1 | 2011-12-31 | 1-1 | | Wireless Charging At A Glance | tjprcabs73.pdf | Mr.Savan K.Patel, Mr.Hiral R. Patel & Mr.Ravi.S.Patel | 1-12 |
2 | 2011-12-31 | 1-1 | | Power Aware Routing Protocol for Mobile Ad Hoc Networks | tjprcabs74.pdf | Mrs Sujatha B M, Mr. Manjunath R C & Mr.Vedanth Ravi | 13-22 |
3 | 2011-12-31 | 1-1 | | Design Of An Efficient Random Walk Routing Protocol For Wireless Sensor Networks | tjprcabs75.pdf | Mrs.Kavita D.Hanabaratti & Prof. Rashmi Jogdand | 23-41 |
4 | 2011-12-31 | 1-1 | | Graphical Simulation Of Wireless Application Protocol | tjprcabs189.pdf | Asst. Prof. G. Mural, Mr. Y.V. Krishna Reddy, Mr. M. Siva Kumar & Ms.K.Durga Prasad | 42-58 |
5 | 2011-12-31 | 1-1 | | Security Assessments And Research Directions In Cloud Computing | tjprcabs190.pdf | Mr.Hiren B. Patel & Mr. Dhiren R. Patel | 59-68 |
6 | 2011-12-31 | 1-1 | | M-Learning: A Perspective Application Of Mobile Computing | tjprcabs191.pdf | Asst. Prof. Jui Pattnayak & Prof. Dr. Sabyasachi Pattnaik | 69-78 |
7 | 2012-03-31 | 2-1 | | Analysis in Mobile Communication Network Using DTN | tjprcabs304.pdf | M. Chithik Raja & A.Jayaprakash | 1-30 |
8 | 2012-03-31 | 2-1 | | Optimization of Recent Attacks using Internet Protocol | tjprcabs338.pdf | A. Rengarajan1, C. Jayakumar & R. Sugumar
| 31-52 |
9 | 2012-06-30 | 2-2 | | Multi-Factor Authentication in Relation to Secured Payment Systems in Atm’s | tjprcabs543.pdf | Partha Pratim Ghosh & Sabyasachi Pattnaik | 1-20 |
10 | 2012-06-30 | 2-2 | | Design and Analysis of Enhanced Developments in Wireless Mobile Networks and Security | tjprcabs544.pdf | Srinivasa Rao, D. Rajani, J.A. Chandulal & D. Veerabhadra Rao | 21-31 |
11 | 2012-06-30 | 2-2 | | Security Issues in P2P Network using Analysis of Streaming Services | tjprcabs545.pdf | A. Rengarajan & R. Sugumar | 32-43 |
12 | 2012-06-30 | 2-2 | | Validating and Weight Scales Report of Foodstuffs in Smart Home based on Short Message Service (SMS) and Email with the Radio Frequency Identification (RFID) | tjprcabs546.pdf | Seyed Mohammad Bagher Mostafavi & R. S. Kawitkar | 44-58 |
13 | 2012-06-30 | 2-2 | | SMS Based Money Transaction using SOA | tjprcabs547.pdf | P.Mathivalavan, K. Karthikeyan & T. Padmanabaraghavan | 59-71 |
14 | 2012-06-30 | 2-2 | | Measurement Study of A P2P IPTV System: SOPCAST | tjprcabs584.pdf | Sandhya C P & S.Karthik | 72-78 |
15 | 2012-09-30 | 2-3 | | A Review of Various Issues in Routing and Broadcasting Methods for Designing Efficient Method in Mobile ADHOC Network | 2-3-1346383646-abs A REVIEW OF VARIOUS ISSUES IN ROUTING AND BROADCASTING METHODS FOR.pdf | B.Vinodhini & et al., | 1-12 |
16 | 2012-09-30 | 2-3 | | Biometric Security Systems: A Comparative Review | 2-3-1346383900-abs BIOMETRIC SECURITY SYSTEMS.pdf | Milind Godase & Anil N. Barbole | 13-26 |
17 | 2012-09-30 | 2-3 | | Effect of Blocking Probability on Channel Allocation Using Distributed Dynamic Channel Allocation Algorithm | 2-3-1346384397-abs EFFECT OF BLOCKING PROBABILITY ON CHANNEL ALLOCATION.pdf | Y.S.V. Raman et al., | 27-35 |
18 | 2012-09-30 | 2-3 | | Listless Highly Scalable Set Partitioning in Hierarchical Trees Coding for Transmission of Image over Heterogenous Networks | 2-3-1346384748-abs LISTLESS HIGHLY SCALABLE SET PARTITIONING IN HIERARCHICAL TREES CODING.pdf | Monauwer Alam & Ekram Khan | 36-48 |
19 | 2012-09-30 | 2-3 | | Analysis of Multicasting on Tolerant Network in Wireless Communication | --1347961914-absANALYSIS OF MULTICASTING ON TOLERANT NETWORK IN WIRELESS COMMUNICATION.pdf | G. Murugaboopathi et al., | 49-66 |
20 | 2012-12-31 | 2-4 | | Simulation Study for Ad Hoc on Demand Distance Vector Routing Protocol Networks | --1354256908-ABS Simulation.pdf | Sweta Verma, Ajay Pratap, B.Sushma Rao | 1-6 |
21 | 2012-12-31 | 2-4 | | AODVLSR: AODV Limited Source Routing Protocol for Vanets in City Scenarios | 2-3-1354256005-ABS AODVLSR.pdf | Dharmendra Sutariya, Ronak Solanki & Pratik Mewada | 7-16 |
22 | 2012-12-31 | 2-4 | | Mobility and QOS Management in OLSR Routing Protocol | 2-3-1354256266-ABS Mobility.pdf | Fatima Lakrami & Najib Elkamoun | 17-26 |
23 | 2012-12-31 | 2-4 | | Experimental Evaluation of Single Path and Multipath Routing Protocol for MANET | 2-3-1354256599-ABS Experimental.pdf | Minesh Thaker, Yogesh Kosta & S B Sharma | 27-36 |
24 | 2012-12-31 | 2-4 | | Reliable Multipath Routing Modal with Jamming Alert using Probe Scheme | 2-3-1354256727-ABS Reliable.pdf | A.Kiruthika, K.Khumarvel & A.Marimuthu | 37-46 |
25 | 2013-03-31 | 3-1 | | A Framework for Mobile Cloud Computing | --1355917773-ABS Framework.pdf | R. Lakshman Naik & S. S. V. N. Sarma | 1-12 |
26 | 2013-03-31 | 3-1 | | A Study on Buffered Crossbar Switch Scheduling Algorithms | 2-3-1355979239-ABS Study.pdf | N. Narayanan Prasanth & Kannan Balasubramanian | 13-26 |
27 | 2013-03-31 | 3-1 | | Energy Efficient Bandwidth Reservation Model Using Cyclic Flows in Wireless Networks | 2-3-1355988523-ABS Energy.pdf | A.Anitha & S.Sherin Liba | 27-38 |
28 | 2013-03-31 | 3-1 | | Performance Estimation of OFDM-Wimax Network | 2-3-1356089383-ABS Performance.pdf | Vishal Sharma & Navneet Kaur
| 39-46 |
29 | 2013-03-31 | 3-1 | | Implementation and Analysis of OFDM based IEEE 802.11g VANET | 2-3-1356092172-ABS Implementation.pdf | Vishal Sharma,Harsukhpreet Singh & Shashi Kant
| 47-54 |
30 | 2013-03-31 | 3-1 | | Relative Weight Optimized Linking Scheme for Route Optimization in Adhoc Network | 2-3-1356426809-ABS Relative.pdf | Shaik Shavali
| 55-64 |
31 | 2013-03-31 | 3-1 | | Energy Efficient Distributed Cluster Routing Protocol with Centralized Base Station for Wireless Sensor Networks | 2-3-1356614102-ABS Energy efficient.pdf | T.Venu Madhav & Nvsn Sarma | 75-86 |
32 | 2013-03-31 | 3-1 | | Efficient Rendezvous Points Tracking for Mobility Enabled Wireless Sensor Networks | 2-3-1357295812-ABS Efficient.pdf | S. Kurshid Jinna, R. Sahila Devi & M. Anoop | 87-94 |
33 | 2013-03-31 | 3-1 | | AIS Model for Botnet Detection in MANET Using Fuzzy Function | 2-3-1357555551-ABS AIS Model.pdf | I.M.Hanafy et al. | 95-102 |
34 | 2013-03-31 | 3-1 | | Random Access OFDMA Network with Joint Power and Bandwidth Allocation Based on Partial Channel Knowledge | 2-3-1357824638-ABS Random.pdf | Sunil Jacob & R. Dhanasekaran
| 103-110 |
35 | 2013-03-31 | 3-1 | | Wireless Data Acquisition System for Pharmaceutical and Chemical Industries using Load-Cell | 2-3-1357893305-ABS Wireless.pdf | Nayeem Muddin Khan D et al. | 111-116 |
36 | 2013-03-31 | 3-1 | | Performance Analysis of a Routed Adhoc Networks using Different Routing Algorithms | 2-3-1357893740-ABS Performance analysis.pdf | Paramjit Singh, Ajay K Sharma& T S Kamal
| 117-122 |
37 | 2013-03-31 | 3-1 | | All Unit Interconnection Algorithm for Vehicular Ad-Hoc Networks | 2-3-1358407080-ABS All unit.pdf | Saurabh Srivastava et al. | 123-130 |
38 | 2013-03-31 | 3-1 | | Enhanced Analysis of Spread Spectrum Schemes in Wireless Mesh Networks | 2-3-1358407274-ABS Enhanced .full.pdf | Sonal Sood, Amarpal Singh& Vishal Sharma
| 131-136 |
39 | 2013-03-31 | 3-1 | | Effect of Mobility Models on Performance of Mobile Wireless Sensor Networks | 2-3-1358407425-ABS Effect.pdf | Mandar Karyakarte, Anil Tavildar & Rajesh Khanna | 137-148 |
40 | 2013-03-31 | 3-1 | | Communication as Service Cloud | 2-3-1358759921-ABS Communication.pdf |
| 149-156 |
41 | 2013-03-31 | 3-1 | | A Study on Black Hole Attack against OLSR Based MANETs | 2-3-1359110021-ABS A study on.full.pdf | L. Sridhara Rao, Md. Ali Hussain & K. Satya Rajesh | 157-164 |
42 | 2013-03-31 | 3-1 | | Performance Evaluation of Routing Protocols with Variation in Node Speed for Mobile Ad-Hoc Networks | 2-3-1359117775-ABS Perrformance evaluation.pdf | Sanjay Kumar Sonbhadra & Charu Wahi | 165-170 |
43 | 2013-03-31 | 3-1 | | Mobile Printing Solutions | 2-3-1359808832-ABS Mobile.pdf | Arul Selvan R & K. Porkumaran
| 171-190 |
44 | 2013-03-31 | 3-1 | | A Survey of Mobile Virtualization Using Cloud Computing | 2-3-1359963415-ABS A Survey.pdf | Arpit J. Kuche & D M. Dakhane | 191-196 |
45 | 2013-03-31 | 3-1 | IJCNWMCMAR201321 | Performance Analysis of Different Routing Protocols Using NS-3 | --1424348057-ABS - 21.Comp Networking - IJCNWMC -Performance analysis - Pratik Gite.pdf | Pratik Gite & Sanjay Thakur | 197-208 |
46 | 2013-03-31 | 3-1 | | Efficiency Enhancement of Energy Aware Ad Hoc Routing Protocols | 2-3-1360062563-ABS Efficiency enhancement.pdf | P.Sathya Priya, Seethalakshmi.V & G.Mohan Kumar | 209-220 |
47 | 2013-03-31 | 3-1 | | Survey of Innovated Techniques to Detect Selfish Nodes in MANET | 2-3-1360134988-ABS Survey.pdf | Sagar Padiya, Rakesh Pandit & Sachin Patel | 221-230 |
48 | 2013-03-31 | 3-1 | | Implementation and Testing of Delay Tolerant Network Using Self-Capable and Routing Nodes: A Case Study | 2-3-1361178621-ABS - IMPLEMENTATION AND TES.pdf | R. S. Mangrulkar & Mohammad Atique | 231-244 |
49 | 2013-03-31 | 3-1 | | Face Recognition Using Principal Component Analysis and Neural Networks | --1361620843-ABS Face recognition.pdf | A. S. Syed Navaz, T. Dhevi Sri & Pratap Mazumder | 245-256 |
50 | 2013-03-31 | 3-1 | | A Review on Multimedia Transcoding Techniques on Transcoding for Wireless Networks | --1361633309-ABS A Review on multimedia.pdf | Shakti Awaghad & Sanjay Pokle | 257-266 |
51 | 2013-03-31 | 3-1 | | Enhanced AAF based Distributed Space Time Trellis Code Protocols for Co-Operative Networks | --1361628581-ABS Enhanced AAF.pdf | B. Ashvanth, G. Nagarajan& N.Benimon | 267-280 |
52 | 2013-03-31 | 3-1 | | Residual Energy Based Clustering Algorithm for Mobile Nodes in Sensor Networks | --1361787937-ABS Residual.pdf | Manju Prasad et al. | 281-288 |
53 | 2013-03-31 | 3-1 | | Opportunities and Challenges of Wireless Communication Technologies for Smart Grid Application | --1362131038-ABS Opportunities.pdf |
Anjali Pawar & Sandip Rahane
| 289-296 |
54 | 2013-03-31 | 3-1 | | Energy-Efficient Cluster Partition Effects on Wireless Sensor Network | 2-3-1362056711-ABS Energy efficent.pdf | | 297-308 |
55 | 2013-03-31 | 3-1 | | Key Distribution Techniques in ADHOC Sensor Network Using Diffie-Hellman Algorithm: A Critical Survey | 2-3-1362381129-ABS Key distribution.pdf | Mohd. Rizwan Beg Shish Ahmad
| 309-320 |
56 | 2013-03-31 | 3-1 | | Server Based MANETs with Updatable Cache for Consistency and Data Replication for Minimizing Network Contention | 2-3-1362501690-ABS Server based.pdf | Benimon N & Ashvanth B | 321-332 |
57 | 2013-03-31 | 3-1 | | Reduction of Control Traffic in Hybrid Routing Protocol for MANET’s | 2-3-1362567614-ABS Reduction.pdf | Dilli Ravilla & Chandra Shekar Reddy Putta | 333-342 |
58 | 2013-03-31 | 3-1 | | Congestion Control for Internet Using Fuzzy Logic: A Review | --1363945305-ABS Congestion.pdf | Neha Aggarwal et al. | 343-346 |
59 | 2013-03-31 | 3-1 | | Confines of Endpoint Based CAC for VoIPoWLAN | 2-3-1362656424-ABS Confines.pdf | Amar Saraswat & Kunal Gupta | 347-352 |
60 | 2013-03-31 | 3-1 | | Simulation Based Comparative Analysis of TORA, OLSR and GRP Routing Protocols for Email and Video Conferencing Applications over MANETs | 2-3-1362656560-ABS Simulation.pdf | Gagangeet Singh Aujla & Sandeep Singh Kang | 353-362 |
61 | 2013-03-31 | 3-1 | | A Proposed Improvement Model for Hybrid 3GPP-LTE-OFDMA-DS-CDMA Based on the Multiwavelet Transform | 2-3-1362739611-ABS A Proposed.pdf | Raad Farhood Chisab, S. S. Prasad & C. K. Shukla | 363-374 |
62 | 2013-03-31 | 3-1 | | An Adaptive Mobile Technology Application for Tourist Travel | 2-3-1362809418-ABS An adaptive.pdf | Hussain Abu Dalbouh & Mohammad Zayed Almuiet | 375-382 |
63 | 2013-03-31 | 3-1 | | Sand: Smart Algorithm for Network Defense | 2-3-1362985631-ABS Sand smart.pdf | Vikas Singh & Gurpreet Singh | 383-388 |
64 | 2013-03-31 | 3-1 | | An Effective Privacy Preserving Model for Databases Using (_α,β,k,_)Anonymity Model and Lossy Join | 2-3-1363266721-ABS An effective privacy.pdf | Abou_El_Ela Abdou Hussien | 389-400 |
65 | 2013-06-30 | 3-2 | | Maintaining Data Integrity in Internet Security | 2-3-1363682914-ABS Maintaining.pdf | Ahlam Towfeeq Al-Sarraf | 1-6 |
66 | 2013-06-30 | 3-2 | | Review on Implementation of Mobile Phone Crawlers | 2-3-1363851399-ABS Review on implementation.pdf | Srashti Gupta & Kunal Gupta | 7-10 |
67 | 2013-06-30 | 3-2 | | Fuzzy Based Modified Real Time Polling Service Algorithm & Performance Analysis of Scheduling Algorithms Used in WiMAX | 2-3-1364201009-ABS Fuzzy based.pdf | Poulomi Das, Siladitya Sen & Arindam Benerjee | 11-18 |
68 | 2013-06-30 | 3-2 | | An Approximation of Variable Node Layering for Decoding LDPC Codes | 2-3-1364454480-ABS An Approximation.pdf | Laouini Nassib, Ben Hadj Slama Larbi & Bouallegue Ammar | 19-28 |
69 | 2013-06-30 | 3-2 | | A Review Paper on MEMS Cantilever Radio Frequency Switch | 2-3-1365232233-ABS Review paper.pdf | Shweta M. Shingare & Syed A. Naveed | 29-34 |
70 | 2013-06-30 | 3-2 | | Energy Saving Control in Ad Hoc Wireless Networks | 2-3-1365769025-ABS Energy saving.pdf | M. M. El-Gazzar & Ben Bella S. Tawfik | 35-42 |
71 | 2013-06-30 | 3-2 | | AVR Embedded Based Web Server | 2-3-1366022311-ABS AVR Embedded.pdf | Maheshchandra Jadhav & M. S. Biradar | 43-46 |
72 | 2013-06-30 | 3-2 | | Performance Study of the MCCDMA as Physical Layer for Mobile WiMAX Technology | 2-3-1366189395-ABS Performance study.pdf | A. Bouacha & F. T. Bendimerad | 47-52 |
73 | 2013-06-30 | 3-2 | | Enhance the Performance of Hadoop Distributed File System for Random File Access Using Increased Block Size | 2-3-1366629409-ABS Enhance the performance.pdf | P. D. Gudadhe, A. D. Gawande & L. K. Gautham | 53-56 |
74 | 2013-06-30 | 3-2 | | Fault Tolerance in SIP Push-To-Talk Service | 2-3-1366629891-ABS Fault tolerance.pdf | Manju Kaushik & Kavitha S N | 57-64 |
75 | 2013-06-30 | 3-2 | | Emerging Trends of Information Technology and its Implication in Business Organizations | 2-3-1367845158-ABS Emerging trends.pdf | Syeda Hafsa Hameeda Hashmi | 65-70 |
76 | 2013-06-30 | 3-2 | | Implementing Firewall in Wireless AD HOC Networks Using Clustering Approach | 2-3-1367902744-ABS Implementing firewall.pdf | Purnima, Rimple Gilhotra & Ravishanker | 71-74 |
77 | 2013-06-30 | 3-2 | | Study of Antenna Parameters and Design of an Ultra-Wideband Antenna | 2-3-1367928770-ABS Study of antenna.pdf | Prajakta Umbarkar & R. P. Labade | 75-82 |
78 | 2013-06-30 | 3-2 | | Influence of G.P on Networks - A Scientific Study on Case (I) | 2-3-1368076528-ABS Influence of G.P.pdf | K. V. L. N. Acharyulu & Nagu Vadlana | 83-92 |
79 | 2013-06-30 | 3-2 | | Impact of A. P on Networks - A Computational Study on Case (I) | 2-3-1368250529-Abs-14-Imapct.pdf | K. V. L. N. Acharyulu & Maddi N. Murali Krishna | 93-102 |
80 | 2013-06-30 | 3-2 | | SMEASY: A GUI Automation Framework on the Top of the Selenium | 2-3-1368861481-ABS Smeasy gut automation.pdf | Ajeet Ghodeswar & Y. C. Kulkarni | 103-112 |
81 | 2013-06-30 | 3-2 | | Security in VANET | --1369113449-ABS Security in VANET.pdf | Saviti | 113-118 |
82 | 2013-06-30 | 3-2 | | Consistent and Secure Multimedia Data Transfer over WLAN Fused Network | 2-3-1369926373-ABS Consistent and secure.pdf | Akanksha Gupta & Abhishek Jain | 119-124 |
83 | 2013-06-30 | 3-2 | | Integration of Broadband Wireless Network Technology to Achieve Optimal Pricing for Bandwidth Sharing | 2-3-1370343633-ABS Integration of broadband.pdf | Abhijeet Gupta, Sudhir Kumar & Kamna Mishra | 125-132 |
84 | 2013-06-30 | 3-2 | | A Framework for Agent Based Expert System for Online Assessment in Distributed Database Environment | 2-3-1370344871-ABS A Framework.pdf | Khurshid Alam Borbora et al. | 133-138 |
85 | 2013-06-30 | 3-2 | | Android Application with Integrated Google Maps | 2-3-1370597627-ABS Android application.pdf | Sheetal Mahajan & Kusum Sorout | 139-146 |
86 | 2013-06-30 | 3-2 | | An Integrated WLAN and WiMAX Architecture with QoS-Based Vertical Handoff Scheme | 2-3-1370860408-ABS An integrated WLAN.pdf | S. S. Sambare & Madhuri R. Pawar | 147-156 |
87 | 2013-08-31 | 3-3 | | A Study of Statistical Inference Tools for Uncertainty Reasoning in Target Tracking | 2-3-1370860627-ABS The study of statistical.pdf | Mridula Maurya, Usha Kiran Vishwakarma & Pooja Lohia | 1-10 |
88 | 2013-08-31 | 3-3 | | Recent Trends in Using Wireless Sensor Networks in Industrial Environment | 2-3-1370940837-ABS Recent trends.pdf | Shripad V Deshpande & P. R. Devale | 11-20 |
89 | 2013-08-31 | 3-3 | | Impact of Wormhole Attack on Performance of Leach in Wireless Sensor Networks | 2-3-1371395239-ABS Impact of wormhole.pdf | Priya Maidamwar & Nekita Chavhan | 21-32 |
90 | 2013-08-31 | 3-3 | | A Progression Based Method for the Detection of Black and Gray Hole Attacks in MANET | 2-3-1371483879-ABS Progression based.pdf | S. Feslin Anish Mon, Raj Kumar Saha & L. Rajaji | 33-40 |
91 | 2013-08-31 | 3-3 | | A Comparative Cost Analysis of Text Based on Clustering and Entropy Model | 2-3-1371544823-ABS A Comparative cost.pdf | Vidya Kadam & Prakash R. Devale | 41-50 |
92 | 2013-08-31 | 3-3 | | Expository Study on Sybil Attack Counter Measures in VANET | 2-3-1371720440-ABS Expository study.pdf | Jis Mary Jacob & Anita John | 51-56 |
93 | 2013-08-31 | 3-3 | | Optical Character Recognition Using Android | 2-3-1371911727-ABS Optical character.pdf | Vinaya Sawant et al. | 57-62 |
94 | 2013-08-31 | 3-3 | | New Technology Local Area Network Manager (NTLM) for Intranets | 2-3-1372674791-ABS New Technology.pdf | M. Dakshayini, S. J Namitha & P. Jayarekha | 63-72 |
95 | 2013-08-31 | 3-3 | | Outlier Detection Algorithms for Predeployment Symptom Mining Debugging of Wireless Sensor Network Application: A Survey | 2-3-1372942387-ABS Outlier detection.pdf | Sreedevi T.R & Mary Priya Sebastian | 73-78 |
96 | 2013-08-31 | 3-3 | | Energy Aware Dynamic Clustering and Hierarchical Routing Based on LEACH for WSN | 2-3-1373290893-ABS Energy Aware.pdf | Dakshayini M, Praveen Kurer, & Guruprasad H S | 79-86 |
97 | 2013-08-31 | 3-3 | | Multi-Routing in Wireless Sensor Networks Using an Ant Colony Optimization (ACO) | 2-3-1374132107-ABS Multirouting.pdf | Sanjay Kumar Sahani & Kaushal Kumar | 87-98 |
98 | 2013-08-31 | 3-3 | | Packet Sizing for AOMDV and OLSR MANET Routing Protocols | 2-3-1374311909-ABS Packet sizing.pdf | Atul Malhotra, Jaswinder Singh, H. S. Johal & Amit Chhabra | 99-104 |
99 | 2013-08-31 | 3-3 | | Single-Response Metric Analysis of Adaptive Fault Tolerant Replication Routing Protocol for MANETs Using Taguchi Approach | 2-3-1374498371-ABS Single Responses.pdf | Swati Saxena &Madhavi Sinha | 105-116 |
100 | 2013-08-31 | 3-3 | | Implementation of an Integrated System for Accurate Localization | 2-3-1374742207-ABS Implementation of an integrated.pdf | Vishal S. Hingmire & Sunita S. Shinde | 117-124 |
101 | 2013-08-31 | 3-3 | | Visible and Infrared Communication through Bow Tie Nanoptenna | 2-3-1374904476-ABS Visible and infrared.pdf | Shruti Taksali | 125-130 |
102 | 2013-08-31 | 3-3 | | Dual Polarized Antenna for Wireless Communication | 2-3-1375522490-ABS Dual Polarized.pdf | Priyanka Balasaheb Yadav & Abhilasha Mishra | 131-134 |
103 | 2013-08-31 | 3-3 | | A Collaborative Study of Traffic Management in Cloud Computing Environment | 2-3-1375774630-ABS A Collaboration study.pdf | Megha Tretha, Harsh.K.Verma & Naveen Hemrajani | 135-148 |
104 | 2013-10-31 | 3-4 | | Adaptive Passive Duplicate Address Detection (APDAD) in MANETs | 2-3-1376470915-ABS Adaptive passive.pdf | S. Bajidvali & B. N. Bhandari | 1-6 |
105 | 2013-10-31 | 3-4 | | Study and Amalgamation of Various Vulnerability Database | 2-3-1376896587-ABS Study and amalgamation.pdf | B. S. Panchabhai & A. N. Patil | 7-16 |
106 | 2013-10-31 | 3-4 | | Traffic Engineering Based VPN Security in Wireless Mesh Network | 2-3-1376974141-ABS Traffic engineering.pdf | Narender Singh & Krishan Kumar | 17-26 |
107 | 2013-10-31 | 3-4 | | An Effective Utilization of Resources Using a Novel Method in Cloud Computing Era | 2-3-1377239538-ABS An effective utilization.pdf | Sk. Abdulkareem et al. | 27-36 |
108 | 2013-10-31 | 3-4 | | A Survey on the Techniques Enhancing Video Streaming in VANETs | 2-3-1377330089-ABS A Survey on techniques.pdf | Nandhini Vineeth & H. S. Guruprasad | 37-46 |
109 | 2013-10-31 | 3-4 | | Mobility Management for Various Agents in Mobile IP Networks | 2-3-1378186154-ABS Mobility management.pdf | V. Nagaraju & R. Nadeem | 47-50 |
110 | 2013-10-31 | 3-4 | | Performance Evaluation of Queue Management Techniques: Droptail and RED over Wireless Networks | 2-3-1378446329-ABS Performance evaluation.pdf | Praveen Kumar Singh et al. | 51-66 |
111 | 2013-10-31 | 3-4 | | Energy Efficient and Congestion Controlled Relay Node Assignment in Cooperative Ad Hoc Network | 2-3-1378987716-ABS Energy efficient.pdf | Neha Paliwal & Shiv Prakash | 67-76 |
112 | 2013-10-31 | 3-4 | | Comparative Analysis for Machine Learning Techniques Appliance on Anomaly Based Intrusion Detection System for WLAN | 2-3-1379511218-ABS Comparative analysis.pdf | Ajay M. Patel, A. R. Patel & Hiral R. Patel | 77-86 |
113 | 2013-10-31 | 3-4 | | Triple Band Rectangular Microstrip Antenna for S & C Band Applications | 2-3-1379681301-ABS Triple band.pdf | P. A. Ambresh, Sujata A. A & P. M. Hadalgi | 87-92 |
114 | 2013-10-31 | 3-4 | | An Outcome Evolution in Intrusion Detection System to Advance the Detection Rate in Cloud Computing Environment Utilising Multilayer Perceptron Algorithm | 2-3-1379933777-ABS An Overcome evolution.pdf | Richa Sondhiya, Mahendra Mishra & Maneesh Shreevastav | 93-102 |
115 | 2013-10-31 | 3-4 | | Standardization and Optimization of Cross Layer Design for Wireless Sensor Networks | 2-3-1379936200-ABS Standardization and optimization.pdf | A. K. Patil & A. J. Patil | 103-110 |
116 | 2013-10-31 | 3-4 | | Handover Prediction Technique for Network Based Network Mobility (N-NEMO) | 2-3-1379941509-ABS Handover prediction.pdf | Ravi V Angadi & K. C Shet | 111-126 |
117 | 2013-10-31 | 3-4 | | Continuous and Random Dropping Based Distributed Reflection Denial of Service Attack (Card-DRDOSA) Detection, Control and Prevention Technique in MANET | 2-3-1380629937-ABS Continuous and rendom.pdf | Sourish Mitra, Sayani Chandra, Bidyutmala Saha, Rafiqul Islam & Nirupam Saha | 127-134 |
118 | 2013-10-31 | 3-4 | | A Novel Stochastic Model for Grouped Weighted Multilevel Space-Time Trellis Codes for Rayleigh Fading Channels | --1380977685-ABS A New sochastic.pdf | M. Krishnasamy et al. | 135-140 |
119 | 2013-10-31 | 3-4 | | Energy Optimization Clustering Algorithm for Wireless Sensor Network | --1381325341-ABS Energy optimization.pdf | Shital Dabhade & Pallavi Zambare | 141-148 |
120 | 2013-10-31 | 3-4 | | A Distance Based Scheme for Defending against Wormhole Attack in Wireless Sensor Networks | 2-3-1381402266-ABS A Distance based scheme.pdf | Bhavneet Kaur & Sandeep Singh Kang | 149-156 |
121 | 2013-10-31 | 3-4 | | A Hybrid Scheme for Defending against Malicious Attack in Wireless Sensor Networks | 2-3-1381474845-ABS A Hybrid scheme.pdf | Jyoti Raheja & Sandeep Singh Kang | 157-162 |
122 | 2013-12-31 | 3-5 | | Performance Analysis of Spread Spectrum Algorithm Intacting the Information in Audio Signals | 2-3-1382446058-ABS Performance analysis.pdf | Heena Malik & Sandeep Singh Kang | 1-8 |
123 | 2013-12-31 | 3-5 | | Evolving Optimized Video Processing and Wireless Transmission System Based on ARM-Cortex-A8 and GSM | 2-3-1382599672-ABS Evolving optimized.pdf | G. Ramender, Movva Pavani & K. Kishore Kumar | 9-18 |
124 | 2013-12-31 | 3-5 | | A Behaviour of RSA Algorithm Using 19 Bit Prime Digit | 2-3-1383829711-ABS A Behaviour of RSA.pdf | Gurpreetkaur & Vishal Arora | 19-24 |
125 | 2013-12-31 | 3-5 | | Performance Evaluation of PCF and DCF Based WLANs for Heterogeneous Traffic Applications | 2-3-1384240778-ABS Performance evaluation.pdf | Simranjeet Kaur, RK Bansal & Savina Bansal | 25-30 |
126 | 2013-12-31 | 3-5 | | Optimization of Optical Character Recognition for Printed Devanagari Text Using ANFIS Techniques | 2-3-1384346686-ABS Optimization of optical.pdf | Ganesh S. Sable & Sheetal Arun Nirve | 31-40 |
127 | 2013-12-31 | 3-5 | | Improved Clustering Protocol for Delay Minimization | 2-3-1384508836-ABS Improved clustering.pdf | Nemi Chandra Rathore, Priyank Gour, Bhagwan Sahay Meena, Vishal Jain & Neeraj Jain | 41-48 |
128 | 2013-12-31 | 3-5 | | A Review on Concurrency Issues in Mobile Environment | 2-3-1384597547-ABS A Review on.pdf | M.Mohana &C. Jayakumar | 49-54 |
129 | 2013-12-31 | 3-5 | | Efficient Routing Protocol to Detect and Prevent Sybil Attack in Wireless Sensor Network | 2-3-1385209069-9._Abs_-_Comp_Networking_-_IJCNWMC-EFFICIENT_ROUTING_PROTOCOL_-_Prameet_Kaur_-_OPaid.pdf | Prameet Kaur & Sandeep Singh Kang | 55-62 |
130 | 2013-12-31 | 3-5 | | Analysis of Location Based Queries in Mobile Environments with Privacy Considerations | 2-3-1385211253-11._Abs_-_Comp_Networking_-_IJCNWMC_-_Analysis_of_Location_-_JAYARAJESWARAN_-_Paid.pdf | R. Jayarajeswaran | 63-70 |
131 | 2013-12-31 | 3-5 | | Performance and Analysis the Effect of Mobility of Coordinator and End Devices in ZigBee Using OPNET | 2-3-1385617474-12._Abs_-_Comp_Networking_-_IJCNWMC-PERFORMANCE_AND_ANALYSIS__-_Jasneet_Singh_-_OPaid.pdf | Jasneet Singh Sandhu & Sandeep Singh Kang | 71-76 |
132 | 2013-12-31 | 3-5 | | Performance Analysis of HWMP and a New MIMC Protocol in WLAN Mesh Networks | 2-3-1385622539-10._Abs_-_Comp_Networking_-_IJCNWMC-_PERFORMANCE_ANALYSIS_OF_HWMP_-_Chitender_Kaur_-_OPaid.pdf | Chitender Kaur & Sandeep Singh Kang | 77-84 |
133 | 2013-12-31 | 3-5 | | ISDRP: An Improved Secure and Distributed Protocol for wireless Sensor Network | 2-3-1386235411-ABS ISDRP An improving.pdf | Chhabeel Kaur & Hardeep Singh | 85-92 |
134 | 2014-02-28 | 4-1 | | Patient Monitoring System Using Zigbee Communication | --1387282748-ABS Patient monitoring system.pdf | C.Amritha, Soma Pal & Sankar Raj.T | 1-4 |
135 | 2014-02-28 | 4-1 | | Future Smartphone: Mobile Virtualization System using Cloud Computing | --1387799307-ABS CN FUTURE.pdf | Arpit J. Kuche, D M. Dakhane & R L. Pardhi | 5-10 |
136 | 2014-02-28 | 4-1 | | Routing Algorithm for Optimizing Energy Consumption in Wireless Sensor Network for Environment Monitoring | 2-3-1387878496-ABS Routing algorithm.pdf | Sanjay Kumar Sahani & Raghav YadaV | 11-20 |
137 | 2014-02-28 | 4-1 | | A Study on Fuzzy Reliability for Web Server Using Statistical Approach | 2-3-1390039612-ABS A Study on fuzzy.pdf | T. Chitrakala Rani & R. Neelambari | 21-26 |
138 | 2014-02-28 | 4-1 | | Secure Health Monitoring in Wireless Sensor Networks with Mobility-Supporting Adaptive Authentication Scheme | --1390376086-ABS Secure health.pdf | Shantala Devi Patil & Vijayakumar B P | 27-34 |
139 | 2014-02-28 | 4-1 | | A Survey Query Driven Data Collection in Multiple Mobile Gateways WSN –MCN Convergence System | 2-3-1390381955-ABS A Survey query.pdf | Nandakishor Sirdeshpande | 35-38 |
140 | 2014-02-28 | 4-1 | | A Survey On: Sentiment Analysis for Movie Domain in Mobile Environment | 2-3-1390386416-ABS A Supply on sentiment.pdf | Savita Laxman Harer & Yogesh P. Sayaji | 39-44 |
141 | 2014-02-28 | 4-1 | | Semantic-Cloud Architecture for Mobiles an Integration of Semantic Web, Cloud and Mobile Applications | --1390388177-ABS SEMANTIC CLOUD.pdf | Jayalakshmi Srinivasan | 45-50 |
142 | 2014-02-28 | 4-1 | | Experimental Study of Conventional Energy Detector for Spectrum Sensing | 2-3-1390564719-ABS Experimental study.pdf | Awani S. Khobragade & R. D. Raut | 51-58 |
143 | 2014-02-28 | 4-1 | | Congestion Control Techniques and Principles in Computer Networks: A Survey | 2-3-1391682040-ABS Congestion control.pdf | Abhay Kumar, Smriti Agrawal, Niraj Upadhyaya & A. Govardhan | 59-70 |
144 | 2014-02-28 | 4-1 | IJCNWMCFEB201449 | Survey of Security Issues in Mobile AD HOC Networks | 2-3-1392012775-ABS SURVEY OF SECURITY.pdf | Charu Wahi & Sanjay Kumar Sonbhadra | 71-78 |
145 | 2014-04-30 | 4-2 | IJCNWMCAPR20141 | Information Perimeter Security of the Organization | 2-3-1392793540-ABS 1. INFORMATION PERIMETER SECURITY.pdf | Zhangisina G. D & Shaikhanova A. K | 1-4 |
146 | 2014-04-30 | 4-2 | IJCNWMCAPR20142 | A Case Study: Java is Secure Programming Language | --1392874163-2. ABS A CASE STUDY.pdf | Laxmi Joshi | 5-10 |
147 | 2014-04-30 | 4-2 | IJCNWMCAPR20143 | Distributed Generation Systems Affected by Delay of Wireless Communication While Load Sharing | --1392890529-3. ABS DISTRIBUTED GENERATION SYSTEMS AFFECTED BY DELAY OF WIRELESS COMMUNICATION WHILE LOAD SHARING.pdf | Rajashri R. Narwade & Sonal Gahankari | 11-22 |
148 | 2014-04-30 | 4-2 | IJCNWMCAPR20144 | Ballooned Wireless Network for Free Internet Access | 2-3-1392965068-4. ABS BALLOONED WIRELESS NETWORK FOR FREE INTERNET ACCESS.pdf | Mohil Pandey & Sumit Bhattacharya | 23-30 |
149 | 2014-04-30 | 4-2 | IJCNWMCAPR20145 | A Full Duplex Indoor Wireless Communication System | --1393412927-5. ABS A FULL DUPLEX INDOOR WIRELESS COMMUNICATION SYSTEM.Pdf | Vijay Amrit Raj Varma & Savita R Bhosale | 31-36 |
150 | 2014-04-30 | 4-2 | IJCNWMCAPR20146 | An Approach to Overcome Problems in Ubiquitous Networks | --1393477206-6. ABS AN APPROACH TO OVERCOME PROBLEMS IN UBIQUITOUS NETWORKS.Pdf | Prasanna Kumar G & Padmini. M. S | 37-44 |
151 | 2014-04-30 | 4-2 | IJCNWMCAPR20147 | Common Control Channel Design for Cognitive Radio Ad Hoc Network Using OFDM | --1393664959-ABS Common control.Pdf | Soorya Praveen Nair & Sujata V. Kadam | 45-52 |
152 | 2014-04-30 | 4-2 | IJCNWMCAPR20149 | Routing Schemes Algorithms for Distributed Clustering in Two Tiered Sensor Network | 2-3-1393674333-ABS Routing schemes.Pdf | Raju M. Sairise, Sangita M. Pokhale & Umesh Waghmare | 53-64 |
153 | 2014-04-30 | 4-2 | IJCNWMCAPR20148 | Wireless Technology to Monitor Remote Patients-A Survey | --1393683190-7. ABS WIRELESS TECHNOLOGY TO MONITOR REMOTE PATIENTS (1).Pdf | Nirmala S Guptha, Thanuja K & Kiran Kumari Patil | 65-76 |
154 | 2014-04-30 | 4-2 | IJCNWMCAPR201410 | A Survey on Application of Game Theory in Multipoint Transmission of High Speed Network | --1393679213-8. ABS A SURVEY ON APPLICATION OF GAME THEORY IN MULTIPOINT TRANSMISSION OF HIGH SPEED NETWORK.Pdf | Annapurna V. K & C. Vidya Raj | 77-82 |
155 | 2014-04-30 | 4-2 | IJCNWMCAPR201411 | Multiple Cooperative Black Hole Attack Detection in Mobile Ad Hoc Network | 2-3-1394195330-ABS Multiple cooperative.Pdf | Rohini Sharma & Minakshi Sharma | 83-92 |
156 | 2014-04-30 | 4-2 | IJCNWMCAPR201412 | An Approach for Grapheme to Phoneme Alignment for Sanskrit TTS | --1394693356-ABS An approach.Pdf | Chandra Sekharam Bondu & Ramakrishna S R | 93-100 |
157 | 2014-04-30 | 4-2 | IJCNWMCAPR201413 | Fabric Faults Processing: Perfections and Imperfections | 2-3-1394863884-ABS Fabric faults.Pdf | Jagruti Mahure & Y. C. Kulkarni | 101-106 |
158 | 2014-04-30 | 4-2 | IJCNWMCAPR201414 | Wireless Sensor Networks: Comparative Study and Analysis of MAC Protocols | 2-3-1395227112-ABS Wireless sensor.Pdf | Umesh Kumar Singh, Kailash Chandra Phuleriya & Rakhi Sunhare | 107-114 |
159 | 2014-04-30 | 4-2 | IJCNWMCAPR201415 | Approach Towards Safety in WSN: A Survey | --1395323154-ABS Approach towards.Pdf | Padmini M. S & Prasanna Kumar G | 115-124 |
160 | 2014-04-30 | 4-2 | IJCNWMCAPR201416 | Sybil Attack Prevention in Wireless Sensor Network | 2-3-1395401064-ABS Sybil attack.Pdf | Manju V C | 125-132 |
161 | 2014-04-30 | 4-2 | IJCNWMCAPR201417 | Average Matching Rate Algorithm for Fingerprint Verification | 2-3-1396009054-ABS Average matching.Pdf | Shubham Singhal & Sukhwinder Singh | 133-136 |
162 | 2014-04-30 | 4-2 | IJCNWMCAPR201418 | A Dynamic Cluster Formation for Query-Based Data Aggregation in Wireless Sensor Network: A Survey | 2-3-1396604932-absA DYNAMIC CLUSTER FORMATION FOR QUERY.Pdf | Abhay Sonone, Ajitkumar R. Khachane & Deepali Vora | 137-142 |
163 | 2014-04-30 | 4-2 | IJCNWMCAPR201419 | Comparative Analysis of Wavelet Based Compression Method | 2-3-1396934604-ABS COMPARATIVE ANALYSIS OF WAVELET BASED COMPRESSION METHODS.Pdf | Rohit Kumar & Sukhwinder Singh | 143-150 |
164 | 2014-04-30 | 4-2 | IJCNWMCAPR201421 | Comparative Analysis of Trust Based and Intrusion Based Black Hole Prevention in AODV in MANET | --1396969766-ABS - 10. Comp Networking - IJCNWMC -Comparative Analysis of Trust Based - RAJSHEKHAR TIWARI.pdf | Rajshekhar Tiwari & Manish Sharma | 151-154 |
165 | 2014-04-30 | 4-2 | IJCNWMCAPR201421 | Design and Implementation an E-Voting System Based on Sophisticated Technologies of Wireless Networks and Visual Programming Languages | --1397289032-absDESIGN AND IMPLEMENTATION AN E.pdf | Mahmood Zaki Abdullah | 155-168 |
166 | 2014-06-30 | 4-3 | IJCNWMCJUN20142 | Analysis of Human Limbs Motion by Designing Wearable Wireless Device Message Alert System for Various Applications | --1399048624-absANALYSIS OF HUMAN LIMBS MOTION BY DESIGNING WEARABLE WIRELESS DEVICE MESSAGE ALERT SYSTEM FOR VARIOUS APPLICATIONS.pdf | Prasad K. Bhasme & Umesh W. Hore | 1-6 |
167 | 2014-06-30 | 4-3 | IJCNWMCJUN20144 | Tamil and Hindi Script Recognition System Using Hierarchical Multilayered Neural Network | --1400160556-absTAMIL AND HINDI SCRIPT RECOGNITION SYSTEM USING HIERARCHICAL MULTILAYERED NEURAL NETWORK.pdf | Bharath Kumar M R & S. Ganeshmoorthy | 7-16 |
168 | 2014-06-30 | 4-3 | IJCNWMCJUN20146 | Implementation of Low Cost Wireless Image Acquisition and Transfer to Web Client Using Raspberry Pi for Remote Monitoring | 2-3-1400172246-absIMPLEMENTATION OF LOW COST WIRELESS IMAGE ACQUISITION AND TRANSFER TO WEB CLIENT USING RASPBERRY PI FOR REMOTE MONITORING.pdf | B. Uday Kumar, Ravali Manda, Y. Sai Satish & Anirudh Pammi | 17-20 |
169 | 2014-06-30 | 4-3 | IJCNWMCJUN20147 | Detection and Characterization of Fake Accounts on the Pinterest Social Network | 2-3-1400312836-absDETECTION AND CHARACTERIZATION OF FAKE ACCOUNTS ON THE PINTEREST SOCIAL NETWORK.pdf | Enas Elgeldawi, Ahmed A Radwan, Fatma Omara, Tarek M Mahmoud & Harsha V Madhyastha | 21-28 |
170 | 2014-06-30 | 4-3 | IJCNWMCJUN20148 | Analysis of Deployment of Wireless Sensor Nodes using VORONOI Diagram | 2-3-1401713548-absANALYSIS OF DEPLOYMENT OF WIRELESS SENSOR NODES USING VORONOI DIAGRAM.pdf | Ankita Dhiman & Sandeep Singh Kang | 29-36 |
171 | 2014-06-30 | 4-3 | IJCNWMCJUN20149 | Iterative Water Filling Algorithm Based Channel Capacity Estimation for MIMO-OFDM | 2-3-1402058090-absITERATIVE WATER FILLING ALGORITHM BASED CHANNEL CAPACITY ESTIMATION FOR MIMO.pdf | Samiksha Modi &Abhijeet Bishnu | 37-46 |
172 | 2014-06-30 | 4-3 | IJCNWMCJUN201410 | Energy Efficient Fuzzy Based Sleep Scheduling in Wireless Sensor Networks | 2-3-1402139417-absENERGY EFFICIENT FUZZY BASED SLEEP SCHEDULING IN WIRELESS SENSOR NETWORKS.pdf | Deepika Gour & Nikhil Tiwari | 47-52 |
173 | 2014-06-30 | 4-3 | IJCNWMCJUN201411 | Coal Mines Saftey with Wireless Sensor Network | 2-3-1402838501-absCOAL MINES SAFTEY WITH WIRELESS SENSOR NETWORK.pdf | Sujata B Nalkar & A.H. Ansari | 53-60 |
174 | 2014-08-31 | 4-4 | IJCNWMCAUG20141 | An Advance Algorithm for Precision Agriculture Using Wireless Sensor Network | 2-3-1404543838-abs AN ADVANCE ALGORITHM FOR PRECISION AGRICULTURE USING WIRELESS SENSOR NETWORK (1) (1).Pdf | Arnav Attri, Shubham, Sahil Vashist, & Gagangeet Singh Aujla
| 1-10 |
175 | 2014-08-31 | 4-4 | IJCNWMCAUG20142 | A MAC Protocol for UWB Heterogeneous Mobile Ad Hoc Networks Based on ER By Using Directional Antenna | 2-3-1404903929-ABS - Comp Networking - IJCNWMC - A MAC Protocol for UWB - Y V AdiSatyanarayana.pdf | Y V Adisatyanarayana, K Padmaraju & P V Naganjaneyulu | 11-26 |
176 | 2014-08-31 | 4-4 | IJCNWMCAUG20143 | Trusted Energy Efficient Cluster based Routing in MANET | 2-3-1405406447-ABS - 3. Comp Networking - IJCNWMC - TRUSTED ENERGY EFFICIENT CLUSTER - JASPINDER SINGH.pdf | Jaspinder Singh & Meenakshi Sharma | 27-32 |
177 | 2014-08-31 | 4-4 | IJCNWMCAUG201404 | “Maintenance of Topology Using Clustering Approach in an Mobile Adhoc Networks” | 2-3-1406094995-ABS - 4. Comp Networking - IJCNWMC - Maintenance of Topology using - Darshana H. Patel.pdf | Darshana H. Patel& Anjana R. Nagaria | 33-40 |
178 | 2014-08-31 | 4-4 | IJCNWMCAUG20145 | Network Coding Technique for Reliablity in WBAN - A Simulation Approach | 2-3-1406973502-ABS - 5. Comp Networking - IJCNWMC- Network Coding Tech -Vijay M. Birari.pdf | Vijay M. Birari, J. B. Helonde& Vijay M. Wadhai | 41-46 |
179 | 2014-10-31 | 4-5 | IJCNWMCOCT20141 | Upgraded Deterministic Energy Efficient Clustering Protocol for Wireless Sensor Network | 2-3-1410426914-ABS - 1. Comp Networking - IJCNWMC - upgraded deterministic-Vicky Choudhary.pdf | Vicky Choudhary & Karan Mahajan | 1-6 |
180 | 2014-10-31 | 4-5 | IJCNWMCOCT20142 | Link Quality Based Power Efficient Routing Protocol (LQ-PERP) | 2-3-1411624639-ABS - 2. Comp Networking - IJCNWMC -Link Quality Based Power Efficient - Mohankumar - Deveraju.pdf | Mohankumar N M, M Subramanya Bhat, Jyothi V & Devaraju J T | 7-20 |
181 | 2014-10-31 | 4-5 | IJCNWMCOCT20143 | Heterogeneous Enhanced Leach Protocol in Wireless Sensor Network to Prolong Network Lifetime with Static Clustering | 2-3-1412923315-ABS - 3. Comp Networking - -Heterogeneous Enhanced LEACH Protocol - Chandra Prakash Verma.pdf | Chandra Prakash Verma & Neetu Sharma | 21-32 |
182 | 2014-12-31 | 4-6 | IJCNWMCDEC20141 | Analyzing the Decoding Performance of Rate ⅓ Convolutional Code | --1413624639-ABS - 2. Comp Networking - IJCNWMC-Cheekatla.Ravikumar.Pdf | Ch. Ravi Kumar & K. Padmaraju | 1-12 |
183 | 2014-12-31 | 4-6 | IJCNWMCDEC20142 | WSN in Disastrous Area Management | 2-3-1414579551-ABS - 2. Computer Networking - IJCNWMC - WSN IN DISASTROUS AREA - Venkatramana Bhat P.pdf | Venkatramana Bhat P, Shridhar Aithal & Sudhakara G | 13-24 |
184 | 2014-12-31 | 4-6 | IJCNWMCDEC20143 | A Survey on Various Fault Tolerant Approaches for Cloud Environment During Load Balancing | 2-3-1414581134-ABS - 3. Comp Networking - IJCNWMC -A SURVEY ON VARIOUS FAULT TOLERANT - VIRENDRA SINGH KUSHWAH.pdf | Virendra Singh Kushwah, Sandip Kumar Goyal & Priusha Narwariya | 25-34 |
185 | 2014-12-31 | 4-6 | IJCNWMCDEC20144 | Performance Evaluation of Novel Scheduling Algorithm for MIMO Transmission in Downlink 3GPP LTE Cellular Network | 2-3-1416226901-ABS - 4. Comp Networking - IJCNWMC- PERFORMANCE EVALUATION OF -Nsiri Bechir.pdf | Nsiri Bechir, Mallouki Nasreddine, Mahmoud Ammar, Walid Hakimi & Bouallegue Ammar | 35-42 |
186 | 2014-12-31 | 4-6 | IJCNWMCDEC20145 | Comparison of PSK and BPSK Modulation Techniques of MIMO System Under Alamouti’s Scheme | 2-3-1416402001-ABS - 5. Comp Networking - IJCNWMC - COMPARISON OF PSK -NEETEE.pdf | Neetee & Sandeep Singh Kang | 43-52 |
187 | 2014-12-31 | 4-6 | IJCNWMCDEC20146 | The Ontology of Research | 2-3-1417414727-ABS - 6. Computer Networking - IJCNWMC - The Ontology of Research - TRANSMISSIA SEMIAWAN.pdf | Transmissia Semiawan, Ade Chandra Nugraha, Suprihanto & Inggriani Liem | 53-64 |
188 | 2014-12-31 | 4-6 | IJCNWMCDEC20148 | Predicting Consumer Intentions to Quick Response Code Adoption: Evidence from Taiwan | 2-3-1417765386-ABS - 7. Computer Networking - IJCNWMC - PREDICTING CONSUMER INTENTIONS -Mei-Ling Tang.pdf | M. L. Tang | 65-74 |
189 | 2014-12-31 | 4-6 | IJCNWMCDEC20149 | Improved Algorithm for MAC Layer Spectrum Sensing in Cognitive Radio Networks from Dynamic Spectrum Management Perspective | 2-3-1417866213-ABS - 8. Computer Networking - IJCNWMC -IMPROVED ALGORITHM FOR MAC- DIPAK P.PATIL.pdf | Dipak P. Patil & Vijay M. Wadhai | 75-90 |
190 | 2015-02-28 | 5-1 | IJCNWMCFEB20151 | Optimize Signal Strength and Energy Efficient Mechanism for Link Failure in Manet | --1419249879-ABS--Comp Networking - IJCNWMC - OPTIMIZE SIGNAL STRENGTH AND ENERGY - Krittika Khator - OPaid(1).Pdf | Krittika Khator & Nitin Manjhi | 1-12 |
191 | 2015-02-28 | 5-1 | IJCNWMCFEB20152 | Micro Utilities Communication Utilities on Low-Cost Mobiles | --1421751632-2. ABS - Comp Networking - IJCNWMC -Micro Utilities Communication Utilities on low(1).pdf | Gopakumaran T. Thampi & Jayalakshmi Srinivasan | 13-18 |
192 | 2015-02-28 | 5-1 | IJCNWMCFEB20153 | SEEHR: Secure and Energy Efficient Hierarchical Routing in Wireless Sensor Networks | 2-3-1422017342-2. ABS - Computer Networking - IJCNWMC - SEEHR.pdf | Amanpreet Kaur & Sandeep Singh Kang | 19-26 |
193 | 2015-02-28 | 5-1 | IJCNWMCFEB20154 | Route Redistribution between EIGRP and OSPF Routing Protocol in Computer Network Using GNS3 Sofware | 2-3-1423809234-4. ABS -Comp Networking - IJCNWMC - ROUTE REDISTRIBUTION BETWEEN EIGRP AND OSPF ROUTING PROTOCOL IN COMPUTER NETWORK USING GNS3 SOFWARE.pdf | Jaswinder Kumar, Samiksha, Susil Bhagat &Karanjit Kaur | 27-34 |
194 | 2015-04-30 | 5-2 | IJCNWMCAPR20151 | Energy Conservation Wistful Algorithm (ECWA) Associated with Cache System to Maximize the Life Time of an Ad-Hoc Network | 2-3-1426595616-1. ABS -Comp Networking - IJCNWMC - ENERGY CONSERVATION WISTFUL ALGORITHM.pdf | Pruthvirani Kakasuraiah | 1-8 |
195 | 2015-04-30 | 5-2 | IJCNWMCAPR20152 | Protyping and Analyzing the Congestion Control for Multicast Over 3G Networks | 2-3-1426843399-1. ABS - Comp Networki IJCNWMC - PROTYPING AND ANALYZING THE CONGESTION CONTROL.pdf | Neelkamal Chaudhary & Sumit Kumar Bola | 9-16 |
196 | 2015-04-30 | 5-2 | IJCNWMCAPR20153 | A Secure Intrusion-Detection System for MANETS | 2-3-1427090151-ABS - 3. Comp Networking - IJCNWMC - A Secure Intrusion-Detection - MUSTAFA QAYS HATEM.pdf | Mustafa Qays Hatem | 17-24 |
197 | 2015-04-30 | 5-2 | IJCNWMCAPR20154 | Face Detection and Recognition Using O-line EDGE Maps(O-LEM) | 2-3-1427371319-4. ABS - Comp Networking - IJCNWMC - FACE DETECTION AND RECOGNITION USING O.pdf | Vipul Aggarwal | 25-34 |
198 | 2015-06-30 | 5-3 | IJCNWMCJUN201501 | An Implementation Approach to the Detection of Faults in the Fabrics with the Help of Image Processing Techniques | --1434006526-ABS - 6. Electronics - IJECIERD - An implementation approach to the - Jagruti Mahure.pdf | Jagruti Mahure & Y. C. Kulkarni | 1-8 |
199 | 2015-06-30 | 5-3 | IJCNWMCJUN20152 | Detection of Virtual Link Attack in Wireless Ad-Hoc Network | 2-3-1434113162-ABS - DETECTION OF VIRTUAL LINK ATTACK IN WIRELESS AD.pdf | Amruta Vyavahare, Manjusha Deshmukh & Rahul Jiwane | 9-16 |
200 | 2015-08-31 | 5-4 | IJCNWMCAUG20151 | Design Approach of 64-Point Reconfigurable FFT/IFFT Processor for ASIP Architecture | 2-3-1436356732-1. ABS - Comp Networking - IJCNWMC - DESIGN APPROACH OF 64.pdf | L. P. Thakare & A. Y. Deshmukh | 1-8 |
201 | 2015-08-31 | 5-4 | IJCNWMCAUG20152 | Data Forwarding Based on Interest Using ABC Algorithm in SAN | 2-3-1437221735-2. ABS -Comp Networking - IJCNWMC - DATA FORWARDING BASED ON INTEREST USING.pdf | Priyanka Lonkar & D.C. Mehetre | 9-18 |
202 | 2015-08-31 | 5-4 | IJCNWMCAUG20153 | Analysis and Performance Measurement of Rule Based Firewall Using Queuing Model | 2-3-1439175028-ABS - 3. Comp Networking - IJCNWMC - ANALYSIS AND PERFORMANCE.pdf | M. Padmadas, N. Krishnan & Soorya Surendran | 19-26 |
203 | 2015-10-31 | 5-5 | IJCNWMCOCT20151 | The Aunotomy of Social Networks | 2-3-1440041531-ABS - 1. Comp Networking - IJCNWMC - The Aunotomy of Social Networks tjprc _2_.pdf | Mini Singh Ahuja & Jatinder Singh | 1-8 |
204 | 2015-10-31 | 5-5 | IJCNWMCOCT201502 | Hybrid Techniques for PAPR Reduction of OFDM Signal | --1467968289-ABS - 2. Comp Networking - IJCNWMC - Hybrid_technique_to_reduce_PAPR_by_Modified_SLM_rev5.pdf | Bahubali K. Shiragapur & Udaywali | 9-16 |
205 | 2015-10-31 | 5-5 | IJCNWMCOCT20153 | Human Motion Detection Using Background Subtraction Algorithm | 2-3-1441694181-ABS- 3. Comp Networking - IJCNWMC - Human Motion Detection.pdf | Ayush Panwar | 17-24 |
206 | 2015-12-31 | 5-6 | IJCNWMCDEC20151 | Throughput Analysis of Cooperative Spectrum Sensing for Cognitive Radio Network | --1467968641-ABS - 1. Comp Networking - IJCNWMC - THROUGHPUT ANALYSIS OF COOPERATIVE SPECTRUM.pdf | Bhawna Ahuja & Gurjit Kaur | 1-8 |
207 | 2015-12-31 | 5-6 | IJCNWMCDEC20152 | Design of Ground station Smart Antenna System for Multimedia Communications in Small Drone Applications | --1467968665-ABS - 2. IJCNWMC- DESIGN OF GROUND STATION SMART ANTENNA SYSTEM FOR MULTIMEDIA.pdf | Settapong Malisuwan | 9-18 |
208 | 2015-12-31 | 5-6 | IJCNWMCDEC20153 | A Study on Big Data Modeling Techniques | --1467968719-ABS - 3. IJCNWMC - A STUDY ON BIG DATA MODELING TECHNIQUES new.pdf | B. Sai Jyothi et al., | 19-26 |
209 | 2015-12-31 | 5-6 | IJCNWMCDEC20154 | Estimation of Consumer Surplus in Mobile Services: Case Study on Telecommunication Market in Thailand | --1467968740-ABS - 4. IJCNWMC - ESTIMATION OF CONSUMER SURPLUS IN MOBILE SERVICES.pdf | Settapong Malisuwan et al., | 27-40 |
210 | 2015-12-31 | 5-6 | IJCNWMCDEC20155 | A Novel Joint Data-Hiding and Compression Scheme based on SVD and DWT | --1467968767-ABS - 5. IJCNWMC - A Novel Joint Data-Hiding and Compression Scheme Based.pdf | Jagadeeswari Jasthi et al., | 41-50 |
211 | 2016-02-29 | 6-1 | IJCNWMCFEB20161 | AD HOC UAV LTE Networks for Critical Communications | --1467969370-ABS - 1. IJCNWMC_Ad hoc UAV LTE Networks for Critical Communications V2.pdf | Settapong Malisuwan et al., | 1-6 |
212 | 2016-02-29 | 6-1 | IJCNWMCFEB20162 | Design of Spectrum Licensing for Mobile Telecommunications Service in Thailand | --1467969349-abs 1. IJCNWMC -Design of Spectrum Licensing for Mobile Telecommunications Service in Thailand v3.pdf | Settapong Malisuwan & Wassana Kaewphanuekrungsi | 7-14 |
213 | 2016-04-30 | 6-2 | IJCNWMCAPR20161 | Routing Protocols in Wireless Sensor Networks: A Survey | --1467969483-ABS - 1. IJCNWMC - ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK.pdf | Movva Pavani et al., | 1-12 |
214 | 2016-04-30 | 6-2 | IJCNWMCAPR20162 | Implementation of Different Modulation Format for Fibre Distribued Ring on Wan | --1467969505-ABS - 2. IJCNWMC - Performance Analysis Of Hybrid Optical Amplifier in Fiber.pdf | Rajesh Kochher et al., | 13-20 |
215 | 2016-04-30 | 6-2 | IJCNWMCAPR20163 | Interconnection Charge in Telecommunications: A Case Study on Telecommunications Service in Asean and Thailand | --1467969527-ABS - 3. IJCNWMC - INTERCONNECTION CHARGE IN TELECOMMUNICATIONS A CASE.pdf | Settapong Malisuwan et al., | 21-28 |
216 | 2016-06-30 | 6-3 | IJCNWMCJUN20161 | The Intelligent Charging Path Planning for Electric Vehicle | 2-3-1465464078-ABS - 1. IJCNWMC - The Intelligent Charging Path Planning for Electric 1.pdf | Zhi-Ping Lin, Her-Shing Wang & Shao-Jyun Tsai | 1-8 |
217 | 2016-04-30 | 6-2 | IJCNWMCAPR20164 | Scheduling with Improved BFCA-VF in OBS Network | 2-3-1465474715-ABS - 4. IJCNWMC - Scheduling with Improved BFCA.pdf | Prajapati Vipul Dasharathbhai, Hardik Jagad & Pinakini Prajapati | 29-36 |
218 | 2016-04-30 | 6-2 | IJCNWMCAPR20165 | A Comprehensive Study of Different Energy-Efficient Routing Protocols in Wireless Sensor Network | 2-3-1465474785-ABS - 5. IJCNWMC - A COMPREHENSIVE STUDY OF DIFFERENT ENERGY.pdf | Bhoomika Pandey & H.L.Mandoria | 37-44 |
219 | 2016-04-30 | 6-2 | IJCNWMCAPR20166 | Performance Evaluation of Multicast Routing Protocols in Mobile Ad Hoc Networks | 2-3-1465474851-ABS - 6. IJCNWMC - Performance Evaluation of Multicast Routing Protocols.pdf | Dharmendra Sutariya | 45-54 |
220 | 2016-06-30 | 6-3 | IJCNWMCJUN20162 | E-Commerce of Opinion-Based Entity Ranking | 2-3-1465543855-ABS - 2. IJCNWMC - E-commerce of Opinion-based entity ranking.pdf | Adamu Abubakar Isah et al., | 9-16 |
221 | 2016-02-29 | 6-1 | IJCNWMCFEB20163 | Cluster Routing Protocol and Its Importance in Wireless Sensor Networks | 2-3-1466002036-1. abs Comp Net - CLUSTER ROUTING PROTOCOL AND ITS IMPORTANCE IN WIRELESS SENSOR NETWORKS.pdf | T.Venu Madhav & NVSN Sarma | 15-26 |
222 | 2016-08-31 | 6-4 | IJCNWMCAUG20161 | Third Party Intervened Vertical Handover in Heterogeneous Networks | 2-3-1468220947-ABS - 1. IJCNWMC - Third party intervened vertical handover in heterogeneous.pdf | S. B. Kumbalavati et al., | 1-12 |
223 | 2016-10-31 | 6-5 | IJCNWMCOCT20161 | The Optimal RFID Reader Deployment in 3-Dimensional Space Based on the Meta-Heuristic Algorithm | 2-3-1471955224-ABS - 1. IJCNWMC - THE OPTIMAL RFID READER DEPLOYMENT IN 3.pdf | Zhi-Ping Lin et al., | 1-16 |
224 | 2016-10-31 | 6-5 | IJCNWMCOCT20162 | Reconfiguring Composite Coding Labels to Adapt to Packet Traffic in Optical MPLS Network | 2-3-1472129095-ABS - 2. IJCNWMC - RECONFIGURING COMPOSITE CODING LABELS TO ADAPT TO PACKETS.pdf | Kai-Sheng Chen et al., | 17-22 |
225 | 2016-10-31 | 6-5 | IJCNWMCOCT20163 | An Evaluation on State of the Art Feature Extractors for Steganalysis | 2-3-1472548110-ABS - 3. Comp Networking -IJCNWMC- An Evaluation on State of the Art Feature Extractors for Steganalysis.pdf | S. Deepa et al., | 23-32 |
226 | 2016-10-31 | 6-5 | IJCNWMCOCT20164 | Instrument and Technology for Computer Forensic: Research in Ghana | 2-3-1474280201-ABS - 4. IJCNWMC - INSTRUMENT AND TECHNOLOGY FOR COMPUTER.pdf | Nana Kwame Gyamfi et al., | 33-40 |
227 | 2016-10-31 | 6-5 | IJCNWMCOCT20165 | Secure Routing Protocol Design: AODV Protocol Vulnerability to Black Hole Attack in Comparison of OLSR Protocol | 2-3-1473940999-ABS - 5. IJCNWMC - SECURE ROUTING PROTOCOL DESIGN.pdf | Najiya Sultana | 41-48 |
228 | 2016-10-31 | 6-5 | IJCNWMCOCT20166 | Study of Smart Electric Vehicle Charging Path System | 2-3-1475649692-ABS - 6. IJCNWMC - A STUDY OF SMART ELECTRIC VEHICLE CHARGING PATH SYSTEM.pdf | Zhi-Ping Lin et al., | 49-58 |
229 | 2016-10-31 | 6-5 | IJCNWMCOCT20167 | Implementation of Distributive Cooperative Sensing Schemes Using And and OR Fusion Rules for Spectrum Detection | 2-3-1475739335-ABS - 7. IMPLEMENTATION OF DISTRIBUTIVE COOPERATIVE SENSING SCHEMES.pdf | D. Damodaram et al., | 59-66 |
230 | 2016-10-31 | 6-5 | IJCNWMCOCT20168 | Improved BEENISH: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Network | 2-3-1475839046-ABS - 8. Comp Networking - IJCNWMC-Improved BEENISH A Routing Protocol for Enhanced Efficiency in Wireless Sensor Network.pdf | Navjot Kaur et al., | 67-76 |
231 | 2017-04-30 | 7-1 | IJCNWMCAPR20171 | Conditional Probabilistic Poisson factor Based Mitigation Mechanism for Byzantine Attack in Manets | 2-3-1492590532-1.Abs-IJCNWMCAPR20171.pdf | Geetha Achuthan et al., | 1-10 |
232 | 2017-04-30 | 7-1 | IJCNWMCAPR20172 | QOS Modeling and Analysis Using QML in Mobile Computing Environment | 2-3-1494392653-2.Abs-IJCNWMCAPR20172.pdf | Gurwinder Pal Kaur & Kavita | 11-22 |
233 | 2017-04-30 | 7-1 | IJCNWMCAPR20173 | Bayesian Belief Networks (BBN) Based Risk Assessment for Deployed C4I System | 2-3-1492590572-3.Abs-IJCNWMCAPR20173.pdf | Manoj Tyagi et al., | 23-32 |
234 | 2017-06-30 | 7-2 | IJCNWMCJUN20171 | Mitigating Interference Linked to Material Composition for Wireless Sensor Network Deployment in Real Three-Dimensional Indoor Spaces | 2-3-1493126514-1.ABS_IJCNWMCJUN20171.pdf | Her-Shing Wang et al., | 1-18 |
235 | 2017-06-30 | 7-2 | IJCNWMCJUN20172 | Throughput Analysis of TCP Newreno for Multiple Bottlenecks | 2-3-1496483228-ABS-2.IJCNWMCJUN20172.pdf | Mohibur Rahman et al., | 19-28 |
236 | 2017-10-31 | 7-3 | IJCNWMCOCT20171 | E - Learning and Computer-Based Multimedia Intervention and its Education Effect on The Relationship between Knowledge, Attitude and Practices of Rural Women | 2-3-1507980920-abs1.IJCNWMCOCT20171.pdf | Nida Fatima Hazari et al., | 1-8 |
237 | 2017-12-31 | 7-4 | IJCNWMCDEC20171 | The Optimal Carpool Planning Based on IOS Platform | 2-3-1509183687-1.IJCNWMCDEC20171.pdf | Her-Shing Wang et al., | 1-10 |
238 | 2017-12-31 | 7-4 | IJCNWMCDEC20172 | Performance Analysis of Select Forwarding Attack on WSN and its Detection and Removal from Network | 2-3-1511505969-Abs.1.IJCNWMCDEC20171.pdf | Vijeta Kumawat, Kavita & B. S. Jangra | 11-18 |
239 | 2018-06-30 | 8-1 | IJCNWMCJUN20181 | Internet of Things: A Review on Architecture, Security Threats and Countermeasures | 2-3-1527919912-abs.1.IJCNWMCJUN20181.pdf | Priya Maidamwar et al., | 1-10 |
240 | 2018-06-30 | 8-1 | IJCNWMCJUN20182 | Improved Reposition Cluster Head in Leach Protocol for Heterogeneous Wireless Network | 2-3-1527920413-abs.2.IJCNWMCJUN20182.pdf | Satyanarayan. K. Padaganur et al., | 11-18 |
241 | 2018-06-30 | 8-1 | IJCNWMCJUN20183 | A Competitive Study on Clouds Computing, Service Orientation Architecture and Web Services in Enterprise Network Application | 2-3-1527921157-abs.3.IJCNWMCJUN20183.pdf | I. Lakshmi | 19-34 |
242 | 2018-06-30 | 8-1 | IJCNWMCJUN20184 | Analysis and Evaluation on Online Shops Customers Through Data Mining Methods | 2-3-1528951870-abs.4.IJCNWMCJUN20184.pdf | Snezhana Sulova | 35-44 |
243 | 2018-08-31 | 8-2 | IJCNWMCAUG20181 | Efficient Data Gathering by Mobisink in WSN using Optimized Route Points Intelligence System (ORPIS) | 2-3-1530344654-ABS.1.IJCNWMCAUG20181.pdf | Kumar Swamy. B. V et al., | 1-12 |
244 | 2018-10-31 | 8-3 | IJCNWMCOCT20181 | Shared Circular Radiator for UWB-MIMO Applications | 2-3-1535009863-ABS.1.IJCNWMCOCT20181.pdf | K. Srividhya & H. Umma Habiba | 1-8 |
245 | 2018-10-31 | 8-3 | IJCNWMCOCT20182 | Study of the OCDMA Transmission Characteristics Using Bidirectional Optical Fiber Link, Based on EDW Code | 2-3-1535106370-ABS.2.IJCNWMCOCT20182.pdf | Muthana. Y. Aldouri et al., | 9-16 |
246 | 2018-12-31 | 8-4 | IJCNWMCDEC20181 | Automatic Number Plate Recognition using Canny Edge Detector, Sliding Concentric Windows and Linear Discriminant Analysis | 2-3-1540615264-ABS.1.IJCNWMCDEC20181.pdf | Brinthakumari. S et al., | 1-8 |
247 | 2018-12-31 | 8-4 | IJCNWMCDEC20182 | PSAV Model: Agile Method to Design Human Machine Interaction for User Experience Across the Platforms | 2-3-1542361746-abs.2IJCNWMCDEC20182.pdf | Abhijeet Shukla | 9-14 |
248 | 2019-06-30 | 9-1 | IJCNWMCJUN20191 | Enhanced Identity-Based Signcryption System | 2-3-1548161464-absIJCNWMCJUN20191.pdf | V. Isakkirajan et al., | 1-4 |
249 | 2019-06-30 | 9-1 | IJCNWMCJUN20192 | Efficient Trust Management Technique Using Neural Network in Cloud Computing | 2-3-1548912521-abs.2IJCNWMCJUN20192.pdf | P. Neelakanteswara et al., | 5-16 |
250 | 2019-06-30 | 9-1 | IJCNWMCJUN20193 | Demystifying Big Data Analytics Techniques | 2-3-1551438993-abs.3.IJCNWMCJUN20193.pdf | Komalpreet Kaur et al., | 17-24 |
251 | 2019-06-30 | 9-1 | IJCNWMCJUN20194 | A Study on Self-Driving Car an Application of IoT | 2-3-1556350693-abs.4.IJCNWMCJUN20194.pdf | Geetika Mathur et al., | 25-34 |
252 | 2019-06-30 | 9-1 | IJCNWMCJUN20195 | Optimizing IoT Cloud Architectures for Pipelining Data through Machine Learning Models | 2-3-1556350434-abs5IJCNWMCJUN20195.pdf | Dipanjan De et al., | 35-44 |
253 | 2019-12-31 | 9-2 | IJCNWMCDEC20191 | Formalization the Tasks of Selecting Optimal Parameters for Balancing of Loading Servers in IMS Subsystem | 2-3-1561787352-abs.1.IJCNWMCDEC20191.pdf | Samandarov Bunyod G. Ayratovich et al., | 1-6 |
254 | 2019-12-31 | 9-2 | IJCNWMCDEC20192 | Route Redistribution: Beyond Inherent Metrics | 2-3-1575524173-abs.2.IJCNWMCDEC20192.pdf | Dr. Paul Danquah | 7–14 |
255 | 2020-12-31 | 10–2 | IJCNWMCDEC20201 | Optimisation Clustering Approach For Energy Efficiency In Wireless Network | 2-3-1607951387-ABS1IJCNWMCDEC20201.pdf | Sakshi Mishra | 1-10 |
256 | 2021-06-30 | 11-1 | IJCNWMCJUN20211 | Ntdroid: Android Malware Detection Using Network Traffic Features | 2-3-1620384110-ABS1IJCNWMCJUN20211.pdf | Deepti Singh, Kapil Gupta et al., | 1-12 |
257 | 2021-12-31 | 11–2 | IJCNWMCDEC20211 | Identification and Recovering Locality Exploitations in Distributed Sdn Controllers | 2-3-1637833001-abs1IJCNWMCDEC20211.pdf | V. R. Sudarsana Raju et al., | 1 – 8 |
258 | 2022-06-30 | 12–1 | IJCNWMCJUN20221 | Development of an Application for Managing the Production of Organic Products sing an Architecture with Blockchain Technology | 2-3-1646201866-ABS1IJCNWMCJUN20221.pdf | Khalid Twarish Alhamazani | 1–10 |
259 | 2022-06-30 | 12–1 | IJCNWMCJUN20222 | Decision Tree and K-Nearest Neighbor (KNN) Algorithms in Breast Cancer Diagnosis: A Relative Performance Evaluation | 2-3-1646224428-abs2IJCNWMCJUN20222.pdf | Dhahi Alshammari | 11–20 |
260 | 2022-06-30 | 12–1 | IJCNWMCJUN20223 | Automatic Segmentation of Calcification Areas in Digital Breast Images | 2-3-1646731639-abs3IJCNWMCJUN20223.pdf | Jalawi Alshudukhi et al., | 21–32 |
261 | 2022-06-30 | 12–1 | IJCNWMCJUN20224 | Determinants of Smartphones Learning Adoption in Taraba State University Institute for Distant Education and Life Long Learning: An Empirical Analysis | 2-3-1647604597-abs4IJCNWMCJUN20224.pdf | Philip Zhino Aboki et al., | 33–44 |
262 | 2022-06-30 | 12–1 | IJCNWMCJUN20225 | Optimizing Maximum Link Utilization in Multicast Network | 2-3-1650541050-abs5IJCNWMCJUN20225.pdf | Deepa V. B et al., | 45–54 |
263 | 2022-12-31 | 12–2 | IJCNWMCDEC20221 | Multi path Routing with Dupen Node in Wireless Multimedia Sensor Networks | 2-3-1669373791-ABS1IJCNWMCDEC20221.pdf | Viswanath Reddy Bontha | 1–10 |
264 | 2023-06-30 | 13–1 | IJCNWMCJUN20231 | tjprc | 2-3-1680605671-Blank.pdf | tjprc | 1–12 |
265 | 2023-12-31 | 13–2 | IJCNWMCDEC20231 | AN IMPROVED TRUST-BASED SECURED MULTIPLE PATH ROUTE PROTOCOL FOR MOBILE DEVICES AD HOC NETWORK OF QOS METHOD | 2-3-1697452258-IJCNWMCDEC20231abt.pdf | BINUJA PHILOMINA MARYDASAN & RANJITH NADARAJAN | 1–10 |
266 | 2023-12-31 | 13–2 | IJCNWMCDEC20232 | ENHANCING ANONYMITY AND SECURITY IN VANETS: A HYBRID APPROACH TO BLACK HOLE ATTACK PREVENTION | 2-3-1699686486-IJCNWMCDEC20232ABT.pdf | PARAMJIT & DR. SAURABH CHARYA | 11–18 |
267 | 2024-06-30 | 14–1 | IJCNWMCJUN20241 | A Comprehensive Survey of Hierarchical Routing Protocols in Wireless Sensor Networks; Performance Metrics and Comparative Analysis | 2-3-1709269528-IJCNWMCJUN20241ABT.pdf | V. Ravindra Reddy, Dr. V. Raghunatha Reddy & Dr. Tirupathi Rao Gullipalli | 1–14 |
268 | 2024-06-30 | 14–1 | IJCNWMCJUN20242 | Ensuring the Security and Efficiency of Fog-Assisted IoT Cloud Based Electronic Medical Records Sharing Through Lightweight Blockchain- Based Access Control | 2-3-1714133996-IJCNWMCJUN20242ABT.pdf | S. J. Sujitha & Dr. Tamil Selvi. P | 15-24 |