Journal: IJITN

Volume 5, Issue 4

1 -- 12Upkar Varshney, Neetu Singh. A Framework for Studying Patterns of Effective Medication Adherence
13 -- 20Shikhar P. Acharya, Ivan G. Guardiola. Detection and Recognition of RF Devices Using Support Vector Machine
21 -- 52Mike Irizarry, Mary Lind. System Frame Erasure Rate and its Relationship to Perceived Call Quality in a Wireless Network: A Quantitative Investigation
53 -- 72Rajarshi Sanyal. ISDN User Part Traffic Optimization in the SS7 Network
73 -- 91Jacqueline Stewart, Thomas McCabe, Robert Stewart, Sean Kennedy. An Overview of Memory Provisioning in Real-Time Wireless Sensor Networks
92 -- 106Izabella Lokshina, Michael R. Bartolacci. Redesigning the Healthcare Model to Address Obesity Problem Using Incentives Delivered through a Combination of Processes and Mobile Technologies

Volume 5, Issue 3

1 -- 10E. T. Tchao, W. K. Ofosu, K. Diawuo. Radio Planning and Field Trial Measurement of a Deployed 4G WiMAX Network in an Urban Sub-Saharan African Environment
11 -- 22Radhika Radhakrishnan, Qing-An Zeng, William E. Edmonson. Inter-Satellite Communications for Small Satellite Systems
23 -- 33K. A. Bonsu, K. O. Boateng, J. K. Oppong, K. A. Dotche. Small-Scale Fading Characteristics in Cellular Networks in Ghana
34 -- 48Mahabubul Alam, Salam Salloum, Mohammad Husain. Improving Network Management by XML to Relational Data Translation
49 -- 53Ehsan Sheybani, L. Ralph, Giti Javidi, A. Eslami, J. Luttamaguzi. SNMP-Based RMA Analysis of Wired and Wireless Networks
54 -- 62Willie K. Ofosu, Hamadou Saliah-Hassane. Cloud Computing in the Education Environment for Developing Nations
63 -- 68Pavel Soucek, Jan Holub. Shift in Speech Quality and Acceptability Level between 2008-2012

Volume 5, Issue 2

1 -- 17David Crowe, Wasim A. Al-Hamdani. Retained-Key Encryption
18 -- 31Guillermo A. Francia III, Kihyun Kim, Byungoh Ahn, Sen-xin Zhou. A Formal Framework for Patch Management
32 -- 42Herbert J. Mattord, Yair Levy, Steven Furnell. An Expert Panel Approach on Developing a Unified System Authentication Benchmarking Index
43 -- 50Michael E. Whitman, Humayun Zafar. URL Manipulation and the Slippery Slope: The Case of the Harvard 119 Revisited
51 -- 65Scott Musman, Michael R. Grimaila. Mission Assurance Challenges within the Military Environment
66 -- 82Eralda Caushaj, Huirong Fu, Ishwar Sethi, Haissam Badih, Dion Watson, Ye Zhu, Supeng Leng. Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications
83 -- 95George P. Corser, Suzan Arslanturk, Jared Oluoch, Huirong Fu, George E. Corser. Knowing the Enemy at the Gates: Measuring Attacker Motivation

Volume 5, Issue 1

1 -- 13Monirosharieh Vameghestahbanati, Hasan S. Mir, Mohamed El-Tarhuni. An MMSE Overlay Cognitive Wireless System
14 -- 25Mahdy Saedy. Biologically Inspired Networks: On Energy Efficient Event-Driven Data Collection for Wireless Sensor Networks
26 -- 42John G. Klincewicz, David F. Lynch. Designing an IP Link Topology for a Metro Area Backbone Network
43 -- 57S. Sreeejesh. Cellular Customer Churns Due to Mobile Number Portability: Causes and the Strategies to Deal with it (An Empirical Study)
58 -- 74Rajarshi Sanyal, Ernestina Cianca, Ramjee Prasad. Novel WLL Architecture Based on Color Pixel Multiple Access Implemented on a Terrestrial Video Network as the Overlay