Issue | Title | |
Vol 3, No 8 (2013) | Remote Surveillance System for Mobile Application | Abstract PDF |
Sonali M. Diware, Shweta A. Iskande | ||
Vol 5, No 5 (2015) | Review of Computer Network Security System | Abstract PDF |
Ajala Funmilola, Akanbi Oluwafemi | ||
Vol 4, No 5 (2014) | Route Selection Based on Impairments Computation in All-Optical CDMA-WDM Networks | Abstract PDF |
Ahmed Musa | ||
Vol 2, No 1 (2012) | Sans Signature Buffer Overflow Blocker | Abstract PDF |
G. Prisilla Jayanthi, Ambika Prasad Mohanty | ||
Vol 5, No 7 (2015) | Sector Routing Protocol (SRP) in Ad-hoc Networks | Abstract PDF |
First M. Rajesh, J.M Gnanasekar | ||
Vol 5, No 1 (2015) | Secure Leader Election for Intrusion Detection in MANET | Abstract PDF |
G Murali | ||
Vol 1, No 1 (2011) | Signaling For Multimedia Conferencing in Stand-Alone Mobile Ad Hoc Networks | Abstract PDF |
Sudhakar Krishnan, Rubini Pandu | ||
Vol 5, No 8 (2015) | Simulation of an Optimized Data Packet Transmission in a Congested Network | Abstract PDF |
Promise T. Akiene, Ledisi G. Kabari | ||
Vol 12 (2021) | Single Sink Repositioning Technique in Wireless Sensor Networks for Increasing Throughput and Decreasing Delay | Abstract PDF |
Asrat Sime Bedada | ||
Vol 2, No 4 (2012) | Soft Computing and Artificial Intelligence Techniques for Intrusion Detection System | Abstract PDF |
V. Bapuji, R. Naveen Kumar, A. Govardhan, S.S.V.N. Sarma | ||
Vol 1, No 2 (2011) | Soft Handover scheme for WSN nodes using media independent handover functions | Abstract PDF |
Jagadeesha. RB | ||
Vol 13 (2022) | Software Market in Nigeria: A Case Study of Its Buying Behaviour Heterogeneity | Abstract PDF |
Akomolafe, A. A., Oloyede A.O., Awogbemi C.A., Oladimeji A.O., Oyegoke O.A. | ||
Vol 4, No 5 (2014) | Some Fixed point Theorems in Generalization Metric space | Abstract PDF |
Sarika Jain, Rashmi Tiwari, Ramakant Bhardwaj | ||
Vol 8 (2018) | Speech Enhancement Based Compression Method | Abstract PDF |
Zinah S. Abduljabbar, Noor Khaled | ||
Vol 6, No 3 (2016) | Speech Steganography System Using Lifting Wavelet Transform | Abstract PDF |
Ahlam majead Kadum, Saad Najim Al-Saad | ||
Vol 1, No 1 (2011) | Study of Load Balanced Routing Protocols in Mobile Ad hoc Networks | Abstract PDF |
Uma Nagaraj, Shwetal Patil | ||
Vol 4, No 4 (2014) | Study of MAC Protocols for Mobile Wireless Body Sensor Networks | Abstract PDF |
Maryam El azhari, Ahmed Toumanari, Rachid Latif | ||
Vol 2, No 4 (2012) | Sub-Terahertz Low Power UWB Communication Link for WPAN | Abstract PDF |
Tiodor. Narytnik, Aladdin Amro, Michael Ilchenko, Valeri Kalinin, Osama Turabi | ||
Vol 5, No 4 (2015) | Survey on Quality Analysis of Collaboration Motivation Approach in Wireless Ad Hoc Networks | Abstract PDF |
M. Rajesh, J.M Gnanasekar | ||
Vol 3, No 7 (2013) | Synthesis and Performance Analysis of Network Topology using Graph Theory | Abstract PDF |
U N Bassey, K N Bassey, E N Bassey | ||
Vol 6, No 3 (2016) | Taraba State University Campus LAN | Abstract PDF |
B. Y. Baha, D. A. Andembubtob, A. K. Dodo | ||
Vol 3, No 3 (2013) | The Continuous Linked Structure Flooding in MANET | Abstract PDF |
Shailendra Singh, Vandana V. Thakare, Rajkumar Thenua, Sachin Saurabh, Prakash Chandra | ||
Vol 11 (2020) | The Effect of Feature Reduction in Click Fraud Detection: Review | Abstract PDF |
Hazar Wanous | ||
Vol 4, No 1 (2014) | The Impact of Radio Frequency Identification Detection in Cellular Networks | Abstract PDF |
Chigozirim Ajaegbu, Oreoluwa Adesegun, Adekunle Y.A. | ||
Vol 4, No 4 (2014) | The Impact of Expert Systems on AIS - Characteristics and Productivity Work Life Cycle: A Study Targeting Jordan Large Market Organizations | Abstract PDF |
Muhannad Akram Ahmad, Farah Hanna Zawaideh | ||
176 - 200 of 215 Items | << < 3 4 5 6 7 8 9 > >> |
Paper submission email: NCS@iiste.org
ISSN (Paper)2224-610X ISSN (Online)2225-0603
Please add our address "contact@iiste.org" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright © www.iiste.org