SlideShare a Scribd company logo
International Journal on AdHoc Networking Systems (IJANS)
http://airccse.org/journal/ijans/ijans.html
ISSN : 2249 - 0175 [Online] ; 2249 - 2682 [Print]
Scope & Topics
In recent years, AdHoc networks have been attracting much interest in both academic and industrial
communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed
journal that serves as a forum to discuss on ongoing research and new contributions. The journal
addresses both practical and theoretical research in the areas of ad hoc networks, sensor networks, mesh
networks and vehicular networks. Its main focus is on all issues from link layer up to the application
layer. The journal solicits original technical papers that were not previously published and are not
currently under review for publication elsewhere.
Topics of interest include but are not limited to, the following
 Wireless mesh networks and cognitive networks
 Vehicular Networks and Protocols
 Mobile Ad Hoc Networks
 Sensor Networks
 MAC layer design for Ad-Hoc Networks and WSNs
 MAC Protocols (802.11, 802.15.4, UWB)
 Multi-channel, Multi-radio and MIMO Technologies
 Cross layer Design and Optimization
 Wireless Local and Personal Area Networks
 Home Networks
 Ad Hoc Networks of Autonomous Intelligent Systems
 Novel Architectures for Ad Hoc and Sensor Networks
 Self-organizing Network Architectures and Protocols
 Transport Layer Protocols
 Routing Protocols (unicast, multicast, geocast, etc.)
 Media Access Control Techniques, Routing and Transport Protocols
 Error Control Schemes
 Power-Aware, Low-Power and Energy-Efficient Designs
 Synchronization and Scheduling Issues
 Mobility Management
 Capacity Planning and Admission Control in Ad-Hoc and Sensor Networks
 Handoff / Mobility Management and Seamless Internetworking
 Resource Management and Wireless QoS Provisioning
 Key Management, Trust Establishment in Wireless Networks
 Security and Privacy issues in Ad Hoc and Sensor Networks
 Reliability, Resiliency and Fault Tolerance Techniques
 Security, Privacy issues in Vehicular, DTNs, and Mesh Networks
 Operating Systems and Middle-Ware Support
 Novel Applications and Architectures for WSNs
 Modeling, Analysis and Performance Evaluation
 Measurements and Hardware and Software Platforms, Systems and Test bed
 Mobility-Tolerant Communication Protocols
 Location Tracking and Location-Based Services
 Resource and Information Management
 Security , Privacy and Fault-Tolerance Issues
 Experimental and Prototype and Test Beds
 Quality-of-Service Issues
 OFDM and MIMD techniques
 Cross-Layer Interactions
 Scalability Issues
 Performance Analysis and Simulation of Protocols
Paper Submission
Authors are invited to Submit papers for this journal through Email :ijans@aircconline.com.
Submissions must be original and should not have been published previously or be under
consideration for publication while being evaluated for this Journal.
Important Dates
 Submission Deadline :June 06, 2020
 Acceptance Notification : July 06, 2020
 Final Manuscript Due : July 14, 2020
 Publication Date : Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us : ijans@aircconline.com or ijansjournal@yahoo.com

More Related Content

More from pijans

As-Puma : Anycast Semantics In Parking Using Metaheuristic Approach
As-Puma : Anycast Semantics In Parking Using Metaheuristic ApproachAs-Puma : Anycast Semantics In Parking Using Metaheuristic Approach
As-Puma : Anycast Semantics In Parking Using Metaheuristic Approach
pijans
 
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
pijans
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
pijans
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
pijans
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
pijans
 
Securing Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and RoutingSecuring Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and Routing
pijans
 

More from pijans (20)

An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...
 
As-Puma : Anycast Semantics In Parking Using Metaheuristic Approach
As-Puma : Anycast Semantics In Parking Using Metaheuristic ApproachAs-Puma : Anycast Semantics In Parking Using Metaheuristic Approach
As-Puma : Anycast Semantics In Parking Using Metaheuristic Approach
 
A Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for ManetsA Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for Manets
 
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
 
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient NodePerformance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
 
Path Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc NetworkPath Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc Network
 
Study of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh NetworkStudy of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh Network
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networks
 
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance ComparisonWireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...
 
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Securing Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and RoutingSecuring Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and Routing
 
Different Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETDifferent Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANET
 

Recently uploaded

Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
Kamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
Kamal Acharya
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
AbrahamGadissa
 

Recently uploaded (20)

CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering ScientistTop 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientist
 
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxConstruction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
fluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answerfluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answer
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
 
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdf
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering Workshop
 

Ijans cfp.25

  • 1. International Journal on AdHoc Networking Systems (IJANS) http://airccse.org/journal/ijans/ijans.html ISSN : 2249 - 0175 [Online] ; 2249 - 2682 [Print] Scope & Topics In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss on ongoing research and new contributions. The journal addresses both practical and theoretical research in the areas of ad hoc networks, sensor networks, mesh networks and vehicular networks. Its main focus is on all issues from link layer up to the application layer. The journal solicits original technical papers that were not previously published and are not currently under review for publication elsewhere. Topics of interest include but are not limited to, the following  Wireless mesh networks and cognitive networks  Vehicular Networks and Protocols  Mobile Ad Hoc Networks  Sensor Networks  MAC layer design for Ad-Hoc Networks and WSNs  MAC Protocols (802.11, 802.15.4, UWB)  Multi-channel, Multi-radio and MIMO Technologies  Cross layer Design and Optimization  Wireless Local and Personal Area Networks  Home Networks  Ad Hoc Networks of Autonomous Intelligent Systems  Novel Architectures for Ad Hoc and Sensor Networks  Self-organizing Network Architectures and Protocols  Transport Layer Protocols  Routing Protocols (unicast, multicast, geocast, etc.)  Media Access Control Techniques, Routing and Transport Protocols  Error Control Schemes  Power-Aware, Low-Power and Energy-Efficient Designs  Synchronization and Scheduling Issues  Mobility Management  Capacity Planning and Admission Control in Ad-Hoc and Sensor Networks  Handoff / Mobility Management and Seamless Internetworking  Resource Management and Wireless QoS Provisioning  Key Management, Trust Establishment in Wireless Networks  Security and Privacy issues in Ad Hoc and Sensor Networks  Reliability, Resiliency and Fault Tolerance Techniques  Security, Privacy issues in Vehicular, DTNs, and Mesh Networks  Operating Systems and Middle-Ware Support  Novel Applications and Architectures for WSNs  Modeling, Analysis and Performance Evaluation  Measurements and Hardware and Software Platforms, Systems and Test bed  Mobility-Tolerant Communication Protocols  Location Tracking and Location-Based Services  Resource and Information Management  Security , Privacy and Fault-Tolerance Issues  Experimental and Prototype and Test Beds  Quality-of-Service Issues
  • 2.  OFDM and MIMD techniques  Cross-Layer Interactions  Scalability Issues  Performance Analysis and Simulation of Protocols Paper Submission Authors are invited to Submit papers for this journal through Email :ijans@aircconline.com. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. Important Dates  Submission Deadline :June 06, 2020  Acceptance Notification : July 06, 2020  Final Manuscript Due : July 14, 2020  Publication Date : Determined by the Editor-in-Chief Contact Us Here's where you can reach us : ijans@aircconline.com or ijansjournal@yahoo.com