Journal: IJCNIS

Volume 4, Issue 3

0 -- 0Natarajan Meghanathan. Link Expiration Time and Minimum Distance Spanning Trees based Distributed Data Gathering Algorithms for Wireless Mobile Sensor Networks
0 -- 0N. Jeyanthi, N. Ch. S. N. Iyengar. Packet Resonance Strategy: A Spoof Attack Detection and Prevention Mechanism in Cloud Computing Environment
0 -- 0Muhammad Zeeshan, Shoab Ahmed Khan. A Robust Carrier Frequency Offset Estimation Algorithm in Burst Mode Multicarrier CDMA based Ad Hoc Networks
0 -- 0Ahmed Bisengar, Mohammed Rziza, Mohamed Ouadou. Queue Length and Mobility aware Routing Protocol for Mobile Ad hoc Network
0 -- 0Haider N. Hussain, Kamalrulnizam Abu Bakar, Shaharuddin Salleh. Using Media Independent Handover to Support PMIPv6 Inter-domain Mobility Based Vehicular Networks
0 -- 0Rastislav Róka, Filip Certík. Modeling of Environmental Influences at the Signal Transmission in the Optical Transmission Medium

Volume 4, Issue 2

0 -- 0Farrukh Javed, Imran Shafi, Asad Mahmood. A Novel Radio Mode Identification Approach for Spectrum Sensing in Cognitive Radios
0 -- 0Rachid Saadane, Mohammed Wahbi. UWB Indoor Radio Propagation Modelling in Presence of Human Body Shadowing Using Ray Tracing Technique
0 -- 0Shensheng Tang, Yi Xie, Chenghua Tang, Jinwen Zhu. A Comparative Study of Power Line Communication Networks With and Without Buffer
0 -- 0Shah Nawaz Khan, Ali Diab, Christian Brosch, Mushtaq Ahmad. Self-Organized Disjoint Service Placement in Future Mobile Communication Networks
0 -- 0Othmane Alaoui Fdili, Youssef Fakhri, Driss Aboutajdine. Impact of queue buffer size awareness on single and multi service real-time routing protocols for WSNs
0 -- 0Parisa Grayeli, Shahram Sarkani, Thomas A. Mazzuchi. Performance Analysis of IPv6 Transition Mechanisms over MPLS
0 -- 0Hanieh Jalali, Ahmad Baraani. Process Aware Host-based Intrusion Detection Model
0 -- 0Pyung Soo Kim. Fair Packet Distribution on Multi-interfaced Mobile Router for Mobile Networks

Volume 4, Issue 1

0 -- 0V. Thiruppathy Kesavan, S. Radhakrishnan. Multiple Secret Keys based Security for Wireless Sensor Networks
0 -- 0Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, Al-Sakib Khan Pathan. Automated Intruder Detection from Image Sequences using Minimum Volume Sets
0 -- 0M. Hussaini, Habeeb Bello-Salau, A. F. Salami, Farhat Anwar, A. H. Abdalla, Md. Rafiqul Islam. Enhanced Clustering Routing Protocol for Power-Efficient Gathering in Wireless Sensor Network
0 -- 0Haseeb Zafar, David Harle, Ivan Andonovic, Laiq Hasan, Amjad Ullah Khattak. QoS-aware Multipath Routing Scheme for Mobile Ad Hoc Networks
0 -- 0Ana-Maria Popescu, Ion Gabriel Tudorache, Bo Peng, Andrew H. Kemp. Surveying Position Based Routing Protocols for Wireless Sensor and Ad-hoc Networks
0 -- 0Jaydip Sen. A Secure and User Privacy-Preserving Searching Protocol for Peer-to-Peer Networks