International journal of Computer Networks & Communications (IJCNC )
ISSN : 0974 – 9322[Online]; 0975 - 2293[Print]
November 2013, Volume 5. Number 6
| Interworking QOS Management Subsystem into IMS-Based Architecture Multi Providers: IMS-IQMSMP[Pdf] Imene Elloumi1,2, Thierry Desprats2, Michelle Sibilla2 and Sami Tabbane1, 1Universite de Carthage, Tunisie and 2Universite Paul Sabatier 31062 Toulouse cedex 9, France |
| Regressive Admission Control Enabled by Real-Time QOS Measurements
[Pdf] Mirjami Jutila, Jarmo Prokkola and Despina Triantafyllidou, VTT Technical Research Centre of Finland, Finland |
| Wireless Sensor Networks Localization Algorithms: A Comprehensive Survey[Pdf] Asma Mesmoudi, Mohammed Feham and Nabila Labraoui, STIC Laboratory, Algeria |
| The Improvement of End to End Delays in Network Management System using Network coding[Pdf] El Miloud AR REYOUCHI1, Kamal Ghoumid2, Koutaiba Ameziane1 and Otman El Mrabet1, 1Abdelmalek Essaadi University, Morroco and 2Mohammed I University, Morocco |
| Minimizing Mobiles Communication Time Using Modified Binary Exponential Backoff Algorithm[Pdf] Ibrahim Sayed Ahmad1, Ali Kalakech1 and Seifedine Kadry2, 1Arts, Sciences and Technologies University, Lebanon and 2American University of the Middle East, Kuwait |
| A Bandwidth Allocation Model Provisioning Framework with Autonomic Characteristics[Pdf] Rafael F. Reale1, Romildo M. da S. Bezerra1 and Joberto S. B. Martins2, 1Federal Institute of Bahia (IFBA) - Brazil and 2Salvador University (UNIFACS) - Brazil |
| A Distributed IP-Based Telecommunication System using SIP[Pdf] Carlton Andre Thompson, Haniph A. Latchman, Nathan Angelacos and Bharath Kumar Pareek, University of Florida, USA |
| A Review: Study of Handover Performance in Mobile IP[Pdf] Geetanjali Chellani and Anshuman Kalla, Jaipur National University, India |
| Key Management in Information Centric Networking[Pdf] Bander A Alzahrani, Vassilios G. Vassilakis and Martin J. Reed, University of Essex, UK |
| Priority Scheduling for Multipath Video Transmission in WMSNS[Pdf] Elham Karimi1 and Behzad Akbari2, 1Qazvin Islamic Azad University, Iran and 2Tarbiat Modares University, Iran |
| DCF Learn and Performance Analysis Of 802.11B Wireless Network[Pdf] Mingming Li, Biao Huang, Haiyang Liu and Miao Yang, SRMC, China |
| Performance Comparison of AODV and OLSR Using 802.11A And DSRC (802.11P) Protocols in Urban Vanets[Pdf] Ederval Pablo Ferreira da Cruz1 and Bruno dos Santos Silva2, 1Federal Institute of Espirito Santo (IFES) - Campus Itapina, Brazil and 2Federal University of State of Rio de Janeiro (UNIRIO) , Brazil |
| A Multi-Tenant Platform for SMS Integrated Services[Pdf] Ka Ching Chan1 and David Tien2, 1La Trobe University, Australia and 2Charles Sturt University, Australia |
| A Novel Hierarchical ant Based QOS Aware Intelligent Routing Scheme for Manets[Pdf] Debajit Sensarma and Koushik Majumder, West Bengal University ofTechnology, India |
| NAME: A Naming Mechanism for Delay/Disruption-Tolerant Network[Pdf] Songyang Wang and Ruyi Ma, Beihang University, China |
| Further Results on the Joint Time Delay and Frequency Estimation Without Eigendecomposition[Pdf] Qasaymeh M. M, Tafila Technical University, Jordan |
September 2013, Volume 5. Number 5
| Joint Multiple Resource Allocation Method for Cloud Computing Services with Different QOS to Users at Multiple Locations[Pdf] Shin-ichi Kuribayashi, Seikei University, Japan |
| Corporate Role in Protecting Consumers from the Risk of Identity Theft[Pdf] Omondi John Opala1 and Syed (Shawon) M. Rahman2, 1Cisco Systems, Inc., RTP, USA and 2University of Hawaii-Hilo, USA |
| Cloud Computing Challenges with Emphasis on Amazon EC2 and Windows Azure[Pdf] Azzam Sleit1, Nada Misk1, Fatima Badwan1 and Tawfiq Khalil2, 1The University of Jordan, Jordan and 2Oakland University, USA |
| Available Network Bandwidth Schema to Improve Performance in TCP Protocols[Pdf] Marcos Talau and Emilio Carlos Gomes Wille, Federal University of Technology - Parana (UTFPR), Brazil |
| Towards Internet of Things (IOTS): Integration of Wireless Sensor Network to Cloud Services for Data Collection and Sharing[Pdf] Rajeev Piyare and Seong Ro Lee, Mokpo National University, South Korea |
| New Design of Leaky Wave Antenna Based on SIW Technology for Beam Steering[Pdf] Souaad Doucha and Mehadji Abri, University of Abou-Bekr Belkaid-Tlemcen, Algeria |
| Exact Network Reconstruction from Consensus Signals and One Eigen Value[Pdf] Enzo Fioriti, Stefano Chiesa and Fabio Fratichini, ENEA, CR Casaccia, Italy |
| Distributed Firewalls and IDS Interoperability Checking Based on A Formal Approach[Pdf] Kamel Karoui, Fakher Ben Ftima and Henda Ben Ghezala, University of Manouba, Tunisia |
| Security Analysis of Generalized Confidentialmodulation for Quantum Communication[Pdf] Hidema Tanaka, National Defense Academy, Japan |
| A Novel Secure E-Contents System for Multi-Media Interchange Workflows in E-Learning Environments[Pdf] Shadi R. Masadeh1, Bilal Abul-Huda2 and Nidal M. Turab1, 1ISRA University, Jordan and 2Yarmouk University, Jordan |
| On Client`s Interactive Behaviour to Design Peer Selection Policies for Bittorrent-Like Protocols[Pdf] Marcus V. M. Rocha1 and Carlo Kleber da S. Rodrigues2,3, 1Minas Gerais State Assembly, Brazil, 2University Center of Brasilia, Brazil and 3Polytechnic School of Army, Ecuador |
| A General Stochastic Information Diffusion Model in Social Networks Based on Epidemic Diseases[Pdf] Hamidreza Sotoodeh1, Farshad Safaei2,3, Arghavan Sanei3 and Elahe Daei1, 1Qazvin Islamic Azad University, Iran, 2Institute for Research in Fundamental Sciences (IPM), Iran and 3Shahid Beheshti University G.C., Iran |
| Performance Analysis of Economic Model and Radio Resource Management in Heterogeneous Wireless Networks[Pdf] Nilkantha Chakraborty, Cognizant Technology Solution India Pvt. Ltd , India |
| Visualize Network Anomaly Detection by Using K-Means Clustering Algorithm[Pdf] A. M. Riad1, Ibrahim Elhenawy2, Ahmed Hassan1 and Nancy Awadallah1, 1Mansoura University, Egypt and 2Zagazig University, Egypt |
| Cloud Computing Challenges And Solutions[Pdf] Nidal M. Turab1, Anas Abu Taleb1 and Shadi R. Masadeh1,2, 1Isra University, Jordan and 2Al-Hussein Bin Talal University, Jordan |
July 2013, Volume 5. Number 4
| A New Programming Model to Simulate Wireless Sensor Networks : Finding The Best Routing Path[Pdf] Abrar Alajlan, Khaled Elleithy and Varun Pande, University of Bridgeport, USA |
| Node Failure Time and Coverage Loss Time Analysis for Maximum Stability Vs Minimum Distance Spanning Tree Based Data Gathering in Mobile Sensor Networks[Pdf] Natarajan Meghanathan1 and Philip D. Mumford2, 1Jackson State University, USA and 2Air Force Research Lab, USA |
| Designing Secure Clustering Protocol With The Approach Of Reducing Energy Consumption In Wireless Sensor Networks[Pdf] Sanaz Sadeghi1 and Behrouz Sadeghi2, 1Ferdowsi University of Mashhad, Iran and 2Payam noor University of Taybad, Iran |
| Improving IPV6 Addressing Types and Size[Pdf] Khaldoun Batiha, Philadelphia University, Jordan |
| Threats and Anti-threats Strategies for Social Networking Websites[Pdf] Omar Saeed Al Mushayt, Jazan University, Kingdom of Saudi Arabia |
| A Wavelength and Converter Assignment Scheme using Converter Usage History in Wavelength-Routed Networks[Pdf] Yukinobu Fukushima, Takahiro Ooishi and Tokumi Yokohira, Okayama University,Japan |
| Improved Quality of Service Protocol for Real Time Traffic in MANET[Pdf] Iftikhar Ahmad1, Humaira Jabeen2 and Faisal Riaz3, 1Mirpur University of Science and Technology, Pakistan, 2International Islamic University , Pakistan and 3Iqra University Islamabad Campus, Pakistan |
| Effects Of Filters on DVB-T Receiver Performance Under AWGN, RAYLEIGH and RICEAN Fading Channels [Pdf] AKM Arifuzzaman1, Mussab Saleh2, Mohammed Tarique2 and Rumana Islam1, 1American International University, Bangladesh and 2Ajman University of Science and Technology, United Arab Emirates |
| Performance and Rekeying Analysis of Multicast Security in LTE[Pdf] Mohsen M. Tantawy1, Adly S. Tag ELdien2 and Esraa Mosleh Eid2, 1National Telecommunication Institute Cairo, Egypt and 2Benha university, Egypt |
| Optimizing Voip Using A Cross Layer Call Admission Control Scheme[Pdf] Mumtaz AL-Mukhtar and Huda Abdulwahed, AL-Nahrain University, Iraq |
| An IDE for Android Mobile Phones with Extended Functionalities Using Best Developing Methodologies[Pdf] Sakila Banu Ali1, Saba V Kumar 2, 1Taif University, Saudi Arabia and 2Anna University,India |
| IDS in Telecommunication Network using PCA[Pdf] Mohamed Faisal Elrawy1, T. K. Abdelhamid2 and A. M. Mohamed2, 1MUST University, Egypt and 2Assuit University, Egypt |
| Honeypotlabsac: A Virtual Honeypot Framework for Android[Pdf] Vladimir B. Oliveira, Zair Abdelouahab, Denivaldo Lopes, Mario H. Santos and Valeria P. Fernandes, Federal University of Maranhao, Brazil |
| An Adaptive Pseudorandom STEGO-CRYPTO Technique for Data Communication[Pdf] Ajay Kumar Nain, Shailender Gupta, Bharat Bhushan and Rashmi Chawla, YMCA University of Science and Technology, India |
| An Efficient Ant Based QOS Aware Intelligent Temporally Ordered Routing Algorithm for MANETS[Pdf] Debajit Sensarma and Koushik Majumder, West Bengal University of Technology, India |
May 2013, Volume 5. Number 3
| Designing Run-Time Environments to Have Predefined Global Dynamics [Pdf] Massimo Monti, Pierre Imai, and Christian Tschudin, University of Basel, Switzerland. |
| Probability Density Functions of the Packet Length for Computer Networks with Bimodal Traffic[Pdf] Ewerton R. S. Castro1, Marcelo S. Alencar2 and Iguatemi E. Fonseca1, 1Federal Institute of Paraiba, Brazil and 2Federal University of Campina Grande, Brazil |
| Reducing the Peak to Average Power Ratio of MIMO-OFDM Systems[Pdf] Asim M. Mazin and Garth V. Crosby, Southern Illinois University Carbondale. |
| I Am 4 VHO: New Approach to Improve Seamless Vertical Handover in Heterogeneous Wireless Networks[Pdf] Omar Khattab and Omar Alani, University of Salford, UK. |
| The Extended Clustering AD HOC Routing Protocol (ECRP)[Pdf] Buthayna Al-Sharaa, Al Balqa Applied University, Jordan. |
| Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration [Pdf] Mohammad Z. M. Masoud, Huazhong University of Science and Technology, China. |
| Healthy Nutrition Under ASP-PROLOG[Pdf] Fernando Zacarias F, Rosalba Cuapa, Erick Madrid and Dionicio Zacarias, BUAP, Mexico. |
| Analysis of Hierarchical Scheduling for Heterogeneous Traffic Over Network[Pdf] Rabie Barhoun1, Abdelwahed Namir1 and Anas Barhoun2, 1University Hassan II, Morocco and 2Syracuse University, USA. |
| A Compact Dual Band Dielectric Resonator Antenna For Wireless Applications[Pdf] H. Raggad1, M. Latrach2, A. Gharsallah3 and T. Razban3, 1Radio-Frequency and Microwave Research Group, France, 2Unit of Research in High Frequency Electronic Circuits and Systems ,Tunisia and 3IETR, France. |
| A Secure Data Communication System Using Cryptogaphy And Steganography[Pdf] Saleh Saraireh,Philadelphia University, Jordan. |
| ETOR-Efficient Token based Opportunistic Routing[Pdf] A. Saichand and A. R. Naseer, JNTU Hyderabad, India. |
| Centrality-Based Network Coder Placement for Peer-To-Peer Content Distribution[Pdf] Dinh Nguyen and Hidenori Nakazato, Waseda University, Japan |
| LTE QOS Dynamic Resource Block Allocation with Power Source Limitation and Queue Stability Constraints[Pdf] Mohamed A. Abd El-Gawad1, Mohsen M. Tantawy1 and Mohamed El-Mahallawy2, 1National Telecommunication Institute, Egypt and 2Arab Academy for Science, Egypt. |
| A Framework for SOFTWARE-AS-A-SERVICE Selection and Provisioning[Pdf] Elarbi Badidi ,College of Information Technology, United Arab Emirates. |
| An Optimal Software Framework for Parallel Computation of CRC[Pdf] Hamed Sheidaeian and Behrouz Zolfaghari, Islamic Azad University, Iran |
March 2013, Volume 5. Number 2
| System Architecture of HatterHealthConnect: An Integration of Body Sensor Networks and Social Networks to Improve Health Awareness [Pdf] Hala ElAarag, David Bauschlicher and Steven Bauschlicher, Stetson University,USA |
| Cognitive Radio Engine Model Utilizing Soft Fusion Based Genetic Algorithm for Cooperative Spectrum Optimization [Pdf] Md. Kamal Hossain andAyman Abd El-Saleh, Multimedia University, Malaysia |
| Energy and Bandwidth Constrained QoS Enabled Routing for MANETs [Pdf] N.Sumathi1 and C.P.Sumathi2, 1S.N.R.Sons College, India and 2SDNB Vaishnav College for Women, India |
| New Metric for HWMP Protocol (NMH). [Pdf] Sidi Ould Cheikh, Malik Mubashir Hassan and Abdelhak Geuroui, University of Versailles, France |
| Replay Attack Prevention in Kerberos Authentication Protocol using Triple Password [Pdf] Gagan Dua1, Nitin Gautam2, Dharmendar Sharma3 and Ankit Arora4, 1National Institute of Technology, India, 2Raj Kumar Goel Institute of Technology, India, 3Satyug Darshan Technical Campus, India and 4RIMT-Institute of Engineering & Technology, India |
| Area Efficient Rapid Signal Acquisition scheme for High Doppler DSSS Signals [Pdf] D. Karunakar Reddy and T. Satya Savithri, JNTUH College of Engineering, India |
| An Energy Efficient Analysis of S-MAC And H-MAC Protocols for Wireless Sensor Networks [Pdf] P.T.Kalaivaani1 and A.Rajeswari2, 1MNM Jain Engineering College, India and 2Coimbatore Institute of Technology, India |
| A New Approach for Complex Encrypting and Decrypting Data [Pdf] Obaida Mohammad Awad Al-Hazaimeh, AL-Huson University College, Jordan |
| A Survey on Energy Efficiency for Wireless Mesh Network [Pdf] Sarra Mamechaoui1, Fedoua Didi1 and Guy Pujolle2, 1Abou Bekr Belkaid University ,Algeria and 2Pierre et Marie Curie University, France |
| A Pair-Wise Key Establishment Scheme for AD HOC Networks [Pdf] Isra Sitan Al-Qasrawi and Obaida Mohammed Al-Hazaimeh, AL-Huson University College, Jordan |
| Performance study of IEEE 802.16d under Stanford University Interim (SUI)Channel [Pdf] Abdul HashibSiddique1, A K M Arifuzzman2 and Mohammed Tarique3, 1The Petroleum Institute, UAE, 2American International University, Bangladesh and 3Ajman University of Science and Technology, UAE |
| Architectural Evaluation of Algorithms RSA, ECC and MQQ in Arm Processors [Pdf] Gustavo da Silva Quirino1 and Edward David Moreno2, 1IFBA, Brasil and 2UFS, Brasil |
| Performance Evaluation of Distributed Synchronous Greedy Graph Coloring Algorithms on Wireless Ad Hoc and Sensor Networks [Pdf] Esra Ruzgar1 and Orhan Dagdeviren2, 1Izmir University, Izmir, Turkey and 2Ege University, Izmir, Turkey |
| Simulation of Cognitive Radio System Applying Different Wireless Channel Models [Pdf] Mohamed Shalaby1, Mona Shokair2 and Yaser S. E. Abdo1, 1National Institute for Standards, Egypt and 2Menoufia University, Egypt |
| Fine-tuning of k in a K-fold Multicast Network with Finite Queue using Markovian Model [Pdf] Md. Mahmudul Hasan, Daffodil International University, Bangladesh |
January 2013, Volume 5. Number 1
| Finite Horizon Adaptive Optimal Distributed Power Allocation for Enhanced Cognitive Radio Network in the Presence of Channel Uncertainties[Pdf] Hao Xu and S. Jagannathan, Missouri University of Science and Technology, USA |
| Further Results on the Dirac Delta Approximation and the Moment Generating Function Techniques for Error Probability Analysis in Fading Channels[Pdf] Annamalai Annamalai, Eyidayo Adebola and Oluwatobi Olabiyi, Prairie View A&M University, USA |
| Improving Quality of Service and Reducing Power Consumption with WAN accelerator in Cloud Computing Environments[Pdf] Shin-ichi Kuribayashi, Seikei University, Japan |
| A Malicious Users Detecting Model Based on Feedback Correlations[Pdf] Yong WANG, Yang BAI, Jie Hou and Yuan-wei TAN, University of Electronic and Science Technology of China, China |
| A New Improved Storage Model of Wireless Devices using the Cloud[Pdf] Zyad Nossire1 and Khaled Elleithy1 and Boraq Ammourah2, 1University of Bridgeport, USA and 2Najran University, Kingdom of Saudi Arabia |
| Investigate the Performance Evaluation of IPTV Over WiMAX Networks[Pdf] Jamil M. Hamodi and Ravindra C. Thool, Shri Guru Gobind Singhji Institute of Engineering and Technology (SGGS), India |
| A Novel Two-Stage Algorithm Protecting Internal Attack from WSNs[Pdf] Muhammad Ahmed1, Xu Huang1 and Hongyan Cui2, 1University of Canberra, Australia and 2Beijing University of Posts and Telecommunications, China |
| The Affects of Different Queuing Algorithms within the Router on QoS VoIP application Using OPNET[Pdf] Hussein A. Mohammed1, Adnan Hussein Ali2, Hawraa Jassim Mohammed1, 1Iraqi Commission for Computers and Informatics, Iraq and 2Electrical & Electronics Techniques College - Baghdad, Iraq |
| Effect of Duty Cycle on Energy Consumption in Wireless Sensor Networks[Pdf] Jyoti Saraswat and Partha Pratim Bhattacharya, Mody Institute of Technology & Science (Deemed University), India |
| Predicting Communication Delay and Energy Consumption for IEEE 802.15.4/Zigbee Wireless Sensor Networks[Pdf] Sofiane Ouni1 and Zayneb Trabelsi Ayoub2, 1National Institute of Applied Sciences and Technology (INSAT), Tunisia and 2University of Manouba, Tunisia |
| Autoconfiguration Algorithm for a Multiple Interfaces Adhoc Network Running OLSR Routing Protocol[Pdf] Saadi Boudjit, University of Paris13, France |
| A User Profile Based Access Control Model and Architecture[Pdf] Meriem Zerkouk1, Abdallah Mhamed2 and Belhadri Messabih1, 1University of Sciences and Technology Oran, Algeria and 2Institut Mines-Telecom / Telecom SudParis, France |

