Issue | Title | |
Vol 5, No 7 (2015) | Sector Routing Protocol (SRP) in Ad-hoc Networks | Abstract PDF |
First M. Rajesh, J.M Gnanasekar | ||
Vol 5, No 1 (2015) | Secure Leader Election for Intrusion Detection in MANET | Abstract PDF |
G Murali | ||
Vol 1, No 1 (2011) | Signaling For Multimedia Conferencing in Stand-Alone Mobile Ad Hoc Networks | Abstract PDF |
Sudhakar Krishnan, Rubini Pandu | ||
Vol 5, No 8 (2015) | Simulation of an Optimized Data Packet Transmission in a Congested Network | Abstract PDF |
Promise T. Akiene, Ledisi G. Kabari | ||
Vol 12 (2021) | Single Sink Repositioning Technique in Wireless Sensor Networks for Increasing Throughput and Decreasing Delay | Abstract PDF |
Asrat Sime Bedada | ||
Vol 2, No 4 (2012) | Soft Computing and Artificial Intelligence Techniques for Intrusion Detection System | Abstract PDF |
V. Bapuji, R. Naveen Kumar, A. Govardhan, S.S.V.N. Sarma | ||
Vol 1, No 2 (2011) | Soft Handover scheme for WSN nodes using media independent handover functions | Abstract PDF |
Jagadeesha. RB | ||
Vol 13 (2022) | Software Market in Nigeria: A Case Study of Its Buying Behaviour Heterogeneity | Abstract PDF |
Akomolafe, A. A., Oloyede A.O., Awogbemi C.A., Oladimeji A.O., Oyegoke O.A. | ||
Vol 4, No 5 (2014) | Some Fixed point Theorems in Generalization Metric space | Abstract PDF |
Sarika Jain, Rashmi Tiwari, Ramakant Bhardwaj | ||
Vol 8 (2018) | Speech Enhancement Based Compression Method | Abstract PDF |
Zinah S. Abduljabbar, Noor Khaled | ||
Vol 6, No 3 (2016) | Speech Steganography System Using Lifting Wavelet Transform | Abstract PDF |
Ahlam majead Kadum, Saad Najim Al-Saad | ||
Vol 1, No 1 (2011) | Study of Load Balanced Routing Protocols in Mobile Ad hoc Networks | Abstract PDF |
Uma Nagaraj, Shwetal Patil | ||
Vol 4, No 4 (2014) | Study of MAC Protocols for Mobile Wireless Body Sensor Networks | Abstract PDF |
Maryam El azhari, Ahmed Toumanari, Rachid Latif | ||
Vol 2, No 4 (2012) | Sub-Terahertz Low Power UWB Communication Link for WPAN | Abstract PDF |
Tiodor. Narytnik, Aladdin Amro, Michael Ilchenko, Valeri Kalinin, Osama Turabi | ||
Vol 5, No 4 (2015) | Survey on Quality Analysis of Collaboration Motivation Approach in Wireless Ad Hoc Networks | Abstract PDF |
M. Rajesh, J.M Gnanasekar | ||
Vol 3, No 7 (2013) | Synthesis and Performance Analysis of Network Topology using Graph Theory | Abstract PDF |
U N Bassey, K N Bassey, E N Bassey | ||
Vol 6, No 3 (2016) | Taraba State University Campus LAN | Abstract PDF |
B. Y. Baha, D. A. Andembubtob, A. K. Dodo | ||
Vol 3, No 3 (2013) | The Continuous Linked Structure Flooding in MANET | Abstract PDF |
Shailendra Singh, Vandana V. Thakare, Rajkumar Thenua, Sachin Saurabh, Prakash Chandra | ||
Vol 11 (2020) | The Effect of Feature Reduction in Click Fraud Detection: Review | Abstract PDF |
Hazar Wanous | ||
Vol 4, No 1 (2014) | The Impact of Radio Frequency Identification Detection in Cellular Networks | Abstract PDF |
Chigozirim Ajaegbu, Oreoluwa Adesegun, Adekunle Y.A. | ||
Vol 4, No 4 (2014) | The Impact of Expert Systems on AIS - Characteristics and Productivity Work Life Cycle: A Study Targeting Jordan Large Market Organizations | Abstract PDF |
Muhannad Akram Ahmad, Farah Hanna Zawaideh | ||
Vol 6, No 2 (2016) | The Internet, as an “Electronic Slavery” | Abstract PDF |
Igbinosa O. Godwin, Onyemaobi B. Chibuzo | ||
Vol 13 (2022) | The Role of Competitive Advantage on Value Creation: A Study of Mobile Telecommunication Network Operations in Rivers State, Nigeria | Abstract PDF |
Lawrence I. Nwaeke, Bagshaw, Karibo Benaiah | ||
Vol 5, No 5 (2015) | The Use of ICT Tools in Tackling Insecurity and Terrorism Problem in Nigeria | Abstract PDF |
A.I. Oludare, O.E. Omolara, A.M. Umar, D.V. Kemi | ||
Vol 4, No 7 (2014) | Threshold grouping method to derive complex networks from time series | Abstract PDF |
Meenatchidevi Murugesan, R. I. Sujith | ||
176 - 200 of 211 Items | << < 3 4 5 6 7 8 9 > >> |
Paper submission email: NCS@iiste.org
ISSN (Paper)2224-610X ISSN (Online)2225-0603
Please add our address "contact@iiste.org" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright © www.iiste.org