn zohr University, Morocco |
|
|
Analysis and Evolution of SHA-1 Algorithm – Analytical Technique Full Text |
|
|
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection for WSN-Assisted IoT Full Text |
|
| Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Service Full Text Dongju Lee1 and Hyunsung Kim1,2, 1Kyungil University, Korea, 2University of Malawi, Malawi | |
| Enhancing Traffic Routing Inside a Network through IoT Technology & Network Clustering by Selecting Smart Leader Nodes Full TextRadwan S.Abujassar, Arab Open University Kuwait, Kuwait | |
|
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered Feature Selection with ML Model for IoT Threats & Attack Detection Full Text |
|
|
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic Full Text Abderezak Touzene, Ahmed Al Farsi and Nasser Al Zeidi, Sultan Qaboos University, Oman |
|
| Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems Full Text Ali Muayed Fadhil1,2, Norashidah Md Din1, Norazizah Binti Mohd Aripin1 and Ali Ahmed Abed2, 1University Tenaga Nasional, Malaysia, 2University of Basrah, Iraq |
|
|
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy Commitment Full Text |
|
|
A Topology Control Algorithm Taking into Account Energy and Quality of Transmission for Software-Defined Wireless Sensor Network Full Text |
|
| A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless Body Area Networks Full Text Nabila Azdad and Mohamed Elboukhari, Mohammed First University, Morocco | |
| Secure Supervised Learning-Based Smart Home Authentication Framework Full TextK. Swapna Sudha1, N. Jeyanthi1, and Celestine Iwendi2, 1Vellore Institute of Technology, India 2University of Bolton, UK | |
|
Effective Multi-Stage Training Model for Edge Computing Devices in Intrusion Detection Full Text |
|
|
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks Full Text Kanneboina Ashok and Gopikrishnan S, VIT-AP University, India |
|
| Sensing Time Improvement using Two Stage Detectors for Cognitive Radio System Full Text Mohamed Khalaf1, Ahmed Fawzi1 and Ahmed Yahya2, 1Modern Academy for Engineering and Technology, Maadi, Egypt,2Al-Azhar University, Cairo, Egypt |
|
|
Comparative Study of Orchestration using gRPC API and REST API in Server Creation Time: An Openstack Case Full Text |
|
|
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocation in Fog-Cloud Environments Full Text |
|
| Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimized Link State Routing-Based for VANET Full Text Waleed Khalid Ahmed, Mohd Nazri bin Mohd Warip, Mohamed Elshaikh Elobaid Said Ahmed and Phaklen Ehkan, Universiti Malaysia Perlis, Malaysia | |
|
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient Reinforcement Learning Framework Full Text Shruthi N1 and Siddesh G K2, 1Visvesvaraya Technological University, India, 2ALVA’s Institute of Engineering & Technology, India |
|
| BLE Beacon with Data Accumulation Functionality Full TextKOBAYASHI Kakeru and FUJITA Satoshi, Hiroshima University, Japan | |
| Optimize the Network Coding Paths to Enhance the Coding Protection in Wireless Multimedia Sensor Network Full TextMohammadjavad Abbasi, A. S. Abdullah and N. Fisal, Universiti Teknologi Malaysia (UTM), Malaysia | |
| Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection based on Delaying the First Node Death in MWSN-IoT Full TextAwatef Chniguir and Zouhair Ben Jemaa, University of Tunis El Manar, Tunisia | |
| Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent Transportation System Full TextSaureng Kumar and S C Sharma, IIT Roorkee, India | |
| Multi Objective Salp Swarm based Energy Efficient Routing Protocol for Heterogeneous Wireless Networks Full TextSalima Nebti1 and Mohammed Redjimi2, 1Emir Abdelkader University, Algeria, 220 Août 1955 University, Algeria | |
| Analysis of System Capacity and Spectral Efficiency of Fixed-Grid Network Full TextAdarsha M1, S. Malathi1 and Santosh Kumar2, 1M. S. Ramaiah University of Applied Sciences, India, 2Liaocheng University, China | |
| A Privacy-Aware Tracking and Tracing System Full TextAli M. Allam, Helwan University, Egypt | |
| A Survey on CDN Vulnerability to DoS Attacks Full TextMaurizio D’Arienzo and Serena Gracco, Universit`a della Campania ”L.Vanvitelli”, Italy | |
| Enhancing HTTP Web Protocol Performance with Updated Transport Layer Techniques Full TextZiaul Hossain1 and Gorry Fairhurst2, 1University of Fraser Valley, Canada, 2University of Aberdeen, UK | |
| Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks Full TextVarun P. Sarvade1 and Shrirang Ambaji Kulkarni2, 1B. G. M. Institute of Technology, Mudhol, India, 2The National Institute of Engineering, India | |
| IoT Resource Allocation and Optimization Using Improved Reptile Search Algorithm Full TextPrabhakar Narasappa Kota1, Pravin Balaso Chopade1, Bhagvat D. Jadhav2, Pravin Marotrao Ghate2 and Shankar Dattatray Chavan3, 1MES’s College of Engineering, India, 2JSPM’s Rajarshi Shahu College of Engineering, India, 3Dr. D. Y. Patil Institute of Technology, India | |
| Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment Full TextMohamed Ali Shaaban1, Almohammady S. Alsharkawy2, Mohammad T. Abou-Kreisha2 and Mohammed Abdel Razek2, 1B. G. M. Institute of Technology, Mudhol, India, 2The National Institute of Engineering, India |
|
| Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utilization in Wireless Sensor Network Full TextShanmugavalli R and Subashini P, Avinashilingam Institute for Home Science and Higher Education for Women, India | |
| Intrusion Detection System(IDS) Development Using Tree-Based Machine Learning Algorithms Full TextWitcha Chimphlee and Siriporn Chimphlee, Suan Dusit University, Thailand | |
| Machine Learning Based Ensemble Classifier for Android Malware Detection Full TextP Sumalatha1 and G.S. Mahalakshmi2, 1Bhoj Reddy Engineering College for Women, India, 2Anna University, India | |
| Ransomware Attack Detection based on Pertinent System Calls Using Machine Learning Techniques Full TextAhmed Dib, Sabri Ghazi and Mendjel Mohamed Said Mehdi, Mokhtar Annaba University, Algeria | |
| EImproved Q-Reinforcement Learning based Optimal Channel Selection in Cognitive Radio Networks Full TextSopan Talekar1 Satish Banait2 Mithun Patil31MVPS’s KBT College of Engineering, India, 2K.K. Wagh Institute of Engineering Education & Research, India,3N.K. Orchid College of Engineering & Technology, India | |
| Evaluating Latency in Fifth-Generation Vehicle-to-Everything Communications using Adaptive Neuro-Fuzzy InferenceSystem Model Full TextHamdy A.M. Sayedahmed1,3 Emadeldin M. Elgamal1,2 Hesham A. Hefny1, 1Cairo University, Egypt, 2Tarleton State University, USA, 3Central Metallurgical Research and Development Institute, Egypt | |
| IoT-Based Mobile Adaptive Routing Algorithm in a Ubiquitous Network Full TextPrasanna Kumar G and Shankaraiah N, Jayachamarajendra College of Engineering, India | |
| Enabling Ray Tracing for 5G Full TextVladislav Ryzhov, Moscow Institute of Physics and Technology, Russia | |
| Congestion and Energy Aware Multipath Load Balancing Routing for LLNs Full TextKala Venugopal and T G Basavaraju, Government Engineering College, India | |
| Congestion and Energy Aware Multipath Load Balancing Routing for LLNs Full TextKala Venugopal and T G Basavaraju, Government Engineering College, India | |
| PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Polymorphic Treatment of Features Full TextS. Chanti, T. Chithralekha, and K. S. Kuppusamy, Pondicherry University, India | |
| DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Practical Environment Full TextDinh Thi Thai Mai, Nguyen Tien Dat, Pham Minh Bao, Can Quang Truong, Nguyen Thanh Tung, VNU University of Engineering and Technology, Hanoi, Vietnam | |
| Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications Full TextHariharasudhan V and P.Vetrivelan, VIT, India | |
| Performance Evaluation of ERGR-EMHC Routing Protocol using LSWTS and 3DUL Localization Schemes in UWSNs Full TextFaiza Al-Salti1 N. Alzeidi2,Khaled Day2 Abderezak Touzene21Sultan Qaboos Comprehensive Cancer Care and Research Centre, Oman 2Sultan Qaboos University, Oman | |
| Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks Full TextChandra Kanta Samal, Delhi University, India | |
| VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network Full TextSavita Jadhav1 and Sangeeta Jadhav2, 1Dr. D. Y. Patil Institute of Technology Pimpri, India,2Army Institute of Technology, Dhighi, India | |
| An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in Heterogeneous LTE-VANET Networks Full TextDriss Abada1 and 2Rachid Adrdor, Omar Boutkhoum,3 and Adil Bouhouch 41,3Chouaïb Doukkali University, Morocco,2Ibn Zohr University, Morocco,4Mohamed V University, Morocco |
|
| Security Culture, Top Management, and Training on Security Effectiveness: A Correlational Study Without CISSP Participants Full TextJoshua Porche1 and Shawon Rahman2,1 Information Security System Engineer, USA,2University of Hawaii-Hilo Hilo, USA |
|
| Detection of Peer-to-Peer Botnets using Graph Mining Full TextDhruba Jyoti Borah and Abhijit Sarma, Gauhati University, India | |
| Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET Full TextNitesh Ghodichor1 Raj Thaneeghavl. V1,Dinesh Sahu 1 Gautam Borkar 2,Ankush Sawarkar 3,1SRK University, India,2DY Patil University, India,3VNIT, India | |
| Performance Evaluation of the KVM Hypervisor Running on ARM-Based Single-Board Computers Full TextEric Gamess, Mausam Parajuli, and Syed Shah,Jacksonville State University, USA | |
| An Intrusion Detection Mechanism for MANETS based on Deep Learning Artificial Neural Networks (ANNS) Full TextMohamad T Sultan1,2, Hesham El Sayed1,2 and Manzoor Ahmed Khan3, 1,3College of Information Technology United Arab Emirates University, UAE, 2United Arab Emirates University, United Arab Emirates | |
| Phishing URL Detection using LSTM Based Ensemble Learning Approaches Full TextBireswar Banik and Abhijit Sarma, Gauhati University, India | |
| A Lightweight Method for Detecting Cyber Attacks in High-traffic Large Networks based on Clustering Techniques Full TextNguyen Hong Son1 and Ha Thanh Dung2, 1Posts and Telecommunications Institute of Technology, Vietnam,2Saigon University, Vietnam | |
| Actor Critic Approach based Anomaly Detection for Edge Computing Environments Full TextShruthi N1 and Siddesh G K2, 1BNMIT, India, 2New Horizon College of Engineering, India | |
| An Efficient Method to Compute the Rate Matrix for Multi-Server Retrial Queues with Cloud Computing Systems Full TextDang Thanh Chuong, Hoa Ly Cuong, Hoang Dinh Long and Duong Duc Hung, Hue University, Vietnam | |
| Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network Full TextNibedita Jagadev1, Binod Kumar Pattanayak1, Ahmadkhader habboush2, Bassam Mohammad Elzaghmouri2,Mahmoud Ali Al Shugran2, 1Siksha’O’ Anusandhan Deemed to be University, India, 2Jerash University, Jordan | |
| Dynamic Interference Suppression for TV White Space: the Case of Thailand Full TextPrathana Thaopanya1 and Teerapat Sanguankotchakorn2, 1Thai Public Broadcasting Service (ThaiPBS), Thailand,2Asian Institute of Technology, Thailand | |
| Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcement Learning Full TextPBayarmaa Ragchaa and Kazuhiko Kinoshita, Tokushima University, Japan | |
| Cross Layering using Reinforcement Learning in Cognitive Radio-based Industrial Internet of Ad-hoc Sensor Network Full Text Chetna Singhal and Thanikaiselvan V, VIT Vellore, India |
|
| F-802.11P: A Fuzzy Enhancement for IEEE 802.11P in Vehicle-to-Everything Communications Full Text Huy D. Le1, Ngoc T. Luong2 and Tam V. Nguyen3, 1Ha Noi University of Business and Technology, Viet Nam, 2Dong Thap University, Viet Nam, 3Vietnam Academy of Science and Technology, Viet NamHamdy A.M. Sayedahmed1, Emadeldin M. Elgamal2,1 and Hesham A. Hefny1, 1Cairo University, Egypt, 2Tarleton State University, USA |
|
| Design and Analysis of MIMO Patch Antenna for 5G Wireless Communication Systems Full Text Pallavi H. V1, A P Jagadeesh Chandra2 and Paramesha3, 1Government Engineering College, Haasan, India, 2Adichunchanagiri Institute of Technology, India, 3Central University of Karnataka, IndiaEnergy Aware Talented Clustering with Compressive Sensing (TCCS) for Wireless Sensor Networks Full Text Bejjam Komuraiah and M.S. Anuradha, AU College of Engineering (A), India |
|
| Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks Full Text Souparnika Jadhav and Nagesh K. N, Nagarjuna College of Engineering & Technology, India. Rashmi Patil1 and Rekha Patil2, 1Sharnbasva University, India, 2PDA college of Engineering, India |
|
|
Developing Algorithms for Image Steganography and Increasing the Capacity Depending on Choosing the Best Pixels Full Text |
|
| Innovative Low-Cost Perimeter Security Gadget With In-built Mechanism to Ensure Confidentiality, Authenticity and Non-Repudiation Full Text Ritesh Mukherjee1, Anirban Goswami2, Soumit Chowdhury3 and Nabin Ghoshal4, 1Centre for Development of Advanced Computing, India, 2Techno Main Salt Lake, India, 3Government College of Engineering & Ceramic Technology, India, 4University of Kalyani, India |
|
| An Efficient Machine Learning Optimization Model for Route Establishment Mechanism in IoT Environment Full Text Kishore Golla and S. PallamSetty, Andhra University, India |
|
| A New Security Boundary of Component Differentially Challenged XOR Pufs Against Machine Learning Modeling Attacks Full Text Gaoxiang Li1, Khalid T. Mursi2, Ahmad O. Aseeri3, Mohammed S. Alkatheiri2 and Yu Zhuang1, 1Texas Tech University, USA 2University of Jeddah, Saudi Arabia, 3Prince Sattam Bin Abdulaziz University, Saudi Arabiaa |
|
| AODVMO: A Security Routing Protocol using One-Time Password Authentication Mechanism based on Mobile Agent Full Text Huy D. Le1, Ngoc T. Luong2 and Tam V. Nguyen3, 1Ha Noi University of Business and Technology, Viet Nam, 2Dong Thap University, Viet Nam, 3Vietnam Academy of Science and Technology, Viet Nam |
|
| Cluster Based Routing using Energy and Distance Aware Multi-Objective Golden Eagle Optimization in Wireless Sensor Network Full Text Gundeboyina Srinivasalu1 and Hanumanthappa Umadevi2, 1Cambridge Institute of Technology, India 2Dr. Ambedkar Institute of Technology, India |
|
| A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique over WLAN SDN Architecture Full Text Pacharakit Vanitchasatit and Teerapat Sanguankotchakorn, Asian Institute of Technology, Thailand |
|
| Probabilistic based Optimal Node Localization in Wireless Sensor Networks Full Text Souparnika Jadhav and Nagesh K. N, Nagarjuna College of Engineering & Technology, India |
|
| Advanced Service Data Provisioning for Real-Time Management of Ongoing Cellular Communication Networks Full Text Mikhail E. Belkin1, Leonid Zhukov1, Alexander S. Sigov1 and Mikhail G. Vasil’ev2, 1Russian Technological University MIREA, Russia, 2Kurnakov Institute of General and Inorganic Chemistry of the RAS, Russia |
|
| A New Approach to Improve the Performance of OFDM Signal for 6G Communication Full Text Usha S.M1 and Mahesh H.B2, 1Visveswaraya Technological University, India, 2PES University, India |
|
| Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and Clients Full Text Trent N. Ford, Eric Gamess and Christopher Ogden, Jacksonville State University, USA |
|
| FLOC: Hesitant Fuzzy Linguistic Term Set Analysis in Energy Harvesting Opportunistic Clustering Using Relative Thermal Entropy and RF Energy Transfer Full Text Junaid Anees and Hao-Chun Zhang, Harbin Institute of Technology, China |
|
| Performance Analysis of MITA Interleaver on Hybrid Systems using Diversity Full Text Priyanka Agarwal1 and Manoj K Shukla2, 1Harcourt Butler Technical University, India, 2REC Kannauj, India |
|
| A High Performance Hybrid Two Dimensional Spectral/Spatial NZCC/MD Code for SAC-OCDMA Systems with SDD Detection Full Text Berber Redouane1, Bouasria Fatima1, Chetioui Mohammed1,2, Damou Mehdi1 and Boudkhil Abdelhakim1,21Dr. Moulay Tahar University of Saida, Algeria, 2Abu-Bakr Belkaid University of Tlemcen, Algeria |
|
| Cognitive Radio Resource Scheduling using Multi-Agent Q-Learning for LTE Full Text Najem N. Sirhan and Manel Martinez-Ramon, University of New Mexico, USA |
|
| A Proposed Fuzzy Logic Approach for Conserving the Energy of Data Transmission in the Temperature Monitoring Systems of the Internet of Things Full Text Noha Elqeblawy, Ammar Mohammed and Hesham A.Hefny, Cairo University, Egypt |
|
| Constructing New Collective Signature Schemes Base on Two Hard Problems Factoring and Discrete Logarithm Full Text Tuan Nguyen Kim1, Nguyen Tran Truong Thien1, Duy Ho Ngoc2 and Nikolay A. Moldovyan3, 1Duy Tan University, Vietnam 2Department of Information Technology, Vietnam, 3SPIIRAS, Russia |
|
| A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G Networks Full Text Satya R. Das1, Sayan Sen Sarma2, Mitrabinda Khuntia1, Indranil Roy3, Koushik Sinha3 and Bhabani P. Sinha1, 1SOA University, India, 2University of Calcutta, India, 3Southern Illinois University, USA |
|
| ITA: The Improved Throttled Algorithm of Load Balancing on Cloud Computing Full Text Hieu N. Le and Hung C. Tran, Ho Chi Minh City Open University, Vietnam |
|
| Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive Real-Time Services Full Text Palash Kundu, Atunu Sarkar and Bhaskar Sardar, Jadavpur University, India |
|
| A Combination of the Intrusion Detection System and the Open-source Firewall using Python Language Full Text Tuan Nguyen Kim1, Tam Nguyen Tri2, Lam Tran Nguyen2 and Duy Thai Truong2, 1Duy Tan University, Vietnam, 2Danang ICT Infrastructure Development Center, Vietnam |
|
| Adaptive Sensor Sensing Range to Maximise Lifetime of Wireless Sensor Network Full Text Almamoon Naife Alauthman, Wan Nor Shuhadah Wan Nik, Nor Aida Mahiddin, Universiti Sultan Zainal Abidin, Malaysia |
|
| Adaptive Random Spatial based Channel Estimation (ARSCE) for Millimeter Wave MIMO System Full Text Rajkumar M Vadgave1, Manjula S2 and T S Vishwanath3, 1Veerappa Nisty Engineering College, India, 2Lingaraj Appa Engineering College, India, 3Bheemanna Khandre Institute of Technology, India |
|
| An Efficient Intrusion Detection System with Custom Features using FPA-Gradient Boost Machine Learning Algorithm Full Text D.V. Jeyanthi1 and B. Indrani2, 1Sourashtra College, India, 2DDE, Madurai Kamaraj University, India |
|
| Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular Ad-Hoc Networks (VANETS) Full Text Chantakarn Pholpol and Teerapat Sanguankotchakorn, Asian Institute of Technology, Thailand |
|
| An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network Full Text Priyanka Pandey and Raghuraj Singh, Harcourt Butler Technical University, India |
|
| Novel Position Estimation using Differential Timing Information for Asynchronous LTE/NR Networks Full Text Muhammad Abugabal, Yasmine Fahmy and Hazim Tawfik, Cairo University, Egypt |
|
| Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN Full Text Shivshanker. P. Biradar1 and T. S. Vishwanath2, 1LAEC, India, 2BKIT, India |
|
| A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network Full Text Slaheddine Chelbi1 and Riadh Moussi2,3, 1Qassim University, Kingdom of Saudi Arabia, 2Taibah University, Kingdom of Saudi Arabia, 3University of Kairouan, Tunisia |
|
| Performance Analysis in Cellular Networks Considering the QoS by Retrial Queueing Model with the Fractional Guard Channels Policies Full Text Dang ThanhChuong, Hoa Ly Cuong, Pham Trung Duc and Duong Duc Hung, Hue University, VietNam |
|
| MAR Security: Improved Security Mechanism for Emergency Messages of VANET using Group Key Management & Cryptography Schemes (GKMC) Full Text Mahabaleshwar Kabbur, Anand R and Arul Kumar V, REVA University, India |
|
| Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Encryption Full Text FUJITA Satoshi, Hiroshima University, Japan |
|
| MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet of Things Full Text Padmashree M G, Mallikarjun J P, Arunalatha J S and Venugopal K R, University Visvesvaraya College of Engineering, Bangalore University, India |
|
| Securing BGP by Handling Dynamic Network Behavior and Unbalanced Datasets Full Text Rahul Deo Verma, Shefalika Ghosh Samaddar and A. B. Samaddar, National Institute of Technology Sikkim, India |
|
| A Cooperative Localization Method based on V2I Communication and Distance Information in Vehicular NetworksFull Text Walaa Afifi, Hesham A. Hefny and Nagy R. Darwish, Cairo University, Egypt |
|
| Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Network Lifetime in WSNsFull Text Jungsub Ahn1, Sanghyeok Lim2 and Taeho Cho1*, 1Sungkyunkwan University, Republic of Korea, 2Amorepacific Republic of Korea |
|
| BER Analysis for Downlink MIMO-NOMA Systems over Rayleigh Fading ChannelsFull Text Vu Tran Hoang Son1, 2 and Dang Le Khoa1, 2*, 1VNUHCM – University of Science, Vietnam, 2Vietnam National University, Vietnam |
|
| Utilizing XAI Technique to Improve Autoencoder based Model for Computer Network Anomaly Detection with Shapley Additive Explanation(SHAP) Full Text Khushnaseeb Roshan and Aasim Zafar, Aligarh Muslim University, India |
|
| Threshold based VM Placement Technique for Load Balanced Resource Provisioning using Priority Scheme in Cloud Computing Full Text Mayank Sohani and S. C. Jain, Rajasthan Technical University, India |
|
| A New Efficient Cache Replacement Strategy for Named Data Networking Full Text Saad Al-Ahmadi, King Saud University, Saudi Arabia |
|
| An Effective Control of Hello Process for Routing Protocol in MANETs Full Text Dhirendra Kumar Sharma and Nitika Goenka, University of Petroleum and Energy Studies, India |
|
| Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterogeneous Wireless Sensor Network Full Text Nguyen Duy Tan, Vu Khanh Quy, Pham Ngoc Hung and Le Van Vinh, Hung Yen University of Technology and Education, Vietnam |
|
| Dynamic Task Scheduling based on Burst Time Requirement for Cloud Environment Full Text Linz Tom1 and Bindu V.R.2, 1Assumption College, India, 2Mahatma Gandhi University, India |
|
| Investigating Multilayer Omega-Type Networks Operating with the Cut-Through Technique under Uniform or Hotspot Traffic Conditions Full Text Eleftherios Stergiou1, John Garofalakis2, Dimitrios Liarokapis1 and Spiridoula Margariti1, 1University of Ioannina, Greece, 2University of Patras and Computer Technology Institute and Press- “DIOPHANTUS” (CTI) Patras, Greece |
|
| Privacy-Preserving Authentication Scheme for Roaming Service in Global Mobility Networks Full Text Sung Woon Lee1 and Hyunsung Kim2, 3, 1Tongmyong University, Korea, 2University of Malawi, Malawi, 3Kyungil University, Korea |
|
| Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular Ad-Hoc Networks (VANETS) Full Text Chantakarn Pholpol and Teerapat Sanguankotchakorn, Asian Institute of Technology, Thailand |
|
| An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network Full Text Priyanka Pandey and Raghuraj Singh, Harcourt Butler Technical University, India |
|
| Novel Position Estimation using Differential Timing Information for Asynchronous LTE/NR Networks Full Text Muhammad Abugabal, Yasmine Fahmy and Hazim Tawfik, Cairo University, Egypt |
|
| Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN Full Text Shivshanker. P. Biradar1 and T. S. Vishwanath2, 1LAEC, India, 2BKIT, India |
|
| A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network Full Text Slaheddine Chelbi1 and Riadh Moussi2,3, 1Qassim University, Kingdom of Saudi Arabia, 2Taibah University, Kingdom of Saudi Arabia, 3University of Kairouan, Tunisia |
|
| Performance Analysis in Cellular Networks Considering the QoS by Retrial Queueing Model with the Fractional Guard Channels Policies Full Text Dang ThanhChuong, Hoa Ly Cuong, Pham Trung Duc and Duong Duc Hung, Hue University, VietNam |
|
| MAR Security: Improved Security Mechanism for Emergency Messages of VANET using Group Key Management & Cryptography Schemes (GKMC) Full Text Mahabaleshwar Kabbur, Anand R and Arul Kumar V, REVA University, India |
|
| About Digital Communication Methods for Visible Light Communication Full Text Wataru Uemura, Yasuhiro Fukumori and Takato Hayama, Ryukoku University, Japan |
|
| Evolutionary Computing based Neuron-Computational Model for Microstrip Patch Antenna Design Optimization Full Text Rohini Saxena, Mukesh Kumar and Shadman Aslam, University of Allahabad, India |
|
| Multilayer Representation and Multiscale Analysis on Data Networks Full Text Luz Angela Aristizábal Q and Nicolás Toro G, Universidad Nacional de Colombia, Colombia |
|
| Clock Synchronization using Truncated Mean and Whale Optimization for Clustered Sensor Networks Full Text Karthik Soundarapandian1 and Ashok Kumar Ambrose2, 1Bharathiar University, India, 2Alagappa Govt. Arts College, India |
|
| A Controllable RSU and Vampire Moth to Support the Cluster Stability in VANET Full Text Ronald Adrian, Selo Sulistyo, I Wayan Mustika and Sahirul Alam, Universitas Gadjah Mada, Indonesia |
|
| A Method of Improving Energy Efficiency Through Geofencing and False Data Blocking In Context-Aware Architecture for Probabilistic Voting-Based Filtering Scheme of WSNs Full Text Su Man Nam1 and Youn Kyoung Seo2, 1DUDU Information Technologies, Republic of Korea, 2Incheon Jae Neung University, Republic of Korea |
|
| Trust Level Evaluation based Asymmetric Cryptography Protocol for Flexible Access Control in Fog Computing Full Text C. Nagarani1 and R. Kousalya2, 1PSG College of Arts and Science, India, 2Dr. N.G.P Arts and Science College, India |
|
| Dynamic Shaping Method using SDN And NFV Paradigms Full Text Shin-ichi Kuribayashi, Seikei University, Japan |
|
| Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for Performance Improvement in MANET Full Text Gyanendra Kumar Pallai1, Meenakshi Sankaran2 and Amiya Kumar Rath3, 1SOA University, India 2VIT Bhopal University, India, 3Veer Surendra Sai University of Technology, India |
|
| Developing an Adaptive Channel Modelling using a Genetic Algorithm Technique to Enhance Aerial Vehicle-to-Everything Wireless Communications Full Text Faris. A. Almalki, Taif University, Kingdom of Saudi Arabia |
|
| Q-Learning based Routing Protocol to Enhance Network Lifetime in WSNs Full Text Arunita Kundaliya and D.K. Lobiyal, Jawaharlal Nehru University, India |
|
| Quantile Regressive Fish Swarm Optimized Deep Convolutional Neural Learning for Reliable Data Transmission in IoV Full Text S. Suguna Devi and A. Bhuvaneswari, Cauvery College For Women, India |
|
| Privacy-Preserving Machine Authenticated Key Agreement for Internet of Things Full Text Beaton Kapito1,3, Mwawi Nyirenda1 and Hyunsung Kim1,2, 1University of Malawi, Malawi, 2Kyungil University, Korea 3Malawi Adventist University, Malawi |
|
| Does Digital Native Status Impact End-User Antivirus Usage? Full Text Gerrianne Roberts1 and Shawon Rahman2, 1Valencia College, USA, 2University of Hawaii-Hilo, USA |
|
| WiFi Transmit Power and its Effect on Co-Channel Interference Full Text Zyanya Cordoba, Riddhi Rana, Giovanna Rendon, Justin Thunell and Abdelrahman Elleithy, William Paterson University, USA |
|
| An Optimal Route Discovery using Biogeography based Optimization for Vehicular Ad Hoc Networks Full Text Shaeista Begum1, Nagaraj B. Patil2 and Vishwanath P3, 1Government Engineering College, Raichur, India, 2Government Engineering College, Gangavathi, India, 3H.K.E.S’s S.L.N. College Of Engineering, India |
|
| IPTV Improvement Approach over LTE-WLAN Heterogeneous Networks Full Text Mohamed Matoui, Noureddine Moumkine and Abdellah Adib, Faculty of Science and Technology Mohammedia, Morocco |
|
| Enhanced Particle Swarm Optimization for Effective Relay Nodes Deployment in Wireless Sensor Networks Full Text Bader Alshaqqawi1, Sardar Anisul Haque2, Mohammed Alreshoodi1 and Ibrahim Alsukayti1, 1Qassim University, Saudi Arabia, 2Alcorn State University, USA |
|
| Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Network Full Text Lakshmi M and Prashanth C R, Dr. Ambedkar Institute of Technology, India |
|
| An Exact Analytical Model for an IoT Network with MMPP Arrivals Full Text Osama Salameh, Arab American University, Palestine |
|
| Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for High Performance Monitoring Applications of Internet of Things Full Text Fawaz Alassery and Maha M. Althobaiti, Taif University, Saudi Arabia |
|
| Mobility Speed Effect and Neural Network Optimization for Deep MIMO Beamforming in mmWave Networks Full Text Mustafa S. Aljumaily and Husheng Li, University of Tennessee, USA |
|
| Wireless Networks Performance Monitoring Based on Passive-active Quality of Service Measurements Full Text Yazeed A. Al-Sbou, Applied Science University, Bahrain |
|
| Towards Fog-Assisted Virtual Reality MMOG with Ultra-Low Latency Full Text YOSHIHARA Tsuyoshi and FUJITA Satoshi, Hiroshima University, Japan |
|
| Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks Full Text Yasir Mohammed1, Maha Abdelhaq2 and Raed Alsaqour3, 1Iraqi Ministry of Electricity, Iraq, 2Princess Nourah bint Abdulrahman University, Saudi Arabia, 3Saudi Electronic University, Saudi Arabia |
|
| Peer to Peer Approach based Replica and Locality Awareness to Manage and Disseminate Data in Vehicular Ad Hoc Networks Full Text Abdelkader Guezzi1, Abderrahmane Lakas2, Ahmed Korichi1, Sarra Cherbal3, 1Kasdi Merbah University, Algeria, 2UAE University, UAE, 3University of Ferhat Abbas Setif, Algeria |
|
| Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc Networks Full Text Amir J. Majid, Ajman University, UAE |
|
| Using Machine Learning to Build a Classification Model for IoT Networks to Detect Attack Signatures Full Text Mousa Al-Akhras1, 2, Mohammed Alawairdhi1, Ali Alkoudari1 and Samer Atawneh1, 1Saudi Electronic University, Saudi Arabia, 2The University of Jordan, Jordan |
|
| Network Anomaly Detection based on Late Fusion of Several Machine Learning Algorithms Full Text Tran Hoang Hai1, Le Huy Hoang1 and Eui-nam Huh2, 1Hanoi University of Science and Technology, Vietnam, 2Kyung Hee University, Korea |
|
| An Efficient Data Collection Protocol for Underwater Wireless Sensor Networks Full Text Khaled Day1, Faiza Al-Salti2, Abderezak Touzene1 and Nasser Alzeidi1, 1Sultan Qaboos University, Oman, 2Muscat College, Oman |
|
| Jamming Detection based on Doppler Shift Estimation in Vehicular Communications Systems Full Text Javad Afshar Jahanshahi, Universidad Catolica Los Angeles de Chimbote, Peru |
|
| A Deep Learning Technique for Web Phishing Detection Combined URL Features and Visual Similarity Full Text Saad Al-Ahmadi and Yasser Alharbi, King Saud University, Saudi Arabia |
|
| A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting for FDL-equipped at OBS Core Node Full Text Dang Thanh Chuong1, Nguyen Hong Quoc1, Doan Van Thang2 and Pham Trung Duc1, 1Hue University, Vietnam, 2Industrial University of HCM City, Vietnam |
|
| Mean Object Size Considering Average Waiting Latency in M/BP/1 System Full Text Y. –J. Lee, Korea National University of Education, South Korea |
|
| A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based on OLSR Protocol Full Text Youssef Lmoumen1, Yassine Ruichek1 and Raja Touahni2, 1University Bourgogne FrancheComté, France, 2University IbnTofail, Morocco |
|
| Client Performance Predictions for Private Blockchain Networks Full Text YLászló Viktor Jánoky, János Levendovszky and Péter Ekler, Budapest University of Technology and Economics, Hungary |
|
| Determination of Minimum Number of UAVs for Local Area Networks of DronesFull Text Sandaruvan Rajasinghege and Rohan de Silva, CQ University, Australia |
|
| Performance Analysis of Routing Protocols with Roadside Unit Infrastructure in a Vehicular Ad Hoc NetworkFull Text Safae Smiri, Abdelali Boushaba, Rachid Ben Abbou and Azeddine Zahi, Sidi Mohamed Ben Abdelah University, Morocco |
|
| Multi-criteria Handover Decision for Heterogeneous Networks: Carrier Aggregation Deployment ScenarioFull Text Maryam Abdulazeez- Ahmed, Nor Kamariah Nordin, Aduwati Bint Sali and Fazirulhisyam Hashim, Universiti Putra Malaysia, Malaysia |
|
| Hybrid Model in the Block Cipher Applications for High-speed Communications NetworksFull Text Minh Nguyen Hieu1, Bac Do Thi2, Canh Hoang Ngoc3, Manh Cong Tran4, Phan Duong Phuc5 and Khoa Nguyen Tuan6, 1Institute of Cryptographic Science and Technology, Vietnam, 2Thai Nguyen University of Information and Communication Technology, Vietnam, 3Thuongmai University, Vietnam, 4Le Quy Don Technical University, Vietnam, 5Academy of Cryptography Techniques, Vietnam, 6Research Laboratories of Saigon High-Tech Park, Vietnam |
|
| Robotic Inner Signal Propagation and Random Access over Hybrid Access SchemeFull Text Abir Hossain, Zhenni Pan, Megumi Saito, Jiang Liu and Shigeru Shimamoto, Waseda University, Japan |
|
| An Experimental Study of IoT Networks Under Internal Routing AttackFull Text Mohammad Alreshoodi, Qassim University, Saudi Arabia |
|
| Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilities of Web ApplicationsFull Text Mohammad Shojaeshafiei, Letha Etzkorn and Michael Anderson, The University of Alabama in Huntsville, USA |
|
| Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs Full Text Radha Raman Chandan and P.K.Mishra, Banaras Hindu University, India |
|
| 6RLR-ABC: 6LOWPAN Routing Protocol with Local Repair using Bio Inspired Artificial Bee ColonyFull Text Nurul Halimatul Asmak Ismail1, Samer A. B. Awwad2 and Rosilah Hassan3, 1Princess Nourah Bint Abdulrahman University, Kingdom of Saudi Arabia, 2Independent Researcher, Kingdom of Saudi Arabia, 3Universiti Kebangsaan Malaysia, Malaysia |
|
| Swarm Optimization based Gravitational Search Approach for Channel Assignment in MCMR Wireless Mesh NetworkFull Text Nandini Balusu1, Suresh Pabboju2 and Narsimha G3, 1Telangana University, India, 2Chaitanya Bharathi Institute of Technology, India and 3JNTUH College of Engineering, India |
|
| Energy-efficient Multi-hop Routing with Unequal Clustering Approach for Wireless Sensor NetworksFull Text Younes El Assari, Samia Al Fallah, Jihane El Aasri, Mounir Arioua and Ahmed El Oualkadi, Abdelmalek Essaadi University, Morocco |
|
| Flooding Attack Detection and Mitigation in SDN with Modified Adaptive Threshold AlgorithmFull Text Nan Haymarn Oo1, Aris Cahyadi Risdianto2, Teck Chaw Ling3 and Aung Htein Maw4, 1University of Computer Studies, Yangon, Myanmar, 2Gwangju Institute of Science and Technology, Korea, 3University of Malaya, Malaysia 4University of Information Technology, Myanmar |
|
| Signaling Protocols for Local Area Networks of DronesFull Text Prabhu Jyot Singh and Rohan de Silva, School of Engineering and Technology CQ University Sydney, Australia |
|
| Localization Schemes for Underwater Wireless Sensor Networks: SurveyFull Text Faiza Al-Salti1, N. Alzeidi2 and Khaled Day2, 1Muscat College, Oman and 2Sultan Qaboos University, Oman |
|
| Performance Evaluation of Modbus TCP in Normal Operation and Under A Distributed Denial of Service AttackFull Text Eric Gamess1, Brody Smith1 and Guillermo Francia III2, 1Jacksonville State University, USA and 2University of West Florida, USA |
|
| An Adaptive Diffserv Approach to Support QoS in Network Mobility NEMO EnvironmentFull Text Loay F. Hussein1,2, Aisha-Hassan AbdallaHashim2, Mohamed Hadi Habaebi2 and Wan Haslina Hassan3, 1Jouf University, Saudi Arabia, 2International Islamic University Malaysia, Malaysia and 3Universiti Teknologi Malaysia, Malaysia |
|
| Mobile Crowd Sensing RPL-based Routing Protocol for Smart CityFull Text Yahya Al Sawafi, Abderezak Touzene, Khaled Day and Nasser Alzeidi, Sultan Qaboos University, Oman |
|
| Virtual Cache & Virtual Wan Accelerator Function Placement for Cost-effective Content Delivery ServicesFull Text Shin-ichi Kuribayashi, Seikei University, Japan |
|
| Auto Resource Management to Enhance Reliability and Energy Consumption in Heterogeneous Cloud ComputingFull Text Moataz H. Khalil1, 2, Mohamed Azab2, Ashraf Elsayed3, Walaa Sheta1, 2, Mahmoud Gabr3 and Adel S. Elmaghraby1,2, 1University of Louisville, USA, 2The City of Scientific Research and Technology Applications, Egypt and 3Alexandria University, Egypt |
|
| CLBNSRM – Confidence Level Based Unblend Neighbor Selection &Blend Node Report Based Optimized Route Formation in MANETFull Text S. J. Patil1, L.S. Admuthe2 and M. R. Patil3, 1VTU, India, 2DKTE’S Textile & Engineering Institute, India and 3J.A.G.M. Institute of Technology, India |
|
| Energy Performance of a Combined Horizontal and Vertical Compression Approach in Cluster-based WSNSFull Text Jihane El Aasri, Samia Al Fallah, Mounir Arioua and Ahmed El Oualkadi, Tangier Abdelmalek Essaadi University, Morocco |
|
| Least Square Channel Estimation for Image Transmission with OFDM Over Fading ChannelFull Text Usha S.M1 and Mahesh H.B2, 1JSS Academy of Technical Education, India and 2PES University, India |
|
| A Modified Interference Approximation Scheme for Improving Preamble Based Channel Estimation Performance in FBMC SystemFull Text Radwa A. Roshdy1, Mohamed A. Aboul-Dahab2 and Mohamed M. Fouad3, 1Higher Technological Institute, Egypt, 2Arab Academy for Science Technology and Martine transport, Egypt and 3Zagazig University, Egypt |
|
| Evaluation Methodology of MIMO Networks Performance over Rayleigh FadingFull Text Eleftherios Stergiou, Constantinos Angelis and Spiridoula V. Margariti, University of Ioannina, Greece |
|
| LTE Scheduler Algorithms for VANET Traffic in Smart CityFull Text Khadija Raissi and Bechir Ben Gouissem, University of Tunis El Manar, Tunisia |
|
| Lorawan Scalability Analysis – Co Spreading Factor InterferenceFull Text Aiju Thomas and N V Eldhose, M G University, India |
|
| Load Balancing Algorithm for Efficient VM Allocation in Heterogeneous CloudFull Text Badshaha P Mulla1, C. Rama Krishna1 and Raj Kumar Tickoo2, 1NITTTR, India and 2National Informatics Centre, Punjab State Unit, India |
|
| An Efficient and Secure Malicious Node Detection Model for Wireless Sensor NetworksFull Text Asmaa M.Morsi1, Tamer M. Barakat2 and Ahmed Ali Nashaat2, 1Al-Madina Higher Institute for Engineering and Technology, Egypt and 2Fayoum University, Egypt |
|
| Maintaining Cloud Performance under DDOS Attacks Full Text Moataz H. Khalil1, 2, Mohamed Azab2, Ashraf Elsayed3, Walaa Sheta1, 2, Mahmoud Gabr3 and Adel S. Elmaghraby1, 2, 1University of Louisville, USA, 2The City of Scientific Research and Technology Applications, Egypt and 3Alexandria University, Egypt |
|
| A Novel Hybrid Opportunistic Scalable Energy Efficient Routing Design for Low Power, Lossy Wireless Sensor NetworksFull Text Jayavignesh Thyagarajan and Suganthi K, Vellore Institute of Technology, India |
|
| Developing QoS by Priority Routing for Real Time Data in Internet of Things (IoT) Urban ScenariosFull Text Radwan S. Abujassar, Information Technology and Computing (ITC) Arab Open University, Kuwait |
|
| Controlling Delay at the Router Buffer using Modified Random Early DetectionFull Text Ahmad Adel Abu-Shareha, Arab Open University (AOU), Saudi Arabia |
|
| The Method of Detecting Online Password Attacks Based on High-level Protocol Analysis and Clustering TechniquesFull Text Nguyen Hong Son1 and Ha Thanh Dung2, 1Posts and Telecommunications Institute of Technology, Vietnam and 2Ho Chi Minh City University of Natural Resources and Environments, Vietnam |
|
| Multi-cluster Multi-channel Scheduling (MMS) Algorithm for Maximum Data Collection with Delay Minimization in WSNFull Text A. Vijayalakshmi1 and P. Vanaja Ranjan2, 1Vels Institute of Science, Technology and Advanced Studies (VISTAS), India and 2College of Engineering Anna University, India |
|
| Comparative and QoS Performance Analysis of Terrestrial-aerial Platforms-satellites Systems for Temporary EventsFull Text Faris. A. Almalki, Taif University, Saudi Arabia |
|
| A Comprehensive Study of DSCP Markings’ Impact on VOIP QoS in HFC Networks [pdf] Shaher Daoud and Yanzhen Qu, Colorado Technical University, USA |
|
| Histogram of Neighborhood Tripartite Authentication with Fingerprint-based Biometrics for IoT Services [pdf] S. Kanchana, PSG College of Arts & Science, India |
|
| Addressing Imbalanced Classes Problem of Intrusion Detection System Using Weighted Extreme Learning Machine [pdf] Mohammed Awad1, Alaeddin Alabdallah2, 1Arab American University, Palestine and 2An-Najah National University, Palestine |
|
| Energy Efficient Computing for Smart Phones in Cloud Assisted Environment [pdf] Nancy Arya1 Sunita Choudhary1 and S.Taruna2, 1Banasthali Vidyapith, India and 2JK Lakshmipat University, India |
|
| A Low-energy Data Aggregation Protocol Using an Emergency Efficient Hybrid Medium Access Control Protocol in Hierarchal Wireless Sensor Networks [pdf] Rana Adel and Tamer Barakat, Fayoum University, Egypt |
|
| A Novel Security Protocol for Wireless Sensor Networks Based on Elliptic Curve Signcryption [pdf] Anuj Kumar Singh1 and B.D.K.Patro2, 1Dr. A.P.J. Abdul Kalam Technical University, India and 2Rajkiya Engineering College, India |
|
| Containerized Services Orchestration for Edge Computing in Software-defined Wide Area Networks [pdf] Felipe Rodriguez Yaguache and Kimmo Ahola, Technical Research Centre of Finland (VTT), Finland |
|
| Multi-Objective Optimization Assisted Network Condition Aware QOS-Routing Protocol for MANETS: MNCQM [pdf] Shashi Raj K1 and Siddesh G K2, 1Dayananda Sagar College of Engineering, India and 2JSS Academy of Technical Education, India |
|
| A Mac Protocol with Dynamic Allocation of Time Slots Based on Traffic Priority in Wireless Body Area Networks [pdf] Sabin Bhandari and Sangman Moh, Chosun University, South Korea |
|
| Fuzzy Informer Homed Routing Protocol for Wireless Sensor Network [pdf] Gholamreza Kakamanshadi, Savita Gupta and Sukhwinder Singh, Panjab University, India |
|
| An Optimum Energy Consumption Hybrid Algorithm for XLN Strategic Design in WSN’S [pdf] Md. Khaja Mohiddin and V. B. S. Srilatha Indira Dutt, GITAM, India |
|
| A Fractal Based Image Cipher Using Knuth Shuffle Method and Dynamic Diffusion[pdf] Shafali Agarwal, USA |
|
| Lattice Structural Analysis on Sniffing to Denial of Service Attacks [pdf] B.Prabadevi1, N.Jeyanthi1, Nur Izura Udzir2 and Dhinaharan Nagamalai3, 1Vellore Institute of Technology, Vellore, India,2Universiti Putra Malaysia, Malaysia and 3Wireilla Net Solutions, Australia |
|
| Applying Geo-Encryption and Attribute Based Encryption to Implement Secure Access Control in the Cloud [pdf] Abu Salim1, Sachin Tripathi2 and Rajesh Kumar Tiwari3, 1Jazan University, Kingdom of Saudi Arabia, 2Indian Institute of Technology, India and 3RVS College of Eng. & Tech., India |
|
| Implementation of A Context-Aware Routing Mechanism in an Inexpensive Standalone Communication System for Disaster Scenarios [pdf] Regin Cabacas and In-Ho Ra, Kunsan National University, South Korea |
|
| Context-Aware Energy Conserving Routing Algorithm for Internet of Things [pdf] D. Kothandaraman1, C. Chellappan2, P. Sivasankar3 and Syed Nawaz Pasha1, 1S R Engineering College, India, 2Anna University, India and 3NITTTR, India |
|
| Fast Packets Delivery Techniques for Urgent Packets in Emergency Applications of Internet of Things [pdf] Fawaz Alassery, Taif University, Saudi Arabia |
|
| The Performance of Convolutional Coding Based Cooperative Communication: Relay Position and Power Allocation Analysis [pdf] Cebrail ÇIflikli, Waeal Al-Obaidi and Musaab Al-Obaidi, Erciyes University, Turkey |
|
| QoS Categories Activeness-Aware Adaptive EDCA Algorithm for Dense IoT Networks[pdf] Mohammed A. Salem1, Ibrahim F. Tarrad2, Mohamed I. Youssef3 and Sherine M. Abd El-Kader3, 1Higher Technological Institute, Egypt, 2Al-Azhar University, Egypt and 3Electronics Research Institute, Egypt |
|
| A Min-Max Scheduling Load Balanced Approach to Enhance Energy Efficiency and Performance of Mobile ADHOC Networks [pdf] K.Venkatachalapathy and D.Sundaranarayana, Annamalai University, India |
|
| Optimization of Packet Length for Two Way Relaying with Energy Harvesting [pdf] Ghassan Alnwaimi1, Hatem Boujemaa2 and Kamran Arshad3, 1King Abdulaziz University, Kingdom of Saudi Arabia, 2COSIM Laboratory, Tunisia and 3Ajman University, UAE |
|
| VIVoNet: Visually-Represented, Intent-Based, Voice-Assisted Networking [pdf] Amar Chaudhari, Amrita Asthana, Atharva Kaluskar, Dewang Gedia, Lakshay Karani, Levi Perigo, Rahil Gandotra and Sapna Gangwar, University of Colorado Boulder, USA |
|
| Design of Secure and Reliable MU-MIMO Transceiver System for Vehicular Networks[pdf] C. Manikandan, P. Neelamegam, S.Rakesh Kumar, G. Venkat Babu and Sai Siva Satwik Kommi, SASTRA Deemed University, India |
|
| Energy Consumption Reduction in Wireless Sensor Network Based on Clustering [pdf] Gholamreza Farahani, Iranian Research Organization for Science and Technology (IROST), Iran |
|
| Allocation of Virtual Firewall Functions in NFV-Based Networks with Minimum Network Cost [pdf] Shin-ichi Kuribayashi, Seikei University, Japan |
|
| RB-IEMRP: Relay Based Improved Throughput Energy-Efficient Multi-Hop Routing Protocol for INTRA Body Sensor Network (INTRA-WBSN)[pdf] Tarique Rashid1, Sunil Kumar2, Akshay Verma2, Prateek Raj Gautam2 and Arvind Kumar2, 1Katihar Engineering College, India and 2Motilal Nehru National Institute of Technology Allahabad, India |
|
| An Enhancement of Cluster-Based False Data Filtering Scheme Through Dynamic Security Selection in Wireless Sensor Networks [pdf] Jungsub Ahn and Taeho Cho, Sungkyunkwan University, Republic of Korea |
|
| Fuzzy Gene Optimized Reweight Boosting Classification for Energy Efficient Data Gathering in WSN [pdf] J.Srimathi1 and V.Valli Mayil2 , 1Bharathiar University, India and 2Periyar Maniammai University, India |
|
| A Markovian Model for Internet of Things Application [pdf] Osama Salameh and Mohammed Awadand Fadi AbuAlrub, Arab American University, Palestine |
|
| Enhancing Availability for Distributed Replicated Services Considering Network Edge Availability [pdf] Manghui Tu1, Liangliang Xiao2 and Dianxiang Xu3, 1Purdue University Northwest, Indiana, 2Frostburg StateUniversity, Maryland and 3Boise State University, Idaho |
|
| Machine Learning Algorithm of Detection of DOS Attacks on an Automotive Telematic Unit[pdf] Eric Perraud, Renault Software Labs, France |
|
| Energy Efficient Node Rank-Based Routing Algorithm in Mobile Ad-Hoc Networks [pdf] D. Kothandaraman1 and C. Chellappan2, 1S R Engineering College, India and 2Anna University, India |
|
| An open Jackson Network Model for Heterogeneous Infrastructure as a Service on Cloud Computing [pdf] Chien Nguyen Khac1, 2, Khiet Bui Thanh3, 4, Hung Ho Dac4, Son Nguyen Hong2, Vu Pham Tran3 and Hung Tran Cong2,1The People’s Police University, Vietnam, 2Posts and Telecoms Institute of Technology Ho Chi Minh City, Vietnam, 3Ho Chi Minh City University of Technology, Vietnam and 4Thu Dau Mot University, Vietnam |
|
| Broadband Power Line Communication: The Channel and Noise Analysis for A Power Line Network[pdf] Mukesh Kumar Varma, Zainual Abdin Jaffery and Ibraheem, Jamia Millia Islamia, India |
|
| Procedure of Effective Use of Cloudlets in Wireless Metropolitan Area Network Environment [pdf] Rashid Alakbarov and Oqtay Alakbarov, Azerbaijan National Academy of Sciences, Azerbaijan |
|
| Techniques for Offloading LTE Evolved Packet Core Traffic Using Openflow: A Comparative Survey & Design Reference [pdf] Kam Nasim1 and Trevor James Hall2, 1,2University of Ottawa,Canada |
|
| Optimization of Packet Length for MIMO systems [pdf] Ghassan Alnwaimi1, Hatem Boujemaa2 and Kamran Arshad3, 1King Abdulaziz University, Kingdom of Saudi Arabia,2Sup’Com, COSIM Laboratory, Tunisia and 3Ajman University, United Arab Emirates |
|
| Performance of OLSR MANET Adopting Cross-Layer Approach Under CBR and VBR Traffics Environment [pdf] Teerapat Sanguankotchakorn1, Sanika K.Wijayasekara2 and Sugino Nobuhiko3 1Asian Institute of technology, Thailand, 2Chulalongkorn University, Thailand and 3Tokyo Institute of Technology, Japan |
|
| Improvement of False Report Detection Performance Based on Invalid Data Detection Using Neural Network in WSN [pdf] Sanghyeok Lim and Taeho Cho, Sungkyunkwan University, Republic of Korea |
|
| Scalable and Energy Efficient Task Offloading Schemes for Vehicular Cloud Computing [pdf] Mohammad Pasha1 and Khaleel Ur Rahman Khan2, 1MJCET – Hyderabad, India and 2ACE – Hyderabad, India |
|
| A Novel Adaptive Caching Mechanism for Video on Demand System Over Wireless Mobile Network [pdf] Saleh Ali Alomari, Jadara University, Jordan |
|
| Availability Aspects Through Optimization Techniques Based Outlier Detection Mechanism in Wireless and Mobile Networks [pdf] Neeraj Chugh, Adarsh Kumar and Alok Aggarwal, University of Petroleum & Energy Studies – Dehradun, India |
|
| Improvement of Multiple Routing Based on Fuzzy Clustering and PSO Algorithm In WSNs to Reduce Energy Consumption [pdf] Gholamreza Farahani, Iranian Research Organization for Science and Technology (IROST), Iran |
|
| A Proactive Flow Admission and Re-Routing Scheme for Load Balancing and Mitigation of Congestion Propagation in SDN Data Plane [pdf] Sminesh C. N1, Grace Mary Kanaga E2, and Ranjitha K3, 1&3Govt. Engineering College – Thrissur, India, 2Karunya Institute of Technology and Sciences, India |
|
| Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection [pdf] Tony Jan and A.S.M Sajeev, Melbourne Institute of Technology, Australia |
|
| Performances of Ad Hoc Networks Under Deterministic and Probabilistic Channel Conditions : Cases for Single Path and Multipath Routing Protocols [pdf] Mohammed Tarique and Rumana Islam, Ajman University-Fujairah Campus, United Arab Emirates |
|
| Routing Protocols Performance in Mobile Ad-Hoc Networks Using Millimeter Wave [pdf] Mustafa S. Aljumaily, The University of Tennessee, USA |
|
| New Interconnection Topology for Network on Chip [pdf] Laxminath Tripathy and Chitta Ranjan Tripathy, Veer Surendra Sai University of Technology, India |
|
| A Hybrid Modulation Method for Dimming in Visible Light Communication [pdf] Wataru Uemura and Takahiro Kitazawa, Ryukoku University, Japan |
|
| Energy Efficient Routing Algorithm for Void Avoidance in UWSN Using Residual Energy and Depth Variance [pdf] Gulista Khan and R.K. Dwivedi, Teerthanker Mahaveer University, India |
|
| A Security Analysis of IoT Encryption : Side Channel Cube Attack on SIMECK32/64 [pdf] Alya Geogiana Buja1,2, Shekh Faisal Abdul-Latip1 and Rabiah Ahmad1, 1Universiti Teknikal Malaysia Melaka, Malaysia and 2Universiti Teknologi MARA, Malaysia |
|
| An Efficient Bandwidth Optimization and Minimizing Energy Consumption Utilizing Efficient Reliability and Interval Discrepant Routing (ERIDR) Algorithm [pdf] Sivashanmugam.N1 and Jothi Venkateshwaran.C2, 1Madras University, India and 2St. Peter’s Institute of Higher Education and Research, India |
|
| DPI-Based Congestion Control Method for Servers and Network Lines [pdf] Shin-ichi Kuribayashi, Seikei University, Japan |
|
| Deployment of Intrusion Prevention System on Multi-Core Processor Based Security Hardware [pdf] Swetha K V1 and Ravi Dara2, 1CMR Institute of Technology, India and 2Nevis Networks(I) Pvt.Ltd., India |
|
| Chained Displays : Configuration of Multiple Co-Located Public Displays [pdf] Amir E. Sarabadani Tafreshi, Milan Bombsch and Gerhard Troster, ETH Zurich, Switzerland |
|
| Efficient PAPR Reduction Approach for Selective Mapping in a STBC MIMO-OFDM System [pdf] VijayaLakshmi M and K Rama Linga Reddy, GNITS – Hyderabad, India |
|
| An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network [pdf] Ngoc Hong Tran1, Cao Vien Phung2, Binh Quoc Nguyen1 and Leila Bahri3, 1Vietnamese-German University, Vietnam, 2Technical University Braunschweig, Germany and 3KTH, Sweden |
|
| Improved Handover Algorithm to Avoid Duplication AAA Authentication in Proxy MIPV6 [pdf] Hewei Yu1 and Meiling Zhou2, 1South China University of Technology, P.R.China and 2GF Fund Management Co., Ltd., P.R.China |
|
| Proposed Load Balancing Algorithm to Reduce Response Time and Processing Time on Cloud Computing [pdf] Nguyen Xuan Phi, Cao Trung Tin, Luu Nguyen Ky Thu and Tran Cong Hung, Posts and Telecommunications Institute of Technology, Vietnam |
|
| Robot Human Interface for Housekeeper Robot with Wireless Capabilities [pdf] Suhad Faisal Behadili, University of Baghdad, Iraq |
|
| Path Splitting for Virtual Network Embedding in Elastic Optical Networks [pdf] Badr Oulad Nassar and Takuji Tachibana, University of Fukui, Japan |
|
| The Development and Study of the Methods and Algorithms for the Classification of Data Flows of Cloud Applications in the Network of the Virtual Data Center [pdf] Ramireddy Kondaiah1 and Bachala Sathyanarayana2, 1Rayalaseema University, India and 2Sri Krishnadevaraya University, India |
|
| Improvements in Routing Algorithms to Enhance Lifetime of Wireless Sensor Networks [pdf] D. Naga Ravikiran1 and C.G. Dethe2, 1Priyadarshini Institute of Engineering and Technology (PIET), India and 2RTM Nagpur University, India |
|
| Task Allocation and Path Planning for Network of Autonomous Underwater Vehicles [pdf] Bychkov Igor, Kenzin Maksim and Maksimkin Nikolay, Matrosov Institute for System Dynamics and Control Theory, Russia |
|
| Performance Evaluation of Blowfish Algorithm on Supercomputer IMAN1 [pdf] Mahmoud Rajallah Asassfeh, Mohammad Qatawneh and Feras Mohamed ALAzzeh, University of Jordan, Jordan |
|
| A System for Visualization of Big Attributed Hierarchical Graphs [pdf] Victor N. Kasyanov and Timur A. Zolotuhin, Institute of Informatics Systems, Novosibirsk State University, Russia |
|
| Lightweight Cryptography for Distributed PKI Based MANETS [pdf] N. Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, and V. Ch. Venkaiah, University of Hyderabad, India |
|
| Constructing a Fuzzy Network Intrusion Classifier Based on Differential Evolution and Harmonic Search [pdf] I. A. Hodashinsky and M. A. Mech, Tomsk State University of Control Systems and Radio electronics (TUSUR), Russia |
|
| Spectrum Sensing Strategy to Enhance the QoS in White-Fi Networks [pdf] Nabil Giweli, Seyed Shahrestani and Hon Cheung, Western Sydney University, Australia |
|
| Trust Factor and Fuzzy Firefly Integrated Particle Swarm Optimization Based Intrusion Detection and Prevention System for Secure Routing of MANET [pdf] Ramireddy Kondaiah1 and Bachala Sathyanarayana2, 1Rayalaseema University, India and 2Sri Krishnadevaraya University, India |
|
| Virtual Routing Function Deployment in NFV Based Networks Under Network Delay Constraints [pdf] Shin-ichi Kuribayashi, Seikei University, Japan |
|
| Response Surface Methodology for Performance Analysis and Modeling of MANET Routing Protocols [pdf] Mohamed Skander Daas and Salim Chikhi, Abdelhamid Mehri Constantine 2 University, Algeria |
|
| Quad Tree Based Static Multi Hop Leach Energy Efficient Routing Protocol : A Novel Approach [pdf] Abdulmalek Maresh Hasan Ali1 and Hanumanthappa J2, 1Visvesvaraya Technological University, India and 2University of Mysuru, India |
|
| A Extended Linear Multi-Commodity Multicost Network and Maximal Flow Limited Cost Problems [pdf] Tran Quoc Chien1 and Ho Van Hung2, 1University of Danang, Vietnam and 2Quangnam University, Vietnam |
|
| Imperative Programs Behavior Simulation in Terms of Compositional Petri Nets [pdf] Leontyev Denis Vasilevich, Kharitonov Dmitry Ivanovich and Tarasov Georgiy Vitalievich, Institute of Automation and Control Processes, Russia |
|
| On the Transmission of Asynchronous Data Streams Over Packet Switched Networks with Random Multiple Access [pdf] Yuriy Anatolievich Kropotov and Aleksander Anatolievich Kolpakov, Vladimir State University named after Alexander and Nicholay Stoletovs, Russia |
|
| Grid Based Priority Routing Protocol for UWSNs [pdf] Faiza Al-Salti, N. Alzeidi, Khaled Day, Bassel Arafeh and Abderezak Touzene, Sultan Qaboos University, Oman |
|
| Enhancement and Migration of Knowledge Science [pdf] Shawon S. M. Rahman1 and Syed V. Ahamed2, 1University of Hawaii-Hilo, USA and 2City University of New York, USA |
|
| Analysis of LTE Radio Load and User Throughput [pdf] Jari Salo1 and Eduardo Zacarías B2, 1Nokia Networks, Phillipines and 1Nokia Networks, Germany |
|
| A Proposal to Improve SEP Routing Protocol Using Insensitive Fuzzy C-Means in Wireless Sensor Network [pdf] Phan Thi The, Ngo Quang Quyen, Vu Ngoc Phan and Tran Cong Hung, Post & Telecommunications Institute of Technology, Vietnam |
|
| EWER:”Electromagnetic Wave Exposure Reduction” Service for Sensitive Users with Privacy Concerns [pdf] Mohamed Aymen Chalouf1, Francine Krief2 and Dramane Ouattara2, 1University of Rennes 1, France and 3University of Bordeaux, France |
|
| A Rapid Deployment Big Data Computing Platform for Cloud Robotics [pdf] Leigh Duggan1, James Dowzard1, Jayantha Katupitiya1 and Ka C. Chan2, 1University of New South Wales, Australia and 2La Trobe University, Australia |
|
| Multicasting Based Enhanced Proactive Source Routing in MANETs [pdf] Deepa Dasarathan1 and P. Nirmal Kumar2, 1Sathyabama University, India and 2Anna University, India |
|
| Topology Map Analysis for Effective Choice of Network Attack Scenario [pdf] Hidema Tanaka, National Defense Academy of Japan, Japan |
|
| An Analysis of the Fat-Tailedness of the Centrality Distributions of Real-World Networks [pdf] Natarajan Meghanathan ,Jackson State University, MS, USA |
|
| A Novel Approach for Optimizing Energy and Bandwidth Issues in MANET Using DSR Protocol [pdf] Ajay Lala,Anand Bhaskar, Prasun Chakrabarti and JitendraKaushal Srivastava,Department of Computer Science & Engineering, Sir PadampatSinghania University,Udaipur, Rajasthan, India |
|
| A Low Complexity User Grouping Strategy for Downlink Multi-User MIMO Scheduling [pdf] Nguyen Ngoc Van, School of Electronics and Telecommunications, Hanoi University of Science and Technology, No 1 , Dai Co Viet Street, Hai Ba Trung, HaNoi, Vietnam |
|
| Performance Analysis of R/KADEMLIA, Pastry and Bamboo Using Recursive Routing in Mobile Networks [pdf] Farida Chowdhury1and Md. Sadek Ferdous2, 1Department of Computer Science and Engineering, Shahjalal University of Science and Technology, Sylhet, Bangladesh. 2Electronics and Computer Science, University of Southampton, Southampton, UK. |
|
| Performance Analysis of Channel Capacity and Throughput of LTE Downlink System [pdf] P.Poornima1, G. Laxminarayana2and ,D. Srinivas Rao3 , 1Associate Professor, Dept. of ECE, Sphoorthy Engineering College, Hyderabad, India 2Professor, Dept. of ECE, Anurag College of Engineering, Hyderabad, India 3Professor, Dept. of ECE, JNTUH CEH, Kukatpally, Hyderabad, India |
|
| GARP : A Highly Reliable Grid Based Adaptive Routing Protocol for Underwater Wireless Sensor Networks [pdf] Khaled Day, Abderezak Touzene, Bassel Arafeh, and Nasser Alzeidi, Department of Computer Science, Sultan Qaboos University, Muscat, Oman |
|
| Accurate Available Bandwidth Allocation in HTTP Adaptive Streaming [pdf] Tan Phan-Xuan and Eiji Kamioka, Graduate School of Engineering and Science, Shibaura Institute of Technology, Tokyo, Japan |
|
| A Towards Efficient Privacy Preserving Data Aggregation for Advanced Metering Infrastructure [pdf] Navid A lamatsaz1 ,A rash Boustani2,Nima Alamatsaz,3Nima A lamatsaz, 4shkan Boustani.1,2Department of Electrcial Engineering and Computer Science, W ichita State University, W ichita, KS, USA.3 Department of Biomedical Engineering, New Jersey Institute of Technology, Newark, NJ, USA.4Department of Statistics and Mathematics, University of R ed Crescent Society of Iran, Mashad, Iran |
|
| Decision-making system supported by adaptive coloured petri nets [pdf] Haroldo Issao Guibu1,2 and Joao Jose Neto2, 1Instituto Federal de Educacao, Brazil, 2Escola Politecnica da Universidade de Sao Paulo, Brazil |
|
| Discovering New Cyber Protection Approaches from a Security Professional Prospective [pdf] Alain Loukaka1 and Shawon S. M. Rahman, Ph.D2,1 Capella University, Minneapolis, MN, USA, 2Majmaah University, Majmaah, Kingdom of Saudi Arabia |
|
| New Proposed Architecture For Q3 Interface To Manage IP-Based Networks [pdf] Gholamreza Farahani, Iranian Research Organization for Science and Technology (IROST), Iran |
|
| Investigation of Computational Intelligence Techniques for Intrusion Detection in Wireless Sensor Networks [pdf] Christopher D. McDermott and Andrei Petrovski, Robert Gordon University, United Kingdom |
|
| Victim Based Statistical Filtering : A New Deterrent Against Spoofed DoS Traffic [pdf] Suhail Qadir Mir1, S.M.K. Quadri2 , 1University of Kashmir, India and 2Jamia Millia Islamia, India |
|
| Combined Ieee 802.15.4 Physical Layer And Virtual Multiple Input Multiple Output (V- Mimo) Transmissions For Energy Efficient Wireless Sensor Networks [pdf] Fawaz Alassery, Taif University, Saudi Arabia |
|
| IMPROVING DISTRIBUTED ENERGY-EFFICIENT CLUSTERING ALGORITHM TO SAVE LIFETIME FOR HETEROGENEOUS WSN [pdf] Phan Thi The, Bui Hoang Mai, Nguyen Thanh Tuan and Tran Cong Hung, Post & Telecommunications Institute of Technology, Vietnam |
|
| A Novel framework for Intrusion Detection using Distributed Collaboration Detection Scheme in Packet Header Data [pdf] T.S. Urmila1 and R. Balasubramanian2, 1Mother Teresa Women’s University, India and 2Karpaga Vinayagar College of Engineering and Technology, India |
|
| Development and Evaluation of A Contact Center Application System to Integrate Multiple Communication Channels Using WebRTC [ pdf] Yusuke Shiga and KazumasaTakami, Soka University, Japan |
|
| A Structured Deep Neural Network For Data-Driven Localization In High Frequency Wireless Networks [ pdf] Marcus Z. Comiter, Michael B. Crouse and H. T. Kung, Harvard University, USA |
|
| Evaluation Of Congestion Control Methods For Joint Multiple Resource Allocation In Cloud Computing Environments [pdf] Shin-ichiKuribayashi, Seikei University, Japan |
|
| Performance Assessment of Maximum Likelihood in the Detection of Carrier Interference Corrupted GPS Data in Mobile Handsets [pdf] Taher AlSharabati, Al-Ahliyya Amman University, Jordan |
|
| Memory Efficient Forwarding Information Base for Content Centric Networking [pdf] Torsten Teubler1, Dennis Pfisterer2 and Horst Hellbruck1, 1CoSA Center of Excellence, Germany and 2University of Lubeck, Germany |
|
| A Real Time Priority Based Scheduler for Low Rate Wireless Sensor Networks [pdf] Sambhaji Sarode, Jagdish Bakal, RTM University, India |
|
| Low Cost Design and Implementation for HAS Using Multifunctional WI-FI [pdf] Mohammad Al Rawajbeh, Al Zaytoonah University of Jordan, Jordan |
|
| ECA Model Based QoS AODV Routing for MANETs [pdf] Raghavendra M1 and Pallapa Venkataram2, 1Siddaganga Institute of Technology, India and 2Indian Institute of Science, India |
|
| The Effect of Seeking Operation on QoE of HTTP Adaptive Streaming Services[pdf] Toshiro Nunome and Hiroaki Tani, Nagoya Institute of Technology, Japan |
|
| Mitigating Interference to GPS Operation Using Variable Forgetting Factor Based Recursive Least Squares Estimation [pdf] Aseel AlRikabi and Taher AlSharabati, Al-Ahliyya Amman University, Jordan |
|
| Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols in MANET [pdf] Mohamad T. Sultan and Salim M. Zaki, Cihan University, Iraq |
|
| A Comparative Performance Analysis of Route Redistribution among Three Different Routing Protocols Based on OPNET Simulation [pdf] Zeyad Mohammad, Ahmad Abusukhon and Marzooq A. Al-Maitah, Al-Zaytoonah University of Jordan, Jordan |
|
| Algorithm Finding Maximum Concurrent Multicommodity Linear Flow with Limited Cost in Extended Traffic Network with Single Regulating Coefficient on Two-Side Lines [pdf] Tran Quoc Chien and Nguyen Dinh Lau, University of Danang, Vietnam |
|
| Security Analysis of AES and Enhancing its Security by Modifying S-Box with an Additional Byte [pdf] Abdullah Al- Mamun1, Shawon S. M. Rahman2, Tanvir Ahmed Shaon1 and MdAlam Hossain1, 1Jessore University of Science and Technology, Bangladesh and 2Majmaah University, Kingdom of Saudi Arabia |
|
| Data Aggregation Routing Protocols in Wireless Sensor Networks : A Taxonomy [pdf] Saeid Pourroostaei Ardakani, Allameh Tabataba’i University, Iran |
|
| A Critical Improvement on Open Shop Scheduling Algorithm for Routing in Interconnection Networks [pdf] Stavros Birmpilis and Timotheos Aslanidis, National Technical University of Athens, Greece |
|
| Singular Value Decomposition: Principles and Applications in Multiple Input Multiple Output Communication System [pdf] Wael Abu Shehab and Zouhair Al-qudah, Al-Hussein Bin Talal University, Jordan |
|
| Fault Tolerant Routing Algorithm in Octagon-Cell Interconnected Network for Horizontal Moving Messages [pdf] Sanjukta Mohanty1 and Prafulla Ku. Behera2, 1North Orissa University, India and 2Utkal University, India |
|
| Analytical Study for Measuring the Electromagnetic Radiation of the GSM System in Urban Areas [pdf] Murad A.A.Almekhlafi, Sana’a University, Yemen |
|
| Position Based Adaptive Routing for VANETs [pdf] Ajay Guleria and Kuldeep Singh, Panjab University, India |
|
| Bounds on the Achievable Rates of Faded Dirty Paper Channel [pdf] Zouhair Al-qudah and Wael Abu Shehab, Al-Hussein Bin Talal University, Jordan |
|
| RFID Localisation for Internet of Things Smart Homes : A Survey [pdf] Belal Alsinglawi1, Mahmoud Elkhodr1, Quang Vinh Nguyen1 and Upul Gunawardana1, Anthony Maeder2 and Simeon Simoff1, 1Western Sydney University, Australia and 2Flinders University, Australia |
|
| Performance Evaluation of OSPF and RIP on IPV4 & IPV6 Technology Using G.711 Codec [pdf] Mabubur Syed and Isaac Yerima Ambore, Minnesota State University, USA |
|
| An Explicit Loss and Handoff Notification Scheme in TCP for Cellular Mobile System [pdf] Nayeema Islam and Mohammed Nasir Uddin, Jagannath University, Bangladesh |
|
| Wireless Sensors Integration into Internet of Things and the Security Primitives [pdf] Muhammad A. Iqbal and Magdy Bayoumi, University of Louisiana at Lafayette, USA |
|
| Performance Evaluation of Different Kernels for Support Vector Machine Used in Intrusion Detection System [pdf] Md. Al Mehedi Hasan1, Shuxiang Xu2, Mir Md. Jahangir Kabir2 and Shamim Ahmad1, 1University of Rajshahi, Bangladesh and 2University of Tasmania, Australia |
|
| An Enhanced Security for Government Base on Multifactor Biometric Authentication [pdf] Tran Cong Hung1, Nguyen Thanh Tri1,2 and Ho Nhut Minh3, 1Post & Telecommunications Institute of Technology, Vietnam, 2Binh Duong Department of Information and Communications, Vietnam and 3Saigon University, Vietnam |
|
| A Solution Framework for Managing Internet of Things (IOT) [pdf] Sukant K. Mohapatra1, Jay N. Bhuyan2, Pankaj Asundi1, and Anand Singh3, 1Ericsson, 2Tuskegee University, 3CenturyLink, USA |
|
| Performance Evaluation of Mobile WIMAX IEEE 802.16E for Hard Handover [pdf] Amira Youssef Fahoud and D.K. Lobiyal, Jawaharlal Nehru University, India |
|
| Flexible Virtual Routing Function Deployment in NFV Based Network with Minimum Total Network Cost [pdf] Shin-ichiKuribayashi, Seikei University, Japan |
|
| Game Theory Based Interference Control and Power Control for D2D Communication in Cellualar Networks [pdf] Fa-Bin Li 1, Peng-Xiang Li2, Ya-Fei Yang 2 and Hui Li2, 163812 Troop of PLA, P. R. China and 2Hainan University, China |
|
| Energy Consumption Improvement of Traditional Clustering Method in Wireless Sensor Network [pdf] Tran Cong Hung1 and Ly Quoc Hung2, 1Posts and Telecommunications Institute of Technology, Vietnam and 2Ho Chi Minh Technical and Economic College, Vietnam |
|
| Modeling, Implementation and Performance Analysis of Mobility Load Balancing for LTE Downlink Data Transmission [pdf] Mohamed Escheikh1 Hana Jouini1 and Kamel Barkaoui2, 1University of Tunis El Manar, Tunisia and 2Conservatoire national des arts et metiers, France |
|
| Performance Assessment of Chaotic Sequence Derived from Bifurcation Dependent Logistic Map in CDMA System [pdf] Oluyemi E. Adetoyi1 and Solomon A. Adeniran1, 1University of Ibadan, Nigeria and 1Obafemi Awolowo University, Nigeria |
|
| OMT : A Dynamic Authenticated Data Structure for Security Kernels [pdf] Somya D. Mohanty1, Mahalingam Ramkumar2 and Naresh Adhikari2, 1University of North Carolina – Greensboro, USA and 2Mississippi State University, USA |
|
| Proposed A Heterogeneous Clustering Algorithm to Improve QoS in WSN [ pdf ] Mehran Mokhtari1 and Masoomeh Tavakoli2, 1Islamic Azad University, Iran and 2Education Qaemshar, Iran |
|
| Energy Savings in Applications for Wireless Sensor Networks Time Critical Requirements [pdf] Tran Cong Hung1 and Ho Huu Trung1,2, 1Post & Telecommunications Institute of Technology, Vietnam and 2Ho Chi Minh City University of Technology, Vietnam |
|
| Adaptive Multi-Tenancy Policy for Enhancing Service Level Agreement Through Resource Allocation in Cloud Computing [pdf] MasnidaHussin, AbdullahMuhammed and NorAsilahWatiAbd Hamid, University of Putra Malaysia, Malaysia |
|
| Simulating Cortical Maps for Attention Shift in Autism[pdf] L.-H. Tan, S.-Y. Cho and Y.-Y. Nguwi, James Cook University, Singapore |
|
| TCP Incast Avoidance Based on Connection Serialization in Data Center Networks [ pdf ] Shigeyuki Osada1,2, Ryo Miyayama1, Yukinobu Fukushima1 and Tokumi Yokohira1, 1Okayama University, Japan and 2The Japan Research Institute, Japan |
|
| A Novel Routing Protocol for Target Tracking in Wireless Sensor Networks[pdf] Sanjay Pahuja and Tarun Shrimali, Indira Gandhi National Open University, India |
|
| Performance Analysis of the Link-Adaptive Cooperative Amplify-and-Forward Relay Networks with Opportunistic Relaying Strategy [pdf] Bhuvan Modi, O.Olabiyi and A.Annamalai, Prairie View A & M University, United States of America |
|
| Light Fidelity (Li-Fi) Based Indoor Communication System [pdf] Farooq Aftab, Muhammad Nafees Ulfat khan and Shahzad Ali, University of Science and Technology Beijing china (USTB), China |
|
| Study the Effect of Parameters to Load Balancing in Cloud Computing [pdf] Tran Cong Hung and Nguyen Xuan Phi, Posts and Telecommunications Institute of Technology, Vietnam |
|
| Simplified CBA Concept and Express Choice Method for Integrated Network Management System [pdf] Mohammad Al Rawajbeh1, Vladimir Sayenko2 and Mohammad I. Muhairat1, 1Al-Zaytoonah University of Jordan, Jordan and 2Kharkov National University of Radio Electronics (KhNURE) Kharkiv, Ukraine |
|
| Hiding A Message in Mp3 Using LSB With 1,2,3 and 4 Bits [pdf] Alaa AbedulsalamAlarood1,2, Azizah Abed Manaf1, Mohammed J.Alhaddad2 and Mohammed Salem Atoum3, 1University Technology Malaysia, Malaysia, 2King Abdulaziz University, Saudi Arabia and 3Irbid National University, Jordan |
|
| Geographic Maps Classification Based on L*A*B Color System [pdf] Salam M.Ghandour1 and Nidal M.Turab2, 1University of Jordan and 2Al Ahliyya Amman University, Jordan |
|
| Performances of Orthogonal Wavelet Division Multiplex (OWDM) System Under AWGN, Rayleigh and Ricean Channel Conditions [pdf] Mohammed Tarique, Ajman University of Science and Technology, United Arab Emirates |
|
| Dynamically Adaptable Improved OLSR (DA-IOLSR) Protocol[pdf] P.S.Vinayagam, Pondicherry University Community College, India |
|
| Performance and Complexity Analysis of a Reduced Iterations LLL Algorithm [pdf] Nizar OUNI and Ridha BOUALLEGUE, National Engineering School of Tunis, Tunisia |
|
| DIA-TORUS:A Novel Topology for Network on Chip Design[pdf] Deewakar Thakyal and Pushpita Chatterjee, SRM Research Institute, India |
|
| A Novel Method to Test Dependable Composed Service Components [pdf] Khaled Farj and Adel Smeda, University of Al-Jabel Al-Gharbi, Libya |
|
| Congestion Aware Link Cost Routing for MANETS [pdf] Tripti Sharma1 and Vivek Kumar2, 1Inderprastha Engineering College, India and 2Gurukul Kangri Vishwavidyalaya, India |
|
| Establishment of Virtual Policy Based Network Management Scheme By Load Experiments in Virtual Environment [pdf] Kazuya Odagiri1, Shogo Shimizu2 and Naohiro Ishii3, 1Sugiyama Jogakuen University, Japan, 2Gakushuin Women’s College, Japan and3Aichi Institute of Technology, Japan |
|
| Joint-Design of Link-Adaptive Modulation and Coding with Adaptive ARQ for Cooperative Amplify and Forward Relaying System [pdf] Bhuvan Modi, O. Olabiyi and A. Annamalai, Prairie View A & M University, USA |
|
Performance of TCP Congestion Control in UAV Networks of Various Radio Propagation Models [Pdf] Jun Peng, University of Texas – Rio Grande Valley, USA |
|
| Energy Efficient Cooperative Spectrum Sensing in Cognitive Radio[Pdf] Ramzi Saifan, Ghazi Al-Sukar, Rawaa Al-Ameer and Iyad Jafar, University of Jordan, Jordan |
|
| Cost-Efficient Residential Energy Management Scheme for Information-Centric Networking Based Home Network in Smart Grid[Pdf] Keping Yu1, Battulga Davaasambuu1, Nam Hoai Nguyenand1, Quang Nguyen1, Takuro Sato1 and Arifuzzaman Mohammad2, 1Waseda University, Japan and 2Memorial University of Newfoundland, Canada |
|
| Handover Optimization Based on Media Independent Handover in New Networks NGWN [Pdf] Safia Gueziz and Dris Korichi, Kasdi Merbah University, Algeria |
|
| Enhancement of Transmission Range Assignment for Clustered Wireless Sensor Networks[Pdf] M.Salamah and A.A.Hussein, Eastern Mediterranean University, Turkey |
|
| Effect of Operating Wavelengths and Different Weather Conditions on Performance of Point-to-Point Free Space Optical Link[Pdf] Md.Nur Islam and Md Nur Al Safa Bhuiyan, University of Rajshahi, Bangladesh |
|
| Performance Evaluation of Wireless Sensor Network Under Hello Flood Attack [Pdf] Mohammad Abdus Salam and Nayana Halemani, Southern University and A&M College Baton Rouge, USA |
|
| Comparative Analysis of Different Encryption Techniques in Mobile Ad Hoc Networks (MANETS) [Pdf] Amal Ahmad, Andraws Swidan and Ramzi Saifan, University Of Jordan, Jordan |
|
| The Impact of Node Misbehavior on the Performance of Routing Protocols in MANET [Pdf] Khaled Ahmed Abood Omer, University of Aden, Yemen |
|
| Optimizing Smart Things Addressing through the Zigbee-Based Internet of Things[Pdf] Tariq Lasloum and Ahmad S.Almogren, King Saud University, Saudi Arabia |
|
| GPS Systems Literature: Inaccuracy Factors And Effective Solutions [Pdf] Li Nyen Thin, Lau Ying Ting, Nor Adila Husna and Mohd Heikal Husin, Universiti Sains Malaysia, Malaysia |
|
| A Joint Timing Offset and Channel Estimation Using Fractional Fourier Transform and Cazac Sequences [Pdf] Cherif Rezgui and Khaled Grayaa, National School of Engineers of Tunis (ENIT), Tunisia |
|
| Performance Analysis of Multi-Path TCP Network [Pdf] Hamzah M A Hijawi and Mohammad M.N.Hamarsheh, Arab American University, Palestine |
|
| A Middleware for the Internet of Things [Pdf] Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung, Western Sydney University, Australia |
|
| An Optimal Fuzzy Logic System for a Nonlinear Dynamic System Using a Fuzzy Basis Function [Pdf] Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung, Western Sydney University, Australia |
|
Evaluation of a Topological Distance Algorithm for Construction of a P2P Multicast Hybrid Overlay Tree [Pdf] Sergej Alekseev and Jörg Schäfer, Frankfurt University of Applied Sciences, Germany |
|
| Optimal Bandwidth Allocation with Bandwidth Reservation and Adaptation in Wireless Communication Networks[Pdf] Ali Amiri, Oklahoma State University, USA |
|
| Performance Improvement of an As-Friendly Peer Selection Algorithm for P2P Live Streaming [Pdf] Yukinobu Fukushima, Kazuki Kobayashi and Tokumi Yokohira, Okayama University, Japan |
|
| QOS Evaluation of Heterogeneous Networks: Application-Based Approach[Pdf] Farnaz Farid, Seyed Shahrestani and Chun Ruan, Western Sydney University, Australia |
|
| Localization for Wireless Sensor Networks: A Neural Network Approach[Pdf] Shiu Kumar, Ronesh Sharma and Edwin R.Vans, Fiji national University, Fiji and University of the South Pacific, Fiji |
|
| A Smart Clustering Based Approach To Dynamic Bandwidth Allocation In Wireless Networks [Pdf] Mohammed Awad and Abdelmunem Abuhasan, Arab American University Jenin, Palestine |
|
| A Proposal to Enhance Cellular and Wifi Interworking Toward a Reliable Hetnet [Pdf] Nam Nguyen and Takuro Sato, Waseda University, Japan |
|
| Infrastructure of Services for a Smart City Using Cloud Environment [Pdf] SherifKamel Hussein1 and Mahmoud Hanafy Saleh2, 1October University for Modern Sciences and Arts, Egypt and 2Canadian International College, Egypt |
|
| Planning and Managing Virtualized Next Generation Networks [Pdf] Sukant K.Mohapatra1, Jay N.Bhuyan2 and Hira N.Narang2, 1Stevens Institute of Technology, New Jersey and 2Tuskegee University, USA |
|
| A Mass Balancing Theorem for the Economical Network Flow Maximisation [Pdf] Ziauddin Ursani1,2, Ahsan A.Ursani3,4 and David W.Corne1,2, 1Heriot Watt University, UK, 2Route Monkey Ltd, UK,3South Asian University New Delhi, India and 4Mehran University of Engineering and Technology Sindh Pakistan |
|
| Resource Allocation Method for Cloud Computing Environments with Different Service Quality to Users at Multiple Access Points [Pdf] Shin-ichi Kuribayashi,Seikei University, Japan |
|
| Approximating Nash Equilibrium Uniqueness of Power Control in Practical WSNs [Pdf] Evangelos D. Spyrou and Dimitrios K. Mitrakos, Aristotle University of Thessaloniki., Greece |
|
| Context-Aware Decision Making System for Mobile Cloud Offloading [Pdf] Mustafa Tanriverdi and M. Ali Akcayol, Gazi University, Turkey |
|
| Adaptive Handover Hysteresis and Call Admission Control for Mobile Relay Nodes [Pdf] Battulga Davaasambuu, Frank Semaganga and Takuro Sato, Waseda University, Japan |
|
| Dynamic Re-Clustering Leach-Based (Dr-Leach) Protocol for Wireless Sensor Networks [Pdf] Abdallah Ijjeh1, Abdalraheem Ijjeh2, Huthaifa Al-Issa1 and Saed Thuneibat1, 1Al-Balqa` Applied University / Al-Huson University College, Jordan and 2Technical college at Ranya, Saudi Arabia |
|
| Improving BitTorrent’s Peer Selection for Multimedia Content On-Demand Delivery [Pdf] Ananda Görck Streit and Carlo Kleber da Silva Rodrigues, University Center of Brasília (UniCEUB), Brazil |
|
| Analytic Hierarchy Process for Qos Evaluation of Mobile Data Networks [Pdf] Daniel E.Asuquo and Uduak A.Umoh, University of Uyo, Nigeria |
|
| An Overview of Visible Light Communication Systems [Pdf] Taner Cevik and Serdar Yilmaz, Fatih University, Turkey |
|
| Assessment of Health Monitoring System Using SDL Formal Method [Pdf] Anandi Giridharan and Pallapa Venkataram, Indian Institute of Science, India |
|
| A Scheme for Maximal Resource Utilization in Peer-To-Peer Live Streaming [Pdf] Bahaa Aldeen Alghazawy and Satoshi Fujita, Hiroshima University, Japan |
|
| Coding Openflow: Enable Network Coding in SDN Networks [Pdf] Jun Yang, Bin Dai, Lu Lv and Guan Xu, Huazhong University of Science and Technology, China |
|
| Application of Compressed Sampling for Spectrum Sensing and Channel Estimation in Wideband Cognitive Radio Networks [Pdf] Naveen Kumar and Neetu Sood, Dr B R Ambedkar NIT Jalandhar, India |
|
| Bandwidth Guaranteed Multicast Routing Algorithm [Pdf] Tran Cong Hung1, Huynh Thach Thao2 and Cao Thai Phuong Thanh3, 1Post & Telecommunications Institute of Technology, Vietnam, 2VP bank FE Credit, Vietnam and 3Saigon University, Vietnam |
|
| An Interoperability Framework for Identity Federation in Multi-Clouds [Pdf] Ahmad Mohammad Saied, Ayman Abdel-Hamid and Yasser El-Sonbaty, Arab Academy for science and Technology, Egypt |
|
| Server Congestion Control And Reduction of Server Power Consumption With DPI Technology [Pdf] Shin-ichi Kuribayashi, Seikei University, Japan |
|
| A Survey of Multimedia Streaming in Wireless Sensor Networks: Progress, Issues and Design Challenges [Pdf] Taner Cevik1, Alex Gunagwera2 and Nazife Cevik2, 1Fatih University, Turkey and 2Arel University, Turkey |
|
| Analyzing The Performance of the Dynamic Position Location and Tracking (D-Pl&T) of Mobile Nodes Using Omni Directional Antenna in Manet [Pdf] Sharmistha Khan1, Golam R Khan1, Dhadesugoor R. Vaman2, Siew T. Koay1 and Suxia Cui1, 1Prairie View A&M University, USA and 2Texas A&M University, USA |
|
| Distribution of Maximal Clique Size of the Vertices for Theoretical Small-World Networks and Real-World Networks [Pdf] Natarajan Meghanathan, Jackson State University, USA |
|
| A Proposed Architecture for Network Forensic System in Large-Scale Networks [Pdf] Tala Tafazzoli, Elham Salahi and Hossein Gharaee, Iran Telecommunication Research Center, Iran |
|
| The Influence of Information Security on the Adoption of Cloud Computing: An Exploratory Analysis [Pdf] Omondi John Opala1, Shawon Rahman2, and Abdulhameed Alelaiwi3, 1Cisco Networks System, USA, 2University of Hawaii-Hilo, USA and 3King Saud University, Saudi Arabia |
|
| A Genetic Algorithm to Solve the Minimum-Costpaths Tree Problem [Pdf] Ahmed Y. Hamed1 and M. R. Hassan2, 1University of Dammam, KSA and 2Aswan University, Egypt. |
|
| The Comparison of Immunization Mechanisms Against Disseminating Information in Social Networks [Pdf] Mohsen Raeisi1 and Behzad Akbari2, 1Islamic Azad University, Iran and 2Tarbiat Modares, Iran |
|
| Attack Countermeasure Tree (ACT) meets with the Split-protocol [Pdf] Bharat S Rawal, Penn State Abington, USA |
|
| Performance Improvement by Temporary Extension of an HPC Cluster [Pdf] Pil Seong Park, University of Suwon, Korea |
|
| Design and Implementation of New Routing Strategy for Enhanced Energy Efficient in WSN [Pdf] Mehdi Bouallegue1,2, Hager Benfradj3, Kosai Raoof1 and Bouallegue Ridha3, 1Laboratory of Acoustics at University of Maine, France, 2System of communication SysCom and 3University of Carthage, Tunisia and 3University of Carthage, Tunisia |
|
| Referencing Tool for Reputation and Trust in Wireless Sensor Networks [Pdf] Mohammad Abdus Salam1 and Alfred Sarkodee-Adoo2, 1Southern University, USA and 2Southern University, USA |
|
| Broadcast Wormhole-Routed 3-D Mesh Networks [Pdf] Amnah El-Obaid, Al-Zaytoonah University of Jordan, Jordan |
|
| Using Spectral Radius Ratio for Node Degree to Analyze the Evolution of Complex Networks [Pdf] Natarajan Meghanathan, Jackson State University, USA |
|
| Real Time Wireless Health Monitoring Application Using Mobile Devices [Pdf] Amna Abdullah, Asma Ismael, Aisha Rashid, Ali Abou-Elnour and Mohammed Tarique, Ajman University of Science and Technology, United Arab Emirates |
|
| Three-Dimension Hamiltonian Broadcast Wormhole-Routing [Pdf] Amnah El-Obaid, Al-Zaytoonah University of Jordan, Jordan |
|
| Embedding Bus and Ring into Hex-Cell Interconnection Network [Pdf] Qatawneh Mohammad1, Ahmad Alamoush1, Sawsan Basem1, Maen M. Al Assaf1 and Mohammad Sh. Daoud2, 1The University of Jordan, Jordan and 2al Ain University of Science and Technology, UAE |
|
| Correlating Objective Factors With Video Quality Experienced By End Users on P2PTV [Pdf] Huong Pham-Thi1, Hiep Hoang-Van2 and Takumi Miyoshi1, 1Shibaura Institute of Technology, Japan and 2Hanoi University of Science and Technology, Vietnam |
|
| Traffic Offloading Impact on the Performance of Channel-Aware/Qos-Aware Scheduling Algorithms for Video-Applications Over Lte-A Hetnets Using Carrier Aggregation [Pdf] Najem N.Sirhan, Gregory L.Heileman and Christopher C. Lamb, University of New Mexico, USA |
|
| A Novel Energy Aware Node Clustering Algorithm for Wireless Sensor Networks Using a Modified Artificial Fish Swarm Algorithm [Pdf] Reza Azizi1, Hasan Sedghi2, Hamid Shoja3, Alireza Sepas-Moghaddam4, 1Islamic Azad University, Iran, 2Pnu, Assaluye, Iran, 3Pnu, Tehran, Iran and 4Islamic Azad University, Iran |
|
| Fault-Tolerant Routing Scheme Based on Leach for Wireless Sensor Networks [Pdf] Chifaa Tabet Hellel1, Mohamed Lehsaini1 and Hervé Guyennet2, 1Tlemcen University, Algeria and 2 University of Franche-Comte, France |
|
| Radio Propagation Models in Wireless Networks of Unmanned Aerial Vehicles [Pdf] Jun Peng, University of Texas – Rio Grande Valley Edinburg, USA |
|
| Cross Layer Design for Power Control and Link Availability in Mobile Adhoc Networks [Pdf] Anita Yadav1, Y.N.Singh2, Smieee and Raghuraj Singh1, 1Harcourt Butler Technological Institute, Kanpur, India and 2Indian Institute Of Technology, India |
|
| A Novel Algorithm for TCP Timeout Calculation Over Wireless Ad Hoc Networks [Pdf] Tareq T. Krishan1 and Adnan M.Al-Smadi2, 1The University of Jordan-Aqaba, Jordan and 2yarmouk University, Jordan |
|
| Novel Designs of Broadband Patch Antenna for Wireless Communication Application (1800 Mhz And 2400 Mhz) [Pdf] Melad Olaimat and Aws Al-Qaisi, Al-Blaqa’a Applied University, Jordan |
|
| Managing, Searching and Accessing Iot Devices Via Rest Resources [Pdf] Jarogniew Rykowski, The Poznan University of Economics, Poland |
|
| Extending Network Lifetime of Wireless Sensor Networks [Pdf] Ali Amiri, Oklahoma State University, USA |
|
| Energy Efficient clustering in Heterogeneous Wireless Sensor Networks using Degree of Connectivity [Pdf] Ajay Sikandar and Sushil Kumar, Jawaharlal Nehru University, India |
|
| Fuzzy Based Clustering and Energy Efficient Routing for Underwater Wireless Sensor Networks [Pdf] Sihem Souiki, Mourad Hadjila and Mohammed Feham,T lemcen University, Algeria |
|
| PAR: Petal Ant Routing Algorithm for Mobile Ad Hoc Network [Pdf] Manjunath M and Manjaiah D.H, Mangalore University, India |
|
| Wireless Adhoc Multi Access Networks Optimization Using OSPF Routing Protocol Based on Cisco Devices [Pdf] Mohamed E.Khedr, Mohamed S. Zaghlouland Mohamed I. El-Desouky,Arab Academy for Science, Tech. and Maritime Transport, Egypt |
|
| Video Contents Prior Storing Server for Optical Access Network [Pdf] Tony Tsang, Chu Hai College of Higher Education, Hong Kong |
|
| Mobile Payment Method Based on Public-Key Cryptography [Pdf] Adnan A.Hnaif and Mohammad A. Alia, Al-Zaytoonah University of Jordan, Jordan |
|
| A New DNA Based Approach of Generating Key Dependent Mix Columns Transformation [Pdf] Auday H.Al-Wattar, Ramlan Mahmod, Zuriati Ahmad Zukarnain and NurIzura Udzir, Universiti Putra Malaysia, Malaysia |
|
| Maximizing Network Interruption in Wireless Sensor Network: An Intruder’s Perspective [Pdf] Mohammad Mahfuzul Islam1, Fariha Tasmin Jaigirdar1 and Mohammad Manzurul Islam2, 1Bangladesh University of Engineering and Technology (BUET), Bangladesh and 2University of Technology (UTS), Australia |
|
| White Space Steganography on Text By Using lzw-Huffman Double Compression [Pdf] Gelar Budiman and Ledya Novamizanti, Telkom University, Indonesia |
|
| Multi-Hop Distributed Coordination in Cognitive Radio Networks [Pdf] Abdallah Ijjeh, Al-Balqa`Applied University, Jordan |
|
| A Predictive Framework For Cyber Security Analytics Using Attack Graphs [Pdf] Subil Abraham1 and Suku Nair2, 1IBM Global Solution Center, USA and 2Southern Methodist University, USA |
|
| A Method of Evaluating Effect of QoS Degradation on Multidimensional QoE of Web Service with ISO – based Usability [Pdf] Daisuke Yamauchi and Yoshihiro Ito, Nagoya Institute of Technology, Japan |
|
| A Genetic Algorithm for Constructing Broadcast Trees with Cost and Delay Constraints in Computer Networks[Pdf] Ahmed Y. Hamed and Ghazi Al-Naymat, University of Dammam, KSA |
|
| Performance Improvement for PAPR Reduction in LTE Downlink System with Elliptic Filtering [Pdf] Snikdho Sworov Haque, Md. Munjure Mowla, Rajshahi University of Engineering & Technology, Bangladesh |
|
| A Novel Signature-Based Traffic Classification Engine To Reduce False Alarms In Intrusion Detection Systems [Pdf] Md. Azizul Islam and Md. Manirul Islam, American International University, Bangladesh |
|
| Concepts And Evolution Of Research In The Field Of Wireless Sensor Networks [Pdf] Ado Adamou ABBA ARI 1,3, Abdelhak GUEROUI1, Nabila LABRAOUI2 and Blaise Omer YENKE3, 1PRISM, University of Versailles St-Quentin-en-Yvelines, France, 21STIC, University of Tlemcen, Algeria and 3LASE, University of Ngaoundere, Cameroon |
|
| Adhoc Mobile Wireless Network Enhancement Based On Cisco Devices [Pdf] Mohamed E. Khedr, Mohamed S. Zaghloul and Mohamed I. El-Desouky, Arab Academy for Science, Egypt |
|
| Data Gathering In Wireless Sensor Networks Using Intermediate Nodes [ Pdf] Ahmad Ali Alhasanat1, Khitam M. Alatoun1, Abdullah I. Alhasanat1 and Aws Al-Qaisi2, 1Al-Hussein Bin Talal University, Jordan and 2Al-Balqa’ Applied University, Jordan |
|
| Clock Synchronization: Estimation of Non-deterministic Delays in Wireless Message Delivery [Pdf] Shiu Kumar1 and Seong Ro Lee2, 1Fiji national University, Fiji and 2Mokpo National University, South Korea |
|
| On The Approximation Of The Sum Of Lognormals By A Log Skew Normal Distribution [Pdf] Marwane Ben Hcine and Ridha Bouallegue, Univesity of Carthage Ariana, Tunisia |
|
| Multi User Performance On Mc Cdma Single Relay Cooperative System By Distributed Stbc In Rayleigh Fading Channel [Pdf] Gelar Budiman, Ali Muayyadi and Rina Pudji Astuti, Telkom University, Indonesia |
|
| Section Based Hex-Cell Routing ALGORITHM (SBHCR) [Pdf] Mohammad Qatawneh, Ahmad Alamoush and Ja’far Alqatawna, The University of Jordan, Jordan |
|
|
© 2016 AIRCC Publishing Corporation |
|
| Cross Layering using Reinforcement Learning in Cognitive Radio-based Industrial Internet of Ad-hoc Sensor Network Full Text Chetna Singhal and Thanikaiselvan V, VIT Vellore, India |
|
| F-802.11P: A Fuzzy Enhancement for IEEE 802.11P in Vehicle-to-Everything Communications Full Text Huy D. Le1, Ngoc T. Luong2 and Tam V. Nguyen3, 1Ha Noi University of Business and Technology, Viet Nam, 2Dong Thap University, Viet Nam, 3Vietnam Academy of Science and Technology, Viet NamHamdy A.M. Sayedahmed1, Emadeldin M. Elgamal2,1 and Hesham A. Hefny1, 1Cairo University, Egypt, 2Tarleton State University, USA |
|
| Design and Analysis of MIMO Patch Antenna for 5G Wireless Communication Systems Full Text Pallavi H. V1, A P Jagadeesh Chandra2 and Paramesha3, 1Government Engineering College, Haasan, India, 2Adichunchanagiri Institute of Technology, India, 3Central University of Karnataka, IndiaEnergy Aware Talented Clustering with Compressive Sensing (TCCS) for Wireless Sensor Networks Full Text Bejjam Komuraiah and M.S. Anuradha, AU College of Engineering (A), India |
|
| Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks Full Text Souparnika Jadhav and Nagesh K. N, Nagarjuna College of Engineering & Technology, India. Rashmi Patil1 and Rekha Patil2, 1Sharnbasva University, India, 2PDA college of Engineering, India |
|
|
Developing Algorithms for Image Steganography and Increasing the Capacity Depending on Choosing the Best Pixels Full Text |
|
| Innovative Low-Cost Perimeter Security Gadget With In-built Mechanism to Ensure Confidentiality, Authenticity and Non-Repudiation Full Text Ritesh Mukherjee1, Anirban Goswami2, Soumit Chowdhury3 and Nabin Ghoshal4, 1Centre for Development of Advanced Computing, India, 2Techno Main Salt Lake, India, 3Government College of Engineering & Ceramic Technology, India, 4University of Kalyani, India |
|
| An Efficient Machine Learning Optimization Model for Route Establishment Mechanism in IoT Environment Full Text Kishore Golla and S. PallamSetty, Andhra University, India |
|
| A New Security Boundary of Component Differentially Challenged XOR Pufs Against Machine Learning Modeling Attacks Full Text Gaoxiang Li1, Khalid T. Mursi2, Ahmad O. Aseeri3, Mohammed S. Alkatheiri2 and Yu Zhuang1, 1Texas Tech University, USA 2University of Jeddah, Saudi Arabia, 3Prince Sattam Bin Abdulaziz University, Saudi Arabiaa |
|
| AODVMO: A Security Routing Protocol using One-Time Password Authentication Mechanism based on Mobile Agent Full Text Huy D. Le1, Ngoc T. Luong2 and Tam V. Nguyen3, 1Ha Noi University of Business and Technology, Viet Nam, 2Dong Thap University, Viet Nam, 3Vietnam Academy of Science and Technology, Viet Nam |
|
| Cluster Based Routing using Energy and Distance Aware Multi-Objective Golden Eagle Optimization in Wireless Sensor Network Full Text Gundeboyina Srinivasalu1 and Hanumanthappa Umadevi2, 1Cambridge Institute of Technology, India 2Dr. Ambedkar Institute of Technology, India |
|
| Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and Clients Full Text Trent N. Ford, Eric Gamess and Christopher Ogden, Jacksonville State University, USA |
|
| FLOC: Hesitant Fuzzy Linguistic Term Set Analysis in Energy Harvesting Opportunistic Clustering Using Relative Thermal Entropy and RF Energy Transfer Full Text Junaid Anees and Hao-Chun Zhang, Harbin Institute of Technology, China |
|
| Performance Analysis of MITA Interleaver on Hybrid Systems using Diversity Full Text Priyanka Agarwal1 and Manoj K Shukla2, 1Harcourt Butler Technical University, India, 2REC Kannauj, India |
|
| A High Performance Hybrid Two Dimensional Spectral/Spatial NZCC/MD Code for SAC-OCDMA Systems with SDD Detection Full Text Berber Redouane1, Bouasria Fatima1, Chetioui Mohammed1,2, Damou Mehdi1 and Boudkhil Abdelhakim1,21Dr. Moulay Tahar University of Saida, Algeria, 2Abu-Bakr Belkaid University of Tlemcen, Algeria |
|
| Cognitive Radio Resource Scheduling using Multi-Agent Q-Learning for LTE Full Text Najem N. Sirhan and Manel Martinez-Ramon, University of New Mexico, USA |
|
| A Proposed Fuzzy Logic Approach for Conserving the Energy of Data Transmission in the Temperature Monitoring Systems of the Internet of Things Full Text Noha Elqeblawy, Ammar Mohammed and Hesham A.Hefny, Cairo University, Egypt |
|
| Constructing New Collective Signature Schemes Base on Two Hard Problems Factoring and Discrete Logarithm Full Text Tuan Nguyen Kim1, Nguyen Tran Truong Thien1, Duy Ho Ngoc2 and Nikolay A. Moldovyan3, 1Duy Tan University, Vietnam 2Department of Information Technology, Vietnam, 3SPIIRAS, Russia |
|
| A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G Networks Full Text Satya R. Das1, Sayan Sen Sarma2, Mitrabinda Khuntia1, Indranil Roy3, Koushik Sinha3 and Bhabani P. Sinha1, 1SOA University, India, 2University of Calcutta, India, 3Southern Illinois University, USA |
|
| ITA: The Improved Throttled Algorithm of Load Balancing on Cloud Computing Full Text Hieu N. Le and Hung C. Tran, Ho Chi Minh City Open University, Vietnam |
|
| Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive Real-Time Services Full Text Palash Kundu, Atunu Sarkar and Bhaskar Sardar, Jadavpur University, India |
|
| A Combination of the Intrusion Detection System and the Open-source Firewall using Python Language Full Text Tuan Nguyen Kim1, Tam Nguyen Tri2, Lam Tran Nguyen2 and Duy Thai Truong2, 1Duy Tan University, Vietnam, 2Danang ICT Infrastructure Development Center, Vietnam |
|
| Adaptive Sensor Sensing Range to Maximise Lifetime of Wireless Sensor Network Full Text Almamoon Naife Alauthman, Wan Nor Shuhadah Wan Nik, Nor Aida Mahiddin, Universiti Sultan Zainal Abidin, Malaysia |
|
| Adaptive Random Spatial based Channel Estimation (ARSCE) for Millimeter Wave MIMO System Full Text Rajkumar M Vadgave1, Manjula S2 and T S Vishwanath3, 1Veerappa Nisty Engineering College, India, 2Lingaraj Appa Engineering College, India, 3Bheemanna Khandre Institute of Technology, India |
|
| An Efficient Intrusion Detection System with Custom Features using FPA-Gradient Boost Machine Learning Algorithm Full Text D.V. Jeyanthi1 and B. Indrani2, 1Sourashtra College, India, 2DDE, Madurai Kamaraj University, IndiaOn The Performance of Intrusion Detection Systems with Hidden Multilayer Neural Network using DSD Training Full Text Trong Thua Huynh, Hoang Thanh Nguyen, Posts and Telecommunications Institute of Technology, Vietnam |
|
| Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular Ad-Hoc Networks (VANETS) Full Text Chantakarn Pholpol and Teerapat Sanguankotchakorn, Asian Institute of Technology, Thailand |
|
| An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network Full Text Priyanka Pandey and Raghuraj Singh, Harcourt Butler Technical University, India |
|
| Novel Position Estimation using Differential Timing Information for Asynchronous LTE/NR Networks Full Text Muhammad Abugabal, Yasmine Fahmy and Hazim Tawfik, Cairo University, Egypt |
|
| Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN Full Text Shivshanker. P. Biradar1 and T. S. Vishwanath2, 1LAEC, India, 2BKIT, India |
|
| A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network Full Text Slaheddine Chelbi1 and Riadh Moussi2,3, 1Qassim University, Kingdom of Saudi Arabia, 2Taibah University, Kingdom of Saudi Arabia, 3University of Kairouan, Tunisia |
|
| Performance Analysis in Cellular Networks Considering the QoS by Retrial Queueing Model with the Fractional Guard Channels Policies Full Text Dang ThanhChuong, Hoa Ly Cuong, Pham Trung Duc and Duong Duc Hung, Hue University, VietNam |
|
| MAR Security: Improved Security Mechanism for Emergency Messages of VANET using Group Key Management & Cryptography Schemes (GKMC) Full Text Mahabaleshwar Kabbur, Anand R and Arul Kumar V, REVA University, India |
|
| Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Encryption Full Text FUJITA Satoshi, Hiroshima University, Japan |
|
| MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet of Things Full Text Padmashree M G, Mallikarjun J P, Arunalatha J S and Venugopal K R, University Visvesvaraya College of Engineering, Bangalore University, India |
|
| Securing BGP by Handling Dynamic Network Behavior and Unbalanced Datasets Full Text Rahul Deo Verma, Shefalika Ghosh Samaddar and A. B. Samaddar, National Institute of Technology Sikkim, India |
|
| A Cooperative Localization Method based on V2I Communication and Distance Information in Vehicular NetworksFull Text Walaa Afifi, Hesham A. Hefny and Nagy R. Darwish, Cairo University, Egypt |
|
| Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Network Lifetime in WSNsFull Text Jungsub Ahn1, Sanghyeok Lim2 and Taeho Cho1*, 1Sungkyunkwan University, Republic of Korea, 2Amorepacific Republic of Korea |
|
| BER Analysis for Downlink MIMO-NOMA Systems over Rayleigh Fading ChannelsFull Text Vu Tran Hoang Son1, 2 and Dang Le Khoa1, 2*, 1VNUHCM – University of Science, Vietnam, 2Vietnam National University, Vietnam |
|
| Utilizing XAI Technique to Improve Autoencoder based Model for Computer Network Anomaly Detection with Shapley Additive Explanation(SHAP) Full Text Khushnaseeb Roshan and Aasim Zafar, Aligarh Muslim University, India |
|
| Threshold based VM Placement Technique for Load Balanced Resource Provisioning using Priority Scheme in Cloud Computing Full Text Mayank Sohani and S. C. Jain, Rajasthan Technical University, India |
|
| A New Efficient Cache Replacement Strategy for Named Data Networking Full Text Saad Al-Ahmadi, King Saud University, Saudi Arabia |
|
| An Effective Control of Hello Process for Routing Protocol in MANETs Full Text Dhirendra Kumar Sharma and Nitika Goenka, University of Petroleum and Energy Studies, India |
|
| Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterogeneous Wireless Sensor Network Full Text Nguyen Duy Tan, Vu Khanh Quy, Pham Ngoc Hung and Le Van Vinh, Hung Yen University of Technology and Education, Vietnam |
|
| Dynamic Task Scheduling based on Burst Time Requirement for Cloud Environment Full Text Linz Tom1 and Bindu V.R.2, 1Assumption College, India, 2Mahatma Gandhi University, India |
|
| Investigating Multilayer Omega-Type Networks Operating with the Cut-Through Technique under Uniform or Hotspot Traffic Conditions Full Text Eleftherios Stergiou1, John Garofalakis2, Dimitrios Liarokapis1 and Spiridoula Margariti1, 1University of Ioannina, Greece, 2University of Patras and Computer Technology Institute and Press- “DIOPHANTUS” (CTI) Patras, Greece |
|
| Privacy-Preserving Authentication Scheme for Roaming Service in Global Mobility Networks Full Text Sung Woon Lee1 and Hyunsung Kim2, 3, 1Tongmyong University, Korea, 2University of Malawi, Malawi, 3Kyungil University, Korea |
|
| Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular Ad-Hoc Networks (VANETS) Full Text Chantakarn Pholpol and Teerapat Sanguankotchakorn, Asian Institute of Technology, Thailand |
|
| An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network Full Text Priyanka Pandey and Raghuraj Singh, Harcourt Butler Technical University, India |
|
| Novel Position Estimation using Differential Timing Information for Asynchronous LTE/NR Networks Full Text Muhammad Abugabal, Yasmine Fahmy and Hazim Tawfik, Cairo University, Egypt |
|
| Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN Full Text Shivshanker. P. Biradar1 and T. S. Vishwanath2, 1LAEC, India, 2BKIT, India |
|
| A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network Full Text Slaheddine Chelbi1 and Riadh Moussi2,3, 1Qassim University, Kingdom of Saudi Arabia, 2Taibah University, Kingdom of Saudi Arabia, 3University of Kairouan, Tunisia |
|
| Performance Analysis in Cellular Networks Considering the QoS by Retrial Queueing Model with the Fractional Guard Channels Policies Full Text Dang ThanhChuong, Hoa Ly Cuong, Pham Trung Duc and Duong Duc Hung, Hue University, VietNam |
|
| MAR Security: Improved Security Mechanism for Emergency Messages of VANET using Group Key Management & Cryptography Schemes (GKMC) Full Text Mahabaleshwar Kabbur, Anand R and Arul Kumar V, REVA University, India |
|
| About Digital Communication Methods for Visible Light Communication Full Text Wataru Uemura, Yasuhiro Fukumori and Takato Hayama, Ryukoku University, Japan |
|
| Evolutionary Computing based Neuron-Computational Model for Microstrip Patch Antenna Design Optimization Full Text Rohini Saxena, Mukesh Kumar and Shadman Aslam, University of Allahabad, India |
|
| Multilayer Representation and Multiscale Analysis on Data Networks Full Text Luz Angela Aristizábal Q and Nicolás Toro G, Universidad Nacional de Colombia, Colombia |
|
| Clock Synchronization using Truncated Mean and Whale Optimization for Clustered Sensor Networks Full Text Karthik Soundarapandian1 and Ashok Kumar Ambrose2, 1Bharathiar University, India, 2Alagappa Govt. Arts College, India |
|
| A Controllable RSU and Vampire Moth to Support the Cluster Stability in VANET Full Text Ronald Adrian, Selo Sulistyo, I Wayan Mustika and Sahirul Alam, Universitas Gadjah Mada, Indonesia |
|
| A Method of Improving Energy Efficiency Through Geofencing and False Data Blocking In Context-Aware Architecture for Probabilistic Voting-Based Filtering Scheme of WSNs Full Text Su Man Nam1 and Youn Kyoung Seo2, 1DUDU Information Technologies, Republic of Korea, 2Incheon Jae Neung University, Republic of Korea |
|
| Trust Level Evaluation based Asymmetric Cryptography Protocol for Flexible Access Control in Fog Computing Full Text C. Nagarani1 and R. Kousalya2, 1PSG College of Arts and Science, India, 2Dr. N.G.P Arts and Science College, India |
|
| Dynamic Shaping Method using SDN And NFV Paradigms Full Text Shin-ichi Kuribayashi, Seikei University, Japan |
|
| Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for Performance Improvement in MANET Full Text Gyanendra Kumar Pallai1, Meenakshi Sankaran2 and Amiya Kumar Rath3, 1SOA University, India 2VIT Bhopal University, India, 3Veer Surendra Sai University of Technology, India |
|
| Developing an Adaptive Channel Modelling using a Genetic Algorithm Technique to Enhance Aerial Vehicle-to-Everything Wireless Communications Full Text Faris. A. Almalki, Taif University, Kingdom of Saudi Arabia |
|
| Q-Learning based Routing Protocol to Enhance Network Lifetime in WSNs Full Text Arunita Kundaliya and D.K. Lobiyal, Jawaharlal Nehru University, India |
|
| Quantile Regressive Fish Swarm Optimized Deep Convolutional Neural Learning for Reliable Data Transmission in IoV Full Text S. Suguna Devi and A. Bhuvaneswari, Cauvery College For Women, India |
|
| Privacy-Preserving Machine Authenticated Key Agreement for Internet of Things Full Text Beaton Kapito1,3, Mwawi Nyirenda1 and Hyunsung Kim1,2, 1University of Malawi, Malawi, 2Kyungil University, Korea 3Malawi Adventist University, Malawi |
|
| Does Digital Native Status Impact End-User Antivirus Usage? Full Text Gerrianne Roberts1 and Shawon Rahman2, 1Valencia College, USA, 2University of Hawaii-Hilo, USA |
|
| WiFi Transmit Power and its Effect on Co-Channel Interference Full Text Zyanya Cordoba, Riddhi Rana, Giovanna Rendon, Justin Thunell and Abdelrahman Elleithy, William Paterson University, USA |
|
| An Optimal Route Discovery using Biogeography based Optimization for Vehicular Ad Hoc Networks Full Text Shaeista Begum1, Nagaraj B. Patil2 and Vishwanath P3, 1Government Engineering College, Raichur, India, 2Government Engineering College, Gangavathi, India, 3H.K.E.S’s S.L.N. College Of Engineering, India |
|
| IPTV Improvement Approach over LTE-WLAN Heterogeneous Networks Full Text Mohamed Matoui, Noureddine Moumkine and Abdellah Adib, Faculty of Science and Technology Mohammedia, Morocco |
|
| Enhanced Particle Swarm Optimization for Effective Relay Nodes Deployment in Wireless Sensor Networks Full Text Bader Alshaqqawi1, Sardar Anisul Haque2, Mohammed Alreshoodi1 and Ibrahim Alsukayti1, 1Qassim University, Saudi Arabia, 2Alcorn State University, USA |
|
| Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Network Full Text Lakshmi M and Prashanth C R, Dr. Ambedkar Institute of Technology, India |
|
| An Exact Analytical Model for an IoT Network with MMPP Arrivals Full Text Osama Salameh, Arab American University, Palestine |
|
| Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for High Performance Monitoring Applications of Internet of Things Full Text Fawaz Alassery and Maha M. Althobaiti, Taif University, Saudi Arabia |
|
| Mobility Speed Effect and Neural Network Optimization for Deep MIMO Beamforming in mmWave Networks Full Text Mustafa S. Aljumaily and Husheng Li, University of Tennessee, USA |
|
| Wireless Networks Performance Monitoring Based on Passive-active Quality of Service Measurements Full Text Yazeed A. Al-Sbou, Applied Science University, Bahrain |
|
| Towards Fog-Assisted Virtual Reality MMOG with Ultra-Low Latency Full Text YOSHIHARA Tsuyoshi and FUJITA Satoshi, Hiroshima University, Japan |
|
| Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks Full Text Yasir Mohammed1, Maha Abdelhaq2 and Raed Alsaqour3, 1Iraqi Ministry of Electricity, Iraq, 2Princess Nourah bint Abdulrahman University, Saudi Arabia, 3Saudi Electronic University, Saudi Arabia |
|
| Peer to Peer Approach based Replica and Locality Awareness to Manage and Disseminate Data in Vehicular Ad Hoc Networks Full Text Abdelkader Guezzi1, Abderrahmane Lakas2, Ahmed Korichi1, Sarra Cherbal3, 1Kasdi Merbah University, Algeria, 2UAE University, UAE, 3University of Ferhat Abbas Setif, Algeria |
|
| Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc Networks Full Text Amir J. Majid, Ajman University, UAE |
|
| Using Machine Learning to Build a Classification Model for IoT Networks to Detect Attack Signatures Full Text Mousa Al-Akhras1, 2, Mohammed Alawairdhi1, Ali Alkoudari1 and Samer Atawneh1, 1Saudi Electronic University, Saudi Arabia, 2The University of Jordan, Jordan |
|
| Network Anomaly Detection based on Late Fusion of Several Machine Learning Algorithms Full Text Tran Hoang Hai1, Le Huy Hoang1 and Eui-nam Huh2, 1Hanoi University of Science and Technology, Vietnam, 2Kyung Hee University, Korea |
|
| An Efficient Data Collection Protocol for Underwater Wireless Sensor Networks Full Text Khaled Day1, Faiza Al-Salti2, Abderezak Touzene1 and Nasser Alzeidi1, 1Sultan Qaboos University, Oman, 2Muscat College, Oman |
|
| Jamming Detection based on Doppler Shift Estimation in Vehicular Communications Systems Full Text Javad Afshar Jahanshahi, Universidad Catolica Los Angeles de Chimbote, Peru |
|
| A Deep Learning Technique for Web Phishing Detection Combined URL Features and Visual Similarity Full Text Saad Al-Ahmadi and Yasser Alharbi, King Saud University, Saudi Arabia |
|
| A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting for FDL-equipped at OBS Core Node Full Text Dang Thanh Chuong1, Nguyen Hong Quoc1, Doan Van Thang2 and Pham Trung Duc1, 1Hue University, Vietnam, 2Industrial University of HCM City, Vietnam |
|
| Mean Object Size Considering Average Waiting Latency in M/BP/1 System Full Text Y. –J. Lee, Korea National University of Education, South Korea |
|
| A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based on OLSR Protocol Full Text Youssef Lmoumen1, Yassine Ruichek1 and Raja Touahni2, 1University Bourgogne FrancheComté, France, 2University IbnTofail, Morocco |
|
| Client Performance Predictions for Private Blockchain Networks Full Text YLászló Viktor Jánoky, János Levendovszky and Péter Ekler, Budapest University of Technology and Economics, Hungary |
|
| Determination of Minimum Number of UAVs for Local Area Networks of DronesFull Text Sandaruvan Rajasinghege and Rohan de Silva, CQ University, Australia |
|
| Performance Analysis of Routing Protocols with Roadside Unit Infrastructure in a Vehicular Ad Hoc NetworkFull Text Safae Smiri, Abdelali Boushaba, Rachid Ben Abbou and Azeddine Zahi, Sidi Mohamed Ben Abdelah University, Morocco |
|
| Multi-criteria Handover Decision for Heterogeneous Networks: Carrier Aggregation Deployment ScenarioFull Text Maryam Abdulazeez- Ahmed, Nor Kamariah Nordin, Aduwati Bint Sali and Fazirulhisyam Hashim, Universiti Putra Malaysia, Malaysia |
|
| Hybrid Model in the Block Cipher Applications for High-speed Communications NetworksFull Text Minh Nguyen Hieu1, Bac Do Thi2, Canh Hoang Ngoc3, Manh Cong Tran4, Phan Duong Phuc5 and Khoa Nguyen Tuan6, 1Institute of Cryptographic Science and Technology, Vietnam, 2Thai Nguyen University of Information and Communication Technology, Vietnam, 3Thuongmai University, Vietnam, 4Le Quy Don Technical University, Vietnam, 5Academy of Cryptography Techniques, Vietnam, 6Research Laboratories of Saigon High-Tech Park, Vietnam |
|
| Robotic Inner Signal Propagation and Random Access over Hybrid Access SchemeFull Text Abir Hossain, Zhenni Pan, Megumi Saito, Jiang Liu and Shigeru Shimamoto, Waseda University, Japan |
|
| An Experimental Study of IoT Networks Under Internal Routing AttackFull Text Mohammad Alreshoodi, Qassim University, Saudi Arabia |
|
| Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilities of Web ApplicationsFull Text Mohammad Shojaeshafiei, Letha Etzkorn and Michael Anderson, The University of Alabama in Huntsville, USA |
|
| Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs Full Text Radha Raman Chandan and P.K.Mishra, Banaras Hindu University, India |
|
| 6RLR-ABC: 6LOWPAN Routing Protocol with Local Repair using Bio Inspired Artificial Bee ColonyFull Text Nurul Halimatul Asmak Ismail1, Samer A. B. Awwad2 and Rosilah Hassan3, 1Princess Nourah Bint Abdulrahman University, Kingdom of Saudi Arabia, 2Independent Researcher, Kingdom of Saudi Arabia, 3Universiti Kebangsaan Malaysia, Malaysia |
|
| Swarm Optimization based Gravitational Search Approach for Channel Assignment in MCMR Wireless Mesh NetworkFull Text Nandini Balusu1, Suresh Pabboju2 and Narsimha G3, 1Telangana University, India, 2Chaitanya Bharathi Institute of Technology, India and 3JNTUH College of Engineering, India |
|
| Energy-efficient Multi-hop Routing with Unequal Clustering Approach for Wireless Sensor NetworksFull Text Younes El Assari, Samia Al Fallah, Jihane El Aasri, Mounir Arioua and Ahmed El Oualkadi, Abdelmalek Essaadi University, Morocco |
|
| Flooding Attack Detection and Mitigation in SDN with Modified Adaptive Threshold AlgorithmFull Text Nan Haymarn Oo1, Aris Cahyadi Risdianto2, Teck Chaw Ling3 and Aung Htein Maw4, 1University of Computer Studies, Yangon, Myanmar, 2Gwangju Institute of Science and Technology, Korea, 3University of Malaya, Malaysia 4University of Information Technology, Myanmar |
|
| Signaling Protocols for Local Area Networks of DronesFull Text Prabhu Jyot Singh and Rohan de Silva, School of Engineering and Technology CQ University Sydney, Australia |
|
| Localization Schemes for Underwater Wireless Sensor Networks: SurveyFull Text Faiza Al-Salti1, N. Alzeidi2 and Khaled Day2, 1Muscat College, Oman and 2Sultan Qaboos University, Oman |
|
| Performance Evaluation of Modbus TCP in Normal Operation and Under A Distributed Denial of Service AttackFull Text Eric Gamess1, Brody Smith1 and Guillermo Francia III2, 1Jacksonville State University, USA and 2University of West Florida, USA |
|
| An Adaptive Diffserv Approach to Support QoS in Network Mobility NEMO EnvironmentFull Text Loay F. Hussein1,2, Aisha-Hassan AbdallaHashim2, Mohamed Hadi Habaebi2 and Wan Haslina Hassan3, 1Jouf University, Saudi Arabia, 2International Islamic University Malaysia, Malaysia and 3Universiti Teknologi Malaysia, Malaysia |
|
| Mobile Crowd Sensing RPL-based Routing Protocol for Smart CityFull Text Yahya Al Sawafi, Abderezak Touzene, Khaled Day and Nasser Alzeidi, Sultan Qaboos University, Oman |
|
| Virtual Cache & Virtual Wan Accelerator Function Placement for Cost-effective Content Delivery ServicesFull Text Shin-ichi Kuribayashi, Seikei University, Japan |
|
| Auto Resource Management to Enhance Reliability and Energy Consumption in Heterogeneous Cloud ComputingFull Text Moataz H. Khalil1, 2, Mohamed Azab2, Ashraf Elsayed3, Walaa Sheta1, 2, Mahmoud Gabr3 and Adel S. Elmaghraby1,2, 1University of Louisville, USA, 2The City of Scientific Research and Technology Applications, Egypt and 3Alexandria University, Egypt |
|
| CLBNSRM – Confidence Level Based Unblend Neighbor Selection &Blend Node Report Based Optimized Route Formation in MANETFull Text S. J. Patil1, L.S. Admuthe2 and M. R. Patil3, 1VTU, India, 2DKTE’S Textile & Engineering Institute, India and 3J.A.G.M. Institute of Technology, India |
|
| Energy Performance of a Combined Horizontal and Vertical Compression Approach in Cluster-based WSNSFull Text Jihane El Aasri, Samia Al Fallah, Mounir Arioua and Ahmed El Oualkadi, Tangier Abdelmalek Essaadi University, Morocco |
|
| Least Square Channel Estimation for Image Transmission with OFDM Over Fading ChannelFull Text Usha S.M1 and Mahesh H.B2, 1JSS Academy of Technical Education, India and 2PES University, India |
|
| A Modified Interference Approximation Scheme for Improving Preamble Based Channel Estimation Performance in FBMC SystemFull Text Radwa A. Roshdy1, Mohamed A. Aboul-Dahab2 and Mohamed M. Fouad3, 1Higher Technological Institute, Egypt, 2Arab Academy for Science Technology and Martine transport, Egypt and 3Zagazig University, Egypt |
|
| Evaluation Methodology of MIMO Networks Performance over Rayleigh FadingFull Text Eleftherios Stergiou, Constantinos Angelis and Spiridoula V. Margariti, University of Ioannina, Greece |
|
| LTE Scheduler Algorithms for VANET Traffic in Smart CityFull Text Khadija Raissi and Bechir Ben Gouissem, University of Tunis El Manar, Tunisia |
|
| Lorawan Scalability Analysis – Co Spreading Factor InterferenceFull Text Aiju Thomas and N V Eldhose, M G University, India |
|
| Load Balancing Algorithm for Efficient VM Allocation in Heterogeneous CloudFull Text Badshaha P Mulla1, C. Rama Krishna1 and Raj Kumar Tickoo2, 1NITTTR, India and 2National Informatics Centre, Punjab State Unit, India |
|
| An Efficient and Secure Malicious Node Detection Model for Wireless Sensor NetworksFull Text Asmaa M.Morsi1, Tamer M. Barakat2 and Ahmed Ali Nashaat2, 1Al-Madina Higher Institute for Engineering and Technology, Egypt and 2Fayoum University, Egypt |
|
| Maintaining Cloud Performance under DDOS Attacks Full Text Moataz H. Khalil1, 2, Mohamed Azab2, Ashraf Elsayed3, Walaa Sheta1, 2, Mahmoud Gabr3 and Adel S. Elmaghraby1, 2, 1University of Louisville, USA, 2The City of Scientific Research and Technology Applications, Egypt and 3Alexandria University, Egypt |
|
| A Novel Hybrid Opportunistic Scalable Energy Efficient Routing Design for Low Power, Lossy Wireless Sensor NetworksFull Text Jayavignesh Thyagarajan and Suganthi K, Vellore Institute of Technology, India |
|
| Developing QoS by Priority Routing for Real Time Data in Internet of Things (IoT) Urban ScenariosFull Text Radwan S. Abujassar, Information Technology and Computing (ITC) Arab Open University, Kuwait |
|
| Controlling Delay at the Router Buffer using Modified Random Early DetectionFull Text Ahmad Adel Abu-Shareha, Arab Open University (AOU), Saudi Arabia |
|
| The Method of Detecting Online Password Attacks Based on High-level Protocol Analysis and Clustering TechniquesFull Text Nguyen Hong Son1 and Ha Thanh Dung2, 1Posts and Telecommunications Institute of Technology, Vietnam and 2Ho Chi Minh City University of Natural Resources and Environments, Vietnam |
|
| Multi-cluster Multi-channel Scheduling (MMS) Algorithm for Maximum Data Collection with Delay Minimization in WSNFull Text A. Vijayalakshmi1 and P. Vanaja Ranjan2, 1Vels Institute of Science, Technology and Advanced Studies (VISTAS), India and 2College of Engineering Anna University, India |
|
| Comparative and QoS Performance Analysis of Terrestrial-aerial Platforms-satellites Systems for Temporary EventsFull Text Faris. A. Almalki, Taif University, Saudi Arabia |
|
| A Comprehensive Study of DSCP Markings’ Impact on VOIP QoS in HFC Networks [pdf] Shaher Daoud and Yanzhen Qu, Colorado Technical University, USA |
|
| Histogram of Neighborhood Tripartite Authentication with Fingerprint-based Biometrics for IoT Services [pdf] S. Kanchana, PSG College of Arts & Science, India |
|
| Addressing Imbalanced Classes Problem of Intrusion Detection System Using Weighted Extreme Learning Machine [pdf] Mohammed Awad1, Alaeddin Alabdallah2, 1Arab American University, Palestine and 2An-Najah National University, Palestine |
|
| Energy Efficient Computing for Smart Phones in Cloud Assisted Environment [pdf] Nancy Arya1 Sunita Choudhary1 and S.Taruna2, 1Banasthali Vidyapith, India and 2JK Lakshmipat University, India |
|
| A Low-energy Data Aggregation Protocol Using an Emergency Efficient Hybrid Medium Access Control Protocol in Hierarchal Wireless Sensor Networks [pdf] Rana Adel and Tamer Barakat, Fayoum University, Egypt |
|
| A Novel Security Protocol for Wireless Sensor Networks Based on Elliptic Curve Signcryption [pdf] Anuj Kumar Singh1 and B.D.K.Patro2, 1Dr. A.P.J. Abdul Kalam Technical University, India and 2Rajkiya Engineering College, India |
|
| Containerized Services Orchestration for Edge Computing in Software-defined Wide Area Networks [pdf] Felipe Rodriguez Yaguache and Kimmo Ahola, Technical Research Centre of Finland (VTT), Finland |
|
| Multi-Objective Optimization Assisted Network Condition Aware QOS-Routing Protocol for MANETS: MNCQM [pdf] Shashi Raj K1 and Siddesh G K2, 1Dayananda Sagar College of Engineering, India and 2JSS Academy of Technical Education, India |
|
| A Mac Protocol with Dynamic Allocation of Time Slots Based on Traffic Priority in Wireless Body Area Networks [pdf] Sabin Bhandari and Sangman Moh, Chosun University, South Korea |
|
| Fuzzy Informer Homed Routing Protocol for Wireless Sensor Network [pdf] Gholamreza Kakamanshadi, Savita Gupta and Sukhwinder Singh, Panjab University, India |
|
| An Optimum Energy Consumption Hybrid Algorithm for XLN Strategic Design in WSN’S [pdf] Md. Khaja Mohiddin and V. B. S. Srilatha Indira Dutt, GITAM, India |
|
| A Fractal Based Image Cipher Using Knuth Shuffle Method and Dynamic Diffusion[pdf] Shafali Agarwal, USA |
|
| Lattice Structural Analysis on Sniffing to Denial of Service Attacks [pdf] B.Prabadevi1, N.Jeyanthi1, Nur Izura Udzir2 and Dhinaharan Nagamalai3, 1Vellore Institute of Technology, Vellore, India,2Universiti Putra Malaysia, Malaysia and 3Wireilla Net Solutions, Australia |
|
| Applying Geo-Encryption and Attribute Based Encryption to Implement Secure Access Control in the Cloud [pdf] Abu Salim1, Sachin Tripathi2 and Rajesh Kumar Tiwari3, 1Jazan University, Kingdom of Saudi Arabia, 2Indian Institute of Technology, India and 3RVS College of Eng. & Tech., India |
|
| Implementation of A Context-Aware Routing Mechanism in an Inexpensive Standalone Communication System for Disaster Scenarios [pdf] Regin Cabacas and In-Ho Ra, Kunsan National University, South Korea |
|
| Context-Aware Energy Conserving Routing Algorithm for Internet of Things [pdf] D. Kothandaraman1, C. Chellappan2, P. Sivasankar3 and Syed Nawaz Pasha1, 1S R Engineering College, India, 2Anna University, India and 3NITTTR, India |
|
| Fast Packets Delivery Techniques for Urgent Packets in Emergency Applications of Internet of Things [pdf] Fawaz Alassery, Taif University, Saudi Arabia |
|
| The Performance of Convolutional Coding Based Cooperative Communication: Relay Position and Power Allocation Analysis [pdf] Cebrail ÇIflikli, Waeal Al-Obaidi and Musaab Al-Obaidi, Erciyes University, Turkey |
|
| QoS Categories Activeness-Aware Adaptive EDCA Algorithm for Dense IoT Networks[pdf] Mohammed A. Salem1, Ibrahim F. Tarrad2, Mohamed I. Youssef3 and Sherine M. Abd El-Kader3, 1Higher Technological Institute, Egypt, 2Al-Azhar University, Egypt and 3Electronics Research Institute, Egypt |
|
| A Min-Max Scheduling Load Balanced Approach to Enhance Energy Efficiency and Performance of Mobile ADHOC Networks [pdf] K.Venkatachalapathy and D.Sundaranarayana, Annamalai University, India |
|
| Optimization of Packet Length for Two Way Relaying with Energy Harvesting [pdf] Ghassan Alnwaimi1, Hatem Boujemaa2 and Kamran Arshad3, 1King Abdulaziz University, Kingdom of Saudi Arabia, 2COSIM Laboratory, Tunisia and 3Ajman University, UAE |
|
| VIVoNet: Visually-Represented, Intent-Based, Voice-Assisted Networking [pdf] Amar Chaudhari, Amrita Asthana, Atharva Kaluskar, Dewang Gedia, Lakshay Karani, Levi Perigo, Rahil Gandotra and Sapna Gangwar, University of Colorado Boulder, USA |
|
| Design of Secure and Reliable MU-MIMO Transceiver System for Vehicular Networks[pdf] C. Manikandan, P. Neelamegam, S.Rakesh Kumar, G. Venkat Babu and Sai Siva Satwik Kommi, SASTRA Deemed University, India |
|
| Energy Consumption Reduction in Wireless Sensor Network Based on Clustering [pdf] Gholamreza Farahani, Iranian Research Organization for Science and Technology (IROST), Iran |
|
| Allocation of Virtual Firewall Functions in NFV-Based Networks with Minimum Network Cost [pdf] Shin-ichi Kuribayashi, Seikei University, Japan |
|
| RB-IEMRP: Relay Based Improved Throughput Energy-Efficient Multi-Hop Routing Protocol for INTRA Body Sensor Network (INTRA-WBSN)[pdf] Tarique Rashid1, Sunil Kumar2, Akshay Verma2, Prateek Raj Gautam2 and Arvind Kumar2, 1Katihar Engineering College, India and 2Motilal Nehru National Institute of Technology Allahabad, India |
|
| An Enhancement of Cluster-Based False Data Filtering Scheme Through Dynamic Security Selection in Wireless Sensor Networks [pdf] Jungsub Ahn and Taeho Cho, Sungkyunkwan University, Republic of Korea |
|
| Fuzzy Gene Optimized Reweight Boosting Classification for Energy Efficient Data Gathering in WSN [pdf] J.Srimathi1 and V.Valli Mayil2 , 1Bharathiar University, India and 2Periyar Maniammai University, India |
|
| A Markovian Model for Internet of Things Application [pdf] Osama Salameh and Mohammed Awadand Fadi AbuAlrub, Arab American University, Palestine |
|
| Enhancing Availability for Distributed Replicated Services Considering Network Edge Availability [pdf] Manghui Tu1, Liangliang Xiao2 and Dianxiang Xu3, 1Purdue University Northwest, Indiana, 2Frostburg StateUniversity, Maryland and 3Boise State University, Idaho |
|
| Machine Learning Algorithm of Detection of DOS Attacks on an Automotive Telematic Unit[pdf] Eric Perraud, Renault Software Labs, France |
|
| Energy Efficient Node Rank-Based Routing Algorithm in Mobile Ad-Hoc Networks [pdf] D. Kothandaraman1 and C. Chellappan2, 1S R Engineering College, India and 2Anna University, India |
|
| An open Jackson Network Model for Heterogeneous Infrastructure as a Service on Cloud Computing [pdf] Chien Nguyen Khac1, 2, Khiet Bui Thanh3, 4, Hung Ho Dac4, Son Nguyen Hong2, Vu Pham Tran3 and Hung Tran Cong2,1The People’s Police University, Vietnam, 2Posts and Telecoms Institute of Technology Ho Chi Minh City, Vietnam, 3Ho Chi Minh City University of Technology, Vietnam and 4Thu Dau Mot University, Vietnam |
|
| Broadband Power Line Communication: The Channel and Noise Analysis for A Power Line Network[pdf] Mukesh Kumar Varma, Zainual Abdin Jaffery and Ibraheem, Jamia Millia Islamia, India |
|
| Procedure of Effective Use of Cloudlets in Wireless Metropolitan Area Network Environment [pdf] Rashid Alakbarov and Oqtay Alakbarov, Azerbaijan National Academy of Sciences, Azerbaijan |
|
| Techniques for Offloading LTE Evolved Packet Core Traffic Using Openflow: A Comparative Survey & Design Reference [pdf] Kam Nasim1 and Trevor James Hall2, 1,2University of Ottawa,Canada |
|
| Optimization of Packet Length for MIMO systems [pdf] Ghassan Alnwaimi1, Hatem Boujemaa2 and Kamran Arshad3, 1King Abdulaziz University, Kingdom of Saudi Arabia,2Sup’Com, COSIM Laboratory, Tunisia and 3Ajman University, United Arab Emirates |
|
| Performance of OLSR MANET Adopting Cross-Layer Approach Under CBR and VBR Traffics Environment [pdf] Teerapat Sanguankotchakorn1, Sanika K.Wijayasekara2 and Sugino Nobuhiko3 1Asian Institute of technology, Thailand, 2Chulalongkorn University, Thailand and 3Tokyo Institute of Technology, Japan |
|
| Improvement of False Report Detection Performance Based on Invalid Data Detection Using Neural Network in WSN [pdf] Sanghyeok Lim and Taeho Cho, Sungkyunkwan University, Republic of Korea |
|
| Scalable and Energy Efficient Task Offloading Schemes for Vehicular Cloud Computing [pdf] Mohammad Pasha1 and Khaleel Ur Rahman Khan2, 1MJCET – Hyderabad, India and 2ACE – Hyderabad, India |
|
| A Novel Adaptive Caching Mechanism for Video on Demand System Over Wireless Mobile Network [pdf] Saleh Ali Alomari, Jadara University, Jordan |
|
| Availability Aspects Through Optimization Techniques Based Outlier Detection Mechanism in Wireless and Mobile Networks [pdf] Neeraj Chugh, Adarsh Kumar and Alok Aggarwal, University of Petroleum & Energy Studies – Dehradun, India |
|
| Improvement of Multiple Routing Based on Fuzzy Clustering and PSO Algorithm In WSNs to Reduce Energy Consumption [pdf] Gholamreza Farahani, Iranian Research Organization for Science and Technology (IROST), Iran |
|
| A Proactive Flow Admission and Re-Routing Scheme for Load Balancing and Mitigation of Congestion Propagation in SDN Data Plane [pdf] Sminesh C. N1, Grace Mary Kanaga E2, and Ranjitha K3, 1&3Govt. Engineering College – Thrissur, India, 2Karunya Institute of Technology and Sciences, India |
|
| Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection [pdf] Tony Jan and A.S.M Sajeev, Melbourne Institute of Technology, Australia |
|
| Performances of Ad Hoc Networks Under Deterministic and Probabilistic Channel Conditions : Cases for Single Path and Multipath Routing Protocols [pdf] Mohammed Tarique and Rumana Islam, Ajman University-Fujairah Campus, United Arab Emirates |
|
| Routing Protocols Performance in Mobile Ad-Hoc Networks Using Millimeter Wave [pdf] Mustafa S. Aljumaily, The University of Tennessee, USA |
|
| New Interconnection Topology for Network on Chip [pdf] Laxminath Tripathy and Chitta Ranjan Tripathy, Veer Surendra Sai University of Technology, India |
|
| A Hybrid Modulation Method for Dimming in Visible Light Communication [pdf] Wataru Uemura and Takahiro Kitazawa, Ryukoku University, Japan |
|
| Energy Efficient Routing Algorithm for Void Avoidance in UWSN Using Residual Energy and Depth Variance [pdf] Gulista Khan and R.K. Dwivedi, Teerthanker Mahaveer University, India |
|
| A Security Analysis of IoT Encryption : Side Channel Cube Attack on SIMECK32/64 [pdf] Alya Geogiana Buja1,2, Shekh Faisal Abdul-Latip1 and Rabiah Ahmad1, 1Universiti Teknikal Malaysia Melaka, Malaysia and 2Universiti Teknologi MARA, Malaysia |
|
| An Efficient Bandwidth Optimization and Minimizing Energy Consumption Utilizing Efficient Reliability and Interval Discrepant Routing (ERIDR) Algorithm [pdf] Sivashanmugam.N1 and Jothi Venkateshwaran.C2, 1Madras University, India and 2St. Peter’s Institute of Higher Education and Research, India |
|
| DPI-Based Congestion Control Method for Servers and Network Lines [pdf] Shin-ichi Kuribayashi, Seikei University, Japan |
|
| Deployment of Intrusion Prevention System on Multi-Core Processor Based Security Hardware [pdf] Swetha K V1 and Ravi Dara2, 1CMR Institute of Technology, India and 2Nevis Networks(I) Pvt.Ltd., India |
|
| Chained Displays : Configuration of Multiple Co-Located Public Displays [pdf] Amir E. Sarabadani Tafreshi, Milan Bombsch and Gerhard Troster, ETH Zurich, Switzerland |
|
| Efficient PAPR Reduction Approach for Selective Mapping in a STBC MIMO-OFDM System [pdf] VijayaLakshmi M and K Rama Linga Reddy, GNITS – Hyderabad, India |
|
| An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network [pdf] Ngoc Hong Tran1, Cao Vien Phung2, Binh Quoc Nguyen1 and Leila Bahri3, 1Vietnamese-German University, Vietnam, 2Technical University Braunschweig, Germany and 3KTH, Sweden |
|
| Improved Handover Algorithm to Avoid Duplication AAA Authentication in Proxy MIPV6 [pdf] Hewei Yu1 and Meiling Zhou2, 1South China University of Technology, P.R.China and 2GF Fund Management Co., Ltd., P.R.China |
|
| Proposed Load Balancing Algorithm to Reduce Response Time and Processing Time on Cloud Computing [pdf] Nguyen Xuan Phi, Cao Trung Tin, Luu Nguyen Ky Thu and Tran Cong Hung, Posts and Telecommunications Institute of Technology, Vietnam |
|
| Robot Human Interface for Housekeeper Robot with Wireless Capabilities [pdf] Suhad Faisal Behadili, University of Baghdad, Iraq |
|
| Path Splitting for Virtual Network Embedding in Elastic Optical Networks [pdf] Badr Oulad Nassar and Takuji Tachibana, University of Fukui, Japan |
|
| The Development and Study of the Methods and Algorithms for the Classification of Data Flows of Cloud Applications in the Network of the Virtual Data Center [pdf] Ramireddy Kondaiah1 and Bachala Sathyanarayana2, 1Rayalaseema University, India and 2Sri Krishnadevaraya University, India |
|
| Improvements in Routing Algorithms to Enhance Lifetime of Wireless Sensor Networks [pdf] D. Naga Ravikiran1 and C.G. Dethe2, 1Priyadarshini Institute of Engineering and Technology (PIET), India and 2RTM Nagpur University, India |
|
| Task Allocation and Path Planning for Network of Autonomous Underwater Vehicles [pdf] Bychkov Igor, Kenzin Maksim and Maksimkin Nikolay, Matrosov Institute for System Dynamics and Control Theory, Russia |
|
| Performance Evaluation of Blowfish Algorithm on Supercomputer IMAN1 [pdf] Mahmoud Rajallah Asassfeh, Mohammad Qatawneh and Feras Mohamed ALAzzeh, University of Jordan, Jordan |
|
| A System for Visualization of Big Attributed Hierarchical Graphs [pdf] Victor N. Kasyanov and Timur A. Zolotuhin, Institute of Informatics Systems, Novosibirsk State University, Russia |
|
| Lightweight Cryptography for Distributed PKI Based MANETS [pdf] N. Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, and V. Ch. Venkaiah, University of Hyderabad, India |
|
| Constructing a Fuzzy Network Intrusion Classifier Based on Differential Evolution and Harmonic Search [pdf] I. A. Hodashinsky and M. A. Mech, Tomsk State University of Control Systems and Radio electronics (TUSUR), Russia |
|
| Spectrum Sensing Strategy to Enhance the QoS in White-Fi Networks [pdf] Nabil Giweli, Seyed Shahrestani and Hon Cheung, Western Sydney University, Australia |
|
| Trust Factor and Fuzzy Firefly Integrated Particle Swarm Optimization Based Intrusion Detection and Prevention System for Secure Routing of MANET [pdf] Ramireddy Kondaiah1 and Bachala Sathyanarayana2, 1Rayalaseema University, India and 2Sri Krishnadevaraya University, India |
|
| Virtual Routing Function Deployment in NFV Based Networks Under Network Delay Constraints [pdf] Shin-ichi Kuribayashi, Seikei University, Japan |
|
| Response Surface Methodology for Performance Analysis and Modeling of MANET Routing Protocols [pdf] Mohamed Skander Daas and Salim Chikhi, Abdelhamid Mehri Constantine 2 University, Algeria |
|
| Quad Tree Based Static Multi Hop Leach Energy Efficient Routing Protocol : A Novel Approach [pdf] Abdulmalek Maresh Hasan Ali1 and Hanumanthappa J2, 1Visvesvaraya Technological University, India and 2University of Mysuru, India |
|
| A Extended Linear Multi-Commodity Multicost Network and Maximal Flow Limited Cost Problems [pdf] Tran Quoc Chien1 and Ho Van Hung2, 1University of Danang, Vietnam and 2Quangnam University, Vietnam |
|
| Imperative Programs Behavior Simulation in Terms of Compositional Petri Nets [pdf] Leontyev Denis Vasilevich, Kharitonov Dmitry Ivanovich and Tarasov Georgiy Vitalievich, Institute of Automation and Control Processes, Russia |
|
| On the Transmission of Asynchronous Data Streams Over Packet Switched Networks with Random Multiple Access [pdf] Yuriy Anatolievich Kropotov and Aleksander Anatolievich Kolpakov, Vladimir State University named after Alexander and Nicholay Stoletovs, Russia |
|
| Grid Based Priority Routing Protocol for UWSNs [pdf] Faiza Al-Salti, N. Alzeidi, Khaled Day, Bassel Arafeh and Abderezak Touzene, Sultan Qaboos University, Oman |
|
| Enhancement and Migration of Knowledge Science [pdf] Shawon S. M. Rahman1 and Syed V. Ahamed2, 1University of Hawaii-Hilo, USA and 2City University of New York, USA |
|
| Analysis of LTE Radio Load and User Throughput [pdf] Jari Salo1 and Eduardo Zacarías B2, 1Nokia Networks, Phillipines and 1Nokia Networks, Germany |
|
| A Proposal to Improve SEP Routing Protocol Using Insensitive Fuzzy C-Means in Wireless Sensor Network [pdf] Phan Thi The, Ngo Quang Quyen, Vu Ngoc Phan and Tran Cong Hung, Post & Telecommunications Institute of Technology, Vietnam |
|
| EWER:”Electromagnetic Wave Exposure Reduction” Service for Sensitive Users with Privacy Concerns [pdf] Mohamed Aymen Chalouf1, Francine Krief2 and Dramane Ouattara2, 1University of Rennes 1, France and 3University of Bordeaux, France |
|
| A Rapid Deployment Big Data Computing Platform for Cloud Robotics [pdf] Leigh Duggan1, James Dowzard1, Jayantha Katupitiya1 and Ka C. Chan2, 1University of New South Wales, Australia and 2La Trobe University, Australia |
|
| Multicasting Based Enhanced Proactive Source Routing in MANETs [pdf] Deepa Dasarathan1 and P. Nirmal Kumar2, 1Sathyabama University, India and 2Anna University, India |
|
| Topology Map Analysis for Effective Choice of Network Attack Scenario [pdf] Hidema Tanaka, National Defense Academy of Japan, Japan |
|
| An Analysis of the Fat-Tailedness of the Centrality Distributions of Real-World Networks [pdf] Natarajan Meghanathan ,Jackson State University, MS, USA |
|
| A Novel Approach for Optimizing Energy and Bandwidth Issues in MANET Using DSR Protocol [pdf] Ajay Lala,Anand Bhaskar, Prasun Chakrabarti and JitendraKaushal Srivastava,Department of Computer Science & Engineering, Sir PadampatSinghania University,Udaipur, Rajasthan, India |
|
| A Low Complexity User Grouping Strategy for Downlink Multi-User MIMO Scheduling [pdf] Nguyen Ngoc Van, School of Electronics and Telecommunications, Hanoi University of Science and Technology, No 1 , Dai Co Viet Street, Hai Ba Trung, HaNoi, Vietnam |
|
| Performance Analysis of R/KADEMLIA, Pastry and Bamboo Using Recursive Routing in Mobile Networks [pdf] Farida Chowdhury1and Md. Sadek Ferdous2, 1Department of Computer Science and Engineering, Shahjalal University of Science and Technology, Sylhet, Bangladesh. 2Electronics and Computer Science, University of Southampton, Southampton, UK. |
|
| Performance Analysis of Channel Capacity and Throughput of LTE Downlink System [pdf] P.Poornima1, G. Laxminarayana2and ,D. Srinivas Rao3 , 1Associate Professor, Dept. of ECE, Sphoorthy Engineering College, Hyderabad, India 2Professor, Dept. of ECE, Anurag College of Engineering, Hyderabad, India 3Professor, Dept. of ECE, JNTUH CEH, Kukatpally, Hyderabad, India |
|
| GARP : A Highly Reliable Grid Based Adaptive Routing Protocol for Underwater Wireless Sensor Networks [pdf] Khaled Day, Abderezak Touzene, Bassel Arafeh, and Nasser Alzeidi, Department of Computer Science, Sultan Qaboos University, Muscat, Oman |
|
| Accurate Available Bandwidth Allocation in HTTP Adaptive Streaming [pdf] Tan Phan-Xuan and Eiji Kamioka, Graduate School of Engineering and Science, Shibaura Institute of Technology, Tokyo, Japan |
|
| A Towards Efficient Privacy Preserving Data Aggregation for Advanced Metering Infrastructure [pdf] Navid A lamatsaz1 ,A rash Boustani2,Nima Alamatsaz,3Nima A lamatsaz, 4shkan Boustani.1,2Department of Electrcial Engineering and Computer Science, W ichita State University, W ichita, KS, USA.3 Department of Biomedical Engineering, New Jersey Institute of Technology, Newark, NJ, USA.4Department of Statistics and Mathematics, University of R ed Crescent Society of Iran, Mashad, Iran |
|
| Decision-making system supported by adaptive coloured petri nets [pdf] Haroldo Issao Guibu1,2 and Joao Jose Neto2, 1Instituto Federal de Educacao, Brazil, 2Escola Politecnica da Universidade de Sao Paulo, Brazil |
|
| Discovering New Cyber Protection Approaches from a Security Professional Prospective [pdf] Alain Loukaka1 and Shawon S. M. Rahman, Ph.D2,1 Capella University, Minneapolis, MN, USA, 2Majmaah University, Majmaah, Kingdom of Saudi Arabia |
|
| New Proposed Architecture For Q3 Interface To Manage IP-Based Networks [pdf] Gholamreza Farahani, Iranian Research Organization for Science and Technology (IROST), Iran |
|
| Investigation of Computational Intelligence Techniques for Intrusion Detection in Wireless Sensor Networks [pdf] Christopher D. McDermott and Andrei Petrovski, Robert Gordon University, United Kingdom |
|
| Victim Based Statistical Filtering : A New Deterrent Against Spoofed DoS Traffic [pdf] Suhail Qadir Mir1, S.M.K. Quadri2 , 1University of Kashmir, India and 2Jamia Millia Islamia, India |
|
| Combined Ieee 802.15.4 Physical Layer And Virtual Multiple Input Multiple Output (V- Mimo) Transmissions For Energy Efficient Wireless Sensor Networks [pdf] Fawaz Alassery, Taif University, Saudi Arabia |
|
| IMPROVING DISTRIBUTED ENERGY-EFFICIENT CLUSTERING ALGORITHM TO SAVE LIFETIME FOR HETEROGENEOUS WSN [pdf] Phan Thi The, Bui Hoang Mai, Nguyen Thanh Tuan and Tran Cong Hung, Post & Telecommunications Institute of Technology, Vietnam |
|
| A Novel framework for Intrusion Detection using Distributed Collaboration Detection Scheme in Packet Header Data [pdf] T.S. Urmila1 and R. Balasubramanian2, 1Mother Teresa Women’s University, India and 2Karpaga Vinayagar College of Engineering and Technology, India |
|
| Development and Evaluation of A Contact Center Application System to Integrate Multiple Communication Channels Using WebRTC [ pdf] Yusuke Shiga and KazumasaTakami, Soka University, Japan |
|
| A Structured Deep Neural Network For Data-Driven Localization In High Frequency Wireless Networks [ pdf] Marcus Z. Comiter, Michael B. Crouse and H. T. Kung, Harvard University, USA |
|
| Evaluation Of Congestion Control Methods For Joint Multiple Resource Allocation In Cloud Computing Environments [pdf] Shin-ichiKuribayashi, Seikei University, Japan |
|
| Performance Assessment of Maximum Likelihood in the Detection of Carrier Interference Corrupted GPS Data in Mobile Handsets [pdf] Taher AlSharabati, Al-Ahliyya Amman University, Jordan |
|
| Memory Efficient Forwarding Information Base for Content Centric Networking [pdf] Torsten Teubler1, Dennis Pfisterer2 and Horst Hellbruck1, 1CoSA Center of Excellence, Germany and 2University of Lubeck, Germany |
|
| A Real Time Priority Based Scheduler for Low Rate Wireless Sensor Networks [pdf] Sambhaji Sarode, Jagdish Bakal, RTM University, India |
|
| Low Cost Design and Implementation for HAS Using Multifunctional WI-FI [pdf] Mohammad Al Rawajbeh, Al Zaytoonah University of Jordan, Jordan |
|
| ECA Model Based QoS AODV Routing for MANETs [pdf] Raghavendra M1 and Pallapa Venkataram2, 1Siddaganga Institute of Technology, India and 2Indian Institute of Science, India |
|
| The Effect of Seeking Operation on QoE of HTTP Adaptive Streaming Services[pdf] Toshiro Nunome and Hiroaki Tani, Nagoya Institute of Technology, Japan |
|
| Mitigating Interference to GPS Operation Using Variable Forgetting Factor Based Recursive Least Squares Estimation [pdf] Aseel AlRikabi and Taher AlSharabati, Al-Ahliyya Amman University, Jordan |
|
| Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols in MANET [pdf] Mohamad T. Sultan and Salim M. Zaki, Cihan University, Iraq |
|
| A Comparative Performance Analysis of Route Redistribution among Three Different Routing Protocols Based on OPNET Simulation [pdf] Zeyad Mohammad, Ahmad Abusukhon and Marzooq A. Al-Maitah, Al-Zaytoonah University of Jordan, Jordan |
|
| Algorithm Finding Maximum Concurrent Multicommodity Linear Flow with Limited Cost in Extended Traffic Network with Single Regulating Coefficient on Two-Side Lines [pdf] Tran Quoc Chien and Nguyen Dinh Lau, University of Danang, Vietnam |
|
| Security Analysis of AES and Enhancing its Security by Modifying S-Box with an Additional Byte [pdf] Abdullah Al- Mamun1, Shawon S. M. Rahman2, Tanvir Ahmed Shaon1 and MdAlam Hossain1, 1Jessore University of Science and Technology, Bangladesh and 2Majmaah University, Kingdom of Saudi Arabia |
|
| Data Aggregation Routing Protocols in Wireless Sensor Networks : A Taxonomy [pdf] Saeid Pourroostaei Ardakani, Allameh Tabataba’i University, Iran |
|
| A Critical Improvement on Open Shop Scheduling Algorithm for Routing in Interconnection Networks [pdf] Stavros Birmpilis and Timotheos Aslanidis, National Technical University of Athens, Greece |
|
| Singular Value Decomposition: Principles and Applications in Multiple Input Multiple Output Communication System [pdf] Wael Abu Shehab and Zouhair Al-qudah, Al-Hussein Bin Talal University, Jordan |
|
| Fault Tolerant Routing Algorithm in Octagon-Cell Interconnected Network for Horizontal Moving Messages [pdf] Sanjukta Mohanty1 and Prafulla Ku. Behera2, 1North Orissa University, India and 2Utkal University, India |
|
| Analytical Study for Measuring the Electromagnetic Radiation of the GSM System in Urban Areas [pdf] Murad A.A.Almekhlafi, Sana’a University, Yemen |
|
| Position Based Adaptive Routing for VANETs [pdf] Ajay Guleria and Kuldeep Singh, Panjab University, India |
|
| Bounds on the Achievable Rates of Faded Dirty Paper Channel [pdf] Zouhair Al-qudah and Wael Abu Shehab, Al-Hussein Bin Talal University, Jordan |
|
| RFID Localisation for Internet of Things Smart Homes : A Survey [pdf] Belal Alsinglawi1, Mahmoud Elkhodr1, Quang Vinh Nguyen1 and Upul Gunawardana1, Anthony Maeder2 and Simeon Simoff1, 1Western Sydney University, Australia and 2Flinders University, Australia |
|
| Performance Evaluation of OSPF and RIP on IPV4 & IPV6 Technology Using G.711 Codec [pdf] Mabubur Syed and Isaac Yerima Ambore, Minnesota State University, USA |
|
| An Explicit Loss and Handoff Notification Scheme in TCP for Cellular Mobile System [pdf] Nayeema Islam and Mohammed Nasir Uddin, Jagannath University, Bangladesh |
|
| Wireless Sensors Integration into Internet of Things and the Security Primitives [pdf] Muhammad A. Iqbal and Magdy Bayoumi, University of Louisiana at Lafayette, USA |
|
| Performance Evaluation of Different Kernels for Support Vector Machine Used in Intrusion Detection System [pdf] Md. Al Mehedi Hasan1, Shuxiang Xu2, Mir Md. Jahangir Kabir2 and Shamim Ahmad1, 1University of Rajshahi, Bangladesh and 2University of Tasmania, Australia |
|
| An Enhanced Security for Government Base on Multifactor Biometric Authentication [pdf] Tran Cong Hung1, Nguyen Thanh Tri1,2 and Ho Nhut Minh3, 1Post & Telecommunications Institute of Technology, Vietnam, 2Binh Duong Department of Information and Communications, Vietnam and 3Saigon University, Vietnam |
|
| A Solution Framework for Managing Internet of Things (IOT) [pdf] Sukant K. Mohapatra1, Jay N. Bhuyan2, Pankaj Asundi1, and Anand Singh3, 1Ericsson, 2Tuskegee University, 3CenturyLink, USA |
|
| Performance Evaluation of Mobile WIMAX IEEE 802.16E for Hard Handover [pdf] Amira Youssef Fahoud and D.K. Lobiyal, Jawaharlal Nehru University, India |
|
| Flexible Virtual Routing Function Deployment in NFV Based Network with Minimum Total Network Cost [pdf] Shin-ichiKuribayashi, Seikei University, Japan |
|
| Game Theory Based Interference Control and Power Control for D2D Communication in Cellualar Networks [pdf] Fa-Bin Li 1, Peng-Xiang Li2, Ya-Fei Yang 2 and Hui Li2, 163812 Troop of PLA, P. R. China and 2Hainan University, China |
|
| Energy Consumption Improvement of Traditional Clustering Method in Wireless Sensor Network [pdf] Tran Cong Hung1 and Ly Quoc Hung2, 1Posts and Telecommunications Institute of Technology, Vietnam and 2Ho Chi Minh Technical and Economic College, Vietnam |
|
| Modeling, Implementation and Performance Analysis of Mobility Load Balancing for LTE Downlink Data Transmission [pdf] Mohamed Escheikh1 Hana Jouini1 and Kamel Barkaoui2, 1University of Tunis El Manar, Tunisia and 2Conservatoire national des arts et metiers, France |
|
| Performance Assessment of Chaotic Sequence Derived from Bifurcation Dependent Logistic Map in CDMA System [pdf] Oluyemi E. Adetoyi1 and Solomon A. Adeniran1, 1University of Ibadan, Nigeria and 1Obafemi Awolowo University, Nigeria |
|
| OMT : A Dynamic Authenticated Data Structure for Security Kernels [pdf] Somya D. Mohanty1, Mahalingam Ramkumar2 and Naresh Adhikari2, 1University of North Carolina – Greensboro, USA and 2Mississippi State University, USA |
|
| Proposed A Heterogeneous Clustering Algorithm to Improve QoS in WSN [ pdf ] Mehran Mokhtari1 and Masoomeh Tavakoli2, 1Islamic Azad University, Iran and 2Education Qaemshar, Iran |
|
| Energy Savings in Applications for Wireless Sensor Networks Time Critical Requirements [pdf] Tran Cong Hung1 and Ho Huu Trung1,2, 1Post & Telecommunications Institute of Technology, Vietnam and 2Ho Chi Minh City University of Technology, Vietnam |
|
| Adaptive Multi-Tenancy Policy for Enhancing Service Level Agreement Through Resource Allocation in Cloud Computing [pdf] MasnidaHussin, AbdullahMuhammed and NorAsilahWatiAbd Hamid, University of Putra Malaysia, Malaysia |
|
| Simulating Cortical Maps for Attention Shift in Autism[pdf] L.-H. Tan, S.-Y. Cho and Y.-Y. Nguwi, James Cook University, Singapore |
|
| TCP Incast Avoidance Based on Connection Serialization in Data Center Networks [ pdf ] Shigeyuki Osada1,2, Ryo Miyayama1, Yukinobu Fukushima1 and Tokumi Yokohira1, 1Okayama University, Japan and 2The Japan Research Institute, Japan |
|
| A Novel Routing Protocol for Target Tracking in Wireless Sensor Networks[pdf] Sanjay Pahuja and Tarun Shrimali, Indira Gandhi National Open University, India |
|
| Performance Analysis of the Link-Adaptive Cooperative Amplify-and-Forward Relay Networks with Opportunistic Relaying Strategy [pdf] Bhuvan Modi, O.Olabiyi and A.Annamalai, Prairie View A & M University, United States of America |
|
| Light Fidelity (Li-Fi) Based Indoor Communication System [pdf] Farooq Aftab, Muhammad Nafees Ulfat khan and Shahzad Ali, University of Science and Technology Beijing china (USTB), China |
|
| Study the Effect of Parameters to Load Balancing in Cloud Computing [pdf] Tran Cong Hung and Nguyen Xuan Phi, Posts and Telecommunications Institute of Technology, Vietnam |
|
| Simplified CBA Concept and Express Choice Method for Integrated Network Management System [pdf] Mohammad Al Rawajbeh1, Vladimir Sayenko2 and Mohammad I. Muhairat1, 1Al-Zaytoonah University of Jordan, Jordan and 2Kharkov National University of Radio Electronics (KhNURE) Kharkiv, Ukraine |
|
| Hiding A Message in Mp3 Using LSB With 1,2,3 and 4 Bits [pdf] Alaa AbedulsalamAlarood1,2, Azizah Abed Manaf1, Mohammed J.Alhaddad2 and Mohammed Salem Atoum3, 1University Technology Malaysia, Malaysia, 2King Abdulaziz University, Saudi Arabia and 3Irbid National University, Jordan |
|
| Geographic Maps Classification Based on L*A*B Color System [pdf] Salam M.Ghandour1 and Nidal M.Turab2, 1University of Jordan and 2Al Ahliyya Amman University, Jordan |
|
| Performances of Orthogonal Wavelet Division Multiplex (OWDM) System Under AWGN, Rayleigh and Ricean Channel Conditions [pdf] Mohammed Tarique, Ajman University of Science and Technology, United Arab Emirates |
|
| Dynamically Adaptable Improved OLSR (DA-IOLSR) Protocol[pdf] P.S.Vinayagam, Pondicherry University Community College, India |
|
| Performance and Complexity Analysis of a Reduced Iterations LLL Algorithm [pdf] Nizar OUNI and Ridha BOUALLEGUE, National Engineering School of Tunis, Tunisia |
|
| DIA-TORUS:A Novel Topology for Network on Chip Design[pdf] Deewakar Thakyal and Pushpita Chatterjee, SRM Research Institute, India |
|
| A Novel Method to Test Dependable Composed Service Components [pdf] Khaled Farj and Adel Smeda, University of Al-Jabel Al-Gharbi, Libya |
|
| Congestion Aware Link Cost Routing for MANETS [pdf] Tripti Sharma1 and Vivek Kumar2, 1Inderprastha Engineering College, India and 2Gurukul Kangri Vishwavidyalaya, India |
|
| Establishment of Virtual Policy Based Network Management Scheme By Load Experiments in Virtual Environment [pdf] Kazuya Odagiri1, Shogo Shimizu2 and Naohiro Ishii3, 1Sugiyama Jogakuen University, Japan, 2Gakushuin Women’s College, Japan and3Aichi Institute of Technology, Japan |
|
| Joint-Design of Link-Adaptive Modulation and Coding with Adaptive ARQ for Cooperative Amplify and Forward Relaying System [pdf] Bhuvan Modi, O. Olabiyi and A. Annamalai, Prairie View A & M University, USA |
|
Performance of TCP Congestion Control in UAV Networks of Various Radio Propagation Models [Pdf] Jun Peng, University of Texas – Rio Grande Valley, USA |
|
| Energy Efficient Cooperative Spectrum Sensing in Cognitive Radio[Pdf] Ramzi Saifan, Ghazi Al-Sukar, Rawaa Al-Ameer and Iyad Jafar, University of Jordan, Jordan |
|
| Cost-Efficient Residential Energy Management Scheme for Information-Centric Networking Based Home Network in Smart Grid[Pdf] Keping Yu1, Battulga Davaasambuu1, Nam Hoai Nguyenand1, Quang Nguyen1, Takuro Sato1 and Arifuzzaman Mohammad2, 1Waseda University, Japan and 2Memorial University of Newfoundland, Canada |
|
| Handover Optimization Based on Media Independent Handover in New Networks NGWN [Pdf] Safia Gueziz and Dris Korichi, Kasdi Merbah University, Algeria |
|
| Enhancement of Transmission Range Assignment for Clustered Wireless Sensor Networks[Pdf] M.Salamah and A.A.Hussein, Eastern Mediterranean University, Turkey |
|
| Effect of Operating Wavelengths and Different Weather Conditions on Performance of Point-to-Point Free Space Optical Link[Pdf] Md.Nur Islam and Md Nur Al Safa Bhuiyan, University of Rajshahi, Bangladesh |
|
| Performance Evaluation of Wireless Sensor Network Under Hello Flood Attack [Pdf] Mohammad Abdus Salam and Nayana Halemani, Southern University and A&M College Baton Rouge, USA |
|
| Comparative Analysis of Different Encryption Techniques in Mobile Ad Hoc Networks (MANETS) [Pdf] Amal Ahmad, Andraws Swidan and Ramzi Saifan, University Of Jordan, Jordan |
|
| The Impact of Node Misbehavior on the Performance of Routing Protocols in MANET [Pdf] Khaled Ahmed Abood Omer, University of Aden, Yemen |
|
| Optimizing Smart Things Addressing through the Zigbee-Based Internet of Things[Pdf] Tariq Lasloum and Ahmad S.Almogren, King Saud University, Saudi Arabia |
|
| GPS Systems Literature: Inaccuracy Factors And Effective Solutions [Pdf] Li Nyen Thin, Lau Ying Ting, Nor Adila Husna and Mohd Heikal Husin, Universiti Sains Malaysia, Malaysia |
|
| A Joint Timing Offset and Channel Estimation Using Fractional Fourier Transform and Cazac Sequences [Pdf] Cherif Rezgui and Khaled Grayaa, National School of Engineers of Tunis (ENIT), Tunisia |
|
| Performance Analysis of Multi-Path TCP Network [Pdf] Hamzah M A Hijawi and Mohammad M.N.Hamarsheh, Arab American University, Palestine |
|
| A Middleware for the Internet of Things [Pdf] Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung, Western Sydney University, Australia |
|
| An Optimal Fuzzy Logic System for a Nonlinear Dynamic System Using a Fuzzy Basis Function [Pdf] Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung, Western Sydney University, Australia |
|
Evaluation of a Topological Distance Algorithm for Construction of a P2P Multicast Hybrid Overlay Tree [Pdf] Sergej Alekseev and Jörg Schäfer, Frankfurt University of Applied Sciences, Germany |
|
| Optimal Bandwidth Allocation with Bandwidth Reservation and Adaptation in Wireless Communication Networks[Pdf] Ali Amiri, Oklahoma State University, USA |
|
| Performance Improvement of an As-Friendly Peer Selection Algorithm for P2P Live Streaming [Pdf] Yukinobu Fukushima, Kazuki Kobayashi and Tokumi Yokohira, Okayama University, Japan |
|
| QOS Evaluation of Heterogeneous Networks: Application-Based Approach[Pdf] Farnaz Farid, Seyed Shahrestani and Chun Ruan, Western Sydney University, Australia |
|
| Localization for Wireless Sensor Networks: A Neural Network Approach[Pdf] Shiu Kumar, Ronesh Sharma and Edwin R.Vans, Fiji national University, Fiji and University of the South Pacific, Fiji |
|
| A Smart Clustering Based Approach To Dynamic Bandwidth Allocation In Wireless Networks [Pdf] Mohammed Awad and Abdelmunem Abuhasan, Arab American University Jenin, Palestine |
|
| A Proposal to Enhance Cellular and Wifi Interworking Toward a Reliable Hetnet [Pdf] Nam Nguyen and Takuro Sato, Waseda University, Japan |
|
| Infrastructure of Services for a Smart City Using Cloud Environment [Pdf] SherifKamel Hussein1 and Mahmoud Hanafy Saleh2, 1October University for Modern Sciences and Arts, Egypt and 2Canadian International College, Egypt |
|
| Planning and Managing Virtualized Next Generation Networks [Pdf] Sukant K.Mohapatra1, Jay N.Bhuyan2 and Hira N.Narang2, 1Stevens Institute of Technology, New Jersey and 2Tuskegee University, USA |
|
| A Mass Balancing Theorem for the Economical Network Flow Maximisation [Pdf] Ziauddin Ursani1,2, Ahsan A.Ursani3,4 and David W.Corne1,2, 1Heriot Watt University, UK, 2Route Monkey Ltd, UK,3South Asian University New Delhi, India and 4Mehran University of Engineering and Technology Sindh Pakistan |
|
| Resource Allocation Method for Cloud Computing Environments with Different Service Quality to Users at Multiple Access Points [Pdf] Shin-ichi Kuribayashi,Seikei University, Japan |
|
| Approximating Nash Equilibrium Uniqueness of Power Control in Practical WSNs [Pdf] Evangelos D. Spyrou and Dimitrios K. Mitrakos, Aristotle University of Thessaloniki., Greece |
|
| Context-Aware Decision Making System for Mobile Cloud Offloading [Pdf] Mustafa Tanriverdi and M. Ali Akcayol, Gazi University, Turkey |
|
| Adaptive Handover Hysteresis and Call Admission Control for Mobile Relay Nodes [Pdf] Battulga Davaasambuu, Frank Semaganga and Takuro Sato, Waseda University, Japan |
|
| Dynamic Re-Clustering Leach-Based (Dr-Leach) Protocol for Wireless Sensor Networks [Pdf] Abdallah Ijjeh1, Abdalraheem Ijjeh2, Huthaifa Al-Issa1 and Saed Thuneibat1, 1Al-Balqa` Applied University / Al-Huson University College, Jordan and 2Technical college at Ranya, Saudi Arabia |
|
| Improving BitTorrent’s Peer Selection for Multimedia Content On-Demand Delivery [Pdf] Ananda Görck Streit and Carlo Kleber da Silva Rodrigues, University Center of Brasília (UniCEUB), Brazil |
|
| Analytic Hierarchy Process for Qos Evaluation of Mobile Data Networks [Pdf] Daniel E.Asuquo and Uduak A.Umoh, University of Uyo, Nigeria |
|
| An Overview of Visible Light Communication Systems [Pdf] Taner Cevik and Serdar Yilmaz, Fatih University, Turkey |
|
| Assessment of Health Monitoring System Using SDL Formal Method [Pdf] Anandi Giridharan and Pallapa Venkataram, Indian Institute of Science, India |
|
| A Scheme for Maximal Resource Utilization in Peer-To-Peer Live Streaming [Pdf] Bahaa Aldeen Alghazawy and Satoshi Fujita, Hiroshima University, Japan |
|
| Coding Openflow: Enable Network Coding in SDN Networks [Pdf] Jun Yang, Bin Dai, Lu Lv and Guan Xu, Huazhong University of Science and Technology, China |
|
| Application of Compressed Sampling for Spectrum Sensing and Channel Estimation in Wideband Cognitive Radio Networks [Pdf] Naveen Kumar and Neetu Sood, Dr B R Ambedkar NIT Jalandhar, India |
|
| Bandwidth Guaranteed Multicast Routing Algorithm [Pdf] Tran Cong Hung1, Huynh Thach Thao2 and Cao Thai Phuong Thanh3, 1Post & Telecommunications Institute of Technology, Vietnam, 2VP bank FE Credit, Vietnam and 3Saigon University, Vietnam |
|
| An Interoperability Framework for Identity Federation in Multi-Clouds [Pdf] Ahmad Mohammad Saied, Ayman Abdel-Hamid and Yasser El-Sonbaty, Arab Academy for science and Technology, Egypt |
|
| Server Congestion Control And Reduction of Server Power Consumption With DPI Technology [Pdf] Shin-ichi Kuribayashi, Seikei University, Japan |
|
| A Survey of Multimedia Streaming in Wireless Sensor Networks: Progress, Issues and Design Challenges [Pdf] Taner Cevik1, Alex Gunagwera2 and Nazife Cevik2, 1Fatih University, Turkey and 2Arel University, Turkey |
|
| Analyzing The Performance of the Dynamic Position Location and Tracking (D-Pl&T) of Mobile Nodes Using Omni Directional Antenna in Manet [Pdf] Sharmistha Khan1, Golam R Khan1, Dhadesugoor R. Vaman2, Siew T. Koay1 and Suxia Cui1, 1Prairie View A&M University, USA and 2Texas A&M University, USA |
|
| Distribution of Maximal Clique Size of the Vertices for Theoretical Small-World Networks and Real-World Networks [Pdf] Natarajan Meghanathan, Jackson State University, USA |
|
| A Proposed Architecture for Network Forensic System in Large-Scale Networks [Pdf] Tala Tafazzoli, Elham Salahi and Hossein Gharaee, Iran Telecommunication Research Center, Iran |
|
| The Influence of Information Security on the Adoption of Cloud Computing: An Exploratory Analysis [Pdf] Omondi John Opala1, Shawon Rahman2, and Abdulhameed Alelaiwi3, 1Cisco Networks System, USA, 2University of Hawaii-Hilo, USA and 3King Saud University, Saudi Arabia |
|
| A Genetic Algorithm to Solve the Minimum-Costpaths Tree Problem [Pdf] Ahmed Y. Hamed1 and M. R. Hassan2, 1University of Dammam, KSA and 2Aswan University, Egypt. |
|
| The Comparison of Immunization Mechanisms Against Disseminating Information in Social Networks [Pdf] Mohsen Raeisi1 and Behzad Akbari2, 1Islamic Azad University, Iran and 2Tarbiat Modares, Iran |
|
| Attack Countermeasure Tree (ACT) meets with the Split-protocol [Pdf] Bharat S Rawal, Penn State Abington, USA |
|
| Performance Improvement by Temporary Extension of an HPC Cluster [Pdf] Pil Seong Park, University of Suwon, Korea |
|
| Design and Implementation of New Routing Strategy for Enhanced Energy Efficient in WSN [Pdf] Mehdi Bouallegue1,2, Hager Benfradj3, Kosai Raoof1 and Bouallegue Ridha3, 1Laboratory of Acoustics at University of Maine, France, 2System of communication SysCom and 3University of Carthage, Tunisia and 3University of Carthage, Tunisia |
|
| Referencing Tool for Reputation and Trust in Wireless Sensor Networks [Pdf] Mohammad Abdus Salam1 and Alfred Sarkodee-Adoo2, 1Southern University, USA and 2Southern University, USA |
|
| Broadcast Wormhole-Routed 3-D Mesh Networks [Pdf] Amnah El-Obaid, Al-Zaytoonah University of Jordan, Jordan |
|
| Using Spectral Radius Ratio for Node Degree to Analyze the Evolution of Complex Networks [Pdf] Natarajan Meghanathan, Jackson State University, USA |
|
| Real Time Wireless Health Monitoring Application Using Mobile Devices [Pdf] Amna Abdullah, Asma Ismael, Aisha Rashid, Ali Abou-Elnour and Mohammed Tarique, Ajman University of Science and Technology, United Arab Emirates |
|
| Three-Dimension Hamiltonian Broadcast Wormhole-Routing [Pdf] Amnah El-Obaid, Al-Zaytoonah University of Jordan, Jordan |
|
| Embedding Bus and Ring into Hex-Cell Interconnection Network [Pdf] Qatawneh Mohammad1, Ahmad Alamoush1, Sawsan Basem1, Maen M. Al Assaf1 and Mohammad Sh. Daoud2, 1The University of Jordan, Jordan and 2al Ain University of Science and Technology, UAE |
|
| Correlating Objective Factors With Video Quality Experienced By End Users on P2PTV [Pdf] Huong Pham-Thi1, Hiep Hoang-Van2 and Takumi Miyoshi1, 1Shibaura Institute of Technology, Japan and 2Hanoi University of Science and Technology, Vietnam |
|
| Traffic Offloading Impact on the Performance of Channel-Aware/Qos-Aware Scheduling Algorithms for Video-Applications Over Lte-A Hetnets Using Carrier Aggregation [Pdf] Najem N.Sirhan, Gregory L.Heileman and Christopher C. Lamb, University of New Mexico, USA |
|
| A Novel Energy Aware Node Clustering Algorithm for Wireless Sensor Networks Using a Modified Artificial Fish Swarm Algorithm [Pdf] Reza Azizi1, Hasan Sedghi2, Hamid Shoja3, Alireza Sepas-Moghaddam4, 1Islamic Azad University, Iran, 2Pnu, Assaluye, Iran, 3Pnu, Tehran, Iran and 4Islamic Azad University, Iran |
|
| Fault-Tolerant Routing Scheme Based on Leach for Wireless Sensor Networks [Pdf] Chifaa Tabet Hellel1, Mohamed Lehsaini1 and Hervé Guyennet2, 1Tlemcen University, Algeria and 2 University of Franche-Comte, France |
|
| Radio Propagation Models in Wireless Networks of Unmanned Aerial Vehicles [Pdf] Jun Peng, University of Texas – Rio Grande Valley Edinburg, USA |
|
| Cross Layer Design for Power Control and Link Availability in Mobile Adhoc Networks [Pdf] Anita Yadav1, Y.N.Singh2, Smieee and Raghuraj Singh1, 1Harcourt Butler Technological Institute, Kanpur, India and 2Indian Institute Of Technology, India |
|
| A Novel Algorithm for TCP Timeout Calculation Over Wireless Ad Hoc Networks [Pdf] Tareq T. Krishan1 and Adnan M.Al-Smadi2, 1The University of Jordan-Aqaba, Jordan and 2yarmouk University, Jordan |
|
| Novel Designs of Broadband Patch Antenna for Wireless Communication Application (1800 Mhz And 2400 Mhz) [Pdf] Melad Olaimat and Aws Al-Qaisi, Al-Blaqa’a Applied University, Jordan |
|
| Managing, Searching and Accessing Iot Devices Via Rest Resources [Pdf] Jarogniew Rykowski, The Poznan University of Economics, Poland |
|
| Extending Network Lifetime of Wireless Sensor Networks [Pdf] Ali Amiri, Oklahoma State University, USA |
|
| Energy Efficient clustering in Heterogeneous Wireless Sensor Networks using Degree of Connectivity [Pdf] Ajay Sikandar and Sushil Kumar, Jawaharlal Nehru University, India |
|
| Fuzzy Based Clustering and Energy Efficient Routing for Underwater Wireless Sensor Networks [Pdf] Sihem Souiki, Mourad Hadjila and Mohammed Feham,T lemcen University, Algeria |
|
| PAR: Petal Ant Routing Algorithm for Mobile Ad Hoc Network [Pdf] Manjunath M and Manjaiah D.H, Mangalore University, India |
|
| Wireless Adhoc Multi Access Networks Optimization Using OSPF Routing Protocol Based on Cisco Devices [Pdf] Mohamed E.Khedr, Mohamed S. Zaghlouland Mohamed I. El-Desouky,Arab Academy for Science, Tech. and Maritime Transport, Egypt |
|
| Video Contents Prior Storing Server for Optical Access Network [Pdf] Tony Tsang, Chu Hai College of Higher Education, Hong Kong |
|
| Mobile Payment Method Based on Public-Key Cryptography [Pdf] Adnan A.Hnaif and Mohammad A. Alia, Al-Zaytoonah University of Jordan, Jordan |
|
| A New DNA Based Approach of Generating Key Dependent Mix Columns Transformation [Pdf] Auday H.Al-Wattar, Ramlan Mahmod, Zuriati Ahmad Zukarnain and NurIzura Udzir, Universiti Putra Malaysia, Malaysia |
|
| Maximizing Network Interruption in Wireless Sensor Network: An Intruder’s Perspective [Pdf] Mohammad Mahfuzul Islam1, Fariha Tasmin Jaigirdar1 and Mohammad Manzurul Islam2, 1Bangladesh University of Engineering and Technology (BUET), Bangladesh and 2University of Technology (UTS), Australia |
|
| White Space Steganography on Text By Using lzw-Huffman Double Compression [Pdf] Gelar Budiman and Ledya Novamizanti, Telkom University, Indonesia |
|
| Multi-Hop Distributed Coordination in Cognitive Radio Networks [Pdf] Abdallah Ijjeh, Al-Balqa`Applied University, Jordan |
|
| A Predictive Framework For Cyber Security Analytics Using Attack Graphs [Pdf] Subil Abraham1 and Suku Nair2, 1IBM Global Solution Center, USA and 2Southern Methodist University, USA |
|
| A Method of Evaluating Effect of QoS Degradation on Multidimensional QoE of Web Service with ISO – based Usability [Pdf] Daisuke Yamauchi and Yoshihiro Ito, Nagoya Institute of Technology, Japan |
|
| A Genetic Algorithm for Constructing Broadcast Trees with Cost and Delay Constraints in Computer Networks[Pdf] Ahmed Y. Hamed and Ghazi Al-Naymat, University of Dammam, KSA |
|
| Performance Improvement for PAPR Reduction in LTE Downlink System with Elliptic Filtering [Pdf] Snikdho Sworov Haque, Md. Munjure Mowla, Rajshahi University of Engineering & Technology, Bangladesh |
|
| A Novel Signature-Based Traffic Classification Engine To Reduce False Alarms In Intrusion Detection Systems [Pdf] Md. Azizul Islam and Md. Manirul Islam, American International University, Bangladesh |
|
| Concepts And Evolution Of Research In The Field Of Wireless Sensor Networks [Pdf] Ado Adamou ABBA ARI 1,3, Abdelhak GUEROUI1, Nabila LABRAOUI2 and Blaise Omer YENKE3, 1PRISM, University of Versailles St-Quentin-en-Yvelines, France, 21STIC, University of Tlemcen, Algeria and 3LASE, University of Ngaoundere, Cameroon |
|
| Adhoc Mobile Wireless Network Enhancement Based On Cisco Devices [Pdf] Mohamed E. Khedr, Mohamed S. Zaghloul and Mohamed I. El-Desouky, Arab Academy for Science, Egypt |
|
| Data Gathering In Wireless Sensor Networks Using Intermediate Nodes [ Pdf] Ahmad Ali Alhasanat1, Khitam M. Alatoun1, Abdullah I. Alhasanat1 and Aws Al-Qaisi2, 1Al-Hussein Bin Talal University, Jordan and 2Al-Balqa’ Applied University, Jordan |
|
| Clock Synchronization: Estimation of Non-deterministic Delays in Wireless Message Delivery [Pdf] Shiu Kumar1 and Seong Ro Lee2, 1Fiji national University, Fiji and 2Mokpo National University, South Korea |
|
| On The Approximation Of The Sum Of Lognormals By A Log Skew Normal Distribution [Pdf] Marwane Ben Hcine and Ridha Bouallegue, Univesity of Carthage Ariana, Tunisia |
|
| Multi User Performance On Mc Cdma Single Relay Cooperative System By Distributed Stbc In Rayleigh Fading Channel [Pdf] Gelar Budiman, Ali Muayyadi and Rina Pudji Astuti, Telkom University, Indonesia |
|
| Section Based Hex-Cell Routing ALGORITHM (SBHCR) [Pdf] Mohammad Qatawneh, Ahmad Alamoush and Ja’far Alqatawna, The University of Jordan, Jordan |
|
|
© 2016 AIRCC Publishing Corporation |
|