Journal: IJITN

Volume 11, Issue 4

1 -- 16Wassim Jerbi, Abderrahmen Guermazi, Hafedh Trabelsi. Orphan Node Connected Management in Multi-Hop Clustering-Based Routing Protocols for Wireless Sensor Networks
17 -- 31Mamata Rath, Bibudhendu Pati. Security Assertion of IoT Devices Using Cloud of Things Perception
32 -- 47Mousaab M. Nahas. Fiber-Optic Based Solutions for Long-Tunnels Radio Coverage and Surveillance
48 -- 62Ibtihel Baddari, Mohamed Amine Riahla, Mohamed Mezghiche. A New AOMDV Lifetime Prolonging Routing Algorithm for Ad-Hoc Networks
63 -- 79Theodoros Mavroeidakos, Nikolaos Tsolis, Dimitrios D. Vergados, Stavros Kotsopoulos. Attack-Tree Based Risk Assessment on Cloud-Oriented Wireless Body Area Network

Volume 11, Issue 3

1 -- 10Hewei Yu, Ziliang Li. Handover Algorithm to Avoid Duplication Authentication Within or Between Proxy Mobile IPv6 Domains
11 -- 22Hao Wang, Jingfei Jiang. Accelerating High Throughput Cipher Processing on Supercomputing Platform
23 -- 33Tahreer Mahmood, Seshadri Mohan. Factors Influencing the PAPR Performance of OFDM and MIMO-OFDM Systems: A Comparison Study
34 -- 48Omar Sweileh, Mohamed S. Hassan, Hasan S. Mir, Mahmoud H. Ismail. A Switching-Based and Delay-Aware Scheduling Algorithm for Cognitive Radio Networks

Volume 11, Issue 2

1 -- 11Khashayar Kotobi, Mina Sartipi. A Novel Congestion Avoidance Algorithm for Autonomous Vehicles Assessed by Queue Modeling
12 -- 23Vemula Manohar Reddy, Min Kyung An, Hyuk Cho. An Improved Data Collection Algorithm for Wireless Sensor Networks
24 -- 41Eric E. Petrosky, Alan J. Michaels, Joseph M. Ernst. A Low Power IoT Medium Access Control for Receiver-Assigned CDMA
42 -- 55Vishwa Teja Alaparthy, Salvatore D. Morgera. Modeling an Intrusion Detection System Based on Adaptive Immunology

Volume 11, Issue 1

1 -- 16Mohammad Reza Ghavidel Aghdam, Reza Abdolee, Seyed Kamal Seyyedi Sahbari, Behzad Mozaffari Tazehkand. Non-Gradient Based PDF Approximation for Sensor Selection in Cognitive Sensor Networks
17 -- 29Kuo-Chi Fang, Husnu S. Narman, Ibrahim Hussein Mwinyi, Wook-Sung Yoo. PPHA-Popularity Prediction Based High Data Availability for Multimedia Data Center
30 -- 43Elie F. Kfoury, Julien Saab, Paul Younes, Roger Achkar. A Self Organizing Map Intrusion Detection System for RPL Protocol Attacks
44 -- 56Pedro Narváez, José Manjarrés, Winston S. Percybrooks, Mauricio Pardo, Maria Calle. Assessing the Level of Physical Activity in the Workplace: A Case Study With Wearable Technology
57 -- 70Ahmed Y. Awad, Seshadri Mohan. Internet of Things for a Smart Transportation System
71 -- 86Reem Khalid Mahjoub, Khaled Elleithy. Fault Tolerance Model for Efficient Actor Recovery Paradigm in WSAN