This document summarizes the scope and contents of the International Journal of Computer Networks & Communications (IJCNC). IJCNC is a bi-monthly peer-reviewed journal that publishes articles on all aspects of computer networks and data communications. Topics of interest include network protocols, architectures, routing techniques, wireless networks, next generation networks, network operations and management, and more. The goal is to bring together researchers and industry practitioners to advance networking concepts and collaboration.
International Journal of Computer Networks & Communications (IJCNC) - Scopus...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications.The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
International Journal on AdHoc Networking System (IJANS)pijans
In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss ongoing research and new contributions. theoretical research in the areas of ad hoc networks, sensor networks, mesh networks, and vehicular networks. Its main focus is on all issues from the link layer up to the application layer. The journal solicits original technical papers that were not previously published and are not currently under review for publication elsewhere.
International Journal of Computer Networks & Communications (IJCNC) - Scopus...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications.The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
International Journal on AdHoc Networking System (IJANS)pijans
In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss ongoing research and new contributions. theoretical research in the areas of ad hoc networks, sensor networks, mesh networks, and vehicular networks. Its main focus is on all issues from the link layer up to the application layer. The journal solicits original technical papers that were not previously published and are not currently under review for publication elsewhere.
What is engineering? what are the different specialisations available? How do you get in? To know more contact us on www.onestepup.in and book a career counselling session with us.
Here try to sort out some key benefits and opportunities for the undergraduate and graduate students with their IEEE membership and volunteering supports.
It was prepared for the Seminar on Introduction to IEEE and It's opportunities organized by Computer and Programming Club - Daffodil International University PErmananet campus in collaboration with IEEE DIU Student Branch at 24th July 2018.
Christo Ananth, Advisory Committee Member, “International Conference On Data ...Christo Ananth
Christo Ananth, Advisory Committee Member, “International Conference On Data Science and Analytics (ICDSA’17)”, Department of Computer Science, Rathinam College of Arts and Science (Autonomous), Coimbatore-641 021, India, 23rd September 2017.
The International Journal of Database Management Systems (IJDMS)-WJCI, H inde...ijdms
The International Journal of Database Management Systems (IJDMS) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the database management systems & its applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern developments in this field, and establishing new collaborations in these areas.
What is engineering? what are the different specialisations available? How do you get in? To know more contact us on www.onestepup.in and book a career counselling session with us.
Here try to sort out some key benefits and opportunities for the undergraduate and graduate students with their IEEE membership and volunteering supports.
It was prepared for the Seminar on Introduction to IEEE and It's opportunities organized by Computer and Programming Club - Daffodil International University PErmananet campus in collaboration with IEEE DIU Student Branch at 24th July 2018.
Christo Ananth, Advisory Committee Member, “International Conference On Data ...Christo Ananth
Christo Ananth, Advisory Committee Member, “International Conference On Data Science and Analytics (ICDSA’17)”, Department of Computer Science, Rathinam College of Arts and Science (Autonomous), Coimbatore-641 021, India, 23rd September 2017.
The International Journal of Database Management Systems (IJDMS)-WJCI, H inde...ijdms
The International Journal of Database Management Systems (IJDMS) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the database management systems & its applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern developments in this field, and establishing new collaborations in these areas.
The Columbia University Data Science Institute's FinTech Lab launches The OpenSource Risk Engine and Risk DashBoard for academics, government regulators and financial market participants.
International Journal of Distributed and Parallel systems (IJDPS)ijdpsjournal
International Journal of Distributed and Parallel systems (IJDPS)
ISSN: 0976-9757[Online]; 2229-3957[Print]
https://airccse.org/journal/ijdps/ijdps.html
International Journal of Distributed and Parallel systems (IJDPS)
https://www.academia.edu/69752775/International_Journal_of_Distributed_and_Parallel_systems_IJDPS_
International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks.
International Journal of Network Security & Its Applications (IJNSA) - ERA, W...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
The International Journal of Artificial Intelligence & Applications (IJAIA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Artificial Intelligence & Applications (IJAIA). It is an international journal intended for professionals and researchers in all fields of AI for researchers, programmers, and software and hardware manufacturers. The journal also aims to publish new attempts in the form of special issues on emerging areas in Artificial Intelligence and applications.
LEAFLET FILE - International Journal of peer-to-peer networks (IJP2P)ijp2p
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best practices in the area of P2P networking. This will include works that relate to peer-to-peer systems, peer-to-peer applications, grid systems, large-scale distributed systems, and overlay networks. The journal offers a forum in which academics, consultants, and practitioners in a variety of fields can exchange ideas to further research and improve practices in all areas of P2P.
The International Journal of Information Technology, Modeling and Computing (...Zac Darcy
The International Journal of Information Technology, Modeling and Computing (IJITMC) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology, Modeling and Computing. With the advances of Information Technology, there is an active multi-disciplinary research in the areas of IT, CSE, Modeling and Simulation with numerous applications in various fields. The International Journal of Information Technology, Modeling and Computing (IJITMC) is an abstracted and indexed international journal of high quality devoted to the publication of original research papers from IT, Modeling, CSE and Control Engineering with some emphasis on all areas and subareas of computer science, IT, scientific modeling, simulation, visualization and control systems and their broad range of applications.
International Journal of Software Engineering & Applications (IJSEA) - ERA, H...ijseajournal
The International Journal of Software Engineering & Applications (IJSEA) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Software Engineering & Applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts & establishing new collaborations in these areas.
Advanced Computing: An International Journal (ACIJ) acijjournal
Advanced Computing: An International Journal (ACIJ) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the advanced computing. The journal focuses on all technical and practical aspects of high performance computing, green computing, pervasive computing, cloud computing etc. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding advances in computing and establishing new collaborations in these areas.
International Journal on Soft Computing ( IJSC ), H index - Profileijsc
Soft computing is likely to play an important role in science and engineering in the future. The successful applications of soft computing and the rapid growth suggest that the impact of soft computing will be felt increasingly in coming years. Soft Computing encourages the integration of soft computing techniques and tools into both everyday and advanced applications. This Open access peer-reviewed journal serves as a platform that fosters new applications for all scientists and engineers engaged in research and development in this fast growing field.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
International Journal of Computer Science, Engineering and Information Techno...ijcseit
International Journal of Computer Science, Engineering and Information Technology
(IJCSEIT) will provide an excellent international forum for sharing knowledge and results
in theory, methodology and applications of Computer Science, Engineering and
Information Technology. The Journal looks for significant contributions to all major fields
of the Computer Science and Information Technology in theoretical and practical aspects.
The aim of the Journal is to provide a platform to the researchers and practitioners from
both academia as well as industry to meet and share cutting-edge development in the field.
All submissions must describe original research, not published or currently under review
for another conference or journal.
Advances in Materials Science and Engineering: An International Journal (MSEJ)msejjournal
Call for paper!!!.....
Advances in Materials Science and Engineering: An International Journal (MSEJ)
Web page URL: https://airccse.com/msej/index.html
Submission deadline: February 05, 2022
Contact us: : : msejjournal@yahoo.com or msejjournal@airccse.com
Submission URL:http://airccse.com/submission/home.html
Health Informatics - An International Journal (HIIJ) - H index - Profilehiij
Health Informatics: An International Journal is a Quarterly open access peer-reviewed journal that Publishes articles which contribute new results in all areas of the health care.
The journal focuses on all of aspect in theory, practices, and applications of Digital Health Records, Knowledge Engineering in Health, E-Health Information, and Information Management in healthcare, Bio-Medical Expert Systems, ICT in health promotion and related topics.
International Journal of Computational Science and Information Technology (IJ...ijcsity
International Journal of Computational Science and Information Technology (IJCSITY) focuses on Complex systems, information and computation using mathematics and engineering techniques. This is an open access peer-reviewed journal will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the area of Computation theory and applications. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of advanced Computation and its applications.
Service-oriented computing is a popular design methodology for large scale business computing systems. Grid computing enables the sharing of distributed computing and data resources such as processing, networking and storage capacity to create a cohesive resource environment for executing distributed applications in service-oriented computing. Grid computing represents more business-oriented orchestration of pretty homogeneous and powerful distributed computing resources to optimize the execution of time consuming process as well. Grid computing have received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational in e-Science and businesses. The objective of the journal is to serve as both the premier venue for presenting foremost research results in the area and as a forum for introducing and exploring new concepts.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
2. SCOPE OF THE JOURNAL
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly
open access peer-reviewed journal that publishes articles which contribute new results in all
areas of Computer Networks & Communications.The journal focuses on all technical and
practical aspects of Computer Networks & data Communications. The goal of this journal is to
bring together researchers and practitioners from academia and industry to focus on advanced
networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research
results, projects, surveying works and industrial experiences that describe significant advances
in the Computer Networks & Communications.
Topics of interest include, but are not limited to, the following
• Network Protocols & Wireless Networks
• Network Architectures
• High speed networks
• Routing, switching and addressing techniques
• Next Generation Internet
• Next Generation Web Architectures
• Network Operations & management
• Adhoc and sensor networks
• Internet and Web applications
• Ubiquitous networks
• Mobile networks & Wireless LAN
• Wireless Multimedia systems
• Wireless communications
• Heterogeneous wireless networks
• Measurement & Performance Analysis
• Peer to peer and overlay networks
• QoS and Resource Management
• Network Based applications
• Network Security
• Self-Organizing Networks and Networked Systems
• Optical Networking
• Mobile & Broadband Wireless Internet
• Recent trends & Developments in Computer Networks
http://airccse.org/journal/ijcnc.html
3. Members of the Editorial Board
Editor In Chief :
Natarajan Meghanathan, Jackson State University, USA
Editorial Board :
Abdulbaset Mohammad, University of Bradford, United Kingdom
Adnan Hussein Ali, Electrical & Electronics Techniques College, Iraq
Ahmed M. Khedr,Sharjah University, Sharjah,UAE
Ajay K Sharma, Dr B R Ambedkar National Institute of Technology - India
Alejandro Garces,Jaume I University, Spain
Alexander Ferworn, Ryerson University, Canada
Alfio Lombardo, University of Catania, Italy
Ali El-rashedy, University of Bridgeport, CT, USA
Ali Maqousi, Petra University, Jordan
Alireza Mahini, Islamic Azad University-Gorgan, Iran
Alireza Nemaney Pour, Islamic Azad University, Iran
Alvin Lim,Auburn University, USA
Annamalai, Prairie View A&M University, USA
Arunita Jaekel, University of Windsor, Canada
Ashok Kumar Das, International Institute of Information Technology-Hyderabad, India
Ayman Khalil, Institute of Electronics and Telecommunications of Rennes, France
Bari A, University of Western Ontario, Canada
Bilal A. Abul-Huda, Yarmouk University, Jordon
Christos Politis, Kingston University, United Kingdom
Cristina Ribeiro, University of Waterloo, Canada
Cristina Serban, Ovidius University of Constantza, Romania
David C. Wyld, Southeastern Louisiana University, USA
Debasis Giri, Haldia Institute of Technology, India
Dhinaharan Nagamalai, Wirella Net Solutions PTY ltd, Australia
Diego Reforgiato, University of Catania, Italy
Dinh Que Tran, Post and Telecommunication Institute of Technology, Vietnam
Ederval Pablo Ferreira da Cruz, Instituto Federal do Espirito Santo (IFES) - Campus Itapina, Brazil
E Martin, University of California, Berkeley, USA
E.V.Krishnamurthy, Australian National University College of Engg &Computer Science, Austraila
Eric Renault, Institut Telecom - Telecom SudParis, France
Farag M. Sallabi, United Arab Emirates University, UAE
Farshad Safaei, Shahid Beheshti University, Iran
Genge Bela,Joint Research Centre, European Commission, Italy
Giovanni Cordeiro Barroso, Universidade Federal do Ceara, Brasil
H.V.Ramakrishnan,Bharath university, India
Haller Piroska,Petru Maior University, Tirgu Mures, Romania
Hamza Aldabbas, De Montfort University, United Kingdom
http://airccse.org/journal/ijcnc.html
4. Henrique J. A. Holanda, Universidade do Estado do Rio Grande do Norte, Brasil
Hiroyuki Hisamatsu, Osaka Electro-Communication University, Japan
Hong yu, Capitol College, USA
Hussein Al-Bahadili , Petra University, Jordan
Hussein Ismail Khalaf Al-Bahadili, Petra University, Jordan
Hwangjun Song, Pohang University of Science and Technology,South Korea
Ian Tan, Multimedia University, Malaysia
Intisar Al-Mejibli, University of Essex, United Kingdom
Ioannis Karamitsos,University of Aegean,Greece
Jacques Demerjian,Communications & Systems,France
Jan Zizka, SoNet/DI FBE, Mendel University in Brno, Czech Republic
Juan Li, North Dakota State University, USA
Jusak, STMIK STIKOM Surabaya, Indonesia
Kayhan Erciyes, Izmir University, Turkey
Khaled Shuaib, United Arab Emirates University, UAE
Khoa N. Le, University of Western Sydney, Australia
Krzysztof Walkowiak, Wroclaw University of Technology, Poland
Kuribayashi, Seikei University, Japan
Laiali Almazaydeh, University of Bridgeport, USA
M. Ali, University of Bradford, United Kingdom
Maher Heni, University of Carthage, Tunisia
Md. Kamal Hossain, Multimedia University, Malaysia
Mohamed Hassan, American University of Sharjah, UAE
Mohammad Hajjar, Lebanese University, Lebanon
Mohammad S Khan, Sullivan University, USA
Mohammad Talib, University of Botswana, Botswana
Mohammed M. Alkhawlani, University of Science and Technology, Republic of Yemen
Muhammad Sajjadur Rahim, Rajshahi University, Bangladesh
Mydhili Nair, MS Ramaiah Institute of Technology, India
N.K.Choudhari, Smt. Bhagwati Chaturvedi College of Engineering, India
Nidal M. Turab, Al-Isra University, Jordan
Oluwatobi Olabiyi, Prairie View A&M University, USA
Orhan Dagdeviren, Ege University, Turkey
Patricia Marcu, Leibniz Supercomputing Centre, Germany
Pinaki Sarkar, Jadavpur University, India
Polgar Zsolt Alfred,Technical University of Cluj Napoca, Romania
Poo Kuan Hoong, Multimedia University, Malaysia
http://airccse.org/journal/ijcnc.html
5. S.Li, Swansea University, United Kingdom
Salem Nasri, ENIM, Monastir University, Tunisia
Samiran Chattopadhyay, Jadavpur University, India
Sarmistha Neogy, Jadavpur University, India
Sattar B. Sadkhan, University of Babylon, Iraq
Segun Odejide, National Research Council, USA
Selma Boumerdassi, CNAM/CEDRIC, France
Shaoen Wu, The University of Southern Mississippi, USA
Sherif S. Rashad, Morehead State University, USA
Shin-ichi Kuribayashi, Seikei University, Japan
Shrikant K. Bodhe, Bosh Technologies, India
Shrirang.Ambaji.Kulkarni, National Institute of Engineering, India
Solange Rito Lima, University of Minho, Portugal
Souad Zid, National Engineering School of Tunis, Tunisia
Sridharan, CEG Campus - Anna University, India
Srinivasan Krishnamurthy, Cisco Systems, USA
T. G. Basavaraju, National Institute of Technology Karnataka (NITK), India
Tariq Alwada'n, De montfort University, United Kingdom
Tran Cong Hung, Posts and Telecommunications Institute of Technology, Vietnam
Virgil Dobrota,Technical University of Cluj-Napoca, Romania
Yannick Le Moullec, Aalborg University,Denmark
Zaier Aida, National Engeneering School of GABES, Tunisia
Zuqing Zhu, Cisco Systems, USA
Yanxiao Zhao, South Dakota School of Mines & Technology, USA
Omar Daoud, Philadelphia University, Jordan
Firdous Imam, Imam bin Saud University, Saudi Arabia
Ka Chan, La Trobe University, Australia
Mohammad Alia, Al-Zaytoonah University of Jordan, Jordan
Adnan Hnaif, Al-Zaytoonah University of Jordan, Jordan
Ghazi Al-Naymat, University of Dammam, Saudi Arabia
Former Editor In chief :
Michal Wozniak, Wroclaw University of Technology, Poland (April 2009 ~ June 2013)
http://airccse.org/journal/ijcnc.html
6. Paper Submission & Manuscript preparation Guide
Paper Submission
Authors are invited to submit papers for this journal through E-mail ijcnc@airccse.org . Submissions must be
original and should not have been published previously or be under consideration for publication while being
evaluated for this Journal.
Manuscript Template
Review Process
Submissions are accepted for review with the understanding that the same work has been neither submitted to, nor
published in, another publication. Simultaneous submission to other publications will result in immediate rejection
of the paper. Papers are not within the journal scope will be rejected immediately after the pre review process.
All manuscripts will be subject to a well established, fair, unbiased peer review and refereeing procedure, and are
considered on the basis of their significance, novelty and usefulness to the Journals readership. The reviewing
structure will always ensure the anonymity of the referees & it will be reviewed by 3 experts in the field. The
review output will be one of the following decisions:
1. Accept
2. Accept with minor changes
3. weak Accept with major changes
4. Reject
The review process may take approximately two ~three months to be completed. The Editor reserves the right to
reject a paper if it does not meet the aims and scope of the journal, it is not revised well.
Copy Right Form
After submitting final manuscript, you can get copy right form from AIRCC secretary
Special Issue Proposal
Special issue will be published for selected papers from RoEduNet IEEE International Conference 2010, Sibiu, Romania
Published Special Issues Call for paper :
2011
Special issue On : "Wireless & Mobile Networks"
Special issue On : "Networks and Communications"
2012
Special issue On : "Recent Technologies in Networks & Communications"
Special issue On : "Networks and Communications"
Special issue On : "Advances in Networks and Communications"
Special issue On : "Ad Hoc and Sensor Networks"
2013
Special issue On : "Advances in Networks and Communications"
2014
Special issue On : "Network Technologies, Applications and Systems "
New
Contact Us: Here's where you can reach us : ijcnc@airccse.org
http://airccse.org/journal/ijcnc.html
7. Volume 1, Number 3, October 2009
SI.NO PAPER TITLE CITATION
COUNT
14
Convertible DRM System Based on Identity-Based Encryption
Chou-Chen Yang, Ju-Chun Hsiao, Hung-Wen Yang and Jyun-Yi Jiang,
National Chung Hsing University, Taiwan 02
15
PSNR Evaluation of Media Traffic over TFRC
Mohammad Adly, Information Technology Institute (ITI), Ministry of
Communications and Information Technology (MCIT), Egypt
09
16
Design and Implementation of an Integrated RFID and VOIP
System for Supporting Personal Mobility
Pen-ho Chang and Tsan-Pin Wang, National Taichung University,
Taiwan
02
17
Optimized Gateway Discovery in Hibrid MANETS
A. J. Yuste, A.Trivino, F.D. Trujillo, E. Casilari, A. Diaz-Estrella, Jaen
University, Spain 03
Volume 1, Number 1, April 2009
SI.NO PAPER TITLE CITATION
COUNT
01
Mobile Ad-Hoc Network Based Relaying Data Sysem for Oceanic
Flight Routes in Aeronautical Communications
Ho Dac Tu and Shigeru Shimamoto,Waseda University, Japan 18
02
Hop-by-Hop TCP for Sensor Networks
Yao-Nan Lien, National Chengchi University, Taipei, Taiwan, R.O.C. 13
03
AOM:An Efficient Approach to Restore Actor-Actor Connectivity
in Wireless Sensor and Actor Networks
Azadeh Zamanifar, Omid Kashefi and Mohsen Sharifi,Iran University of
Science and Technology, Iran
19
04
Empirical Examination of Mobile Ad Hoc Routing Protocols on
Wireless Sensor Networks
Zhongwei Zhang and Hong Zhou,University of Southern Queensland,
Australia
08
05
Service Re-routing for Service Network
Graph:Efficiency,Scalability and Implementation
David Lai and Zhongwei Zhang,University of Southern Queensland,
Australia 01
8. 18
Design and Development of µMeter - An Innovative Bluetooth
Application
Gagan Singhal and Hao Shi, Victoria University, Australia 01
19
K-Connection Maintenance Algorithm for Balanced Routing In
Mobile Ad Hoc Networks
S.Smys, G.Josemin Bala,Karunya University, India
02
20
RFID Based Networked Gate Entry Control System (GECS)
Jagdish Lal Raheja, Shashikant Nayak and Ashutosh Gupta, Central
Electronics Engineering Research Institute (CEERI)/Council of
Scientific & Industrial Research (CSIR), India
03
21
Improved Network Connectivity in MANETS
B R Sujatha, M V Satyanarayana, Malnad College of Engineering, India 11
Volume 2, Number 1, January 2010
SI.NO PAPER TITLE CITATION
COUNT
22
Impact of Mobility Models on Multi-Path Routing in Mobile Ad Hoc
Networks
Nicholas Cooper1
and Natarajan Meghanathan2
, 1
Northern Kentucky
University, USA and 2
Jackson State University, USA
27
23
A Semantically Distributed Approach to Map IP Traffic
Measurements to a Standardized Ontology
Alfredo Salvador, Jorge E. Lopez de Vergara, Giuseppe Tropea, Nicola
Blefari-Melazzi, Angel Ferreiro and Alvaro Katsu, Universidad
Autonoma de Madrid, Spain
12
24
Using DSR for Routing Multimedia Traffic in MANETs
Ronald Beaubrun and Badji Molo, Laval University, Canada 25
25
Semantic Association-Based Search and Visualization method on the
Semantic Web Portal
Myungjin Lee, Wooju Kim, June Seok Hong and Sangun Park, Yonsei
University, Korea
06
26
Semantic Integration of Information Systems
Anna Lisa Guido and Roberto Paiano, University of Salento, Italy 05
27
Performance Evaluation of an OMPR Algorithm for Route
Discovery in Noisy MANETs
Hussein Al-Bahadili and Rami Jaradat, The Arab Academy for Banking
& Financial Sciences, Jordan
10
9. 28
DISHES: A Distributed Shell System Designed for Ubiquitous
Computing Environment
Chih-Chung Lai and Ren-Song Ko, National Chung Cheng University,
Taiwan
02
29
Energy-Efficient Traffic-Aware Detour Trees for Geographical
Routing
Lei Zhang1
, Deying Li2
and Alvin Lim3
, 1
Frostburg State University,
U.S.A, 2
Renmin University of China, China and 3
Auburn University,
U.S.A
03
30
Deterministic Formulization of End-To-End Delay for Multicast
Systems
Syed S. Rizvi1
, Aasia Riasat2
and Khaled M. Elleithy3, 1,3
University of
Bridgeport, USA and 2
Institute of Business Management, Pakistan
02
31
Hybrid Coding Gain and Hybrid ARQ Based on Conception of
Majority Voting
Hsin-Kun Lai and Erl-Huei Lu, Chang Gung University, Taiwan
01
Volume 2, Number 2, March 2010
SI.NO PAPER TITLE CITATION
COUNT
32
Delay-Power Performance Comparison of Multipliers in VLSI
Circuit Design
Sumit Vaidya1
and Deepak Dandekar2
, 1
OM College of Engineering,
India and 2
B.D.College of Engineering, India
79
33
Node Isolation Probability of Wireless Adhoc Networks in
Nagakami Fading Channel
A.V. Babu and Mukesh Kumar Singh, National Institute of Technology -
Calicut, India
12
34
H-MAC: A Hybrid MAC Protocol for Wireless Sensor Networks
S. Mehta and K.S. Kwak, Inha University, South Korea 17
35
Analyzing the Performance of Active Queue Management
Algorithms
G.F.Ali Ahammed and Reshma Banu, Ghousia college of Engineering,
India
26
36
Wireless Mesh Network Performance for Urban Search and Rescue
Missions
Cristina Ribeiro1
, Alexander Ferworn2
and Jimmy Tran2
, 1
University of
Guelph, Guelph, Canada and 2
Ryerson University, Canada
07
37
Hierarchical Location Service with Prediction in Mobile Ad-Hoc
Networks
Ebtisam Amar1
, Selma Boumerdassi2
and Eric Renault3,4, 1
University of
Pierre and Marie Curie, France, 2
CNAM - CEDRIC, France, 3
Telecom
SudParis, France and 4
Samovar UMR INT-CNRS 5157, France
03
10. 38
A Novel Solution to the Dynamic Routing and Wavelength
Assignment Problem in Transparent Optical Networks
Urmila Bhanja, Sudipta Mahapatra and Rajarshi Roy, Indian Institute of
Technology - Kharagpur, India
05
39
Innovative Rated-Resource Peer-to-Peer Network
Abhishek Sharma and Hao Shi, Victoria University, Australia 01
40
An Efficient Approach for Generalized Load Balancing in
Multipath Packet Switched Networks
G. G. Md. Nawaz Ali1,2,
Rajib Chakraborty2
, Md. Shihabul Alam2
and
Edward Chan1, 1
City University of Hong Kong, China and 2
Khulna
University of Engineering & Technology, Khulna, Bangladesh
01
41
A Powerful Optimization Approach for the Multi Channel
Dissemination Networks
Ahmad Saad Al-Mogren, King Saud University, Saudi Arabia
01
Volume 2, Number 3, May 2010
SI.NO PAPER TITLE CITATION
COUNT
42
A Joint Power Allocation and Adaptive Channel Coding Scheme for
Image Transmission over Wireless Channels
Mohamed El-Tarhuni1
, Mohamed Hassan1
and Akram Bin Sediq2
,
1
American University of Sharjah, UAE and 2
Carleton University,
Canada
09
43
Interference of 802.11B WLAN and Bluetooth: Analysis and
Performance Evaluation
Anil Mathew, Nithin Chandrababu, Khaled Elleithy and Syed Rizvi,
University of Bridgeport, USA
07
44
Bandwidth Modeling and Estimation in Peer to Peer Networks
Kiarash Mizanian, Mehdi Vasef and Morteza Analoui, Iran University of
Science and Technology, Iran
06
45
Cross-Layer Resource Allocation Scheme Under Heterogeneous
Constraints for Next Generation High Rate WPAN
Ayman Khalil, Matthieu Crussiere and Jean-Francois Helard, Institute of
Electronics and Telecommunications of Rennes, France
11
46
Architecture for Cooperative Prefetching in P2P Video-on-Demand
System
Ubaid Abbasi and Toufik Ahmed, University of Bordeaux, France 08
47
Class Based Admission Control by Complete Partitioning -Video on
Demand Server
Soumen Kanrar and Mohammad Siraj, King Saud University, Saudi
Arabia
07
11. 48
MLET: A Power Efficient Approach for TCAM Based, IP Lookup
Engines in Internet Routers
Hamidreza Mahini1
, Reza Berangi1
and Alireza Mahini2, 1
Iran University
of Science and Technology, Iran and 2
Islamic Azad University, Iran
07
49
An Efficient and Secure Routing Protocol for Mobile Ad-Hoc
Networks
N. Ch. Sriman Narayana Iyengar, Syed Mohammad Ansar Sachin
kumar, Piyush Nagar, Siddharth Sharma and Akshay Atrey,VIT
University, India
04
50
A Trustworthy and well-organized Data Disseminating Scheme for
Ad-hoc WSNs
Nomica Imran1
and Imran Rao2,1
Monash University, Australia and 2
The
University of Melbourne, Australia
04
51
General Model for Infrastructure Multi-channel Wireless LANs
Abdelsalam Amer and Fayez Gebali, University of Victoria, Canada 03
52
On the Minimization of Handover Decision Instability in Wireless
Local Area Networks
Meriem Abid1,2,
Tara Ali Yahiya3
and Guy Pujolle1, 1
Laboratoire
d'Informatique de Paris, France, 2
Ginkgo Networks, France and
3
Telecom SudParis, France
02
Volume 2, Number 4, July 2010
53
High Performance Voltage Controlled Oscillator (VCO) Using
65NM VLSI Technology
Ujwala A. Belorkar1
and S.A.Ladhake2
, 1Hanuman Vyayam Prasarak
Mandal's College of Engineering & Technology, India and 2Sipana's
College of Engineering & Technology, India
04
54
The Quantized Differential Comparator in Flash Analog to Digital
Converter Design
Meghana Kulkarni1
,V. Sridhar2
and G. H. Kulkarni1, 1
Gogte Institute of
Technology, India and 2
P.E.S. College of Engineering, India
10
55
Power Optimized Programmable Embedded Controller
M. Kamaraju1
, K. Lalkishore2
and A. V. N. Tilak3, 1,3
Gudlavalleru
Engineering College, India and 2
JNTU - Hyderabad, India
08
56
Optimized Image Steganalysis Through Feature Selection Using
MBEGA
S. Geetha and N. Kamaraj, Thiagarajar College of Engineering, India
13
57
Performance Analysis of an Improved Graded Precision
Localization Algorithm for Wireless Sensor Networks
Sanat Sarangi and Subrat Kar, IIT - Delhi, India
07
12. 58 A Cross-Layer Approach for Minimizing Interference and Latency
of Medium Access in Wireless Sensor Networks
Behnam Dezfouli, Marjan Radi and Shukor Abd Razak, Universiti
Teknologi Malaysia (UTM), Malaysia
09
59
Implementation of the Trigonometric LMS Algorithm using original
Cordic Rotation
Nasrin Akhter, Kaniz Fatema, Lilatul Fersouse and Faria Khandaker,
Stamford University, Bangladesh
02
60 A 60 GHz Analog Phase Shifter in 65 nm Bulk CMOS Process
ETB.
Samuel Jigme Harrison and Zhang Yue Ping, Nanyang Technological
University, Singapore
01
Volume 2, Number 5, September 2010
61
A Proactive Load-Aware Gateway Discovery in Ad Hoc Networks
for Internet Connectivity
Rakesh Kumar, Manoj Misra and Anil K. Sarje, Indian Institute of
Technology - Roorkree, India
17
62
Capacity of Underwater Wireless Communication Channel with
Different Acoustic Propagation Loss Models
Susan Joshy and A.V. Babu, National Institute of Technology - Calicut,
India
03
63
"TEAMTRACKER"- An Innovative Team Collaboration System
Sasa Savic and Hao Shi, Victoria University, Australia 01
64
A Reliable and Energy Efficient Transport Protocol for Wireless
Sensor Networks
Kamal Kumar Sharma1
, Ram Bahadur Patel2
and Harbhajan Singh3
,
1
RDJ Faculty of Engineering, India, 2
MIT Deemed University, India and
3
SSIET, India
19
65
A Cluster Based Replication Architecture for Load Balancing in
Peer-to-Peer Content Distribution
S.Ayyasamy1
and S. N. Sivanandam2, 1
Tamilnadu College of
Engineering, India and 2
PSG College of Technology, India
17
66
CR-MAC: A Multichannel MAC Protocol for Cognitive Radio AD
HOC Networks
S. M. Kamruzzaman, Hankuk University of Foreign Studies, Korea
14
13. 67
Double Error Correcting Long Code
Joanne Gomes1
and B K Mishra2
, 1
SNDT University, India and 2
Thakur
College of Engineering, India
09
68
A Channel-Aware and Occupancy-Dependent Scheduler for Video
Transmission over Wireless Channels
Mohamed Hassan, Taha Landolsi and Husameldin Mukhtar, American
University of Sharjah, UAE
05
69
Binary Location-Search Based Scalable Routing Protocol For Ad
Hoc Networks
Anuradha Banerjee1
and Paramartha Dutta2
, 1
Kalyani Govt. Engg.
College, India and 2
Visva-Bharati University, India
03
70
Network Mobility Support Scheme on PMIPv6 Networks
Hyo-Beom Lee1
, Youn-Hee Han2
and Sung-Gi Min1, 1
Korea University,
South Korea and 2
Korea University of Technology and Education, South
Korea
25
Volume 2, Number 6, November 2010
71
In-Depth Breakdown of a 6LOWPAN Stack for Sensor Networks
Sergio Lembo, Jari Kuusisto and Jukka Manner, Aalto University,
Finland
11
72
Performance Trade Off with Modulation in 802.15.4 WPAN for
Wireless Sensor Networks
Sukhvinder S Bamber and Ajay K Sharma, National Institute of
Technology - Jalandhar, India
14
73
Optimal Placement of Readers in an RFID Network Using Particle
Swarm Optimization
Indrajit Bhattacharya1
and Uttam Kumar Roy2, 1
Kalyani Govt. Engg.
College, India and 2
Jadavpur University, India
40
74
Performance Evaluation of Web Services Orchestrated with WS-
BPEL4 People
Henrique Jorge A. Holanda1,2,
Jose Merseguer Hernaiz2
, Giovanni
Cordeiro Barroso3
and A. B. Serra4, 1
Departamento de Informatica
UERN, Brazil, 2
Dpto. de Inf. e Ing. de Sistemas, Spain, 3
Universidade
Federal do Ceara, Brasil and 4Instituto Federal de Educacao Tecnologica
do Ceara, Brasil
05
14. 75
A High TCP Performance Rate Adaptation Algorithm for IEEE
802.11 Networks
Kehao Zhang1
, Alvin Lim1
, Shaoen Wu2
and Qing Yang1, 1
Auburn
University, USA and 2
The University of Southern Mississippi, USA
08
76
Web Conferencing Traffic - An Analysis Using DIMDIM as
Example
Patrick Seeling, University of Wisconsin-Stevens Point, USA
05
77
Effect of Mobility Models on Reinforcement Learning Based
Routing Algorithm Applied for Scalable AD HOC Network
Environment
Shrirang.Ambaji.Kulkarni1
and G.Raghavendra Rao2
, 1
National Institute
of Engineering, India and 2
NIE Institute of Technology, India
02
78
Reverse Link Performance of DS-CDMA Cellular Systems through
Closed-Loop Power Control and Beamforming in 2D Urban
Environment
Mohamad Dosaranian Moghadam1
, Hamidreza Bakhshi2
, and
Gholamreza Dadashzadeh2
, 1
Islamic Azad University, Iran and2
Shahed
University, Iran
02
Volume 3, Number 1, January 2011
79
Effective Sensor Relocation Technique in Mobile Sensor Networks
Ahmed M. Khedr1
and Hager Ramadan2, 1
Sharjah University - Sharjah,
UAE and 2
Zagazig university, Egypt
09
80
DS-CDMA Cellular Systems Performance with Base Station
Assignment, Power Control Error and Beamforming over Multipath
Fading
Mohamad Dosaranian Moghadam1
, Hamidreza Bakhshi2
and
Gholamreza Dadashzadeh2, 1
Islamic Azad University, Iran and 2
Shahed
University, Iran
07
81
An Efficient Cluster Based Approach for Multi-Source Multicast
Routing Protocol in Mobile Ad Hoc Networks
R. Pandi Selvam and V. Palanisamy, Alagappa University, India
16
82
U-Learning within a Context-Aware Multiagent Environment
Monica Vladoiu1
and Zoran Constantinescu2
, 1
PG University of Ploiesti,
Romania and 2
ZealSoft Ltd., - Bucharest, Romania
17
15. 83
A QoS Routing Protocol Based on Available Bandwidth Estimation
for Wireless Ad Hoc Networks
Heni KAANICHE1
, Fatma LOUATI2
, Mounir FRIKHA3
and Farouk
KAMOUN1, 1
National School of Computer Sciences, Tunisia, 2
National
School of engineers of Sfax, Tunisia and 3
Higher School of
Communication of Tunis, Tunisia
12
84
OSPF Weight Setting Optimization for Single Link Failures
Mohammed H. Sqalli, Sadiq M. Sait and Syed Asadullah, King Fahd
University of Petroleum & Minerals, Saudi Arabia
08
85
Proposed Optimal LSP Selection Method in MPLS Networks
Shin-ichi Kuribayashi, Seikei University, Japan 02
86
Using Planetlab to Implement Multicast at the Application Level
Genge Bela and Haller Piroska, Petru Maior University of Tirgu Mure?,
Romania
02
87
Network Coding-Based Congestion Control at Network Layer:
Protocol Design and Evaluation
Zsuzsanna Ilona Kiss, Zsolt Alfred Polgar, Catalin Vinti, Mihaly Varga,
Andrei Bogdan Rus and Virgil Dobrota, Technical University of Cluj-
Napoca, Romania
02
88
Knowledge Management System Design Using Extended Gaia
Pooja Jain and Deepak Dahiya, Jaypee University of Information
Technology - Solan, India
06
Volume 3, Number 2, March 2011
89
Optimal Channel Allocation with Dynamic Power Control in
Cellular Networks
Xin Wu, Arunita Jaekel and Ataul Bari, University of Windsor, Canada
07
90
A Multiple Access Protocol for Multimedia Transmission over
Wireless Networks
Hong Yu1
and Mohammed Arozullah2, 1
Capitol College, USA and 2
The
Catholic University of America, USA
01
91
Performance Investigation on Two-Classes of Manet Routing
Protocols Across Various Mobility Models with QoS Constraints
Foez Ahmed1
and Muhammad Sajjadur Rahim2, 1
King Khalid
University, Kingdom of Saudi Arabia and 2
Rajshahi University,
Bangladesh
05
92
A New Localized Network Based Routing Model in Computer and
Communication Networks
Abdulbaset H. Mohammad, University of Bradford, United Kingdom
03
16. 93
A Dynamic Multimedia User-Weight Classification Scheme for
IEEE_802.11 WLANs
Ahmed Riadh Rebai1
and Said Hanafi2
, 1
Texas A&M University, Qatar
and 2
University of Valenciennes & Hainaut-Cambresis, France
05
94
Head-Tail Video Streaming Over Peer To Peer Systems
Ali Sianati, Maghsoud Abbaspour and Maryam Norouzi, Shahid
Beheshti University G.C., Iran
01
95
A WiMAX Solution for Real-Time Video Surveillance in Public
Transport
Iftekhar Ahmad and Daryoush Habibi, Edith Cowan University,
Australia
03
Volume 3, Number 3, May 2011
96
Design, Implementation and Evaluation of Congestion Control
Mechanism for Video Streaming
Hiroki Oda, Hiroyuki Hisamatsu and Hiroshi Noborio, Osaka Electro-
Communication University, Japan
08
97
Extending Resource Access in Multi-Provider Networks Using Trust
Management
Maurizio Colombo1
, Fabio Martinelli1
, Paolo Mori1
, Barbara Martini2
,
Molka Gharbaoui3
and Piero Castoldi3, 1
Consiglio Nazionale delle
Ricerche, Italy, 2
Consorzio Nazionale Interuniversitario per le
Telecomunicazioni, Italy and 3
Scuola Superiore Sant'Anna, Italy
05
98
BER Analysis of Multi-Code Multi-Carrier CDMA Systems in
Multipath Fading Channel
Md. Sadek Ali, Md. Shariful Islam, Md. Alamgir Hossain and Md.
Khalid Hossain Jewel, Islamic University, Bangladesh
04
99
A Dynamic Architecture for Reconfiguration of Web Servers
Clusters
Carla Marques1
, Isabel Oliveira2
, Giovanni Barroso2
and Antonio Serra3
,
1
Universidade do Estado do Rio Grande do Norte (UERN), Brasil,
2
Universidade Federal do Ceara(UFC), Brasil and 3Instituto Federal de
Educ. Ciencia e Tecnologia, Brasil
02
100
Smoothing and Modeling of Video Transmission Rates Over a QoS
Network with Limited Bandwidth Connections
Khaled Shuaib, Farag Sallabi and Liren Zhang, United Arab Emirates
University, UAE
05
17. 101
Large-Scale Terrestrial Relaying of Satellite Broadcasted Real-Time
Multimedia Streams
Franco Tommasi and Catiuscia Melle, University of Salento, Italy 05
102
Hybrid Trust Model for Internet Routing
Pekka Rantala, Seppo Virtanen and Jouni Isoaho, University of Turku,
Finland
03
103
Airborne TDMA for High Throughput and Fast Weather
Conditions Notification
Hyungjun Jang, Hongjun Noh and Jaesung Lim, Ajou University, South
Korea
03
104
Towards Service Continuity in IMS Heterogeneous Access Networks
Mohammed BOUTABIA and Hossam AFIFI, TELECOM SudParis,
France
02
105
Quality of Service Provisioning in MANET Using a Cross-Layer
Approach for Routing
Ruchita Goyal, Divyanshu and Manoj Mishra, Indian Institute of
Technology - Roorkee, India
02
106
Design and Analysis of SD_DWCA - A Mobility Based Clustering of
Homogeneous MANETs
T.N. Janakiraman and A. Senthil Thilak, National Institute of
Technology - Tiruchirapalli, India
02
107
Adaptive Cooperative Spectrum Sensing Using Group Intelligence
Rajagopal Sreenivasan, Sasirekha GVK and Jyotsna Bapat, International
Institute of Information Technology - Bangalore, India 01
Volume 3, Number 4, July 2011
108
Soft-Core Processor Design for Sensor Networks Nodes
Ali Elkateeb, University of Michigan - Dearborn, USA 02
109
Intelligent Vertical Handover for Heterogonous Networks Using FL
and ELECTRE
Mohammed M. Alkhawlani, University of Science and Technology,
Sana'a, Yemen
08
200
Implementation and Evaluation of Measurement-Based Admission
Control Schemes within a Converged Networks QoS Management
Framework
Suleiman Y. Yerima, University of Ulster, N. Ireland, United Kingdom
14
18. 201
A Key Establishment Scheme for Mobile Wireless Sensor Networks
Using Post-Deployment Knowledge
Ashok Kumar Das, International Institute of Information Technology -
Hyderabad, India
05
202
Variability of Location Management Costs with Different Mobilities
and Timer Periods to Update Locations
E. Martin and R. Bajcsy, University of California, USA
03
203
SLA Establishment with Guaranteed QoS in the Interdomain
Network : A Stock Model
Dominique Barth, Boubkeur Boudaoud and Thierry Mautor, University
of Versailles-Saint-Quentin, France
02
204
Secure and Robust IPV6 Autoconfiguration Protocol for Mobile
Adhoc Networks Under Strong Adversarial Model
Zohra Slimane1
, Abdelhafid Abdelmalek1
, Mohamed Feham1
and
Abdelmalik Taleb-Ahmed2, 1
STIC Laboratory University of Tlemcen
Algeria and 2
LAMIH Laboratory University of Valenciennes and
Hainaut Cambresis France
01
205
A Probabilistic Approach to Analysis of Reliability in n-D Meshes
with Interconnect Router Failures
Farshad Safaei and Majed ValadBeigi, Shahid Beheshti University, Iran
01
Volume 3, Number 5, September 2011
206
Effect of Temperature on the Performance of a Cylindrical
Microstrip Printed Antenna for TM01 Mode Using Different
Substrates
A. Elrashidi, K. Elleithy and Hassan Bajwa, University of Bridgeport,
USA
21
207
Enhancing Congestion Control to Address Link Failure Loss Over
Mobile Ad-Hoc Network
Mohammad Amin Kheirandish Fard1
, Sasan Karamizadeh1
and
Mohammad Aflaki2, 1
Universiti Teknologi Malaysia, Malaysia and
2
Multi Media University, Malaysia
15
208
Efficient Traffic Control of VoD System
Soumen Kanrar, Vehere Interactive Pvt Ltd, India 12
209
Cluster-based Load Balancing Algorithms for Grids
Resat Umit Payli1
, Kayhan Erciyes2 and Orhan Dagdeviren2, 1
Indiana
University-Purdue University, USA and 2
Izmir University, Turkey 14
300
Optimization of Input Covariance Matrix for Multi-Antenna
Correlated Channels
Feng Li, Cornell University, USA
05
19. 201
A Key Establishment Scheme for Mobile Wireless Sensor Networks
Using Post-Deployment Knowledge
Ashok Kumar Das, International Institute of Information Technology -
Hyderabad, India
05
202
Variability of Location Management Costs with Different Mobilities
and Timer Periods to Update Locations
E. Martin and R. Bajcsy, University of California, USA
03
203
SLA Establishment with Guaranteed QoS in the Interdomain
Network : A Stock Model
Dominique Barth, Boubkeur Boudaoud and Thierry Mautor, University
of Versailles-Saint-Quentin, France
02
204
Secure and Robust IPV6 Autoconfiguration Protocol for Mobile
Adhoc Networks Under Strong Adversarial Model
Zohra Slimane1
, Abdelhafid Abdelmalek1
, Mohamed Feham1
and
Abdelmalik Taleb-Ahmed2, 1
STIC Laboratory University of Tlemcen
Algeria and 2
LAMIH Laboratory University of Valenciennes and
Hainaut Cambresis France
01
205
A Probabilistic Approach to Analysis of Reliability in n-D Meshes
with Interconnect Router Failures
Farshad Safaei and Majed ValadBeigi, Shahid Beheshti University, Iran
01
206
Parallel Routing in Mobile Ad-Hoc Networks
Khaled Day, Abderezak Touzene, Bassel Arafeh and Nasser Alzeidi,
Sultan Qaboos University, Oman
05
207
Network on Chip: a New Approach of QoS Metric Modeling Based
on Calculus Theory
Salem NASRI, Qassim University, Saudi Arabia
03
208
Performance of Iterated EKF Technique to Estimate Time Varying
Channel Using Pilot Assisted Method in MIMO-OFDM System
Rajendra Prasad. K1
, Srinivasan. M2
, Sravya. P3
, Gnaneswari. P1
, Naga
Harshavardhan. K1
and Pranob K Charles1, 1
KL University, India,
2
Meerut Institute of Engineering and Technology, India and 3
SBIT, India
03
209
Multiple Ant-Bee Colony Optimization for Load Balancing in
Packet-Switched Networks
Mehdi Kashefi Kia1
, Nasser Nemat bakhsh2
and Reza Askari
Moghadam1, 1
Payame Noor University, Iran and 2
Islamic Azad
University, Iran
06
210
Proposed Congestion Control Method for Cloud Computing
Environments
Shin-ichi Kuribayashi, Seikei University, Japan
02
20. 211
Highly Secure Key Predistribution Using Affine Planes and Reed
Muller Codes in Wireless Sensor Networks
Pinaki Sarkar1
, Amrita Saha2
and Samiran Bag3, 1
Jadavpur University,
India, 2
IIT Bombay, India and 3
Indian Statistical Institute, India
01
Volume 3, Number 6, November 2011
212
Decentralized Self-Management of Trust for Mobile Ad Hoc Social
Networks
Juan Li and Qingrui Li, North Dakota State University, USA
08
213
Channel Estimation Study for Block - Pilot Insertion in OFDM
Systems Under Slowly Time Varying Conditions
Aida Zaier1
and Ridha Bouallegue2
, 1Tunis University, Tunisia and
2
Tunis Ariana, Tunisia
23
214
Improving TCP Performance Over Wireless Network with Frequent
Disconnections
Purvang Dalal1 , Nikhil Kothari1 and K. S. Dasgupta2, 1D.D.University,
India and 2IIST - Trivendrum, India
13
215
Performance Evaluation of Secure Video Transmission over
WIMAX
FarrukhEhtisham, Emmanouil A. Panaousis and Christos Politis,
Kingston University - London, UK
07
216
A P2P Platform for Real-Time Multicast Video Streaming
Leveraging on Scalable Multiple Descriptions to Cope with
Bandwidth Fluctuations
Lorenzo Favalli1
, Marco Folli1
, Alfio Lombardo2
, Diego Reforgiato2
and
Giovanni Schembra2
, 1University of Pavia, Italy and 2
University of
Catania, Italy
04
217
Performance Improvement in OVSF Based CDMA Networks Using
Flexible Assignment of Data Calls
Davinder S Saini and Neeru Sharma, Jaypee University of Information
Technology, India
03
218 SOCP Approach for Reducing PAPR System SCFDMA in Uplink
via Tone Reservation
Zid Souad1
and Bouallegue Ridha2
, 1National Engineering School of
Tunis, Tunisia and 2
SUP'COM, 6'Tel Laboratory, Tunisia
02
21. Volume 4, Number 1, January 2012
SI.NO PAPER TITLE CITATION
COUNT
219
Demonstration and Performance Analysis of ROF Based OFDM-
PON System for Next-Generation Faber Optic Communication
Nadia Nowshin1
, A K M Arifuzzman1
, Mohammed Tarique2, 1
American
International University, Bangladesh and 2
University of Science and
Technology, United Arab Emirates
06
220
A Reliable Semi-Distributed Load Balancing Architecture of
Heterogeneous Wireless Networks
Md. Golam Rabiul Alam1
, Chayan Biswas2
, Naushin Nower2
and
Mohammed Shafiul Alam Khan2, 1
Islamic University Chittagong-
Bangladesh and 2
University of Dhaka-Bangladesh.
05
221
An Intelligent Mobile-Agent Based Scalable Network Management
Architecture for Large-Scale Enterprise System
A.K. Sharma, Atul Mishra and Vijay Singh, YMCA University, India 04
222
Parallel Computation of CRC Using Special Generator Polynomials
Hamed Sheidaeian1
and Behrouz Zolfaghari2, 1
Islamic Azad University,
Iran and 2
Amirkabir University, Iran 02
223
Principle of Virtual Use Method in Common Gateway Interface
Program on the DACS Scheme
Kazuya Odagiri1
, Shogo Shimizu2
, Naohiro Ishii3
and MakotoTakizawa4,
1
Yamaguchi University, Japan and 2
Advanced Institute of Industrial
Technology, Japan,3
Aichi Institute of Technology, Japan and 4
Seikei
University, Japan
02
224
An Extended Network Coding Opportunity Discovery Scheme in
Wireless Networks
Yunlong Zhao1,2,
Zhao Dong1
, Masayuki Iwai2
, Kaoru Sezaki2
and
Yoshito Tobe3
, 1Harbin Engineering University, China, 2
The University
of Tokyo, Japan and 3
Tokyo Denki University, Japan
02
225
MIMO Z Channel Interference Management
Ian Lim1
, Chedd Marley2
and Jorge Kitazuru3, 1
National University of
Singapore, Singapore,2
University of Sydney, Australia and 3
University of
Auckland, New Zealand
01
226
Complex Support Vector Machine Regression for Robust Channel
Estimation in Lte Downlink System
Anis Charrada and Abdelaziz Samet, Carthage University, Tunisia 01
22. 227
Implementation of Fault Tolerance Algorithm to Restore Affected
Nodes in Scheduling Clusters
Fadel Hussen, Khaled Elleithy and Abdul Razaque, University of
Bridgeport, USA
01
Volume 4, Number 2, March 2012
SI.NO PAPER TITLE CITATION
COUNT
228
Reducing Total Power Consumption Method in Cloud Computing
Environments
Shin-ichi Kuribayashi, Seikei University, Japan 16
229
Adjacency Matrix Based Energy Efficient Scheduling Using S-Mac
Protocol in Wireless Sensor Networks
Shweta Singh and Ravindara Bhatt, Jaypee University of Information
Technology, India
12
Volume 4, Number 3, May 2012
SI.NO PAPER TITLE CITATION
COUNT
230
Multilayered BOW-TIE Antennas Design for RFID and Radar
Applications Using a Simple Equivalent Transmission Line Model
S. Didouh, M. Abri and F. T. Bendimerad, Abou-Bekr Belkaid
University, Algeria
08
231
Multi-Layered Ring Log-Periodic Antennas Array Design for GPS
Systems
M. Abri, S.M. Bahloul and H. Abri Badaoui, Universite Abou-Bekr
Belkaid - Tlemcen, Algeria
02
232
On Throughput Performance of Decode and Forward Cooperative
Relaying with Packet Combining and ARQ
Rajendrakumar Patil, Indian Institute of Technology - Bombay, India 06
233
Performance Analysis of the Routing Protocols for Video Streaming
Over Mobile Ad Hoc Networks
Muhammad Shaffatul Islam1
, Md. Adnan Riaz2
and Mohammed
Tarique3, 1
Khulna University of Engineering and Technology,
Bangladesh, 2
Technical University of Munich, Germany and 3
Ajman
University of Science and Technology, UAE
13
23. 234
Automated Inference System for End-To-End Diagnosis of Network
Performance Issues in Client-Terminal Devices
Chathuranga Widanapathirana, Y. Ahmet Sekercioglu, Milosh V.
Ivanovich, Paul G. Fitzpatrick and Jonathan C. Li, Monash University,
Australia
04
235
Regenerative and Adaptive schemes Based on Network Coding for
Wireless Relay Network
Ahmed Hassan M. Hassan, Bin Dai and Benxiong Huang, Huazhong
University of Science and Technology, P.R. China
01
236
Enhanced Location Based Routing Protocol for 6LoWPAN
M. Rehenasulthana1
, P. T. V Bhuvaneswari2
and N. Rama3, 1
Mohamed
Sathak College, India, 2
MIT Anna University, India and 3
Presidency
College, India
01
Volume 4, Number 4, July 2012
SI.NO PAPER TITLE CITATION
COUNT
237
Design and Optimization of Integrated Bluetooth and UWB Antenna
with Dual Band-Notched Functions
Su Sandar Thwin, Multimedia University, Malaysia 02
238
AODVSEC: A Novel Approach to Secure Ad Hoc on-Demand
Distance Vector (AODV) Routing Protocol from Insider Attacks in
MANETs
Akshai Aggarwal1
, Savita Gandhi2
, Nirbhay Chaubey2
, Pathik Shah2
and
Madhvi Sadhwani2, 1
Gujarat Technological University, India and
2
Gujarat University, India
14
239
OFDM Systems Resource Allocation using Multi-Objective Particle
Swarm Optimization
Rajendrasingh Annauth and Harry C.S.Rughooputh, University of
Mauritius, Mauritius
09
240
Determination of Optimal Number of Clusters in Wireless Sensor
Networks
Ravi Tandon, Indian Institute of Technology - Guwahati, India 07
241
Comparison between Performances of Channel estimation
Techniques for CP-LTE and ZP-LTE Downlink Systems
Abdelhakim Khlifi1
and Ridha Bouallegue2, 1
National Engineering
School of Tunis, Tunisia and 2
Sup'Com, Tunisia
03
242
BitTorrent Network Traffic Forecasting With ARMA
Poo KuanHoong, Ian K.T. Tan and CheeYikKeong, Multimedia
University, Malaysia
03
24. 243
CRAW: Combination of Re-Keying and Authentication in Wireless
Networks for Secure Multicast Increasing Efficiency of Member
Join/Leave and Movement
Elina Eidkhani1
, Melisa Hajyvahabzadeh1
, S. Anahita Mortazavi1
and
Alireza Nemaney Pour2, 1
Sharif University of Technology, Iran and
2
Islamic Azad University of Abhar, Iran
03
244
TCP-UB: A New Congestion Aware Transmission Control Protocol
Variant
Wafa Elmannai, Abdul Razaque and Khaled Elleithy, University of
Bridgeport, USA
02
245
Performance and Detection of M-ary Frequency Shift Keying in
Triple Layer Wireless Sensor Network
Mohammad Waris Abdullah and Nazar Waheed, King Khalid
University, Saudi Arabia
01
246
An Efficient Group Key Management Using Code for Key
Calculation for Simultaneous Join/Leave: CKCS
Melisa Hajyvahabzadeh1
, Elina Eidkhani1
, S. Anahita Mortazavi1
and
Alireza Nemaney Pour2, 1
Sharif University of Technology, Iran and
2
Islamic Azad University of Abhar, Iran
01
Volume 4, Number 5, September 2012
SI.NO PAPER TITLE CITATION
COUNT
247
IPSec over Heterogeneous IPv4 and IPv6 Networks: Issues and
Implementation
Nazrul M. Ahmad and Asrul H. Yaacob, Multimedia University,
Malaysia
09
248
Wavelet Spectrum for Investigating Statistical Characteristics of
UDP-Based Internet Traffic
Jusak Jusak1
and Richard J. Harris2, 1
STMIK STIKOM Surabaya,
Indonesia and 2
Massey University, New Zealand
02
249
Utilization-Based Congestion Control
Satoshi Utsumi1
and Salahuddin Muhammad Salim Zabir2, 1
Tsuruoka
National College of Technology, Japan and 2
France Telecom Japan,
Japan
01
25. Volume 4, Number 6, November 2012
SI.NO PAPER TITLE CITATION
COUNT
250
Unified Analysis of Two-Hop Cooperative Amplify-and-Forward
Multi-Relay Networks
Oluwatobi Olabiyi and Annamalai Annamalai, Prairie View A&M
University, USA
03
Volume 5, Number 1, January 2013
SI.NO PAPER TITLE CITATION
COUNT
251
The Affects of Different Queuing Algorithms within the Router on
QoS VoIP Application using OPNET
Hussein A. Mohammed1
, Adnan Hussein Ali2
, Hawraa Jassim
Mohammed1, 1
Iraqi Commission for Computers and Informatics, Iraq and
2Electrical & Electronics Techniques College - Baghdad, Iraq
20
252
Investigate the Performance Evaluation of IPTV Over WiMAX
Networks
Jamil M. Hamodi and Ravindra C. Thool, Shri Guru Gobind Singhji
Institute of Engineering and Technology (SGGS), India
20
253
Further Results on the Dirac Delta Approximation and the Moment
Generating Function Techniques for Error Probability Analysis in
Fading Channels
Annamalai Annamalai, Eyidayo Adebola and Oluwatobi Olabiyi, Prairie
View A&M University, USA
04
254
Improving Quality of Service and Reducing Power Consumption
with WAN Accelerator in Cloud Computing Environments
Shin-ichi Kuribayashi, Seikei University, Japan 06
255
A User Profile Based Access Control Model and Architecture
Meriem Zerkouk1
, Abdallah Mhamed2
and Belhadri Messabih1,
1University of Sciences and Technology Oran, Algeria and 2Institut
Mines-Telecom / Telecom SudParis, France 04
26. Volume 5, Number 2, March 2013
SI.NO PAPER TITLE CITATION
COUNT
256
Replay Attack Prevention in Kerberos Authentication Protocol using
Triple Password
Gagan Dua1, Nitin Gautam2
, Dharmendar Sharma3
and Ankit Arora4
,
1
National Institute of Technology, India, 2
Raj Kumar Goel Institute of
Technology, India, 3
Satyug Darshan Technical Campus, India and
4
RIMT-Institute of Engineering & Technology, India
14
257
Performance Evaluation of Distributed Synchronous Greedy Graph
Coloring Algorithms on Wireless Ad Hoc and Sensor Networks
Esra Ruzgar1
and Orhan Dagdeviren2
, 1Izmir University, Izmir, Turkey
and 2
Ege University, Izmir, Turkey
02
258
System Architecture of Hatter Health Connect : An Integration of
Body Sensor Networks and Social Networks to Improve Health
Awareness
Hala ElAarag, David Bauschlicher and Steven Bauschlicher, Stetson
University, USA
02
259
A Survey on Energy Efficiency for Wireless Mesh Network
Sarra Mamechaoui1
, Fedoua Didi1 and Guy Pujolle2, 1
Abou Bekr Belkaid
University, Algeria and 2Pierre et Marie Curie University, France 13
300
New Metric for HWMP Protocol (NMH)
Sidi Ould Cheikh, Malik Mubashir Hassan and Abdelhak Geuroui,
University of Versailles, France
03
301
Simulation of Cognitive Radio System Applying Different Wireless
Channel Models
Mohamed Shalaby1, Mona Shokair2
and Yaser S. E. Abdo1, 1National
Institute for Standards, Egypt and 2
Menoufia University, Egypt
01
Volume 5, Number 3, May 2013
SI.NO PAPER TITLE CITATION
COUNT
302
I Am 4
VHO: New Approach to Improve Seamless Vertical
Handover in Heterogeneous Wireless Networks
Omar Khattab and Omar Alani, University of Salford, UK 09
27. 303
Designing Run-Time Environments to Have Predefined Global
Dynamics
Massimo Monti, Pierre Imai and Christian, Tschudin University of Basel,
Switzerland
02
304
A Secure Data Communication System Using Cryptogaphy and
Steganography
Saleh Saraireh, Philadelphia University, Jordan 14
305
A Framework for Software-as-a-Service Selection and Provisioning
Elarbi Badidi, College of Information Technology, United Arab Emirates 12
306
Reducing the Peak to Average Power Ratio of MIMO-OFDM
Systems
Asim M. Mazin and Garth V. Crosby, Southern Illinois University
Carbondale, USA 03
Volume 5, Number 4, July 2013
SI.NO PAPER TITLE CITATION
COUNT
307
An Efficient ANT Based QoS Aware Intelligent Temporally Ordered
Routing Algorithm for MANETs
Debajit Sensarma and Koushik Majumder, West Bengal University of
Technology, India
12
308
Improved Quality of Service Protocol for Real Time Traffic in
MANET
Iftikhar Ahmad1
, Humaira Jabeen2
and Faisal Riaz3, 1
Mirpur University
of Science and Technology, Pakistan, 2
International Islamic University,
Pakistan and 3Iqra University Islamabad Campus, Pakistan
06
309
Threats and Anti-threats Strategies for Social Networking Websites
Omar Saeed Al Mushayt, Jazan University, Kingdom of Saudi Arabia
02
310
A New Programming Model to Simulate Wireless Sensor Networks :
Finding The Best Routing Path
Abrar Alajlan, Khaled Elleithy and Varun Pande, University of
Bridgeport, USA
01
28. Volume 5, Number 5, September 2013
SI.NO PAPER TITLE CITATION
COUNT
311
Towards Internet of Things (IOTS) : Integration of Wireless Sensor
Network to Cloud Services for Data Collection and Sharing
Rajeev Piyare and Seong Ro Lee, Mokpo National University, South
Korea
20
312
On Client's Interactive Behaviour to Design Peer Selection Policies
for Bittorrent-Like Protocols
Marcus V. M. Rocha1
and Carlo Kleber da S. Rodrigues2,3
, 1Minas
Gerais State Assembly, Brazil, 2
University Center of Brasilia, Brazil and
3
Polytechnic School of Army, Ecuador
08
313
Joint Multiple Resource Allocation Method for Cloud Computing
Services with Different QoS to Users at Multiple Locations
Shin-ichi Kuribayashi, Seikei University, Japan 03
314
Cloud Computing Challenges with Emphasis on Amazon EC2
and
Windows Azure
Azzam Sleit1
, Nada Misk1
, Fatima Badwan1
and Tawfiq Khalil2, 1
The
University of Jordan, Jordan and 2
Oakland University, USA
02
315
A General Stochastic Information Diffusion Model in Social
Networks Based on Epidemic Diseases
Hamidreza Sotoodeh1
, Farshad Safaei2,3,
Arghavan Sanei3
and Elahe
Daei1, 1
Qazvin Islamic Azad University, Iran, 2
Institute for Research in
Fundamental Sciences (IPM), Iran and 3Shahid Beheshti University
G.C., Iran
04
316
Available Network Bandwidth Schema to Improve Performance in
TCP Protocols
Marcos Talau and Emilio Carlos Gomes Wille, Federal University of
Technology - Parana (UTFPR), Brazil
01
Volume 5, Number 6, November 2013
SI.NO PAPER TITLE CITATION
COUNT
317
Wireless Sensor Networks Localization Algorithms : A
Comprehensive Survey
Asma Mesmoudi, Mohammed Feham and Nabila Labraoui, STIC
Laboratory, Algeria
20
29. 318
A Review : Study of Handover Performance in Mobile IP
Geetanjali Chellani and Anshuman Kalla, Jaipur National University,
India
09
319
A Novel Hierarchical ANT Based QoS Aware Intelligent Routing
Scheme for MANETs
Debajit Sensarma and Koushik Majumder, West Bengal University
ofTechnology, India
06
320
A Distributed IP-Based Telecommunication System Using SIP
Carlton Andre Thompson, Haniph A. Latchman, Nathan Angelacos and
Bharath Kumar Pareek, University of Florida, USA 02
321
NAME : A Naming Mechanism for Delay/Disruption-Tolerant
Network
Songyang Wang and Ruyi Ma, Beihang University, China 01
322
The Improvement of End to End Delays in Network Management
System Using Network Coding
El Miloud AR Reyouchi1,
Kamal Ghoumid2
, Koutaiba Ameziane1
and
Otman El Mrabet1, 1
Abdelmalek Essaadi University, Morroco and
2
Mohammed I University, Morocco
02
Volume 6, Number 1, January 2014
SI.NO PAPER TITLE CITATION
COUNT
333
Ubiquitous Smart Home System Using Android Application
Shiu Kumar, Mokpo National University, South Korea 53
334
Secure Routing and Data Transmission in Mobile Ad Hoc Networks
Waleed S. Alnumay1
and Uttam Ghosh2, 1
King Saud University, Saudi
Arabia and 2
IIT- Kharagpur, India
05
335
Distributed Vertex Cover Algorithms for Wireless Sensor Networks
Vedat Kavalci1, Aybars Ural2
and Orhan Dagdeviren2, 1
Izmir University,
Turkey and 2
Ege University, Turkey 03
336
EDOCR: Energy Density On-Demand Cluster Routing in Wireless
Sensor Networks
B M Thippeswamy1
, Reshma S2
, Shaila K1, Venugopal K R2
, S S
Iyengar3
and L M Patnaik4, 1
Jawaharlal Nehru Technological University,
India, 2
Visvesvaraya College of Engineering, India, 3
Florida International
University, U S A and 4
Indian Institute of Science, India
04
30. 337
Analyzing Peer Selection Policies for BitTorrent Multimedia On-
Demand Streaming Systems in Internets
Carlo Kleber da Silva Rodrigues1,2, 1
Armed Forces University – ESPE,
Ecuador and 2
University Center of Brasília – UniCEUB, Brazil
04
Volume 6, Number 2, March 2014
SI.NO PAPER TITLE CITATION
COUNT
338
Performance Comparison of Mobile Ad Hoc Network Routing
Protocols
Mandeep Kaur Gulati and Krishan Kumar, PTU Kapurthala, India 05
339
Enhanced AODV Route Discovery and Route Establishment for QoS
Provision for Real Time Transmission in MANET
Iftikhar Ahmad, Uzma Ashraf, Sadia Anum and Hira Tahir, Mirpur
University of Science and Technology, Pakistan
02
340
Comparative Analyisis on Some Possible Partnership Schemes of
Global IP Exchange Providers
David Gunawan and Karno Budiono, Telkom Indonesia Research &
Development Centre, Indonesi
01
Volume 6, Number 3, May 2014
SI.NO PAPER TITLE CITATION
COUNT
341
Energy Efficiency Cross Layer Protocol for Wireless Mesh Network
Sarra Mamechaoui1, Fedoua Didi1
and Guy Pujolle2, 1
STIC Laboratory,
Abou Bekr Belkaid University Tlemcen, Algeria and 2
Pierre et Marie
Curie University Paris 6
, France
02
342
A Comparison of Efficient Algorithms for Scheduling Parallel Data
Redistribution
Marios-Evangelos Kogias and Timotheos Aslanidis, National Technical
University of Athens, Greece
02
31. Volume 6, Number 4, July 2014
SI.NO PAPER TITLE CITATION
COUNT
343
Energy Aware Clustering Protocol (EACP) for Heterogeneous WSN
Surender Kumar1
, Sumeet Kumar2
and Bharat Bhushan3, 1
Govt.
Polytechnic, India, 2
Accenture Services Private Ltd., India and 3Khalsa
College, India
02
Volume 6, Number 5, September 2014
SI.NO PAPER TITLE CITATION
COUNT
344
A Proposal for Improve the Life-Time of Wireless Sensor Network
Tran Cong Hung1
and Nguyen Hong Quan2, 1
Post & Telecommunications
Institute of Technology, Vietnam and 2University of Science, Vietnam 01
345
A Novel Intrusion Detection Model for Mobile Ad-Hoc Networks
using CP-KNN
M. Lalli1 and V. Palanisamy2, 1
Bharathidasan University, India and
2
Alagappa University, India
02
346
A Computer Virus Propagation Model Using Delay Differential
Equations with Probabilistic Contagion and Immunity
M. S. S. Khan, Sullivan University, USA 06
347
Analysis of IPV6
Transition Technologies
Ali Albkerat and Biju Issac, Teesside University, UK 06
348
Importance of Realistic Mobility Models for Vanet Network
Simulation
Bahidja Boukenadil, Tlemcen University, Algeria 02
349
A Study on Impacts of RTT Inaccuracy on Dynamic Bandwidth
Allocation in PON and Solution
Son Nguyen Hong, Hao Nguyen Anh and Thua Huynh Trong, Post and
Telecommunication Institute of Technology, Vietnam
02
350
On the Optimization of BitTorrent-Like Protocols for Interactive
On-Demand Streaming Systems
Carlo Kleber da Silva Rodrigues1,2, 1
Armed Forces University – ESPE,
Ecuador and 2
University Center of Brasilia, Brazil
03
32. Volume 6, Number 6, November 2014
SI.NO PAPER TITLE CITATION
COUNT
351
Priority Based Bandwidth Allocation in Wireless Sensor Networks
Mary Cherian1
and T.R. Gopalakrishnan Nair2, 1
Dr.Ambedkar Institute of
Technology, India and 2Dayananda Sagar Institutions, India 01
352
Analysis of Wifi and Wimax and Wireless Network Coexistence
Shuang Song and Biju Issac, Teesside University, UK 01
Volume 7, Number 1, January 2015
SI.NO PAPER TITLE CITATION
COUNT
353
Data Gathering in Wireless Sensor Networks Using Intermediate
Nodes
Abdullah I.Alhasanat1
, Ahmad Ali Alhasanat1
, Khitam M.Alatoun1 and
Aws AlQaisi2, 1
Al-Hussein Bin Talal University, Jordan and 2
Al-Balqa'
Applied University, Jordan
03
354
Concepts and Evolution of Research in the Field of Wireless Sensor
Networks
Ado Adamou ABBA ARI1,3,
Abdelhak GUEROUI1
, Nabila LABRAOUI2
and Blaise Omer YENKE3, 1
PRISM, University of Versailles St-Quentin-
en-Yvelines, France, 2,1
STIC, University of Tlemcen, Algeria and
3
LASE, University of Ngaoundere, Cameroon
05
355
A Predictive Framework for Cyber Security Analytics Using Attack
Graphs
Subil Abraham1 and Suku Nair2, 1
IBM Global Solution Center, USA and
2
Southern Methodist University, USA
05
Volume 7, Number 2, March 2015
SI.NO PAPER TITLE CITATION
COUNT
356
White Space Steganography on Text By Using lzw-Huffman Double
Compression
Gelar Budiman and Ledya Novamizanti, Telkom University, Indonesia 01
33. Volume 7, Number 3, May 2015
SI.NO PAPER TITLE CITATION
COUNT
357
Embedding Bus and Ring into Hex-Cell Interconnection Network
Qatawneh Mohammad1, Ahmad Alamoush1, Sawsan Basem1, Maen
M. Al
Assaf1
and Mohammad Sh. Daoud2, 1
The University of Jordan,
Jordan and 1
Al
Ain University of Science and Technology, UAE
01
358
Real Time Wireless Health Monitoring Application Using Mobile
Devices
Amna Abdullah, Asma Ismael, Aisha Rashid, Ali Abou-Elnour and
Mohammed Tarique, Ajman University of Science and Technology,
United Arab Emirates
03
359
A Novel Energy Aware Node Clustering Algorithm for Wireless
Sensor Networks Using a Modified Artificial Fish Swarm Algorithm
Reza Azizi1
, Hasan Sedghi2
, Hamid Shoja3
, Alireza Sepas-Moghaddam4,
1
Islamic Azad University, Iran, 2
Pnu, Assaluye, Iran, 3Pnu, Tehran, Iran
and 4
Islamic Azad University, Iran
01
Volume 7, Number 6, November 2015
SI.NO PAPER TITLE CITATION
COUNT
08
An Overview of Visible Light Communication Systems
Taner Cevik and Serdar Yilmaz, Fatih University, Turkey 01