Sl. No. Issue Date Vol - Issue Paper Id Title Abstract Author Page No
12011-12-311-1Wireless Charging At A Glancetjprcabs73.pdf

Mr.Savan K.Patel, Mr.Hiral R. Patel  & Mr.Ravi.S.Patel

1-12
22011-12-311-1Power Aware Routing Protocol for Mobile Ad Hoc Networkstjprcabs74.pdf

Mrs Sujatha B M,  Mr. Manjunath R C  &  Mr.Vedanth Ravi

13-22
32011-12-311-1Design Of An Efficient Random Walk Routing Protocol For Wireless Sensor Networkstjprcabs75.pdf

Mrs.Kavita D.Hanabaratti  &  Prof. Rashmi Jogdand

23-41
42011-12-311-1Graphical Simulation Of Wireless Application Protocol tjprcabs189.pdf

Asst. Prof. G. Mural, Mr. Y.V. Krishna Reddy,  Mr. M. Siva Kumar  &   Ms.K.Durga Prasad

42-58
52011-12-311-1Security Assessments And Research Directions In Cloud Computingtjprcabs190.pdf

Mr.Hiren B. Patel & Mr. Dhiren R. Patel

59-68
62011-12-311-1M-Learning: A Perspective Application Of Mobile Computingtjprcabs191.pdf

Asst. Prof. Jui Pattnayak & Prof. Dr. Sabyasachi Pattnaik

69-78
72012-03-312-1Analysis in Mobile Communication Network Using DTN tjprcabs304.pdf

M. Chithik Raja  & A.Jayaprakash

1-30
82012-03-312-1Optimization of Recent Attacks using Internet Protocoltjprcabs338.pdf

A. Rengarajan1, C. Jayakumar & R. Sugumar



31-52
92012-06-302-2Multi-Factor Authentication in Relation to Secured Payment Systems in Atm’stjprcabs543.pdf

Partha Pratim Ghosh &  Sabyasachi Pattnaik

1-20
102012-06-302-2Design and Analysis of Enhanced Developments in Wireless Mobile Networks and Securitytjprcabs544.pdf

Srinivasa Rao,  D. Rajani,  J.A. Chandulal  & D. Veerabhadra Rao

21-31
112012-06-302-2Security Issues in P2P Network using Analysis of Streaming Servicestjprcabs545.pdf

A. Rengarajan & R. Sugumar

32-43
122012-06-302-2Validating and Weight Scales Report of Foodstuffs in Smart Home based on Short Message Service (SMS) and Email with the Radio Frequency Identification (RFID)tjprcabs546.pdf

Seyed Mohammad Bagher Mostafavi & R. S. Kawitkar

44-58
132012-06-302-2SMS Based Money Transaction using SOAtjprcabs547.pdf

P.Mathivalavan, K. Karthikeyan & T. Padmanabaraghavan

59-71
142012-06-302-2Measurement Study of A P2P IPTV System: SOPCAST tjprcabs584.pdf

Sandhya C P & S.Karthik

72-78
152012-09-302-3A Review of Various Issues in Routing and Broadcasting Methods for Designing Efficient Method in Mobile ADHOC Network2-3-1346383646-abs A REVIEW OF VARIOUS ISSUES IN ROUTING AND BROADCASTING METHODS FOR.pdf

B.Vinodhini & et al.,

1-12
162012-09-302-3Biometric Security Systems: A Comparative Review2-3-1346383900-abs BIOMETRIC SECURITY SYSTEMS.pdf

Milind Godase & Anil N. Barbole

13-26
172012-09-302-3Effect of Blocking Probability on Channel Allocation Using Distributed Dynamic Channel Allocation Algorithm2-3-1346384397-abs EFFECT OF BLOCKING PROBABILITY ON CHANNEL ALLOCATION.pdf

Y.S.V. Raman et al.,

27-35
182012-09-302-3Listless Highly Scalable Set Partitioning in Hierarchical Trees Coding for Transmission of Image over Heterogenous Networks2-3-1346384748-abs LISTLESS HIGHLY SCALABLE SET PARTITIONING IN HIERARCHICAL TREES CODING.pdf

Monauwer Alam &  Ekram Khan

36-48
192012-09-302-3Analysis of Multicasting on Tolerant Network in Wireless Communication--1347961914-absANALYSIS OF MULTICASTING ON TOLERANT NETWORK IN WIRELESS COMMUNICATION.pdf

G. Murugaboopathi et al.,

49-66
202012-12-312-4Simulation Study for Ad Hoc on Demand Distance Vector Routing Protocol Networks --1354256908-ABS Simulation.pdf

Sweta Verma, Ajay Pratap, B.Sushma Rao

1-6
212012-12-312-4AODVLSR: AODV Limited Source Routing Protocol for Vanets in City Scenarios2-3-1354256005-ABS AODVLSR.pdf

Dharmendra Sutariya, Ronak Solanki & Pratik Mewada

7-16
222012-12-312-4Mobility and QOS Management in OLSR Routing Protocol2-3-1354256266-ABS Mobility.pdf

Fatima Lakrami & Najib Elkamoun

17-26
232012-12-312-4Experimental Evaluation of Single Path and Multipath Routing Protocol for MANET2-3-1354256599-ABS Experimental.pdf

 Minesh Thaker, Yogesh Kosta & S B Sharma 

27-36
242012-12-312-4Reliable Multipath Routing Modal with Jamming Alert using Probe Scheme 2-3-1354256727-ABS Reliable.pdf

A.Kiruthika, K.Khumarvel & A.Marimuthu

37-46
252013-03-313-1A Framework for Mobile Cloud Computing--1355917773-ABS Framework.pdf

R. Lakshman Naik & S. S. V. N. Sarma

1-12
262013-03-313-1A Study on Buffered Crossbar Switch Scheduling Algorithms2-3-1355979239-ABS Study.pdf

N. Narayanan Prasanth & Kannan Balasubramanian

13-26
272013-03-313-1Energy Efficient Bandwidth Reservation Model Using Cyclic Flows in Wireless Networks2-3-1355988523-ABS Energy.pdf

A.Anitha & S.Sherin Liba

27-38
282013-03-313-1Performance Estimation of OFDM-Wimax Network2-3-1356089383-ABS Performance.pdf

Vishal Sharma & Navneet Kaur

 

39-46
292013-03-313-1Implementation and Analysis of OFDM based IEEE 802.11g VANET2-3-1356092172-ABS Implementation.pdf

Vishal Sharma,Harsukhpreet Singh & Shashi Kant

 

47-54
302013-03-313-1Relative Weight Optimized Linking Scheme for Route Optimization in Adhoc Network2-3-1356426809-ABS Relative.pdf

Shaik Shavali

 

 

55-64
312013-03-313-1Energy Efficient Distributed Cluster Routing Protocol with Centralized Base Station for Wireless Sensor Networks 2-3-1356614102-ABS Energy efficient.pdf

T.Venu Madhav & Nvsn Sarma 

75-86
322013-03-313-1Efficient Rendezvous Points Tracking for Mobility Enabled Wireless Sensor Networks2-3-1357295812-ABS Efficient.pdf

S. Kurshid Jinna, R. Sahila Devi & M. Anoop

87-94
332013-03-313-1AIS Model for Botnet Detection in MANET Using Fuzzy Function2-3-1357555551-ABS AIS Model.pdf

I.M.Hanafy et al. 

95-102
342013-03-313-1Random Access OFDMA Network with Joint Power and Bandwidth Allocation Based on Partial Channel Knowledge2-3-1357824638-ABS Random.pdf

Sunil Jacob & R. Dhanasekaran

 

103-110
352013-03-313-1Wireless Data Acquisition System for Pharmaceutical and Chemical Industries using Load-Cell2-3-1357893305-ABS Wireless.pdf

Nayeem Muddin Khan D et al.

111-116
362013-03-313-1Performance Analysis of a Routed Adhoc Networks using Different Routing Algorithms 2-3-1357893740-ABS Performance analysis.pdf

Paramjit Singh, Ajay K Sharma& T S Kamal

 

117-122
372013-03-313-1All Unit Interconnection Algorithm for Vehicular Ad-Hoc Networks2-3-1358407080-ABS All unit.pdf

Saurabh Srivastava et al.

123-130
382013-03-313-1Enhanced Analysis of Spread Spectrum Schemes in Wireless Mesh Networks2-3-1358407274-ABS Enhanced .full.pdf

Sonal Sood, Amarpal Singh& Vishal Sharma

 

 

131-136
392013-03-313-1Effect of Mobility Models on Performance of Mobile Wireless Sensor Networks2-3-1358407425-ABS Effect.pdf

Mandar Karyakarte, Anil Tavildar & Rajesh Khanna

137-148
402013-03-313-1Communication as Service Cloud2-3-1358759921-ABS Communication.pdf

Gurudatt Kulkarni et al.

 

149-156
412013-03-313-1A Study on Black Hole Attack against OLSR Based MANETs2-3-1359110021-ABS A study on.full.pdf

L. Sridhara Rao, Md. Ali Hussain & K. Satya Rajesh

157-164
422013-03-313-1 Performance Evaluation of Routing Protocols with Variation in Node Speed for Mobile Ad-Hoc Networks2-3-1359117775-ABS Perrformance evaluation.pdf

Sanjay Kumar Sonbhadra & Charu Wahi

165-170
432013-03-313-1Mobile Printing Solutions2-3-1359808832-ABS Mobile.pdf

Arul Selvan R & K. Porkumaran 

 

171-190
442013-03-313-1A Survey of Mobile Virtualization Using Cloud Computing2-3-1359963415-ABS A Survey.pdf

Arpit J. Kuche & D M. Dakhane

191-196
452013-03-313-1IJCNWMCMAR201321Performance Analysis of Different Routing Protocols Using NS-3--1424348057-ABS - 21.Comp Networking - IJCNWMC -Performance analysis - Pratik Gite.pdf

Pratik Gite & Sanjay Thakur

197-208
462013-03-313-1Efficiency Enhancement of Energy Aware Ad Hoc Routing Protocols2-3-1360062563-ABS Efficiency enhancement.pdf

P.Sathya Priya, Seethalakshmi.V & G.Mohan Kumar

209-220
472013-03-313-1Survey of Innovated Techniques to Detect Selfish Nodes in MANET2-3-1360134988-ABS Survey.pdf

Sagar Padiya, Rakesh Pandit & Sachin Patel

221-230
482013-03-313-1Implementation and Testing of Delay Tolerant Network Using Self-Capable and Routing Nodes: A Case Study 2-3-1361178621-ABS - IMPLEMENTATION AND TES.pdf

R. S. Mangrulkar & Mohammad Atique

231-244
492013-03-313-1Face Recognition Using Principal Component Analysis and Neural Networks--1361620843-ABS Face recognition.pdf

A. S. Syed Navaz,  T. Dhevi Sri & Pratap Mazumder

245-256
502013-03-313-1A Review on Multimedia Transcoding Techniques on Transcoding for Wireless Networks--1361633309-ABS A Review on multimedia.pdf

Shakti Awaghad & Sanjay Pokle

257-266
512013-03-313-1Enhanced AAF based Distributed Space Time Trellis Code Protocols for Co-Operative Networks--1361628581-ABS Enhanced AAF.pdf

B. Ashvanth, G. Nagarajan& N.Benimon

267-280
522013-03-313-1Residual Energy Based Clustering Algorithm for Mobile Nodes in Sensor Networks--1361787937-ABS Residual.pdf

Manju Prasad et al.

281-288
532013-03-313-1Opportunities and Challenges of Wireless Communication Technologies for Smart Grid Application--1362131038-ABS Opportunities.pdf

Anjali Pawar & Sandip Rahane

289-296
542013-03-313-1Energy-Efficient Cluster Partition Effects on Wireless Sensor Network2-3-1362056711-ABS Energy efficent.pdf

Sonia & Kamaldeep

297-308
552013-03-313-1Key Distribution Techniques in ADHOC Sensor Network Using Diffie-Hellman Algorithm: A Critical Survey2-3-1362381129-ABS Key distribution.pdf

Mohd. Rizwan Beg Shish Ahmad

 

309-320
562013-03-313-1Server Based MANETs with Updatable Cache for Consistency and Data Replication for Minimizing Network Contention2-3-1362501690-ABS Server based.pdf

Benimon N & Ashvanth B

321-332
572013-03-313-1 Reduction of Control Traffic in Hybrid Routing Protocol for MANET’s2-3-1362567614-ABS Reduction.pdf

Dilli Ravilla & Chandra Shekar Reddy Putta

333-342
582013-03-313-1Congestion Control for Internet Using Fuzzy Logic: A Review--1363945305-ABS Congestion.pdf

Neha Aggarwal et al.

343-346
592013-03-313-1Confines of Endpoint Based CAC for VoIPoWLAN2-3-1362656424-ABS Confines.pdf

Amar Saraswat & Kunal Gupta

347-352
602013-03-313-1Simulation Based Comparative Analysis of TORA, OLSR and GRP Routing Protocols for Email and Video Conferencing Applications over MANETs2-3-1362656560-ABS Simulation.pdf

Gagangeet Singh Aujla & Sandeep Singh Kang

353-362
612013-03-313-1A Proposed Improvement Model for Hybrid 3GPP-LTE-OFDMA-DS-CDMA Based on the Multiwavelet Transform2-3-1362739611-ABS A Proposed.pdf

Raad Farhood Chisab, S. S. Prasad & C. K. Shukla

363-374
622013-03-313-1An Adaptive Mobile Technology Application for Tourist Travel2-3-1362809418-ABS An adaptive.pdf

Hussain Abu Dalbouh & Mohammad Zayed Almuiet

375-382
632013-03-313-1Sand: Smart Algorithm for Network Defense2-3-1362985631-ABS Sand smart.pdf

Vikas Singh & Gurpreet Singh

383-388
642013-03-313-1An Effective Privacy Preserving Model for Databases Using (_α,β,k,_)Anonymity Model and Lossy Join2-3-1363266721-ABS An effective privacy.pdf

Abou_El_Ela Abdou Hussien

389-400
652013-06-303-2Maintaining Data Integrity in Internet Security2-3-1363682914-ABS Maintaining.pdf

Ahlam Towfeeq Al-Sarraf

1-6
662013-06-303-2Review on Implementation of Mobile Phone Crawlers2-3-1363851399-ABS Review on implementation.pdf

Srashti Gupta & Kunal Gupta

7-10
672013-06-303-2Fuzzy Based Modified Real Time Polling Service Algorithm & Performance Analysis of Scheduling Algorithms Used in WiMAX2-3-1364201009-ABS Fuzzy based.pdf

Poulomi Das, Siladitya Sen & Arindam Benerjee

11-18
682013-06-303-2An Approximation of Variable Node Layering for Decoding LDPC Codes2-3-1364454480-ABS An Approximation.pdf

Laouini Nassib, Ben Hadj Slama Larbi & Bouallegue Ammar

19-28
692013-06-303-2A Review Paper on MEMS Cantilever Radio Frequency Switch2-3-1365232233-ABS Review paper.pdf

Shweta M. Shingare & Syed A. Naveed

29-34
702013-06-303-2Energy Saving Control in Ad Hoc Wireless Networks2-3-1365769025-ABS Energy saving.pdf

M. M. El-Gazzar & Ben Bella S. Tawfik

35-42
712013-06-303-2AVR Embedded Based Web Server 2-3-1366022311-ABS AVR Embedded.pdf

Maheshchandra Jadhav & M. S. Biradar

43-46
722013-06-303-2Performance Study of the MCCDMA as Physical Layer for Mobile WiMAX Technology2-3-1366189395-ABS Performance study.pdf

 A. Bouacha & F. T. Bendimerad

47-52
732013-06-303-2Enhance the Performance of Hadoop Distributed File System for Random File Access Using Increased Block Size2-3-1366629409-ABS Enhance the performance.pdf

P. D. Gudadhe, A. D. Gawande & L. K. Gautham

53-56
742013-06-303-2Fault Tolerance in SIP Push-To-Talk Service2-3-1366629891-ABS Fault tolerance.pdf

Manju Kaushik & Kavitha S N

57-64
752013-06-303-2Emerging Trends of Information Technology and its Implication in Business Organizations2-3-1367845158-ABS Emerging trends.pdf

Syeda Hafsa Hameeda Hashmi

65-70
762013-06-303-2Implementing Firewall in Wireless AD HOC Networks Using Clustering Approach2-3-1367902744-ABS Implementing firewall.pdf

Purnima, Rimple Gilhotra & Ravishanker

71-74
772013-06-303-2Study of Antenna Parameters and Design of an Ultra-Wideband Antenna2-3-1367928770-ABS Study of antenna.pdf

Prajakta Umbarkar & R. P. Labade

75-82
782013-06-303-2Influence of G.P on Networks - A Scientific Study on Case (I)2-3-1368076528-ABS Influence of G.P.pdf

K. V. L. N. Acharyulu & Nagu Vadlana

83-92
792013-06-303-2Impact of A. P on Networks - A Computational Study on Case (I)2-3-1368250529-Abs-14-Imapct.pdf

K. V. L. N. Acharyulu & Maddi N. Murali Krishna

93-102
802013-06-303-2SMEASY: A GUI Automation Framework on the Top of the Selenium 2-3-1368861481-ABS Smeasy gut automation.pdf

Ajeet Ghodeswar & Y. C. Kulkarni

103-112
812013-06-303-2Security in VANET--1369113449-ABS Security in VANET.pdf

Saviti

113-118
822013-06-303-2Consistent and Secure Multimedia Data Transfer over WLAN Fused Network2-3-1369926373-ABS Consistent and secure.pdf

Akanksha Gupta & Abhishek Jain

119-124
832013-06-303-2Integration of Broadband Wireless Network Technology to Achieve Optimal Pricing for Bandwidth Sharing 2-3-1370343633-ABS Integration of broadband.pdf

Abhijeet Gupta, Sudhir Kumar & Kamna Mishra

125-132
842013-06-303-2A Framework for Agent Based Expert System for Online Assessment in Distributed Database Environment2-3-1370344871-ABS A Framework.pdf

Khurshid Alam Borbora et al.

133-138
852013-06-303-2Android Application with Integrated Google Maps2-3-1370597627-ABS Android application.pdf

Sheetal Mahajan & Kusum Sorout

139-146
862013-06-303-2 An Integrated WLAN and WiMAX Architecture with QoS-Based Vertical Handoff Scheme2-3-1370860408-ABS An integrated WLAN.pdf

S. S. Sambare & Madhuri R. Pawar

147-156
872013-08-313-3 A Study of Statistical Inference Tools for Uncertainty Reasoning in Target Tracking2-3-1370860627-ABS The study of statistical.pdf

Mridula Maurya, Usha Kiran Vishwakarma & Pooja Lohia

1-10
882013-08-313-3Recent Trends in Using Wireless Sensor Networks in Industrial Environment2-3-1370940837-ABS Recent trends.pdf

Shripad V Deshpande & P. R. Devale

11-20
892013-08-313-3Impact of Wormhole Attack on Performance of Leach in Wireless Sensor Networks 2-3-1371395239-ABS Impact of wormhole.pdf

Priya Maidamwar & Nekita Chavhan

21-32
902013-08-313-3A Progression Based Method for the Detection of Black and Gray Hole Attacks in MANET 2-3-1371483879-ABS Progression based.pdf

S. Feslin Anish Mon, Raj Kumar Saha & L. Rajaji

33-40
912013-08-313-3A Comparative Cost Analysis of Text Based on Clustering and Entropy Model2-3-1371544823-ABS A Comparative cost.pdf

Vidya Kadam & Prakash R. Devale

41-50
922013-08-313-3Expository Study on Sybil Attack Counter Measures in VANET2-3-1371720440-ABS Expository study.pdf

Jis Mary Jacob & Anita John

51-56
932013-08-313-3Optical Character Recognition Using Android 2-3-1371911727-ABS Optical character.pdf

Vinaya Sawant et al.

57-62
942013-08-313-3New Technology Local Area Network Manager (NTLM) for Intranets2-3-1372674791-ABS New Technology.pdf

M. Dakshayini, S. J Namitha & P. Jayarekha

63-72
952013-08-313-3Outlier Detection Algorithms for Predeployment Symptom Mining Debugging of Wireless Sensor Network Application: A Survey2-3-1372942387-ABS Outlier detection.pdf

Sreedevi T.R & Mary Priya Sebastian

73-78
962013-08-313-3Energy Aware Dynamic Clustering and Hierarchical Routing Based on LEACH for WSN 2-3-1373290893-ABS Energy Aware.pdf

Dakshayini M, Praveen Kurer, & Guruprasad H S

79-86
972013-08-313-3Multi-Routing in Wireless Sensor Networks Using an Ant Colony Optimization (ACO)2-3-1374132107-ABS Multirouting.pdf

Sanjay Kumar Sahani & Kaushal Kumar

87-98
982013-08-313-3Packet Sizing for AOMDV and OLSR MANET Routing Protocols2-3-1374311909-ABS Packet sizing.pdf

Atul Malhotra, Jaswinder Singh, H. S. Johal & Amit Chhabra

99-104
992013-08-313-3Single-Response Metric Analysis of Adaptive Fault Tolerant Replication Routing Protocol for MANETs Using Taguchi Approach2-3-1374498371-ABS Single Responses.pdf

Swati Saxena &Madhavi Sinha

105-116
1002013-08-313-3Implementation of an Integrated System for Accurate Localization2-3-1374742207-ABS Implementation of an integrated.pdf

Vishal S. Hingmire & Sunita S. Shinde

117-124
1012013-08-313-3Visible and Infrared Communication through Bow Tie Nanoptenna2-3-1374904476-ABS Visible and infrared.pdf

Shruti Taksali  

125-130
1022013-08-313-3Dual Polarized Antenna for Wireless Communication2-3-1375522490-ABS Dual Polarized.pdf

Priyanka Balasaheb Yadav & Abhilasha Mishra 

131-134
1032013-08-313-3A Collaborative Study of Traffic Management in Cloud Computing Environment2-3-1375774630-ABS A Collaboration study.pdf

Megha Tretha, Harsh.K.Verma & Naveen Hemrajani

135-148
1042013-10-313-4Adaptive Passive Duplicate Address Detection (APDAD) in MANETs 2-3-1376470915-ABS Adaptive passive.pdf

S. Bajidvali & B. N. Bhandari

1-6
1052013-10-313-4Study and Amalgamation of Various Vulnerability Database2-3-1376896587-ABS Study and amalgamation.pdf

B. S. Panchabhai & A. N. Patil

7-16
1062013-10-313-4Traffic Engineering Based VPN Security in Wireless Mesh Network 2-3-1376974141-ABS Traffic engineering.pdf

Narender Singh & Krishan Kumar

17-26
1072013-10-313-4An Effective Utilization of Resources Using a Novel Method in Cloud Computing Era2-3-1377239538-ABS An effective utilization.pdf

Sk. Abdulkareem et al.

27-36
1082013-10-313-4A Survey on the Techniques Enhancing Video Streaming in VANETs 2-3-1377330089-ABS A Survey on techniques.pdf

Nandhini Vineeth & H. S. Guruprasad

37-46
1092013-10-313-4Mobility Management for Various Agents in Mobile IP Networks2-3-1378186154-ABS Mobility management.pdf

V. Nagaraju & R. Nadeem

47-50
1102013-10-313-4Performance Evaluation of Queue Management Techniques: Droptail and RED over Wireless Networks2-3-1378446329-ABS Performance evaluation.pdf

Praveen Kumar Singh et al.

51-66
1112013-10-313-4Energy Efficient and Congestion Controlled Relay Node Assignment in Cooperative Ad Hoc Network2-3-1378987716-ABS Energy efficient.pdf

Neha Paliwal & Shiv Prakash

67-76
1122013-10-313-4Comparative Analysis for Machine Learning Techniques Appliance on Anomaly Based Intrusion Detection System for WLAN 2-3-1379511218-ABS Comparative analysis.pdf

Ajay M. Patel, A. R. Patel & Hiral R. Patel

77-86
1132013-10-313-4Triple Band Rectangular Microstrip Antenna for S & C Band Applications2-3-1379681301-ABS Triple band.pdf

P. A. Ambresh, Sujata A. A & P. M. Hadalgi

87-92
1142013-10-313-4 An Outcome Evolution in Intrusion Detection System to Advance the Detection Rate in Cloud Computing Environment Utilising Multilayer Perceptron Algorithm2-3-1379933777-ABS An Overcome evolution.pdf

Richa Sondhiya, Mahendra Mishra & Maneesh Shreevastav

93-102
1152013-10-313-4Standardization and Optimization of Cross Layer Design for Wireless Sensor Networks2-3-1379936200-ABS Standardization and optimization.pdf

A. K. Patil & A. J. Patil

103-110
1162013-10-313-4Handover Prediction Technique for Network Based Network Mobility (N-NEMO)2-3-1379941509-ABS Handover prediction.pdf

Ravi V Angadi & K. C Shet

111-126
1172013-10-313-4Continuous and Random Dropping Based Distributed Reflection Denial of Service Attack (Card-DRDOSA) Detection, Control and Prevention Technique in MANET2-3-1380629937-ABS Continuous and rendom.pdf

Sourish Mitra, Sayani Chandra, Bidyutmala Saha, Rafiqul Islam & Nirupam Saha

127-134
1182013-10-313-4A Novel Stochastic Model for Grouped Weighted Multilevel Space-Time Trellis Codes for Rayleigh Fading Channels--1380977685-ABS A New sochastic.pdf

M. Krishnasamy et al.

135-140
1192013-10-313-4Energy Optimization Clustering Algorithm for Wireless Sensor Network--1381325341-ABS Energy optimization.pdf

Shital Dabhade & Pallavi Zambare

141-148
1202013-10-313-4A Distance Based Scheme for Defending against Wormhole Attack in Wireless Sensor Networks 2-3-1381402266-ABS A Distance based scheme.pdf

Bhavneet Kaur & Sandeep Singh Kang

149-156
1212013-10-313-4A Hybrid Scheme for Defending against Malicious Attack in Wireless Sensor Networks2-3-1381474845-ABS A Hybrid scheme.pdf

Jyoti Raheja & Sandeep Singh Kang

157-162
1222013-12-313-5Performance Analysis of Spread Spectrum Algorithm Intacting the Information in Audio Signals2-3-1382446058-ABS Performance analysis.pdf

Heena Malik & Sandeep Singh Kang

1-8
1232013-12-313-5Evolving Optimized Video Processing and Wireless Transmission System Based on ARM-Cortex-A8 and GSM2-3-1382599672-ABS Evolving optimized.pdf

G. Ramender, Movva Pavani & K. Kishore Kumar

9-18
1242013-12-313-5A Behaviour of RSA Algorithm Using 19 Bit Prime Digit2-3-1383829711-ABS A Behaviour of RSA.pdf

Gurpreetkaur & Vishal Arora

19-24
1252013-12-313-5Performance Evaluation of PCF and DCF Based WLANs for Heterogeneous Traffic Applications2-3-1384240778-ABS Performance evaluation.pdf

Simranjeet Kaur, RK Bansal & Savina Bansal

25-30
1262013-12-313-5Optimization of Optical Character Recognition for Printed Devanagari Text Using ANFIS Techniques2-3-1384346686-ABS Optimization of optical.pdf

Ganesh S. Sable & Sheetal Arun Nirve

31-40
1272013-12-313-5Improved Clustering Protocol for Delay Minimization2-3-1384508836-ABS Improved clustering.pdf

Nemi Chandra Rathore, Priyank Gour, Bhagwan Sahay Meena, Vishal Jain & Neeraj Jain

41-48
1282013-12-313-5A Review on Concurrency Issues in Mobile Environment2-3-1384597547-ABS A Review on.pdf

M.Mohana &C. Jayakumar

49-54
1292013-12-313-5Efficient Routing Protocol to Detect and Prevent Sybil Attack in Wireless Sensor Network2-3-1385209069-9._Abs_-_Comp_Networking_-_IJCNWMC-EFFICIENT_ROUTING_PROTOCOL_-_Prameet_Kaur_-_OPaid.pdf

Prameet Kaur & Sandeep Singh Kang

55-62
1302013-12-313-5Analysis of Location Based Queries in Mobile Environments with Privacy Considerations2-3-1385211253-11._Abs_-_Comp_Networking_-_IJCNWMC_-_Analysis_of_Location_-_JAYARAJESWARAN_-_Paid.pdf

R. Jayarajeswaran

63-70
1312013-12-313-5Performance and Analysis the Effect of Mobility of Coordinator and End Devices in ZigBee Using OPNET2-3-1385617474-12._Abs_-_Comp_Networking_-_IJCNWMC-PERFORMANCE_AND_ANALYSIS__-_Jasneet_Singh_-_OPaid.pdf

Jasneet Singh Sandhu & Sandeep Singh Kang

71-76
1322013-12-313-5Performance Analysis of HWMP and a New MIMC Protocol in WLAN Mesh Networks 2-3-1385622539-10._Abs_-_Comp_Networking_-_IJCNWMC-_PERFORMANCE_ANALYSIS_OF_HWMP_-_Chitender_Kaur_-_OPaid.pdf

Chitender Kaur & Sandeep Singh Kang

77-84
1332013-12-313-5ISDRP: An Improved Secure and Distributed Protocol for wireless Sensor Network2-3-1386235411-ABS ISDRP An improving.pdf

Chhabeel Kaur & Hardeep Singh

85-92
1342014-02-284-1Patient Monitoring System Using Zigbee Communication--1387282748-ABS Patient monitoring system.pdf

C.Amritha, Soma Pal & Sankar Raj.T

1-4
1352014-02-284-1Future Smartphone: Mobile Virtualization System using Cloud Computing--1387799307-ABS CN FUTURE.pdf

Arpit J. Kuche, D M. Dakhane & R L. Pardhi

5-10
1362014-02-284-1Routing Algorithm for Optimizing Energy Consumption in Wireless Sensor Network for Environment Monitoring2-3-1387878496-ABS Routing algorithm.pdf

Sanjay Kumar Sahani & Raghav YadaV

11-20
1372014-02-284-1A Study on Fuzzy Reliability for Web Server Using Statistical Approach 2-3-1390039612-ABS A Study on fuzzy.pdf

T. Chitrakala Rani & R. Neelambari

21-26
1382014-02-284-1Secure Health Monitoring in Wireless Sensor Networks with Mobility-Supporting Adaptive Authentication Scheme --1390376086-ABS Secure health.pdf

Shantala Devi Patil & Vijayakumar B P

27-34
1392014-02-284-1A Survey Query Driven Data Collection in Multiple Mobile Gateways WSN –MCN Convergence System2-3-1390381955-ABS A Survey query.pdf

Nandakishor Sirdeshpande

35-38
1402014-02-284-1 A Survey On: Sentiment Analysis for Movie Domain in Mobile Environment2-3-1390386416-ABS A Supply on sentiment.pdf

Savita Laxman Harer & Yogesh P. Sayaji

39-44
1412014-02-284-1Semantic-Cloud Architecture for Mobiles an Integration of Semantic Web, Cloud and Mobile Applications--1390388177-ABS SEMANTIC CLOUD.pdf

Jayalakshmi Srinivasan

45-50
1422014-02-284-1Experimental Study of Conventional Energy Detector for Spectrum Sensing2-3-1390564719-ABS Experimental study.pdf

Awani S. Khobragade & R. D. Raut

51-58
1432014-02-284-1Congestion Control Techniques and Principles in Computer Networks: A Survey2-3-1391682040-ABS Congestion control.pdf

Abhay Kumar, Smriti Agrawal, Niraj Upadhyaya & A. Govardhan

59-70
1442014-02-284-1IJCNWMCFEB201449Survey of Security Issues in Mobile AD HOC Networks2-3-1392012775-ABS SURVEY OF SECURITY.pdf

Charu Wahi & Sanjay Kumar Sonbhadra

71-78
1452014-04-304-2IJCNWMCAPR20141 Information Perimeter Security of the Organization2-3-1392793540-ABS 1. INFORMATION PERIMETER SECURITY.pdf

Zhangisina G. D & Shaikhanova A. K

1-4
1462014-04-304-2IJCNWMCAPR20142A Case Study: Java is Secure Programming Language--1392874163-2. ABS A CASE STUDY.pdf

Laxmi Joshi

5-10
1472014-04-304-2IJCNWMCAPR20143Distributed Generation Systems Affected by Delay of Wireless Communication While Load Sharing--1392890529-3. ABS DISTRIBUTED GENERATION SYSTEMS AFFECTED BY DELAY OF WIRELESS COMMUNICATION WHILE LOAD SHARING.pdf

Rajashri R. Narwade & Sonal Gahankari

11-22
1482014-04-304-2IJCNWMCAPR20144Ballooned Wireless Network for Free Internet Access2-3-1392965068-4. ABS BALLOONED WIRELESS NETWORK FOR FREE INTERNET ACCESS.pdf

Mohil Pandey & Sumit Bhattacharya

23-30
1492014-04-304-2IJCNWMCAPR20145A Full Duplex Indoor Wireless Communication System--1393412927-5. ABS A FULL DUPLEX INDOOR WIRELESS COMMUNICATION SYSTEM.Pdf

Vijay Amrit Raj Varma & Savita R Bhosale

31-36
1502014-04-304-2IJCNWMCAPR20146An Approach to Overcome Problems in Ubiquitous Networks--1393477206-6. ABS AN APPROACH TO OVERCOME PROBLEMS IN UBIQUITOUS NETWORKS.Pdf

Prasanna Kumar G & Padmini. M. S

37-44
1512014-04-304-2IJCNWMCAPR20147Common Control Channel Design for Cognitive Radio Ad Hoc Network Using OFDM--1393664959-ABS Common control.Pdf

Soorya Praveen Nair & Sujata V. Kadam

45-52
1522014-04-304-2IJCNWMCAPR20149Routing Schemes Algorithms for Distributed Clustering in Two Tiered Sensor Network2-3-1393674333-ABS Routing schemes.Pdf

Raju M. Sairise, Sangita M. Pokhale & Umesh Waghmare

53-64
1532014-04-304-2IJCNWMCAPR20148Wireless Technology to Monitor Remote Patients-A Survey--1393683190-7. ABS WIRELESS TECHNOLOGY TO MONITOR REMOTE PATIENTS (1).Pdf

Nirmala S Guptha, Thanuja K & Kiran Kumari Patil

65-76
1542014-04-304-2IJCNWMCAPR201410A Survey on Application of Game Theory in Multipoint Transmission of High Speed Network --1393679213-8. ABS A SURVEY ON APPLICATION OF GAME THEORY IN MULTIPOINT TRANSMISSION OF HIGH SPEED NETWORK.Pdf

Annapurna V. K & C. Vidya Raj

77-82
1552014-04-304-2IJCNWMCAPR201411Multiple Cooperative Black Hole Attack Detection in Mobile Ad Hoc Network2-3-1394195330-ABS Multiple cooperative.Pdf

Rohini Sharma & Minakshi Sharma

83-92
1562014-04-304-2IJCNWMCAPR201412An Approach for Grapheme to Phoneme Alignment for Sanskrit TTS--1394693356-ABS An approach.Pdf

Chandra Sekharam Bondu & Ramakrishna S R

93-100
1572014-04-304-2IJCNWMCAPR201413Fabric Faults Processing: Perfections and Imperfections2-3-1394863884-ABS Fabric faults.Pdf

 Jagruti Mahure & Y. C. Kulkarni

101-106
1582014-04-304-2IJCNWMCAPR201414Wireless Sensor Networks: Comparative Study and Analysis of MAC Protocols2-3-1395227112-ABS Wireless sensor.Pdf

Umesh Kumar Singh, Kailash Chandra Phuleriya & Rakhi Sunhare

107-114
1592014-04-304-2IJCNWMCAPR201415Approach Towards Safety in WSN: A Survey--1395323154-ABS Approach towards.Pdf

Padmini M. S & Prasanna Kumar G

115-124
1602014-04-304-2IJCNWMCAPR201416Sybil Attack Prevention in Wireless Sensor Network2-3-1395401064-ABS Sybil attack.Pdf

Manju V C

125-132
1612014-04-304-2IJCNWMCAPR201417Average Matching Rate Algorithm for Fingerprint Verification2-3-1396009054-ABS Average matching.Pdf

Shubham Singhal & Sukhwinder Singh

133-136
1622014-04-304-2IJCNWMCAPR201418A Dynamic Cluster Formation for Query-Based Data Aggregation in Wireless Sensor Network: A Survey2-3-1396604932-absA DYNAMIC CLUSTER FORMATION FOR QUERY.Pdf

Abhay Sonone, Ajitkumar R. Khachane & Deepali Vora

137-142
1632014-04-304-2IJCNWMCAPR201419Comparative Analysis of Wavelet Based Compression Method2-3-1396934604-ABS COMPARATIVE ANALYSIS OF WAVELET BASED COMPRESSION METHODS.Pdf

Rohit Kumar & Sukhwinder Singh

143-150
1642014-04-304-2IJCNWMCAPR201421 Comparative Analysis of Trust Based and Intrusion Based Black Hole Prevention in AODV in MANET--1396969766-ABS - 10. Comp Networking - IJCNWMC -Comparative Analysis of Trust Based - RAJSHEKHAR TIWARI.pdf

Rajshekhar Tiwari & Manish Sharma

151-154
1652014-04-304-2IJCNWMCAPR201421Design and Implementation an E-Voting System Based on Sophisticated Technologies of Wireless Networks and Visual Programming Languages--1397289032-absDESIGN AND IMPLEMENTATION AN E.pdf

Mahmood Zaki Abdullah

155-168
1662014-06-304-3IJCNWMCJUN20142Analysis of Human Limbs Motion by Designing Wearable Wireless Device Message Alert System for Various Applications--1399048624-absANALYSIS OF HUMAN LIMBS MOTION BY DESIGNING WEARABLE WIRELESS DEVICE MESSAGE ALERT SYSTEM FOR VARIOUS APPLICATIONS.pdf

Prasad K. Bhasme & Umesh W. Hore

1-6
1672014-06-304-3IJCNWMCJUN20144Tamil and Hindi Script Recognition System Using Hierarchical Multilayered Neural Network--1400160556-absTAMIL AND HINDI SCRIPT RECOGNITION SYSTEM USING HIERARCHICAL MULTILAYERED NEURAL NETWORK.pdf

Bharath Kumar M R & S. Ganeshmoorthy

7-16
1682014-06-304-3IJCNWMCJUN20146Implementation of Low Cost Wireless Image Acquisition and Transfer to Web Client Using Raspberry Pi for Remote Monitoring2-3-1400172246-absIMPLEMENTATION OF LOW COST WIRELESS IMAGE ACQUISITION AND TRANSFER TO WEB CLIENT USING RASPBERRY PI FOR REMOTE MONITORING.pdf

B. Uday Kumar, Ravali Manda, Y. Sai Satish & Anirudh Pammi

17-20
1692014-06-304-3IJCNWMCJUN20147Detection and Characterization of Fake Accounts on the Pinterest Social Network2-3-1400312836-absDETECTION AND CHARACTERIZATION OF FAKE ACCOUNTS ON THE PINTEREST SOCIAL NETWORK.pdf

Enas Elgeldawi, Ahmed A Radwan, Fatma Omara, Tarek M Mahmoud & Harsha V Madhyastha

21-28
1702014-06-304-3IJCNWMCJUN20148Analysis of Deployment of Wireless Sensor Nodes using VORONOI Diagram2-3-1401713548-absANALYSIS OF DEPLOYMENT OF WIRELESS SENSOR NODES USING VORONOI DIAGRAM.pdf

Ankita Dhiman & Sandeep Singh Kang

29-36
1712014-06-304-3IJCNWMCJUN20149Iterative Water Filling Algorithm Based Channel Capacity Estimation for MIMO-OFDM2-3-1402058090-absITERATIVE WATER FILLING ALGORITHM BASED CHANNEL CAPACITY ESTIMATION FOR MIMO.pdf

Samiksha Modi &Abhijeet Bishnu

37-46
1722014-06-304-3IJCNWMCJUN201410Energy Efficient Fuzzy Based Sleep Scheduling in Wireless Sensor Networks2-3-1402139417-absENERGY EFFICIENT FUZZY BASED SLEEP SCHEDULING IN WIRELESS SENSOR NETWORKS.pdf

Deepika Gour & Nikhil Tiwari

47-52
1732014-06-304-3IJCNWMCJUN201411Coal Mines Saftey with Wireless Sensor Network2-3-1402838501-absCOAL MINES SAFTEY WITH WIRELESS SENSOR NETWORK.pdf

Sujata B Nalkar & A.H. Ansari

53-60
1742014-08-314-4IJCNWMCAUG20141An Advance Algorithm for Precision Agriculture Using Wireless Sensor Network2-3-1404543838-abs AN ADVANCE ALGORITHM FOR PRECISION AGRICULTURE USING WIRELESS SENSOR NETWORK (1) (1).Pdf

Arnav Attri, Shubham, Sahil Vashist, & Gagangeet Singh Aujla

 

1-10
1752014-08-314-4IJCNWMCAUG20142A MAC Protocol for UWB Heterogeneous Mobile Ad Hoc Networks Based on ER By Using Directional Antenna2-3-1404903929-ABS - Comp Networking - IJCNWMC - A MAC Protocol for UWB - Y V AdiSatyanarayana.pdf

Y V Adisatyanarayana, K Padmaraju & P V Naganjaneyulu

11-26
1762014-08-314-4IJCNWMCAUG20143Trusted Energy Efficient Cluster based Routing in MANET 2-3-1405406447-ABS - 3. Comp Networking - IJCNWMC - TRUSTED ENERGY EFFICIENT CLUSTER - JASPINDER SINGH.pdf

Jaspinder Singh  & Meenakshi Sharma 

27-32
1772014-08-314-4IJCNWMCAUG201404“Maintenance of Topology Using Clustering Approach in an Mobile Adhoc Networks”2-3-1406094995-ABS - 4. Comp Networking - IJCNWMC - Maintenance of Topology using - Darshana H. Patel.pdf

Darshana H. Patel& Anjana R. Nagaria

33-40
1782014-08-314-4IJCNWMCAUG20145Network Coding Technique for Reliablity in WBAN - A Simulation Approach2-3-1406973502-ABS - 5. Comp Networking - IJCNWMC- Network Coding Tech -Vijay M. Birari.pdf

Vijay M. Birari, J. B. Helonde& Vijay M. Wadhai

41-46
1792014-10-314-5IJCNWMCOCT20141Upgraded Deterministic Energy Efficient Clustering Protocol for Wireless Sensor Network2-3-1410426914-ABS - 1. Comp Networking - IJCNWMC - upgraded deterministic-Vicky Choudhary.pdf

Vicky Choudhary & Karan Mahajan

1-6
1802014-10-314-5IJCNWMCOCT20142Link Quality Based Power Efficient Routing Protocol (LQ-PERP)2-3-1411624639-ABS - 2. Comp Networking - IJCNWMC -Link Quality Based Power Efficient - Mohankumar - Deveraju.pdf

Mohankumar N M, M Subramanya Bhat, Jyothi V & Devaraju J T

7-20
1812014-10-314-5IJCNWMCOCT20143Heterogeneous Enhanced Leach Protocol in Wireless Sensor Network to Prolong Network Lifetime with Static Clustering2-3-1412923315-ABS - 3. Comp Networking - -Heterogeneous Enhanced LEACH Protocol - Chandra Prakash Verma.pdf

Chandra Prakash Verma & Neetu Sharma

21-32
1822014-12-314-6IJCNWMCDEC20141Analyzing the Decoding Performance of Rate ⅓ Convolutional Code--1413624639-ABS - 2. Comp Networking - IJCNWMC-Cheekatla.Ravikumar.Pdf

 Ch. Ravi Kumar & K. Padmaraju

1-12
1832014-12-314-6IJCNWMCDEC20142WSN in Disastrous Area Management2-3-1414579551-ABS - 2. Computer Networking - IJCNWMC - WSN IN DISASTROUS AREA - Venkatramana Bhat P.pdf

Venkatramana Bhat P, Shridhar Aithal & Sudhakara G

13-24
1842014-12-314-6IJCNWMCDEC20143 A Survey on Various Fault Tolerant Approaches for Cloud Environment During Load Balancing2-3-1414581134-ABS - 3. Comp Networking - IJCNWMC -A SURVEY ON VARIOUS FAULT TOLERANT - VIRENDRA SINGH KUSHWAH.pdf

Virendra Singh Kushwah, Sandip Kumar Goyal & Priusha Narwariya

25-34
1852014-12-314-6IJCNWMCDEC20144Performance Evaluation of Novel Scheduling Algorithm for MIMO Transmission in Downlink 3GPP LTE Cellular Network2-3-1416226901-ABS - 4. Comp Networking - IJCNWMC- PERFORMANCE EVALUATION OF -Nsiri Bechir.pdf

Nsiri Bechir, Mallouki Nasreddine, Mahmoud Ammar, Walid Hakimi & Bouallegue Ammar

35-42
1862014-12-314-6IJCNWMCDEC20145Comparison of PSK and BPSK Modulation Techniques of MIMO System Under Alamouti’s Scheme2-3-1416402001-ABS - 5. Comp Networking - IJCNWMC - COMPARISON OF PSK -NEETEE.pdf

Neetee & Sandeep Singh Kang

43-52
1872014-12-314-6IJCNWMCDEC20146The Ontology of Research2-3-1417414727-ABS - 6. Computer Networking - IJCNWMC - The Ontology of Research - TRANSMISSIA SEMIAWAN.pdf

Transmissia Semiawan, Ade Chandra Nugraha, Suprihanto & Inggriani Liem

53-64
1882014-12-314-6IJCNWMCDEC20148Predicting Consumer Intentions to Quick Response Code Adoption: Evidence from Taiwan2-3-1417765386-ABS - 7. Computer Networking - IJCNWMC - PREDICTING CONSUMER INTENTIONS -Mei-Ling Tang.pdf

M. L. Tang

65-74
1892014-12-314-6IJCNWMCDEC20149Improved Algorithm for MAC Layer Spectrum Sensing in Cognitive Radio Networks from Dynamic Spectrum Management Perspective2-3-1417866213-ABS - 8. Computer Networking - IJCNWMC -IMPROVED ALGORITHM FOR MAC- DIPAK P.PATIL.pdf

Dipak P. Patil & Vijay M. Wadhai

75-90
1902015-02-285-1IJCNWMCFEB20151Optimize Signal Strength and Energy Efficient Mechanism for Link Failure in Manet--1419249879-ABS--Comp Networking - IJCNWMC - OPTIMIZE SIGNAL STRENGTH AND ENERGY - Krittika Khator - OPaid(1).Pdf

Krittika Khator & Nitin Manjhi

1-12
1912015-02-285-1IJCNWMCFEB20152Micro Utilities Communication Utilities on Low-Cost Mobiles--1421751632-2. ABS - Comp Networking - IJCNWMC -Micro Utilities Communication Utilities on low(1).pdf

Gopakumaran T. Thampi & Jayalakshmi Srinivasan

13-18
1922015-02-285-1IJCNWMCFEB20153SEEHR: Secure and Energy Efficient Hierarchical Routing in Wireless Sensor Networks2-3-1422017342-2. ABS - Computer Networking - IJCNWMC - SEEHR.pdf

Amanpreet Kaur & Sandeep Singh Kang

19-26
1932015-02-285-1IJCNWMCFEB20154Route Redistribution between EIGRP and OSPF Routing Protocol in Computer Network Using GNS3 Sofware2-3-1423809234-4. ABS -Comp Networking - IJCNWMC - ROUTE REDISTRIBUTION BETWEEN EIGRP AND OSPF ROUTING PROTOCOL IN COMPUTER NETWORK USING GNS3 SOFWARE.pdf

Jaswinder Kumar, Samiksha, Susil Bhagat &Karanjit Kaur

27-34
1942015-04-305-2IJCNWMCAPR20151Energy Conservation Wistful Algorithm (ECWA) Associated with Cache System to Maximize the Life Time of an Ad-Hoc Network2-3-1426595616-1. ABS -Comp Networking - IJCNWMC - ENERGY CONSERVATION WISTFUL ALGORITHM.pdf

Pruthvirani Kakasuraiah

1-8
1952015-04-305-2IJCNWMCAPR20152Protyping and Analyzing the Congestion Control for Multicast Over 3G Networks2-3-1426843399-1. ABS - Comp Networki IJCNWMC - PROTYPING AND ANALYZING THE CONGESTION CONTROL.pdf

Neelkamal Chaudhary & Sumit Kumar Bola

9-16
1962015-04-305-2IJCNWMCAPR20153A Secure Intrusion-Detection System for MANETS2-3-1427090151-ABS - 3. Comp Networking - IJCNWMC - A Secure Intrusion-Detection - MUSTAFA QAYS HATEM.pdf

Mustafa Qays Hatem

17-24
1972015-04-305-2IJCNWMCAPR20154Face Detection and Recognition Using O-line EDGE Maps(O-LEM)2-3-1427371319-4. ABS - Comp Networking - IJCNWMC - FACE DETECTION AND RECOGNITION USING O.pdf

Vipul Aggarwal

25-34
1982015-06-305-3IJCNWMCJUN201501An Implementation Approach to the Detection of Faults in the Fabrics with the Help of Image Processing Techniques--1434006526-ABS - 6. Electronics - IJECIERD - An implementation approach to the - Jagruti Mahure.pdf

Jagruti Mahure & Y. C. Kulkarni

1-8
1992015-06-305-3IJCNWMCJUN20152Detection of Virtual Link Attack in Wireless Ad-Hoc Network2-3-1434113162-ABS - DETECTION OF VIRTUAL LINK ATTACK IN WIRELESS AD.pdf

Amruta Vyavahare, Manjusha Deshmukh & Rahul Jiwane

9-16
2002015-08-315-4IJCNWMCAUG20151Design Approach of 64-Point Reconfigurable FFT/IFFT Processor for ASIP Architecture2-3-1436356732-1. ABS - Comp Networking - IJCNWMC - DESIGN APPROACH OF 64.pdf

L. P. Thakare & A. Y. Deshmukh

1-8
2012015-08-315-4IJCNWMCAUG20152Data Forwarding Based on Interest Using ABC Algorithm in SAN2-3-1437221735-2. ABS -Comp Networking - IJCNWMC - DATA FORWARDING BASED ON INTEREST USING.pdf

Priyanka Lonkar & D.C. Mehetre

9-18
2022015-08-315-4IJCNWMCAUG20153Analysis and Performance Measurement of Rule Based Firewall Using Queuing Model2-3-1439175028-ABS - 3. Comp Networking - IJCNWMC - ANALYSIS AND PERFORMANCE.pdf

M. Padmadas, N. Krishnan & Soorya Surendran

19-26
2032015-10-315-5IJCNWMCOCT20151The Aunotomy of Social Networks2-3-1440041531-ABS - 1. Comp Networking - IJCNWMC - The Aunotomy of Social Networks tjprc _2_.pdf

Mini Singh Ahuja & Jatinder Singh

1-8
2042015-10-315-5IJCNWMCOCT201502Hybrid Techniques for PAPR Reduction of OFDM Signal--1467968289-ABS - 2. Comp Networking - IJCNWMC - Hybrid_technique_to_reduce_PAPR_by_Modified_SLM_rev5.pdf

Bahubali K. Shiragapur & Udaywali

9-16
2052015-10-315-5IJCNWMCOCT20153Human Motion Detection Using Background Subtraction Algorithm2-3-1441694181-ABS- 3. Comp Networking - IJCNWMC - Human Motion Detection.pdf

Ayush Panwar

17-24
2062015-12-315-6IJCNWMCDEC20151Throughput Analysis of Cooperative Spectrum Sensing for Cognitive Radio Network--1467968641-ABS - 1. Comp Networking - IJCNWMC - THROUGHPUT ANALYSIS OF COOPERATIVE SPECTRUM.pdf

Bhawna Ahuja & Gurjit Kaur

1-8
2072015-12-315-6IJCNWMCDEC20152Design of Ground station Smart Antenna System for Multimedia Communications in Small Drone Applications--1467968665-ABS - 2. IJCNWMC- DESIGN OF GROUND STATION SMART ANTENNA SYSTEM FOR MULTIMEDIA.pdf

Settapong Malisuwan

9-18
2082015-12-315-6IJCNWMCDEC20153A Study on Big Data Modeling Techniques--1467968719-ABS - 3. IJCNWMC - A STUDY ON BIG DATA MODELING TECHNIQUES new.pdf

B. Sai Jyothi et al.,

19-26
2092015-12-315-6IJCNWMCDEC20154Estimation of Consumer Surplus in Mobile Services: Case Study on Telecommunication Market in Thailand--1467968740-ABS - 4. IJCNWMC - ESTIMATION OF CONSUMER SURPLUS IN MOBILE SERVICES.pdf

Settapong Malisuwan et al.,

27-40
2102015-12-315-6IJCNWMCDEC20155A Novel Joint Data-Hiding and Compression Scheme based on SVD and DWT--1467968767-ABS - 5. IJCNWMC - A Novel Joint Data-Hiding and Compression Scheme Based.pdf

Jagadeeswari Jasthi et al.,

41-50
2112016-02-296-1IJCNWMCFEB20161AD HOC UAV LTE Networks for Critical Communications--1467969370-ABS - 1. IJCNWMC_Ad hoc UAV LTE Networks for Critical Communications V2.pdf

Settapong Malisuwan et al.,

1-6
2122016-02-296-1IJCNWMCFEB20162Design of Spectrum Licensing for Mobile Telecommunications Service in Thailand--1467969349-abs 1. IJCNWMC -Design of Spectrum Licensing for Mobile Telecommunications Service in Thailand v3.pdf

Settapong Malisuwan & Wassana Kaewphanuekrungsi

7-14
2132016-04-306-2IJCNWMCAPR20161Routing Protocols in Wireless Sensor Networks: A Survey--1467969483-ABS - 1. IJCNWMC - ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK.pdf

Movva Pavani et al.,

1-12
2142016-04-306-2IJCNWMCAPR20162Implementation of Different Modulation Format for Fibre Distribued Ring on Wan--1467969505-ABS - 2. IJCNWMC - Performance Analysis Of Hybrid Optical Amplifier in Fiber.pdf

Rajesh Kochher et al.,

13-20
2152016-04-306-2IJCNWMCAPR20163Interconnection Charge in Telecommunications: A Case Study on Telecommunications Service in Asean and Thailand--1467969527-ABS - 3. IJCNWMC - INTERCONNECTION CHARGE IN TELECOMMUNICATIONS A CASE.pdf

Settapong Malisuwan et al.,

21-28
2162016-06-306-3IJCNWMCJUN20161The Intelligent Charging Path Planning for Electric Vehicle2-3-1465464078-ABS - 1. IJCNWMC - The Intelligent Charging Path Planning for Electric 1.pdf

Zhi-Ping Lin, Her-Shing Wang & Shao-Jyun Tsai

1-8
2172016-04-306-2IJCNWMCAPR20164Scheduling with Improved BFCA-VF in OBS Network2-3-1465474715-ABS - 4. IJCNWMC - Scheduling with Improved BFCA.pdf

Prajapati Vipul Dasharathbhai, Hardik Jagad & Pinakini Prajapati

29-36
2182016-04-306-2IJCNWMCAPR20165A Comprehensive Study of Different Energy-Efficient Routing Protocols in Wireless Sensor Network2-3-1465474785-ABS - 5. IJCNWMC - A COMPREHENSIVE STUDY OF DIFFERENT ENERGY.pdf

Bhoomika Pandey & H.L.Mandoria

37-44
2192016-04-306-2IJCNWMCAPR20166Performance Evaluation of Multicast Routing Protocols in Mobile Ad Hoc Networks2-3-1465474851-ABS - 6. IJCNWMC - Performance Evaluation of Multicast Routing Protocols.pdf

Dharmendra Sutariya

45-54
2202016-06-306-3IJCNWMCJUN20162E-Commerce of Opinion-Based Entity Ranking2-3-1465543855-ABS - 2. IJCNWMC - E-commerce of Opinion-based entity ranking.pdf

Adamu Abubakar Isah et al.,

9-16
2212016-02-296-1IJCNWMCFEB20163Cluster Routing Protocol and Its Importance in Wireless Sensor Networks2-3-1466002036-1. abs Comp Net - CLUSTER ROUTING PROTOCOL AND ITS IMPORTANCE IN WIRELESS SENSOR NETWORKS.pdf

T.Venu Madhav & NVSN Sarma

15-26
2222016-08-316-4IJCNWMCAUG20161Third Party Intervened Vertical Handover in Heterogeneous Networks2-3-1468220947-ABS - 1. IJCNWMC - Third party intervened vertical handover in heterogeneous.pdf

S. B. Kumbalavati et al.,

1-12
2232016-10-316-5IJCNWMCOCT20161The Optimal RFID Reader Deployment in 3-Dimensional Space Based on the Meta-Heuristic Algorithm2-3-1471955224-ABS - 1. IJCNWMC - THE OPTIMAL RFID READER DEPLOYMENT IN 3.pdf

Zhi-Ping Lin et al.,

1-16
2242016-10-316-5IJCNWMCOCT20162Reconfiguring Composite Coding Labels to Adapt to Packet Traffic in Optical MPLS Network2-3-1472129095-ABS - 2. IJCNWMC - RECONFIGURING COMPOSITE CODING LABELS TO ADAPT TO PACKETS.pdf

Kai-Sheng Chen et al.,

17-22
2252016-10-316-5IJCNWMCOCT20163An Evaluation on State of the Art Feature Extractors for Steganalysis2-3-1472548110-ABS - 3. Comp Networking -IJCNWMC- An Evaluation on State of the Art Feature Extractors for Steganalysis.pdf

S. Deepa et al.,

23-32
2262016-10-316-5IJCNWMCOCT20164Instrument and Technology for Computer Forensic: Research in Ghana2-3-1474280201-ABS - 4. IJCNWMC - INSTRUMENT AND TECHNOLOGY FOR COMPUTER.pdf

Nana Kwame Gyamfi et al.,

33-40
2272016-10-316-5IJCNWMCOCT20165Secure Routing Protocol Design: AODV Protocol Vulnerability to Black Hole Attack in Comparison of OLSR Protocol2-3-1473940999-ABS - 5. IJCNWMC - SECURE ROUTING PROTOCOL DESIGN.pdf

Najiya Sultana

41-48
2282016-10-316-5IJCNWMCOCT20166Study of Smart Electric Vehicle Charging Path System2-3-1475649692-ABS - 6. IJCNWMC - A STUDY OF SMART ELECTRIC VEHICLE CHARGING PATH SYSTEM.pdf

Zhi-Ping Lin et al.,

49-58
2292016-10-316-5IJCNWMCOCT20167Implementation of Distributive Cooperative Sensing Schemes Using And and OR Fusion Rules for Spectrum Detection2-3-1475739335-ABS - 7. IMPLEMENTATION OF DISTRIBUTIVE COOPERATIVE SENSING SCHEMES.pdf

D. Damodaram et al.,

59-66
2302016-10-316-5IJCNWMCOCT20168Improved BEENISH: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Network2-3-1475839046-ABS - 8. Comp Networking - IJCNWMC-Improved BEENISH A Routing Protocol for Enhanced Efficiency in Wireless Sensor Network.pdf

Navjot Kaur et al.,

67-76
2312017-04-307-1IJCNWMCAPR20171Conditional Probabilistic Poisson factor Based Mitigation Mechanism for Byzantine Attack in Manets2-3-1492590532-1.Abs-IJCNWMCAPR20171.pdfGeetha Achuthan et al.,1-10
2322017-04-307-1IJCNWMCAPR20172QOS Modeling and Analysis Using QML in Mobile Computing Environment2-3-1494392653-2.Abs-IJCNWMCAPR20172.pdfGurwinder Pal Kaur & Kavita11-22
2332017-04-307-1IJCNWMCAPR20173Bayesian Belief Networks (BBN) Based Risk Assessment for Deployed C4I System2-3-1492590572-3.Abs-IJCNWMCAPR20173.pdfManoj Tyagi et al.,23-32
2342017-06-307-2IJCNWMCJUN20171Mitigating Interference Linked to Material Composition for Wireless Sensor Network Deployment in Real Three-Dimensional Indoor Spaces2-3-1493126514-1.ABS_IJCNWMCJUN20171.pdfHer-Shing Wang et al.,1-18
2352017-06-307-2IJCNWMCJUN20172Throughput Analysis of TCP Newreno for Multiple Bottlenecks2-3-1496483228-ABS-2.IJCNWMCJUN20172.pdfMohibur Rahman et al.,19-28
2362017-10-317-3IJCNWMCOCT20171E - Learning and Computer-Based Multimedia Intervention and its Education Effect on The Relationship between Knowledge, Attitude and Practices of Rural Women2-3-1507980920-abs1.IJCNWMCOCT20171.pdfNida Fatima Hazari et al.,1-8
2372017-12-317-4IJCNWMCDEC20171The Optimal Carpool Planning Based on IOS Platform2-3-1509183687-1.IJCNWMCDEC20171.pdfHer-Shing Wang et al.,1-10
2382017-12-317-4IJCNWMCDEC20172Performance Analysis of Select Forwarding Attack on WSN and its Detection and Removal from Network 2-3-1511505969-Abs.1.IJCNWMCDEC20171.pdfVijeta Kumawat, Kavita & B. S. Jangra11-18
2392018-06-308-1IJCNWMCJUN20181Internet of Things: A Review on Architecture, Security Threats and Countermeasures2-3-1527919912-abs.1.IJCNWMCJUN20181.pdfPriya Maidamwar et al.,1-10
2402018-06-308-1IJCNWMCJUN20182Improved Reposition Cluster Head in Leach Protocol for Heterogeneous Wireless Network2-3-1527920413-abs.2.IJCNWMCJUN20182.pdfSatyanarayan. K. Padaganur et al.,11-18
2412018-06-308-1IJCNWMCJUN20183A Competitive Study on Clouds Computing, Service Orientation Architecture and Web Services in Enterprise Network Application2-3-1527921157-abs.3.IJCNWMCJUN20183.pdfI. Lakshmi19-34
2422018-06-308-1IJCNWMCJUN20184Analysis and Evaluation on Online Shops Customers Through Data Mining Methods2-3-1528951870-abs.4.IJCNWMCJUN20184.pdfSnezhana Sulova35-44
2432018-08-318-2IJCNWMCAUG20181Efficient Data Gathering by Mobisink in WSN using Optimized Route Points Intelligence System (ORPIS)2-3-1530344654-ABS.1.IJCNWMCAUG20181.pdfKumar Swamy. B. V et al.,1-12
2442018-10-318-3IJCNWMCOCT20181Shared Circular Radiator for UWB-MIMO Applications2-3-1535009863-ABS.1.IJCNWMCOCT20181.pdfK. Srividhya & H. Umma Habiba1-8
2452018-10-318-3IJCNWMCOCT20182Study of the OCDMA Transmission Characteristics Using Bidirectional Optical Fiber Link, Based on EDW Code2-3-1535106370-ABS.2.IJCNWMCOCT20182.pdfMuthana. Y. Aldouri et al.,9-16
2462018-12-318-4IJCNWMCDEC20181Automatic Number Plate Recognition using Canny Edge Detector, Sliding Concentric Windows and Linear Discriminant Analysis2-3-1540615264-ABS.1.IJCNWMCDEC20181.pdfBrinthakumari. S et al.,1-8
2472018-12-318-4IJCNWMCDEC20182PSAV Model: Agile Method to Design Human Machine Interaction for User Experience Across the Platforms2-3-1542361746-abs.2IJCNWMCDEC20182.pdfAbhijeet Shukla9-14
2482019-06-309-1IJCNWMCJUN20191Enhanced Identity-Based Signcryption System2-3-1548161464-absIJCNWMCJUN20191.pdfV. Isakkirajan et al.,1-4
2492019-06-309-1IJCNWMCJUN20192Efficient Trust Management Technique Using Neural Network in Cloud Computing2-3-1548912521-abs.2IJCNWMCJUN20192.pdfP. Neelakanteswara et al.,5-16
2502019-06-309-1IJCNWMCJUN20193Demystifying Big Data Analytics Techniques2-3-1551438993-abs.3.IJCNWMCJUN20193.pdfKomalpreet Kaur et al.,17-24
2512019-06-309-1IJCNWMCJUN20194A Study on Self-Driving Car an Application of IoT 2-3-1556350693-abs.4.IJCNWMCJUN20194.pdfGeetika Mathur et al.,25-34
2522019-06-309-1IJCNWMCJUN20195Optimizing IoT Cloud Architectures for Pipelining Data through Machine Learning Models 2-3-1556350434-abs5IJCNWMCJUN20195.pdfDipanjan De et al.,35-44
2532019-12-319-2IJCNWMCDEC20191Formalization the Tasks of Selecting Optimal Parameters for Balancing of Loading Servers in IMS Subsystem2-3-1561787352-abs.1.IJCNWMCDEC20191.pdfSamandarov Bunyod G. Ayratovich et al.,1-6
2542019-12-319-2IJCNWMCDEC20192Route Redistribution: Beyond Inherent Metrics2-3-1575524173-abs.2.IJCNWMCDEC20192.pdfDr. Paul Danquah7–14
2552020-12-3110–2IJCNWMCDEC20201Optimisation Clustering Approach For Energy Efficiency In Wireless Network 2-3-1607951387-ABS1IJCNWMCDEC20201.pdfSakshi Mishra1-10
2562021-06-3011-1IJCNWMCJUN20211Ntdroid: Android Malware Detection Using Network Traffic Features 2-3-1620384110-ABS1IJCNWMCJUN20211.pdfDeepti Singh, Kapil Gupta et al.,1-12
2572021-12-3111–2IJCNWMCDEC20211Identification and Recovering Locality Exploitations in Distributed Sdn Controllers 2-3-1637833001-abs1IJCNWMCDEC20211.pdfV. R. Sudarsana Raju et al.,1 – 8
2582022-06-3012–1IJCNWMCJUN20221Development of an Application for Managing the Production of Organic Products sing an Architecture with Blockchain Technology2-3-1646201866-ABS1IJCNWMCJUN20221.pdfKhalid Twarish Alhamazani1–10
2592022-06-3012–1 IJCNWMCJUN20222Decision Tree and K-Nearest Neighbor (KNN) Algorithms in Breast Cancer Diagnosis: A Relative Performance Evaluation2-3-1646224428-abs2IJCNWMCJUN20222.pdfDhahi Alshammari11–20
2602022-06-3012–1IJCNWMCJUN20223Automatic Segmentation of Calcification Areas in Digital Breast Images 2-3-1646731639-abs3IJCNWMCJUN20223.pdfJalawi Alshudukhi et al.,21–32
2612022-06-3012–1IJCNWMCJUN20224Determinants of Smartphones Learning Adoption in Taraba State University Institute for Distant Education and Life Long Learning: An Empirical Analysis2-3-1647604597-abs4IJCNWMCJUN20224.pdfPhilip Zhino Aboki et al.,33–44
2622022-06-3012–1IJCNWMCJUN20225Optimizing Maximum Link Utilization in Multicast Network 2-3-1650541050-abs5IJCNWMCJUN20225.pdfDeepa V. B et al.,45–54
2632022-12-3112–2IJCNWMCDEC20221Multi path Routing with Dupen Node in Wireless Multimedia Sensor Networks2-3-1669373791-ABS1IJCNWMCDEC20221.pdfViswanath Reddy Bontha 1–10
2642023-06-3013–1IJCNWMCJUN20231tjprc2-3-1680605671-Blank.pdftjprc1–12
2652023-12-3113–2IJCNWMCDEC20231AN IMPROVED TRUST-BASED SECURED MULTIPLE PATH ROUTE PROTOCOL FOR MOBILE DEVICES AD HOC NETWORK OF QOS METHOD2-3-1697452258-IJCNWMCDEC20231abt.pdfBINUJA PHILOMINA MARYDASAN & RANJITH NADARAJAN1–10
2662023-12-3113–2IJCNWMCDEC20232ENHANCING ANONYMITY AND SECURITY IN VANETS: A HYBRID APPROACH TO BLACK HOLE ATTACK PREVENTION2-3-1699686486-IJCNWMCDEC20232ABT.pdfPARAMJIT & DR. SAURABH CHARYA11–18
2672024-06-3014–1IJCNWMCJUN20241A Comprehensive Survey of Hierarchical Routing Protocols in Wireless Sensor Networks; Performance Metrics and Comparative Analysis2-3-1709269528-IJCNWMCJUN20241ABT.pdfV. Ravindra Reddy, Dr. V. Raghunatha Reddy & Dr. Tirupathi Rao Gullipalli1–14
2682024-06-3014–1IJCNWMCJUN20242Ensuring the Security and Efficiency of Fog-Assisted IoT Cloud Based Electronic Medical Records Sharing Through Lightweight Blockchain- Based Access Control2-3-1714133996-IJCNWMCJUN20242ABT.pdfS. J. Sujitha & Dr. Tamil Selvi. P15-24