November 2022, Volume 14, Number 6
Machine Learning based Frame Size Optimization in WLAN Downlink MU-MIMO Channel with the Least Cost of Delay Full Text Lemlem Kassa1, Jianhua Deng1, Mark Davis2 and Jingye Cai1, 1University of Electronic Science and Technology China (UESTC) China, 2Communication Network Research Institute (CNRI), Technological University Dublin, Ireland |
Improvements for Uplink Long Term Evolution (UL-LTE) in Heterogeneous Network using Dynamic Spectrum Allocation Technique Full Text |
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying Search Algorithm Full Text Waleed Khalid Ahmed1, MohdNazri bin Mohd Warip1, Waleed Khalid Abduljabbar2 and Mohamed Elshaikh11University Malaysia Perlis (UniMAP), Malaysia, 2College of Administration and Economics University of Fallujah, Iraq RTL-DL: A Hybrid Deep Learning Framework for DDoS Attack Detection in a Big Data Environment Full Text Hassan A Afolabi and Abdurazzag A Aburas, University of Kwazulu-Natal South Africa |
Efficient Scrambling-Substitution Image Security Scheme using Chaotic Arnold-Logistic Maps in the Discrete Cosine Transform Full Text Mohammed A. AlZain, Taif University, Saudi Arabia |
Web Attack Prediction using Stepwise Conditional Parameter Tuning in Machine Learning Algorithms with Usage Data Full Text Meena1 and Dr. A. Pethalakshmi2, 1Mother Teresa Women’s University, India, 2Alagappa Government Arts College, India |
Twin-Node Neighbour Attack on AODV based Wireless Ad Hoc Network Full Text |
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT) Full Text JAMAL Elhachmi and ABDELLATIF Kobbane, Mohammed V University in Rabat, Morocco |
September 2022, Volume 14, Number 5
Mobility and Routing based Channel Estimation for Hybrid Millimeter-Wave MIMO WSNs Full Text Geeta and A.M. Bhavikatti, Bheemanna Khandre Institute of Technology, India |
Performance Improvement for the Single Carrier in FBMC Systems by PAPR Reduction Full Text |
Hybrid Red Deer Algorithm with Physical Unclonable Function for Security Enhancement in IoT-WSN Full Text Shilpa Venkata Rao and Vidya Anantha, Vivekananda Institute of Technology, India Controlling Adaptive Contention Window to Improve Safe Message Received Rate in VANET Full Text |
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation with Hybrid Beam Forming Power Transfer in WSN-IoT Applications Full Text |
Multi-Layer Digital Validation of Candidate Service Appointment with Digital Signature and Bio-Metric Authentication Approach Full Text |
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures Full Text |
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machine for Trust Model and Link Reliability Full Text Shalini Sharma and Syed Zeeshan Hussain, Jamia Millia Islamia University New Delhi, India |
July 2022, Volume 14, Number 4
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industrial Internet of Ad-hoc Sensor Network Full Text |
F-802.11P: A Fuzzy Enhancement for IEEE 802.11P in Vehicle-to-Everything Communications Full Text |
Design and Analysis of MIMO Patch Antenna for 5G Wireless Communication Systems Full Text Energy Aware Talented Clustering with Compressive Sensing (TCCS) for Wireless Sensor Networks Full Text |
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks Full Text |
Developing Algorithms for Image Steganography and Increasing the Capacity Depending on Choosing the Best Pixels Full Text |
Innovative Low-Cost Perimeter Security Gadget With In-built Mechanism to Ensure Confidentiality, Authenticity and Non-Repudiation Full Text |
An Efficient Machine Learning Optimization Model for Route Establishment Mechanism in IoT Environment Full Text |
May 2022, Volume 14, Number 3
A New Security Boundary of Component Differentially Challenged XOR Pufs Against Machine Learning Modeling Attacks Full Text Gaoxiang Li1, Khalid T. Mursi2, Ahmad O. Aseeri3, Mohammed S. Alkatheiri2 and Yu Zhuang1, 1Texas Tech University, USA 2University of Jeddah, Saudi Arabia, 3Prince Sattam Bin Abdulaziz University, Saudi Arabiaa |
AODVMO: A Security Routing Protocol using One-Time Password Authentication Mechanism based on Mobile Agent Full Text Huy D. Le1, Ngoc T. Luong2 and Tam V. Nguyen3, 1Ha Noi University of Business and Technology, Viet Nam, 2Dong Thap University, Viet Nam, 3Vietnam Academy of Science and Technology, Viet Nam |
Cluster Based Routing using Energy and Distance Aware Multi-Objective Golden Eagle Optimization in Wireless Sensor Network Full Text Gundeboyina Srinivasalu1 and Hanumanthappa Umadevi2, 1Cambridge Institute of Technology, India 2Dr. Ambedkar Institute of Technology, India
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique over WLAN SDN Architecture Full Text |
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique over WLAN SDN Architecture Full Text Pacharakit Vanitchasatit and Teerapat Sanguankotchakorn, Asian Institute of Technology, Thailand |
Probabilistic based Optimal Node Localization in Wireless Sensor Networks Full Text Souparnika Jadhav and Nagesh K. N, Nagarjuna College of Engineering & Technology, India |
Advanced Service Data Provisioning for Real-Time Management of Ongoing Cellular Communication Networks Full Text Mikhail E. Belkin1, Leonid Zhukov1, Alexander S. Sigov1 and Mikhail G. Vasil’ev2, 1Russian Technological University MIREA, Russia, 2Kurnakov Institute of General and Inorganic Chemistry of the RAS, Russia |
A New Approach to Improve the Performance of OFDM Signal for 6G Communication Full Text Usha S.M1 and Mahesh H.B2, 1Visveswaraya Technological University, India, 2PES University, India |
Mach 2022, Volume 14, Number 2
January 2022, Volume 14, Number 1
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G Networks Full Text Satya R. Das1, Sayan Sen Sarma2, Mitrabinda Khuntia1, Indranil Roy3, Koushik Sinha3 and Bhabani P. Sinha1, 1SOA University, India, 2University of Calcutta, India, 3Southern Illinois University, USA |
ITA: The Improved Throttled Algorithm of Load Balancing on Cloud Computing Full Text Hieu N. Le and Hung C. Tran, Ho Chi Minh City Open University, Vietnam |
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive Real-Time Services Full Text Palash Kundu, Atunu Sarkar and Bhaskar Sardar, Jadavpur University, India |
A Combination of the Intrusion Detection System and the Open-source Firewall using Python Language Full Text Tuan Nguyen Kim1, Tam Nguyen Tri2, Lam Tran Nguyen2 and Duy Thai Truong2, 1Duy Tan University, Vietnam, 2Danang ICT Infrastructure Development Center, Vietnam |
Adaptive Sensor Sensing Range to Maximise Lifetime of Wireless Sensor Network Full Text Almamoon Naife Alauthman, Wan Nor Shuhadah Wan Nik, Nor Aida Mahiddin, Universiti Sultan Zainal Abidin, Malaysia |
Adaptive Random Spatial based Channel Estimation (ARSCE) for Millimeter Wave MIMO System Full Text Rajkumar M Vadgave1, Manjula S2 and T S Vishwanath3, 1Veerappa Nisty Engineering College, India, 2Lingaraj Appa Engineering College, India, 3Bheemanna Khandre Institute of Technology, India |
An Efficient Intrusion Detection System with Custom Features using FPA-Gradient Boost Machine Learning Algorithm Full Text D.V. Jeyanthi1 and B. Indrani2, 1Sourashtra College, India, 2DDE, Madurai Kamaraj University, India
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neural Network using DSD Training Full Text |
Threshold based VM Placement Technique for Load Balanced Resource Provisioning using Priority Scheme in Cloud Computing Full Text Mayank Sohani and S. C. Jain, Rajasthan Technical University, India |
A New Efficient Cache Replacement Strategy for Named Data Networking Full Text Saad Al-Ahmadi, King Saud University, Saudi Arabia |
An Effective Control of Hello Process for Routing Protocol in MANETs Full Text Dhirendra Kumar Sharma and Nitika Goenka, University of Petroleum and Energy Studies, India |
Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterogeneous Wireless Sensor Network Full Text Nguyen Duy Tan, Vu Khanh Quy, Pham Ngoc Hung and Le Van Vinh, Hung Yen University of Technology and Education, Vietnam |
Dynamic Task Scheduling based on Burst Time Requirement for Cloud Environment Full Text Linz Tom1 and Bindu V.R.2, 1Assumption College, India, 2Mahatma Gandhi University, India |
Investigating Multilayer Omega-Type Networks Operating with the Cut-Through Technique under Uniform or Hotspot Traffic Conditions Full Text Eleftherios Stergiou1, John Garofalakis2, Dimitrios Liarokapis1 and Spiridoula Margariti1, 1University of Ioannina, Greece, 2University of Patras and Computer Technology Institute and Press- “DIOPHANTUS” (CTI) Patras, Greece |
Privacy-Preserving Authentication Scheme for Roaming Service in Global Mobility Networks Full Text Sung Woon Lee1 and Hyunsung Kim2, 3, 1Tongmyong University, Korea, 2University of Malawi, Malawi, 3Kyungil University, Korea |
March 2021, Volume 13, Number 2
WiFi Transmit Power and its Effect on Co-Channel Interference Full Text Zyanya Cordoba, Riddhi Rana, Giovanna Rendon, Justin Thunell and Abdelrahman Elleithy, William Paterson University, USA |
An Optimal Route Discovery using Biogeography based Optimization for Vehicular Ad Hoc Networks Full Text Shaeista Begum1, Nagaraj B. Patil2 and Vishwanath P3, 1Government Engineering College, Raichur, India, 2Government Engineering College, Gangavathi, India, 3H.K.E.S’s S.L.N. College Of Engineering, India |
IPTV Improvement Approach over LTE-WLAN Heterogeneous Networks Full Text Mohamed Matoui, Noureddine Moumkine and Abdellah Adib, Faculty of Science and Technology Mohammedia, Morocco |
Enhanced Particle Swarm Optimization for Effective Relay Nodes Deployment in Wireless Sensor Networks Full Text Bader Alshaqqawi1, Sardar Anisul Haque2, Mohammed Alreshoodi1 and Ibrahim Alsukayti1, 1Qassim University, Saudi Arabia, 2Alcorn State University, USA |
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Network Full Text Lakshmi M and Prashanth C R, Dr. Ambedkar Institute of Technology, India |
An Exact Analytical Model for an IoT Network with MMPP Arrivals Full Text Osama Salameh, Arab American University, Palestine |
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for High Performance Monitoring Applications of Internet of Things Full Text Fawaz Alassery and Maha M. Althobaiti, Taif University, Saudi Arabia |
November 2020, Volume 12, Number 6
Mobility Speed Effect and Neural Network Optimization for Deep MIMO Beamforming in mmWave Networks Full Text Mustafa S. Aljumaily and Husheng Li, University of Tennessee, USA |
Wireless Networks Performance Monitoring Based on Passive-active Quality of Service Measurements Full Text Yazeed A. Al-Sbou, Applied Science University, Bahrain |
Towards Fog-Assisted Virtual Reality MMOG with Ultra-Low Latency Full Text YOSHIHARA Tsuyoshi and FUJITA Satoshi, Hiroshima University, Japan |
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks Full Text Yasir Mohammed1, Maha Abdelhaq2 and Raed Alsaqour3, 1Iraqi Ministry of Electricity, Iraq, 2Princess Nourah bint Abdulrahman University, Saudi Arabia, 3Saudi Electronic University, Saudi Arabia |
Peer to Peer Approach based Replica and Locality Awareness to Manage and Disseminate Data in Vehicular Ad Hoc Networks Full Text Abdelkader Guezzi1, Abderrahmane Lakas2, Ahmed Korichi1, Sarra Cherbal3, 1Kasdi Merbah University, Algeria, 2UAE University, UAE, 3University of Ferhat Abbas Setif, Algeria |
Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc Networks Full Text Amir J. Majid, Ajman University, UAE |
Using Machine Learning to Build a Classification Model for IoT Networks to Detect Attack Signatures Full Text Mousa Al-Akhras1, 2, Mohammed Alawairdhi1, Ali Alkoudari1 and Samer Atawneh1, 1Saudi Electronic University, Saudi Arabia, 2The University of Jordan, Jordan |
Network Anomaly Detection based on Late Fusion of Several Machine Learning Algorithms Full Text Tran Hoang Hai1, Le Huy Hoang1 and Eui-nam Huh2, 1Hanoi University of Science and Technology, Vietnam, 2Kyung Hee University, Korea |
An Efficient Data Collection Protocol for Underwater Wireless Sensor Networks Full Text Khaled Day1, Faiza Al-Salti2, Abderezak Touzene1 and Nasser Alzeidi1, 1Sultan Qaboos University, Oman, 2Muscat College, Oman |
Jamming Detection based on Doppler Shift Estimation in Vehicular Communications Systems Full Text Javad Afshar Jahanshahi, Universidad Catolica Los Angeles de Chimbote, Peru |
A Deep Learning Technique for Web Phishing Detection Combined URL Features and Visual Similarity Full Text Saad Al-Ahmadi and Yasser Alharbi, King Saud University, Saudi Arabia |
A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting for FDL-equipped at OBS Core Node Full Text Dang Thanh Chuong1, Nguyen Hong Quoc1, Doan Van Thang2 and Pham Trung Duc1, 1Hue University, Vietnam, 2Industrial University of HCM City, Vietnam |
Mean Object Size Considering Average Waiting Latency in M/BP/1 System Full Text Y. –J. Lee, Korea National University of Education, South Korea |
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based on OLSR Protocol Full Text Youssef Lmoumen1, Yassine Ruichek1 and Raja Touahni2, 1University Bourgogne FrancheComté, France, 2University IbnTofail, Morocco |
Client Performance Predictions for Private Blockchain Networks Full Text YLászló Viktor Jánoky, János Levendovszky and Péter Ekler, Budapest University of Technology and Economics, Hungary |
July 2020, Volume 12, Number 4
Determination of Minimum Number of UAVs for Local Area Networks of DronesFull Text Sandaruvan Rajasinghege and Rohan de Silva, CQ University, Australia |
Performance Analysis of Routing Protocols with Roadside Unit Infrastructure in a Vehicular Ad Hoc NetworkFull Text Safae Smiri, Abdelali Boushaba, Rachid Ben Abbou and Azeddine Zahi, Sidi Mohamed Ben Abdelah University, Morocco |
Multi-criteria Handover Decision for Heterogeneous Networks: Carrier Aggregation Deployment ScenarioFull Text Maryam Abdulazeez- Ahmed, Nor Kamariah Nordin, Aduwati Bint Sali and Fazirulhisyam Hashim, Universiti Putra Malaysia, Malaysia |
Hybrid Model in the Block Cipher Applications for High-speed Communications NetworksFull Text Minh Nguyen Hieu1, Bac Do Thi2, Canh Hoang Ngoc3, Manh Cong Tran4, Phan Duong Phuc5 and Khoa Nguyen Tuan6, 1Institute of Cryptographic Science and Technology, Vietnam, 2Thai Nguyen University of Information and Communication Technology, Vietnam, 3Thuongmai University, Vietnam, 4Le Quy Don Technical University, Vietnam, 5Academy of Cryptography Techniques, Vietnam, 6Research Laboratories of Saigon High-Tech Park, Vietnam |
Robotic Inner Signal Propagation and Random Access over Hybrid Access SchemeFull Text Abir Hossain, Zhenni Pan, Megumi Saito, Jiang Liu and Shigeru Shimamoto, Waseda University, Japan |
An Experimental Study of IoT Networks Under Internal Routing AttackFull Text Mohammad Alreshoodi, Qassim University, Saudi Arabia |
Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilities of Web ApplicationsFull Text Mohammad Shojaeshafiei, Letha Etzkorn and Michael Anderson, The University of Alabama in Huntsville, USA |
May 2020, Volume 12, Number 3
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs Full Text Radha Raman Chandan and P.K.Mishra, Banaras Hindu University, India |
6RLR-ABC: 6LOWPAN Routing Protocol with Local Repair using Bio Inspired Artificial Bee ColonyFull Text Nurul Halimatul Asmak Ismail1, Samer A. B. Awwad2 and Rosilah Hassan3, 1Princess Nourah Bint Abdulrahman University, Kingdom of Saudi Arabia, 2Independent Researcher, Kingdom of Saudi Arabia, 3Universiti Kebangsaan Malaysia, Malaysia |
Swarm Optimization based Gravitational Search Approach for Channel Assignment in MCMR Wireless Mesh NetworkFull Text Nandini Balusu1, Suresh Pabboju2 and Narsimha G3, 1Telangana University, India, 2Chaitanya Bharathi Institute of Technology, India and 3JNTUH College of Engineering, India |
Energy-efficient Multi-hop Routing with Unequal Clustering Approach for Wireless Sensor NetworksFull Text Younes El Assari, Samia Al Fallah, Jihane El Aasri, Mounir Arioua and Ahmed El Oualkadi, Abdelmalek Essaadi University, Morocco |
Flooding Attack Detection and Mitigation in SDN with Modified Adaptive Threshold AlgorithmFull Text Nan Haymarn Oo1, Aris Cahyadi Risdianto2, Teck Chaw Ling3 and Aung Htein Maw4, 1University of Computer Studies, Yangon, Myanmar, 2Gwangju Institute of Science and Technology, Korea, 3University of Malaya, Malaysia 4University of Information Technology, Myanmar |
Signaling Protocols for Local Area Networks of DronesFull Text Prabhu Jyot Singh and Rohan de Silva, School of Engineering and Technology CQ University Sydney, Australia |
Localization Schemes for Underwater Wireless Sensor Networks: SurveyFull Text Faiza Al-Salti1, N. Alzeidi2 and Khaled Day2, 1Muscat College, Oman and 2Sultan Qaboos University, Oman |
March 2020, Volume 12, Number 2
Performance Evaluation of Modbus TCP in Normal Operation and Under A Distributed Denial of Service AttackFull Text Eric Gamess1, Brody Smith1 and Guillermo Francia III2, 1Jacksonville State University, USA and 2University of West Florida, USA |
An Adaptive Diffserv Approach to Support QoS in Network Mobility NEMO EnvironmentFull Text Loay F. Hussein1,2, Aisha-Hassan AbdallaHashim2, Mohamed Hadi Habaebi2 and Wan Haslina Hassan3, 1Jouf University, Saudi Arabia, 2International Islamic University Malaysia, Malaysia and 3Universiti Teknologi Malaysia, Malaysia |
Mobile Crowd Sensing RPL-based Routing Protocol for Smart CityFull Text Yahya Al Sawafi, Abderezak Touzene, Khaled Day and Nasser Alzeidi, Sultan Qaboos University, Oman |
Virtual Cache & Virtual Wan Accelerator Function Placement for Cost-effective Content Delivery ServicesFull Text Shin-ichi Kuribayashi, Seikei University, Japan |
Auto Resource Management to Enhance Reliability and Energy Consumption in Heterogeneous Cloud ComputingFull Text Moataz H. Khalil1, 2, Mohamed Azab2, Ashraf Elsayed3, Walaa Sheta1, 2, Mahmoud Gabr3 and Adel S. Elmaghraby1,2, 1University of Louisville, USA, 2The City of Scientific Research and Technology Applications, Egypt and 3Alexandria University, Egypt |
CLBNSRM – Confidence Level Based Unblend Neighbor Selection &Blend Node Report Based Optimized Route Formation in MANETFull Text S. J. Patil1, L.S. Admuthe2 and M. R. Patil3, 1VTU, India, 2DKTE’S Textile & Engineering Institute, India and 3J.A.G.M. Institute of Technology, India |
Energy Performance of a Combined Horizontal and Vertical Compression Approach in Cluster-based WSNSFull Text Jihane El Aasri, Samia Al Fallah, Mounir Arioua and Ahmed El Oualkadi, Tangier Abdelmalek Essaadi University, Morocco |
January 2020, Volume 12, Number 1
Least Square Channel Estimation for Image Transmission with OFDM Over Fading ChannelFull Text Usha S.M1 and Mahesh H.B2, 1JSS Academy of Technical Education, India and 2PES University, India |
A Modified Interference Approximation Scheme for Improving Preamble Based Channel Estimation Performance in FBMC SystemFull Text Radwa A. Roshdy1, Mohamed A. Aboul-Dahab2 and Mohamed M. Fouad3, 1Higher Technological Institute, Egypt, 2Arab Academy for Science Technology and Martine transport, Egypt and 3Zagazig University, Egypt |
Evaluation Methodology of MIMO Networks Performance over Rayleigh FadingFull Text Eleftherios Stergiou, Constantinos Angelis and Spiridoula V. Margariti, University of Ioannina, Greece |
LTE Scheduler Algorithms for VANET Traffic in Smart CityFull Text Khadija Raissi and Bechir Ben Gouissem, University of Tunis El Manar, Tunisia |
Lorawan Scalability Analysis – Co Spreading Factor InterferenceFull Text Aiju Thomas and N V Eldhose, M G University, India |
Load Balancing Algorithm for Efficient VM Allocation in Heterogeneous CloudFull Text Badshaha P Mulla1, C. Rama Krishna1 and Raj Kumar Tickoo2, 1NITTTR, India and 2National Informatics Centre, Punjab State Unit, India |
An Efficient and Secure Malicious Node Detection Model for Wireless Sensor NetworksFull Text Asmaa M.Morsi1, Tamer M. Barakat2 and Ahmed Ali Nashaat2, 1Al-Madina Higher Institute for Engineering and Technology, Egypt and 2Fayoum University, Egypt |
November 2019, Volume 11, Number 6
Maintaining Cloud Performance under DDOS Attacks Full Text Moataz H. Khalil1, 2, Mohamed Azab2, Ashraf Elsayed3, Walaa Sheta1, 2, Mahmoud Gabr3 and Adel S. Elmaghraby1, 2, 1University of Louisville, USA, 2The City of Scientific Research and Technology Applications, Egypt and 3Alexandria University, Egypt |
A Novel Hybrid Opportunistic Scalable Energy Efficient Routing Design for Low Power, Lossy Wireless Sensor NetworksFull Text Jayavignesh Thyagarajan and Suganthi K, Vellore Institute of Technology, India |
Developing QoS by Priority Routing for Real Time Data in Internet of Things (IoT) Urban ScenariosFull Text Radwan S. Abujassar, Information Technology and Computing (ITC) Arab Open University, Kuwait |
Controlling Delay at the Router Buffer using Modified Random Early DetectionFull Text Ahmad Adel Abu-Shareha, Arab Open University (AOU), Saudi Arabia |
The Method of Detecting Online Password Attacks Based on High-level Protocol Analysis and Clustering TechniquesFull Text Nguyen Hong Son1 and Ha Thanh Dung2, 1Posts and Telecommunications Institute of Technology, Vietnam and 2Ho Chi Minh City University of Natural Resources and Environments, Vietnam |
Multi-cluster Multi-channel Scheduling (MMS) Algorithm for Maximum Data Collection with Delay Minimization in WSNFull Text A. Vijayalakshmi1 and P. Vanaja Ranjan2, 1Vels Institute of Science, Technology and Advanced Studies (VISTAS), India and 2College of Engineering Anna University, India |
Comparative and QoS Performance Analysis of Terrestrial-aerial Platforms-satellites Systems for Temporary EventsFull Text Faris. A. Almalki, Taif University, Saudi Arabia |
September 2019, Volume 11, Number 5
Multi-Objective Optimization Assisted Network Condition Aware QOS-Routing Protocol for MANETS: MNCQM [pdf] Shashi Raj K1 and Siddesh G K2, 1Dayananda Sagar College of Engineering, India and 2JSS Academy of Technical Education, India |
A Mac Protocol with Dynamic Allocation of Time Slots Based on Traffic Priority in Wireless Body Area Networks [pdf] Sabin Bhandari and Sangman Moh, Chosun University, South Korea |
Fuzzy Informer Homed Routing Protocol for Wireless Sensor Network [pdf] Gholamreza Kakamanshadi, Savita Gupta and Sukhwinder Singh, Panjab University, India |
An Optimum Energy Consumption Hybrid Algorithm for XLN Strategic Design in WSN’S [pdf] Md. Khaja Mohiddin and V. B. S. Srilatha Indira Dutt, GITAM, India |
A Fractal Based Image Cipher Using Knuth Shuffle Method and Dynamic Diffusion[pdf] Shafali Agarwal, USA |
Lattice Structural Analysis on Sniffing to Denial of Service Attacks [pdf] B.Prabadevi1, N.Jeyanthi1, Nur Izura Udzir2 and Dhinaharan Nagamalai3, 1Vellore Institute of Technology, Vellore, India,2Universiti Putra Malaysia, Malaysia and 3Wireilla Net Solutions, Australia |
Applying Geo-Encryption and Attribute Based Encryption to Implement Secure Access Control in the Cloud [pdf] Abu Salim1, Sachin Tripathi2 and Rajesh Kumar Tiwari3, 1Jazan University, Kingdom of Saudi Arabia, 2Indian Institute of Technology, India and 3RVS College of Eng. & Tech., India |
Implementation of A Context-Aware Routing Mechanism in an Inexpensive Standalone Communication System for Disaster Scenarios [pdf] Regin Cabacas and In-Ho Ra, Kunsan National University, South Korea |
Context-Aware Energy Conserving Routing Algorithm for Internet of Things [pdf] D. Kothandaraman1, C. Chellappan2, P. Sivasankar3 and Syed Nawaz Pasha1, 1S R Engineering College, India, 2Anna University, India and 3NITTTR, India |
Fast Packets Delivery Techniques for Urgent Packets in Emergency Applications of Internet of Things [pdf] Fawaz Alassery, Taif University, Saudi Arabia |
The Performance of Convolutional Coding Based Cooperative Communication: Relay Position and Power Allocation Analysis [pdf] Cebrail ÇIflikli, Waeal Al-Obaidi and Musaab Al-Obaidi, Erciyes University, Turkey |
QoS Categories Activeness-Aware Adaptive EDCA Algorithm for Dense IoT Networks[pdf] Mohammed A. Salem1, Ibrahim F. Tarrad2, Mohamed I. Youssef3 and Sherine M. Abd El-Kader3, 1Higher Technological Institute, Egypt, 2Al-Azhar University, Egypt and 3Electronics Research Institute, Egypt |
A Min-Max Scheduling Load Balanced Approach to Enhance Energy Efficiency and Performance of Mobile ADHOC Networks [pdf] K.Venkatachalapathy and D.Sundaranarayana, Annamalai University, India |
Optimization of Packet Length for Two Way Relaying with Energy Harvesting [pdf] Ghassan Alnwaimi1, Hatem Boujemaa2 and Kamran Arshad3, 1King Abdulaziz University, Kingdom of Saudi Arabia, 2COSIM Laboratory, Tunisia and 3Ajman University, UAE |
VIVoNet: Visually-Represented, Intent-Based, Voice-Assisted Networking [pdf] Amar Chaudhari, Amrita Asthana, Atharva Kaluskar, Dewang Gedia, Lakshay Karani, Levi Perigo, Rahil Gandotra and Sapna Gangwar, University of Colorado Boulder, USA |
Design of Secure and Reliable MU-MIMO Transceiver System for Vehicular Networks[pdf] C. Manikandan, P. Neelamegam, S.Rakesh Kumar, G. Venkat Babu and Sai Siva Satwik Kommi, SASTRA Deemed University, India |
Energy Consumption Reduction in Wireless Sensor Network Based on Clustering [pdf] Gholamreza Farahani, Iranian Research Organization for Science and Technology (IROST), Iran |
Allocation of Virtual Firewall Functions in NFV-Based Networks with Minimum Network Cost [pdf] Shin-ichi Kuribayashi, Seikei University, Japan |
RB-IEMRP: Relay Based Improved Throughput Energy-Efficient Multi-Hop Routing Protocol for INTRA Body Sensor Network (INTRA-WBSN)[pdf] Tarique Rashid1, Sunil Kumar2, Akshay Verma2, Prateek Raj Gautam2 and Arvind Kumar2, 1Katihar Engineering College, India and 2Motilal Nehru National Institute of Technology Allahabad, India |
An Enhancement of Cluster-Based False Data Filtering Scheme Through Dynamic Security Selection in Wireless Sensor Networks [pdf] Jungsub Ahn and Taeho Cho, Sungkyunkwan University, Republic of Korea |
Fuzzy Gene Optimized Reweight Boosting Classification for Energy Efficient Data Gathering in WSN [pdf] J.Srimathi1 and V.Valli Mayil2 , 1Bharathiar University, India and 2Periyar Maniammai University, India |
A Markovian Model for Internet of Things Application [pdf] Osama Salameh and Mohammed Awadand Fadi AbuAlrub, Arab American University, Palestine |
Enhancing Availability for Distributed Replicated Services Considering Network Edge Availability [pdf] Manghui Tu1, Liangliang Xiao2 and Dianxiang Xu3, 1Purdue University Northwest, Indiana, 2Frostburg StateUniversity, Maryland and 3Boise State University, Idaho |
Machine Learning Algorithm of Detection of DOS Attacks on an Automotive Telematic Unit[pdf] Eric Perraud, Renault Software Labs, France |
Energy Efficient Node Rank-Based Routing Algorithm in Mobile Ad-Hoc Networks [pdf] D. Kothandaraman1 and C. Chellappan2, 1S R Engineering College, India and 2Anna University, India |
An open Jackson Network Model for Heterogeneous Infrastructure as a Service on Cloud Computing [pdf] Chien Nguyen Khac1, 2, Khiet Bui Thanh3, 4, Hung Ho Dac4, Son Nguyen Hong2, Vu Pham Tran3 and Hung Tran Cong2,1The People’s Police University, Vietnam, 2Posts and Telecoms Institute of Technology Ho Chi Minh City, Vietnam, 3Ho Chi Minh City University of Technology, Vietnam and 4Thu Dau Mot University, Vietnam |
Broadband Power Line Communication: The Channel and Noise Analysis for A Power Line Network[pdf] Mukesh Kumar Varma, Zainual Abdin Jaffery and Ibraheem, Jamia Millia Islamia, India |
Procedure of Effective Use of Cloudlets in Wireless Metropolitan Area Network Environment [pdf] Rashid Alakbarov and Oqtay Alakbarov, Azerbaijan National Academy of Sciences, Azerbaijan |
Techniques for Offloading LTE Evolved Packet Core Traffic Using Openflow: A Comparative Survey & Design Reference [pdf] Kam Nasim1 and Trevor James Hall2, 1,2University of Ottawa,Canada |
Optimization of Packet Length for MIMO systems [pdf] Ghassan Alnwaimi1, Hatem Boujemaa2 and Kamran Arshad3, 1King Abdulaziz University, Kingdom of Saudi Arabia,2Sup’Com, COSIM Laboratory, Tunisia and 3Ajman University, United Arab Emirates |
Performance of OLSR MANET Adopting Cross-Layer Approach Under CBR and VBR Traffics Environment [pdf] Teerapat Sanguankotchakorn1, Sanika K.Wijayasekara2 and Sugino Nobuhiko3 1Asian Institute of technology, Thailand, 2Chulalongkorn University, Thailand and 3Tokyo Institute of Technology, Japan |
Improvement of False Report Detection Performance Based on Invalid Data Detection Using Neural Network in WSN [pdf] Sanghyeok Lim and Taeho Cho, Sungkyunkwan University, Republic of Korea |
Scalable and Energy Efficient Task Offloading Schemes for Vehicular Cloud Computing [pdf] Mohammad Pasha1 and Khaleel Ur Rahman Khan2, 1MJCET – Hyderabad, India and 2ACE – Hyderabad, India |
A Novel Adaptive Caching Mechanism for Video on Demand System Over Wireless Mobile Network [pdf] Saleh Ali Alomari, Jadara University, Jordan |
Availability Aspects Through Optimization Techniques Based Outlier Detection Mechanism in Wireless and Mobile Networks [pdf] Neeraj Chugh, Adarsh Kumar and Alok Aggarwal, University of Petroleum & Energy Studies – Dehradun, India |
Improvement of Multiple Routing Based on Fuzzy Clustering and PSO Algorithm In WSNs to Reduce Energy Consumption [pdf] Gholamreza Farahani, Iranian Research Organization for Science and Technology (IROST), Iran |
A Proactive Flow Admission and Re-Routing Scheme for Load Balancing and Mitigation of Congestion Propagation in SDN Data Plane [pdf] Sminesh C. N1, Grace Mary Kanaga E2, and Ranjitha K3, 1&3Govt. Engineering College – Thrissur, India, 2Karunya Institute of Technology and Sciences, India |
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection [pdf] Tony Jan and A.S.M Sajeev, Melbourne Institute of Technology, Australia |
DPI-Based Congestion Control Method for Servers and Network Lines [pdf] Shin-ichi Kuribayashi, Seikei University, Japan |
Deployment of Intrusion Prevention System on Multi-Core Processor Based Security Hardware [pdf] Swetha K V1 and Ravi Dara2, 1CMR Institute of Technology, India and 2Nevis Networks(I) Pvt.Ltd., India |
Chained Displays : Configuration of Multiple Co-Located Public Displays [pdf] Amir E. Sarabadani Tafreshi, Milan Bombsch and Gerhard Troster, ETH Zurich, Switzerland |
Efficient PAPR Reduction Approach for Selective Mapping in a STBC MIMO-OFDM System [pdf] VijayaLakshmi M and K Rama Linga Reddy, GNITS – Hyderabad, India |
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network [pdf] Ngoc Hong Tran1, Cao Vien Phung2, Binh Quoc Nguyen1 and Leila Bahri3, 1Vietnamese-German University, Vietnam, 2Technical University Braunschweig, Germany and 3KTH, Sweden |
Improved Handover Algorithm to Avoid Duplication AAA Authentication in Proxy MIPV6 [pdf] Hewei Yu1 and Meiling Zhou2, 1South China University of Technology, P.R.China and 2GF Fund Management Co., Ltd., P.R.China |
Proposed Load Balancing Algorithm to Reduce Response Time and Processing Time on Cloud Computing [pdf] Nguyen Xuan Phi, Cao Trung Tin, Luu Nguyen Ky Thu and Tran Cong Hung, Posts and Telecommunications Institute of Technology, Vietnam |
Robot Human Interface for Housekeeper Robot with Wireless Capabilities [pdf] Suhad Faisal Behadili, University of Baghdad, Iraq |
Path Splitting for Virtual Network Embedding in Elastic Optical Networks [pdf] Badr Oulad Nassar and Takuji Tachibana, University of Fukui, Japan |
The Development and Study of the Methods and Algorithms for the Classification of Data Flows of Cloud Applications in the Network of the Virtual Data Center [pdf] Ramireddy Kondaiah1 and Bachala Sathyanarayana2, 1Rayalaseema University, India and 2Sri Krishnadevaraya University, India |
Improvements in Routing Algorithms to Enhance Lifetime of Wireless Sensor Networks [pdf] D. Naga Ravikiran1 and C.G. Dethe2, 1Priyadarshini Institute of Engineering and Technology (PIET), India and 2RTM Nagpur University, India |
Task Allocation and Path Planning for Network of Autonomous Underwater Vehicles [pdf] Bychkov Igor, Kenzin Maksim and Maksimkin Nikolay, Matrosov Institute for System Dynamics and Control Theory, Russia |
Performance Evaluation of Blowfish Algorithm on Supercomputer IMAN1 [pdf] Mahmoud Rajallah Asassfeh, Mohammad Qatawneh and Feras Mohamed ALAzzeh, University of Jordan, Jordan |
A System for Visualization of Big Attributed Hierarchical Graphs [pdf] Victor N. Kasyanov and Timur A. Zolotuhin, Institute of Informatics Systems, Novosibirsk State University, Russia |
Lightweight Cryptography for Distributed PKI Based MANETS [pdf] N. Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, and V. Ch. Venkaiah, University of Hyderabad, India |
Constructing a Fuzzy Network Intrusion Classifier Based on Differential Evolution and Harmonic Search [pdf] I. A. Hodashinsky and M. A. Mech, Tomsk State University of Control Systems and Radio electronics (TUSUR), Russia |
Spectrum Sensing Strategy to Enhance the QoS in White-Fi Networks [pdf] Nabil Giweli, Seyed Shahrestani and Hon Cheung, Western Sydney University, Australia |
Trust Factor and Fuzzy Firefly Integrated Particle Swarm Optimization Based Intrusion Detection and Prevention System for Secure Routing of MANET [pdf] Ramireddy Kondaiah1 and Bachala Sathyanarayana2, 1Rayalaseema University, India and 2Sri Krishnadevaraya University, India |
Virtual Routing Function Deployment in NFV Based Networks Under Network Delay Constraints [pdf] Shin-ichi Kuribayashi, Seikei University, Japan |
Response Surface Methodology for Performance Analysis and Modeling of MANET Routing Protocols [pdf] Mohamed Skander Daas and Salim Chikhi, Abdelhamid Mehri Constantine 2 University, Algeria |
Quad Tree Based Static Multi Hop Leach Energy Efficient Routing Protocol : A Novel Approach [pdf] Abdulmalek Maresh Hasan Ali1 and Hanumanthappa J2, 1Visvesvaraya Technological University, India and 2University of Mysuru, India |
A Extended Linear Multi-Commodity Multicost Network and Maximal Flow Limited Cost Problems [pdf] Tran Quoc Chien1 and Ho Van Hung2, 1University of Danang, Vietnam and 2Quangnam University, Vietnam |
Imperative Programs Behavior Simulation in Terms of Compositional Petri Nets [pdf] Leontyev Denis Vasilevich, Kharitonov Dmitry Ivanovich and Tarasov Georgiy Vitalievich, Institute of Automation and Control Processes, Russia |
On the Transmission of Asynchronous Data Streams Over Packet Switched Networks with Random Multiple Access [pdf] Yuriy Anatolievich Kropotov and Aleksander Anatolievich Kolpakov, Vladimir State University named after Alexander and Nicholay Stoletovs, Russia |
Grid Based Priority Routing Protocol for UWSNs [pdf] Faiza Al-Salti, N. Alzeidi, Khaled Day, Bassel Arafeh and Abderezak Touzene, Sultan Qaboos University, Oman |
Enhancement and Migration of Knowledge Science [pdf] Shawon S. M. Rahman1 and Syed V. Ahamed2, 1University of Hawaii-Hilo, USA and 2City University of New York, USA |
Analysis of LTE Radio Load and User Throughput [pdf] Jari Salo1 and Eduardo Zacarías B2, 1Nokia Networks, Phillipines and 1Nokia Networks, Germany |
A Proposal to Improve SEP Routing Protocol Using Insensitive Fuzzy C-Means in Wireless Sensor Network [pdf] Phan Thi The, Ngo Quang Quyen, Vu Ngoc Phan and Tran Cong Hung, Post & Telecommunications Institute of Technology, Vietnam |
EWER:”Electromagnetic Wave Exposure Reduction” Service for Sensitive Users with Privacy Concerns [pdf] Mohamed Aymen Chalouf1, Francine Krief2 and Dramane Ouattara2, 1University of Rennes 1, France and 3University of Bordeaux, France |
A Rapid Deployment Big Data Computing Platform for Cloud Robotics [pdf] Leigh Duggan1, James Dowzard1, Jayantha Katupitiya1 and Ka C. Chan2, 1University of New South Wales, Australia and 2La Trobe University, Australia |
Multicasting Based Enhanced Proactive Source Routing in MANETs [pdf] Deepa Dasarathan1 and P. Nirmal Kumar2, 1Sathyabama University, India and 2Anna University, India |
Topology Map Analysis for Effective Choice of Network Attack Scenario [pdf] Hidema Tanaka, National Defense Academy of Japan, Japan |
An Analysis of the Fat-Tailedness of the Centrality Distributions of Real-World Networks [pdf] Natarajan Meghanathan ,Jackson State University, MS, USA |
A Novel Approach for Optimizing Energy and Bandwidth Issues in MANET Using DSR Protocol [pdf] Ajay Lala,Anand Bhaskar, Prasun Chakrabarti and JitendraKaushal Srivastava,Department of Computer Science & Engineering, Sir PadampatSinghania University,Udaipur, Rajasthan, India |
A Low Complexity User Grouping Strategy for Downlink Multi-User MIMO Scheduling [pdf] Nguyen Ngoc Van, School of Electronics and Telecommunications, Hanoi University of Science and Technology, No 1 , Dai Co Viet Street, Hai Ba Trung, HaNoi, Vietnam |
Performance Analysis of R/KADEMLIA, Pastry and Bamboo Using Recursive Routing in Mobile Networks [pdf] Farida Chowdhury1and Md. Sadek Ferdous2, 1Department of Computer Science and Engineering, Shahjalal University of Science and Technology, Sylhet, Bangladesh. 2Electronics and Computer Science, University of Southampton, Southampton, UK. |
Performance Analysis of Channel Capacity and Throughput of LTE Downlink System [pdf] P.Poornima1, G. Laxminarayana2and ,D. Srinivas Rao3 , 1Associate Professor, Dept. of ECE, Sphoorthy Engineering College, Hyderabad, India 2Professor, Dept. of ECE, Anurag College of Engineering, Hyderabad, India 3Professor, Dept. of ECE, JNTUH CEH, Kukatpally, Hyderabad, India |
GARP : A Highly Reliable Grid Based Adaptive Routing Protocol for Underwater Wireless Sensor Networks [pdf] Khaled Day, Abderezak Touzene, Bassel Arafeh, and Nasser Alzeidi, Department of Computer Science, Sultan Qaboos University, Muscat, Oman |
Accurate Available Bandwidth Allocation in HTTP Adaptive Streaming [pdf] Tan Phan-Xuan and Eiji Kamioka, Graduate School of Engineering and Science, Shibaura Institute of Technology, Tokyo, Japan |
A Towards Efficient Privacy Preserving Data Aggregation for Advanced Metering Infrastructure [pdf] Navid A lamatsaz1 ,A rash Boustani2,Nima Alamatsaz,3Nima A lamatsaz, 4shkan Boustani.1,2Department of Electrcial Engineering and Computer Science, W ichita State University, W ichita, KS, USA.3 Department of Biomedical Engineering, New Jersey Institute of Technology, Newark, NJ, USA.4Department of Statistics and Mathematics, University of R ed Crescent Society of Iran, Mashad, Iran |
Decision-making system supported by adaptive coloured petri nets [pdf] Haroldo Issao Guibu1,2 and Joao Jose Neto2, 1Instituto Federal de Educacao, Brazil, 2Escola Politecnica da Universidade de Sao Paulo, Brazil |
Discovering New Cyber Protection Approaches from a Security Professional Prospective [pdf] Alain Loukaka1 and Shawon S. M. Rahman, Ph.D2,1 Capella University, Minneapolis, MN, USA, 2Majmaah University, Majmaah, Kingdom of Saudi Arabia |
New Proposed Architecture For Q3 Interface To Manage IP-Based Networks [pdf] Gholamreza Farahani, Iranian Research Organization for Science and Technology (IROST), Iran |
Investigation of Computational Intelligence Techniques for Intrusion Detection in Wireless Sensor Networks [pdf] Christopher D. McDermott and Andrei Petrovski, Robert Gordon University, United Kingdom |
Victim Based Statistical Filtering : A New Deterrent Against Spoofed DoS Traffic [pdf] Suhail Qadir Mir1, S.M.K. Quadri2 , 1University of Kashmir, India and 2Jamia Millia Islamia, India |
Combined Ieee 802.15.4 Physical Layer And Virtual Multiple Input Multiple Output (V- Mimo) Transmissions For Energy Efficient Wireless Sensor Networks [pdf] Fawaz Alassery, Taif University, Saudi Arabia |
IMPROVING DISTRIBUTED ENERGY-EFFICIENT CLUSTERING ALGORITHM TO SAVE LIFETIME FOR HETEROGENEOUS WSN [pdf] Phan Thi The, Bui Hoang Mai, Nguyen Thanh Tuan and Tran Cong Hung, Post & Telecommunications Institute of Technology, Vietnam |
A Novel framework for Intrusion Detection using Distributed Collaboration Detection Scheme in Packet Header Data [pdf] T.S. Urmila1 and R. Balasubramanian2, 1Mother Teresa Women’s University, India and 2Karpaga Vinayagar College of Engineering and Technology, India |
A Critical Improvement on Open Shop Scheduling Algorithm for Routing in Interconnection Networks [pdf] Stavros Birmpilis and Timotheos Aslanidis, National Technical University of Athens, Greece |
Singular Value Decomposition: Principles and Applications in Multiple Input Multiple Output Communication System [pdf] Wael Abu Shehab and Zouhair Al-qudah, Al-Hussein Bin Talal University, Jordan |
Fault Tolerant Routing Algorithm in Octagon-Cell Interconnected Network for Horizontal Moving Messages [pdf] Sanjukta Mohanty1 and Prafulla Ku. Behera2, 1North Orissa University, India and 2Utkal University, India |
Analytical Study for Measuring the Electromagnetic Radiation of the GSM System in Urban Areas [pdf] Murad A.A.Almekhlafi, Sana’a University, Yemen |
Position Based Adaptive Routing for VANETs [pdf] Ajay Guleria and Kuldeep Singh, Panjab University, India |
Bounds on the Achievable Rates of Faded Dirty Paper Channel [pdf] Zouhair Al-qudah and Wael Abu Shehab, Al-Hussein Bin Talal University, Jordan |
RFID Localisation for Internet of Things Smart Homes : A Survey [pdf] Belal Alsinglawi1, Mahmoud Elkhodr1, Quang Vinh Nguyen1 and Upul Gunawardana1, Anthony Maeder2 and Simeon Simoff1, 1Western Sydney University, Australia and 2Flinders University, Australia |
Performance Evaluation of OSPF and RIP on IPV4 & IPV6 Technology Using G.711 Codec [pdf] Mabubur Syed and Isaac Yerima Ambore, Minnesota State University, USA |
An Explicit Loss and Handoff Notification Scheme in TCP for Cellular Mobile System [pdf] Nayeema Islam and Mohammed Nasir Uddin, Jagannath University, Bangladesh |
Wireless Sensors Integration into Internet of Things and the Security Primitives [pdf] Muhammad A. Iqbal and Magdy Bayoumi, University of Louisiana at Lafayette, USA |
Performance Evaluation of Different Kernels for Support Vector Machine Used in Intrusion Detection System [pdf] Md. Al Mehedi Hasan1, Shuxiang Xu2, Mir Md. Jahangir Kabir2 and Shamim Ahmad1, 1University of Rajshahi, Bangladesh and 2University of Tasmania, Australia |
An Enhanced Security for Government Base on Multifactor Biometric Authentication [pdf] Tran Cong Hung1, Nguyen Thanh Tri1,2 and Ho Nhut Minh3, 1Post & Telecommunications Institute of Technology, Vietnam, 2Binh Duong Department of Information and Communications, Vietnam and 3Saigon University, Vietnam |
A Solution Framework for Managing Internet of Things (IOT) [pdf] Sukant K. Mohapatra1, Jay N. Bhuyan2, Pankaj Asundi1, and Anand Singh3, 1Ericsson, 2Tuskegee University, 3CenturyLink, USA |
Performance Evaluation of Mobile WIMAX IEEE 802.16E for Hard Handover [pdf] Amira Youssef Fahoud and D.K. Lobiyal, Jawaharlal Nehru University, India |
Flexible Virtual Routing Function Deployment in NFV Based Network with Minimum Total Network Cost [pdf] Shin-ichiKuribayashi, Seikei University, Japan |
Game Theory Based Interference Control and Power Control for D2D Communication in Cellualar Networks [pdf] Fa-Bin Li 1, Peng-Xiang Li2, Ya-Fei Yang 2 and Hui Li2, 163812 Troop of PLA, P. R. China and 2Hainan University, China |
Energy Consumption Improvement of Traditional Clustering Method in Wireless Sensor Network [pdf] Tran Cong Hung1 and Ly Quoc Hung2, 1Posts and Telecommunications Institute of Technology, Vietnam and 2Ho Chi Minh Technical and Economic College, Vietnam |
Modeling, Implementation and Performance Analysis of Mobility Load Balancing for LTE Downlink Data Transmission [pdf] Mohamed Escheikh1 Hana Jouini1 and Kamel Barkaoui2, 1University of Tunis El Manar, Tunisia and 2Conservatoire national des arts et metiers, France |
Performance Assessment of Chaotic Sequence Derived from Bifurcation Dependent Logistic Map in CDMA System [pdf] Oluyemi E. Adetoyi1 and Solomon A. Adeniran1, 1University of Ibadan, Nigeria and 1Obafemi Awolowo University, Nigeria |
OMT : A Dynamic Authenticated Data Structure for Security Kernels [pdf] Somya D. Mohanty1, Mahalingam Ramkumar2 and Naresh Adhikari2, 1University of North Carolina – Greensboro, USA and 2Mississippi State University, USA |
Proposed A Heterogeneous Clustering Algorithm to Improve QoS in WSN [ pdf ] Mehran Mokhtari1 and Masoomeh Tavakoli2, 1Islamic Azad University, Iran and 2Education Qaemshar, Iran |
Energy Savings in Applications for Wireless Sensor Networks Time Critical Requirements [pdf] Tran Cong Hung1 and Ho Huu Trung1,2, 1Post & Telecommunications Institute of Technology, Vietnam and 2Ho Chi Minh City University of Technology, Vietnam |
Adaptive Multi-Tenancy Policy for Enhancing Service Level Agreement Through Resource Allocation in Cloud Computing [pdf] MasnidaHussin, AbdullahMuhammed and NorAsilahWatiAbd Hamid, University of Putra Malaysia, Malaysia |
Simulating Cortical Maps for Attention Shift in Autism[pdf] L.-H. Tan, S.-Y. Cho and Y.-Y. Nguwi, James Cook University, Singapore |
TCP Incast Avoidance Based on Connection Serialization in Data Center Networks [ pdf ] Shigeyuki Osada1,2, Ryo Miyayama1, Yukinobu Fukushima1 and Tokumi Yokohira1, 1Okayama University, Japan and 2The Japan Research Institute, Japan |
A Novel Routing Protocol for Target Tracking in Wireless Sensor Networks[pdf] Sanjay Pahuja and Tarun Shrimali, Indira Gandhi National Open University, India |
Performance Analysis of the Link-Adaptive Cooperative Amplify-and-Forward Relay Networks with Opportunistic Relaying Strategy [pdf] Bhuvan Modi, O.Olabiyi and A.Annamalai, Prairie View A & M University, United States of America |
Light Fidelity (Li-Fi) Based Indoor Communication System [pdf] Farooq Aftab, Muhammad Nafees Ulfat khan and Shahzad Ali, University of Science and Technology Beijing china (USTB), China |
Study the Effect of Parameters to Load Balancing in Cloud Computing [pdf] Tran Cong Hung and Nguyen Xuan Phi, Posts and Telecommunications Institute of Technology, Vietnam |
Simplified CBA Concept and Express Choice Method for Integrated Network Management System [pdf] Mohammad Al Rawajbeh1, Vladimir Sayenko2 and Mohammad I. Muhairat1, 1Al-Zaytoonah University of Jordan, Jordan and 2Kharkov National University of Radio Electronics (KhNURE) Kharkiv, Ukraine |
Hiding A Message in Mp3 Using LSB With 1,2,3 and 4 Bits [pdf] Alaa AbedulsalamAlarood1,2, Azizah Abed Manaf1, Mohammed J.Alhaddad2 and Mohammed Salem Atoum3, 1University Technology Malaysia, Malaysia, 2King Abdulaziz University, Saudi Arabia and 3Irbid National University, Jordan |
Geographic Maps Classification Based on L*A*B Color System [pdf] Salam M.Ghandour1 and Nidal M.Turab2, 1University of Jordan and 2Al Ahliyya Amman University, Jordan |
Performances of Orthogonal Wavelet Division Multiplex (OWDM) System Under AWGN, Rayleigh and Ricean Channel Conditions [pdf] Mohammed Tarique, Ajman University of Science and Technology, United Arab Emirates |
Dynamically Adaptable Improved OLSR (DA-IOLSR) Protocol[pdf] P.S.Vinayagam, Pondicherry University Community College, India |
Performance and Complexity Analysis of a Reduced Iterations LLL Algorithm [pdf] Nizar OUNI and Ridha BOUALLEGUE, National Engineering School of Tunis, Tunisia |
DIA-TORUS:A Novel Topology for Network on Chip Design[pdf] Deewakar Thakyal and Pushpita Chatterjee, SRM Research Institute, India |
A Novel Method to Test Dependable Composed Service Components [pdf] Khaled Farj and Adel Smeda, University of Al-Jabel Al-Gharbi, Libya |
Congestion Aware Link Cost Routing for MANETS [pdf] Tripti Sharma1 and Vivek Kumar2, 1Inderprastha Engineering College, India and 2Gurukul Kangri Vishwavidyalaya, India |
Establishment of Virtual Policy Based Network Management Scheme By Load Experiments in Virtual Environment [pdf] Kazuya Odagiri1, Shogo Shimizu2 and Naohiro Ishii3, 1Sugiyama Jogakuen University, Japan, 2Gakushuin Women’s College, Japan and3Aichi Institute of Technology, Japan |
Joint-Design of Link-Adaptive Modulation and Coding with Adaptive ARQ for Cooperative Amplify and Forward Relaying System [pdf] Bhuvan Modi, O. Olabiyi and A. Annamalai, Prairie View A & M University, USA |
Performance of TCP Congestion Control in UAV Networks of Various Radio Propagation Models [Pdf] Jun Peng, University of Texas – Rio Grande Valley, USA |
Energy Efficient Cooperative Spectrum Sensing in Cognitive Radio[Pdf] Ramzi Saifan, Ghazi Al-Sukar, Rawaa Al-Ameer and Iyad Jafar, University of Jordan, Jordan |
Cost-Efficient Residential Energy Management Scheme for Information-Centric Networking Based Home Network in Smart Grid[Pdf] Keping Yu1, Battulga Davaasambuu1, Nam Hoai Nguyenand1, Quang Nguyen1, Takuro Sato1 and Arifuzzaman Mohammad2, 1Waseda University, Japan and 2Memorial University of Newfoundland, Canada |
Handover Optimization Based on Media Independent Handover in New Networks NGWN [Pdf] Safia Gueziz and Dris Korichi, Kasdi Merbah University, Algeria |
Enhancement of Transmission Range Assignment for Clustered Wireless Sensor Networks[Pdf] M.Salamah and A.A.Hussein, Eastern Mediterranean University, Turkey |
Effect of Operating Wavelengths and Different Weather Conditions on Performance of Point-to-Point Free Space Optical Link[Pdf] Md.Nur Islam and Md Nur Al Safa Bhuiyan, University of Rajshahi, Bangladesh |
Performance Evaluation of Wireless Sensor Network Under Hello Flood Attack [Pdf] Mohammad Abdus Salam and Nayana Halemani, Southern University and A&M College Baton Rouge, USA |
Comparative Analysis of Different Encryption Techniques in Mobile Ad Hoc Networks (MANETS) [Pdf] Amal Ahmad, Andraws Swidan and Ramzi Saifan, University Of Jordan, Jordan |
The Impact of Node Misbehavior on the Performance of Routing Protocols in MANET [Pdf] Khaled Ahmed Abood Omer, University of Aden, Yemen |
Optimizing Smart Things Addressing through the Zigbee-Based Internet of Things[Pdf] Tariq Lasloum and Ahmad S.Almogren, King Saud University, Saudi Arabia |
GPS Systems Literature: Inaccuracy Factors And Effective Solutions [Pdf] Li Nyen Thin, Lau Ying Ting, Nor Adila Husna and Mohd Heikal Husin, Universiti Sains Malaysia, Malaysia |
A Joint Timing Offset and Channel Estimation Using Fractional Fourier Transform and Cazac Sequences [Pdf] Cherif Rezgui and Khaled Grayaa, National School of Engineers of Tunis (ENIT), Tunisia |
Performance Analysis of Multi-Path TCP Network [Pdf] Hamzah M A Hijawi and Mohammad M.N.Hamarsheh, Arab American University, Palestine |
A Middleware for the Internet of Things [Pdf] Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung, Western Sydney University, Australia |
An Optimal Fuzzy Logic System for a Nonlinear Dynamic System Using a Fuzzy Basis Function [Pdf] Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung, Western Sydney University, Australia |
Evaluation of a Topological Distance Algorithm for Construction of a P2P Multicast Hybrid Overlay Tree [Pdf] Sergej Alekseev and Jörg Schäfer, Frankfurt University of Applied Sciences, Germany |
Optimal Bandwidth Allocation with Bandwidth Reservation and Adaptation in Wireless Communication Networks[Pdf] Ali Amiri, Oklahoma State University, USA |
Performance Improvement of an As-Friendly Peer Selection Algorithm for P2P Live Streaming [Pdf] Yukinobu Fukushima, Kazuki Kobayashi and Tokumi Yokohira, Okayama University, Japan |
QOS Evaluation of Heterogeneous Networks: Application-Based Approach[Pdf] Farnaz Farid, Seyed Shahrestani and Chun Ruan, Western Sydney University, Australia |
Localization for Wireless Sensor Networks: A Neural Network Approach[Pdf] Shiu Kumar, Ronesh Sharma and Edwin R.Vans, Fiji national University, Fiji and University of the South Pacific, Fiji |
A Smart Clustering Based Approach To Dynamic Bandwidth Allocation In Wireless Networks [Pdf] Mohammed Awad and Abdelmunem Abuhasan, Arab American University Jenin, Palestine |
A Proposal to Enhance Cellular and Wifi Interworking Toward a Reliable Hetnet [Pdf] Nam Nguyen and Takuro Sato, Waseda University, Japan |
Infrastructure of Services for a Smart City Using Cloud Environment [Pdf] SherifKamel Hussein1 and Mahmoud Hanafy Saleh2, 1October University for Modern Sciences and Arts, Egypt and 2Canadian International College, Egypt |
Planning and Managing Virtualized Next Generation Networks [Pdf] Sukant K.Mohapatra1, Jay N.Bhuyan2 and Hira N.Narang2, 1Stevens Institute of Technology, New Jersey and 2Tuskegee University, USA |
A Mass Balancing Theorem for the Economical Network Flow Maximisation [Pdf] Ziauddin Ursani1,2, Ahsan A.Ursani3,4 and David W.Corne1,2, 1Heriot Watt University, UK, 2Route Monkey Ltd, UK,3South Asian University New Delhi, India and 4Mehran University of Engineering and Technology Sindh Pakistan |
Resource Allocation Method for Cloud Computing Environments with Different Service Quality to Users at Multiple Access Points [Pdf] Shin-ichi Kuribayashi,Seikei University, Japan |
Approximating Nash Equilibrium Uniqueness of Power Control in Practical WSNs [Pdf] Evangelos D. Spyrou and Dimitrios K. Mitrakos, Aristotle University of Thessaloniki., Greece |
Context-Aware Decision Making System for Mobile Cloud Offloading [Pdf] Mustafa Tanriverdi and M. Ali Akcayol, Gazi University, Turkey |
Adaptive Handover Hysteresis and Call Admission Control for Mobile Relay Nodes [Pdf] Battulga Davaasambuu, Frank Semaganga and Takuro Sato, Waseda University, Japan |
Dynamic Re-Clustering Leach-Based (Dr-Leach) Protocol for Wireless Sensor Networks [Pdf] Abdallah Ijjeh1, Abdalraheem Ijjeh2, Huthaifa Al-Issa1 and Saed Thuneibat1, 1Al-Balqa` Applied University / Al-Huson University College, Jordan and 2Technical college at Ranya, Saudi Arabia |
Improving BitTorrent’s Peer Selection for Multimedia Content On-Demand Delivery [Pdf] Ananda Görck Streit and Carlo Kleber da Silva Rodrigues, University Center of Brasília (UniCEUB), Brazil |
Analytic Hierarchy Process for Qos Evaluation of Mobile Data Networks [Pdf] Daniel E.Asuquo and Uduak A.Umoh, University of Uyo, Nigeria |
An Overview of Visible Light Communication Systems [Pdf] Taner Cevik and Serdar Yilmaz, Fatih University, Turkey |
Assessment of Health Monitoring System Using SDL Formal Method [Pdf] Anandi Giridharan and Pallapa Venkataram, Indian Institute of Science, India |
A Scheme for Maximal Resource Utilization in Peer-To-Peer Live Streaming [Pdf] Bahaa Aldeen Alghazawy and Satoshi Fujita, Hiroshima University, Japan |
Coding Openflow: Enable Network Coding in SDN Networks [Pdf] Jun Yang, Bin Dai, Lu Lv and Guan Xu, Huazhong University of Science and Technology, China |
Application of Compressed Sampling for Spectrum Sensing and Channel Estimation in Wideband Cognitive Radio Networks [Pdf] Naveen Kumar and Neetu Sood, Dr B R Ambedkar NIT Jalandhar, India |
Bandwidth Guaranteed Multicast Routing Algorithm [Pdf] Tran Cong Hung1, Huynh Thach Thao2 and Cao Thai Phuong Thanh3, 1Post & Telecommunications Institute of Technology, Vietnam, 2VP bank FE Credit, Vietnam and 3Saigon University, Vietnam |
An Interoperability Framework for Identity Federation in Multi-Clouds [Pdf] Ahmad Mohammad Saied, Ayman Abdel-Hamid and Yasser El-Sonbaty, Arab Academy for science and Technology, Egypt |
Server Congestion Control And Reduction of Server Power Consumption With DPI Technology [Pdf] Shin-ichi Kuribayashi, Seikei University, Japan |
A Survey of Multimedia Streaming in Wireless Sensor Networks: Progress, Issues and Design Challenges [Pdf] Taner Cevik1, Alex Gunagwera2 and Nazife Cevik2, 1Fatih University, Turkey and 2Arel University, Turkey |
Analyzing The Performance of the Dynamic Position Location and Tracking (D-Pl&T) of Mobile Nodes Using Omni Directional Antenna in Manet [Pdf] Sharmistha Khan1, Golam R Khan1, Dhadesugoor R. Vaman2, Siew T. Koay1 and Suxia Cui1, 1Prairie View A&M University, USA and 2Texas A&M University, USA |
Distribution of Maximal Clique Size of the Vertices for Theoretical Small-World Networks and Real-World Networks [Pdf] Natarajan Meghanathan, Jackson State University, USA |
A Proposed Architecture for Network Forensic System in Large-Scale Networks [Pdf] Tala Tafazzoli, Elham Salahi and Hossein Gharaee, Iran Telecommunication Research Center, Iran |
The Influence of Information Security on the Adoption of Cloud Computing: An Exploratory Analysis [Pdf] Omondi John Opala1, Shawon Rahman2, and Abdulhameed Alelaiwi3, 1Cisco Networks System, USA, 2University of Hawaii-Hilo, USA and 3King Saud University, Saudi Arabia |
A Genetic Algorithm to Solve the Minimum-Costpaths Tree Problem [Pdf] Ahmed Y. Hamed1 and M. R. Hassan2, 1University of Dammam, KSA and 2Aswan University, Egypt. |
The Comparison of Immunization Mechanisms Against Disseminating Information in Social Networks [Pdf] Mohsen Raeisi1 and Behzad Akbari2, 1Islamic Azad University, Iran and 2Tarbiat Modares, Iran |
Attack Countermeasure Tree (ACT) meets with the Split-protocol [Pdf] Bharat S Rawal, Penn State Abington, USA |
Performance Improvement by Temporary Extension of an HPC Cluster [Pdf] Pil Seong Park, University of Suwon, Korea |
Design and Implementation of New Routing Strategy for Enhanced Energy Efficient in WSN [Pdf] Mehdi Bouallegue1,2, Hager Benfradj3, Kosai Raoof1 and Bouallegue Ridha3, 1Laboratory of Acoustics at University of Maine, France, 2System of communication SysCom and 3University of Carthage, Tunisia and 3University of Carthage, Tunisia |
Referencing Tool for Reputation and Trust in Wireless Sensor Networks [Pdf] Mohammad Abdus Salam1 and Alfred Sarkodee-Adoo2, 1Southern University, USA and 2Southern University, USA |
Broadcast Wormhole-Routed 3-D Mesh Networks [Pdf] Amnah El-Obaid, Al-Zaytoonah University of Jordan, Jordan |
May 2015, Volume 7. Number 3
Using Spectral Radius Ratio for Node Degree to Analyze the Evolution of Complex Networks [Pdf] Natarajan Meghanathan, Jackson State University, USA |
Real Time Wireless Health Monitoring Application Using Mobile Devices [Pdf] Amna Abdullah, Asma Ismael, Aisha Rashid, Ali Abou-Elnour and Mohammed Tarique, Ajman University of Science and Technology, United Arab Emirates |
Three-Dimension Hamiltonian Broadcast Wormhole-Routing [Pdf] Amnah El-Obaid, Al-Zaytoonah University of Jordan, Jordan |
Embedding Bus and Ring into Hex-Cell Interconnection Network [Pdf] Qatawneh Mohammad1, Ahmad Alamoush1, Sawsan Basem1, Maen M. Al Assaf1 and Mohammad Sh. Daoud2, 1The University of Jordan, Jordan and 2al Ain University of Science and Technology, UAE |
Correlating Objective Factors With Video Quality Experienced By End Users on P2PTV [Pdf] Huong Pham-Thi1, Hiep Hoang-Van2 and Takumi Miyoshi1, 1Shibaura Institute of Technology, Japan and 2Hanoi University of Science and Technology, Vietnam |
Traffic Offloading Impact on the Performance of Channel-Aware/Qos-Aware Scheduling Algorithms for Video-Applications Over Lte-A Hetnets Using Carrier Aggregation [Pdf] Najem N.Sirhan, Gregory L.Heileman and Christopher C. Lamb, University of New Mexico, USA |
A Novel Energy Aware Node Clustering Algorithm for Wireless Sensor Networks Using a Modified Artificial Fish Swarm Algorithm [Pdf] Reza Azizi1, Hasan Sedghi2, Hamid Shoja3, Alireza Sepas-Moghaddam4, 1Islamic Azad University, Iran, 2Pnu, Assaluye, Iran, 3Pnu, Tehran, Iran and 4Islamic Azad University, Iran |
Fault-Tolerant Routing Scheme Based on Leach for Wireless Sensor Networks [Pdf] Chifaa Tabet Hellel1, Mohamed Lehsaini1 and Hervé Guyennet2, 1Tlemcen University, Algeria and 2 University of Franche-Comte, France |
Radio Propagation Models in Wireless Networks of Unmanned Aerial Vehicles [Pdf] Jun Peng, University of Texas – Rio Grande Valley Edinburg, USA |
Cross Layer Design for Power Control and Link Availability in Mobile Adhoc Networks [Pdf] Anita Yadav1, Y.N.Singh2, Smieee and Raghuraj Singh1, 1Harcourt Butler Technological Institute, Kanpur, India and 2Indian Institute Of Technology, India |
A Novel Algorithm for TCP Timeout Calculation Over Wireless Ad Hoc Networks [Pdf] Tareq T. Krishan1 and Adnan M.Al-Smadi2, 1The University of Jordan-Aqaba, Jordan and 2yarmouk University, Jordan |
Novel Designs of Broadband Patch Antenna for Wireless Communication Application (1800 Mhz And 2400 Mhz) [Pdf] Melad Olaimat and Aws Al-Qaisi, Al-Blaqa’a Applied University, Jordan |
Managing, Searching and Accessing Iot Devices Via Rest Resources [Pdf] Jarogniew Rykowski, The Poznan University of Economics, Poland |
A Predictive Framework For Cyber Security Analytics Using Attack Graphs [Pdf] Subil Abraham1 and Suku Nair2, 1IBM Global Solution Center, USA and 2Southern Methodist University, USA |
A Method of Evaluating Effect of QoS Degradation on Multidimensional QoE of Web Service with ISO – based Usability [Pdf] Daisuke Yamauchi and Yoshihiro Ito, Nagoya Institute of Technology, Japan |
A Genetic Algorithm for Constructing Broadcast Trees with Cost and Delay Constraints in Computer Networks[Pdf] Ahmed Y. Hamed and Ghazi Al-Naymat, University of Dammam, KSA |
Performance Improvement for PAPR Reduction in LTE Downlink System with Elliptic Filtering [Pdf] Snikdho Sworov Haque, Md. Munjure Mowla, Rajshahi University of Engineering & Technology, Bangladesh |
A Novel Signature-Based Traffic Classification Engine To Reduce False Alarms In Intrusion Detection Systems [Pdf] Md. Azizul Islam and Md. Manirul Islam, American International University, Bangladesh |
Concepts And Evolution Of Research In The Field Of Wireless Sensor Networks [Pdf] Ado Adamou ABBA ARI 1,3, Abdelhak GUEROUI1, Nabila LABRAOUI2 and Blaise Omer YENKE3, 1PRISM, University of Versailles St-Quentin-en-Yvelines, France, 21STIC, University of Tlemcen, Algeria and 3LASE, University of Ngaoundere, Cameroon |
Adhoc Mobile Wireless Network Enhancement Based On Cisco Devices [Pdf] Mohamed E. Khedr, Mohamed S. Zaghloul and Mohamed I. El-Desouky, Arab Academy for Science, Egypt |
Data Gathering In Wireless Sensor Networks Using Intermediate Nodes [ Pdf] Ahmad Ali Alhasanat1, Khitam M. Alatoun1, Abdullah I. Alhasanat1 and Aws Al-Qaisi2, 1Al-Hussein Bin Talal University, Jordan and 2Al-Balqa’ Applied University, Jordan |
Clock Synchronization: Estimation of Non-deterministic Delays in Wireless Message Delivery [Pdf] Shiu Kumar1 and Seong Ro Lee2, 1Fiji national University, Fiji and 2Mokpo National University, South Korea |
On The Approximation Of The Sum Of Lognormals By A Log Skew Normal Distribution [Pdf] Marwane Ben Hcine and Ridha Bouallegue, Univesity of Carthage Ariana, Tunisia |
Multi User Performance On Mc Cdma Single Relay Cooperative System By Distributed Stbc In Rayleigh Fading Channel [Pdf] Gelar Budiman, Ali Muayyadi and Rina Pudji Astuti, Telkom University, Indonesia |
Section Based Hex-Cell Routing ALGORITHM (SBHCR) [Pdf] Mohammad Qatawneh, Ahmad Alamoush and Ja’far Alqatawna, The University of Jordan, Jordan |