|
Issue |
Title |
|
Vol 4, No 1 (2014): International Journal of Computer Communications and Networks (IJCCN) |
A Comprehensive Comparison of Attacks in Wireless Sensor Networks |
Abstract
PDF
|
hossein jadidoleslamy |
|
Vol 3, No 3 (2013): Special Edition: Information Technology and Bussiness Application |
Adaptive Cluster Head probability for LEACH protocol |
Abstract
PDF
|
BONTHU BRAHMA REDDY, k Kishan Rao |
|
Vol 4, No 3 (2014): International Journal of Computer Communications and Networks (IJCCN) |
An Introduction to Undetectable Keyloggers with Experimental Testing |
Abstract
PDF
|
mehdi dadkhah, Mohammad Davarpanah Jazi, Ana-Maria Ciobotaru, Elaheh Barati |
|
Vol 4, No 1 (2014): International Journal of Computer Communications and Networks (IJCCN) |
BINARY CAM WITH CSC TO REINSTATE ATM SWITCH IN ASYNCHRONUS TRANSFER MODE |
Abstract
PDF
|
Uthaya Thangara |
|
Vol 3, No 3 (2013): Special Edition: Information Technology and Bussiness Application |
Cloud Computing and its Leveling Impact between Developed and Emerging Economies |
Abstract
PDF
|
Easwar Krishna Iyer |
|
Vol 3, No 1 (2012): International Journal of Computer Communications and Networks |
Comparative Performance Analysis of AODV, DSR,DYMO,OLSR and ZRP Routing Protocols in MANET Using Varying Pause Time |
Abstract
PDF
|
Jogendra Kumar |
|
Vol 4, No 1 (2014): International Journal of Computer Communications and Networks (IJCCN) |
DESIGN AND DEVELOPMENT OF REAL TIME TRACKING OF HUMAN FACES SECURITY IDENTIFICATION SYSTEM |
Abstract
PDF
|
V.K.Narendira kumar, B. Srinivasan |
|
Vol 4, No 1 (2014): International Journal of Computer Communications and Networks (IJCCN) |
Distributed Adaptive Sleep Scheduling Algorithm for Enhancing Energy Efficiency in Wireless Sensor Networks based on L-PEDAP Protocol |
Abstract
PDF
|
Anand Nayyar |
|
Vol 3, No 2 (2013): International Journal of Computer Communications and Networks (IJCCN) |
EA and ACO Algorithms Applied to Optimizing Location of Controllers in Wireless Networks |
Abstract
PDF
|
Dac-Nhuong Le |
|
Vol 4, No 2 (2014): International Journal of Computer Communications and Networks (IJCCN) |
EMPLOYEE PERFORMANCE EVALUATION USING MACHINE LEARNING ALGORITHM |
Abstract
PDF
|
Magesh Waran N |
|
Vol 3, No 1 (2012): International Journal of Computer Communications and Networks |
FCA - An Approach On LEACH Protocol Of Wireless Sensor Networks Using Fuzzy Logic |
Abstract
PDF
PDF
|
Vaibhav Godbole |
|
Vol 4, No 2 (2014): International Journal of Computer Communications and Networks (IJCCN) |
FRAMEWORK FOR INTELLIGENT NETWORK DESIGN |
Abstract
PDF
|
Karthik Balasubramanian |
|
Vol 3, No 3 (2013): Special Edition: Information Technology and Bussiness Application |
HCERHSW: A Hierarchical, Clustering-based and Energy-aware Routing Algorithm for Homogenous and Static Wireless Sensor Networks |
Abstract
PDF
|
hossein jadidoleslamy |
|
Vol 3, No 3 (2013): Special Edition: Information Technology and Bussiness Application |
ICT Innovation Strategy in Malaysia Public Research Institutes and Government Agencies |
Abstract
PDF
|
Ishak Irny Suzila, Alias Rose Alinda, Ishak Izwan Suhadak, Suradi Zurinah |
|
Vol 4, No 1 (2014): International Journal of Computer Communications and Networks (IJCCN) |
IMAGE PROCESSING AND FACE DETECTION SYSTEM WITH FACE RECOGNITION BASED FACE ALGORITHM EIGENVECTORS PRINCIPAL COMPONENT ANALYSIS (PCA) |
Abstract
PDF
|
Dwi Hartanto |
|
Vol 3, No 3 (2013): Special Edition: Information Technology and Bussiness Application |
Information Security: Human Resources Management and Information Security Incident Management |
Abstract
PDF
|
Nik Nordiana N Ab Rahman |
|
Vol 3, No 2 (2013): International Journal of Computer Communications and Networks (IJCCN) |
Introduction and Security Analysis to Digital Video Broadcasting - Handheld |
Abstract
PDF
|
Leyla Roohi, Noorfadzilla Abd Yusuf |
|
Vol 4, No 1 (2014): International Journal of Computer Communications and Networks (IJCCN) |
LTE system performance enhanced through interference reduction techniques |
Abstract
PDF
|
M. Sugacini |
|
Vol 2, No 1 (2012): International Journal of Computer Communications and Networks (IJCCN) |
Mobile Wireles Sensor Networks Overview |
Abstract
PDF
|
Javad Rezazadeh |
|
Vol 1, No 1 (2011): International Journal of Computer Communications and Networks (IJCCN) |
New Hybrid RSS-based Localization Mechanism For Underwater Wireless Sensor Networks |
Abstract
PDF
|
Majid Hosseini |
|
Vol 3, No 1 (2012): International Journal of Computer Communications and Networks |
Newsroom Security: A survey paper |
Abstract
PDF
|
Rezza Moieni, Ikuesan R. Adeyemi |
|
Vol 3, No 2 (2013): International Journal of Computer Communications and Networks (IJCCN) |
Online Secure Electronic Passport Scheme using Cryptographic Authentication Protocols and Biometrics Technology |
Abstract
PDF
|
V.K.Narendira Kumar, B. Srinivasn |
|
Vol 1, No 1 (2011): International Journal of Computer Communications and Networks (IJCCN) |
Optimization of Wireless Sensor Network Coverage based on Evolutionary Algorithm |
Abstract
PDF
|
mohammadjavad Abbasi |
|
Vol 4, No 1 (2014): International Journal of Computer Communications and Networks (IJCCN) |
Privacy-preserving Data Mining for Personalized Marketing |
Abstract
PDF
|
Yong Jick Lee |
|
Vol 3, No 1 (2012): International Journal of Computer Communications and Networks |
Receipt-Free Electronic Voting Scheme with Smart Card Using Blind Signature |
Abstract
PDF
|
V.K.Narendira Kumar, B. Srinivasan |
|
1 - 25 of 33 Items |
1 2 > >> |