Issue | Title | |
Vol 3, No 1 (2013) | Cloud Security Issue and Challenges | Abstract PDF |
Ankush Narkhede | ||
Vol 2, No 4 (2012) | COMMON FIXED POINT OF WEAKLY COMPATIBLE MAPPINGS UNDER A NEW PROPERTY IN FUZZY METRIC SPACES | Abstract PDF |
Rajinder Sharma | ||
Vol 3, No 6 (2013) | Common fixed theorems for weakly compatible mappings via an implicit relation using the common (E.A) property in intuitionistic fuzzy metric spaces | Abstract PDF |
Kamal Wadhwa, Ramakant Bhardwaj, Jyoti Panthi | ||
Vol 3, No 6 (2013) | Common Fixed Point Theorems of Integral Type in Menger Pm Spaces | Abstract PDF |
Kamal Wadhwa, Ramakant Bhardwaj, Jyoti Panthi | ||
Vol 3, No 8 (2013) | Common Fixed Point Theorem for Two Mapping in Fuzzy Metric Space | Abstract PDF |
Rajesh Shrivastava, Jagrati Singhal | ||
Vol 4, No 5 (2014) | Common Fixed Point Theorems for Six Mappings in Fuzzy Metric Space | Abstract PDF |
KAMAL WADHWA, ASHLEKHA DUBEY | ||
Vol 6, No 2 (2016) | Comparative and Evaluation of Explicit Rate Flow Control in ATM Networks | Abstract PDF |
P. Rajan | ||
Vol 2, No 4 (2012) | Comparison of Different Neural Networks for Iris Recognition: A Review | Abstract PDF |
Shivani Godara, Rajeev Gupta | ||
Vol 7, No 1 (2017) | Complexity Theory: A New Way to Look at New Public Management | Abstract PDF |
Yousif El-Ghalayini | ||
Vol 3, No 10 (2013) | Computational Numerical Solution for Traveling Salesman Problem | Abstract PDF |
D. G. Iyanda, L.A. Ogundele, Ojo, O.S., Olatunji, O, | ||
Vol 3, No 1 (2013) | Concurrency Lock Issues in Relational Cloud Computing | Abstract PDF |
Shri V D Garde, Aarthi Mudaliar | ||
Vol 5, No 9 (2015) | Congestion Control in Mobile Ad Hoc Network using modified acknowledgement with secure channel | Abstract PDF |
Khushboo Sharma Anurag Jain | ||
Vol 3, No 1 (2013) | Cross-layer Based MANET Performance Optimization for Different Traffic and Mobility Scenario | Abstract PDF |
Pankaj Kumar, Ajeet Kumar, Ashwini Singh | ||
Vol 3, No 8 (2013) | Cross-layer Optimization Resource Allocation in Wireless Networks | Abstract PDF |
Oshin Babasanjo | ||
Vol 6, No 4 (2016) | Data and Telecommunication Problems in Sub-Saharan Africa | Abstract PDF |
Harrison Adjei Quaye, Welborn Amoako Marful | ||
Vol 11 (2020) | Data Encryption and Decryption by Using Hill Cipher Algorithm | Abstract PDF |
Mebratu Fana Bedasa | ||
Vol 6, No 1 (2016) | Data Safety Contact Control Model of Cloud Computing | Abstract PDF |
Muhammad Tariq | ||
Vol 2, No 2 (2012) | Data Security Using Stegnography and Quantum Cryptography | Abstract PDF |
Mohit Kumar, Abhishek Gupta, Kinjal Shah, Atul Saurabh, Pravesh Saxena, Vikas Kumar Tiwari | ||
Vol 4, No 2 (2014) | Dataflow-Oriented Provenance System for Multifusion Wireless Sensor Networks | Abstract PDF |
Gulustan Dogan, Ted Brown | ||
Vol 1, No 1 (2011) | Design and Implementation of Distributed Space-Frequency to Achieve Cooperative Diversity in Wireless Relay Networks | Abstract PDF |
K.S. Srikanth | ||
Vol 4, No 5 (2014) | Design and Development of HiperLAN/2 WLANs Based Multiwavelet Signals using Adaptive Antennas Algorithm | Abstract PDF |
Mohammed Aboud Kadhim, Hamood Shehab Hamid, Alhamzah Taher Mohammed | ||
Vol 4, No 8 (2014) | DESIGN AND IMPLEMENTATION OF A DIRECTIONAL OBJECT SENSING AND RANGING SYSTEM | Abstract PDF |
Adamu Murtala Zungeru, Idris Mahmood, Anthony Chukwunonso Mmonyi, Gbenga Daniel Obikoya | ||
Vol 5, No 8 (2015) | Design a New Tomlinson-Harashima Non-Linear Pre-Coding Technique for MIMO WiMAX-OFDM Based on Wavelet Signals in Transmit-Antenna | Abstract PDF |
Mohammed Aboud Kadhim | ||
Vol 8 (2018) | Design and Simulation of the Internet of Things for Accra Smart City | Abstract PDF |
Anthony Bawa, Maxwell Lewis Selby | ||
Vol 3, No 8 (2013) | Design of a New Block Cipher Algorithm | Abstract PDF |
Obaida Mohammad Awad Al-Hazaimeh | ||
51 - 75 of 211 Items | << < 1 2 3 4 5 6 7 8 9 > >> |
Paper submission email: NCS@iiste.org
ISSN (Paper)2224-610X ISSN (Online)2225-0603
Please add our address "contact@iiste.org" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright © www.iiste.org