Journal:Journal of Information Communication Technologies and Robotic Applications (JICTRA), 2017, Volume 8, Issue No 2
Author(s): Rajesh Kumar, Hameedullah Kazi
Keyword(s): Bloom's taxonomy, Cognitive Domain, IICT students, assessment
Journal:Journal of Independent Studies and Research (JISR), 2015, Volume 13, Issue No 1
Author(s): Vikram Kumar Kirpalani, Muhammad Ejaz Tayab
Keyword(s): Enhancing, Data, Quality, Human Computation, Crowd Sourcing
Journal:Journal of Independent Studies and Research (JISR), 2016, Volume 14, Issue No 1
Author(s): Abdul Razaque, Ahmed Haroon, Manoj Kumar, Gullapalli Amulya, Tariq Rahim Soomro
Journal:International Journal of Communication Networks and Information Security (IJCNIS), 2015, Volume 7, Issue No 3
Author(s): Mohammad Irfanul Hasan, Sanjay Kumar
Journal:International Journal of Communication Networks and Information Security (IJCNIS), 2017, Volume 9, Issue No 1
Author(s): Ramesh Kumar, Ayaz Hussain, Abdul Aziz, Inwhee Joe
Journal:International Journal of Communication Networks and Information Security (IJCNIS), 2017, Volume 9, Issue No 1
Author(s): G Vijaya Kumar, C Shoba Bindu
Keyword(s): Wireless Mesh Networks, AP selection, User association
Journal:International Journal of Communication Networks and Information Security (IJCNIS), 2017, Volume 9, Issue No 2
Author(s): Yichiet Aun, Selvakumar Manickam, Shankar Karuppayah
Journal:International Journal of Communication Networks and Information Security (IJCNIS), 2017, Volume 9, Issue No 2
Author(s): Anant Ram, Manas Kumar Mishra
Keyword(s): Clustering, VANETs, Cluster Head, Cluster Member, Relative velocity
Journal:International Journal of Communication Networks and Information Security (IJCNIS), 2017, Volume 9, Issue No 3
Keyword(s): Wireless Mesh Networks, Routing protocol, traffic, Congestion, delay bound
Journal:International Journal of Communication Networks and Information Security (IJCNIS), 2017, Volume 9, Issue No 3
Author(s): Jhum Swain, Binod Kumar Pattanayak, Bibudhendu Pati
Keyword(s): MANET, AODV, QoS, MAC Layer, Network layer, DDoS Attack Mitigation, Redundancy, Protection Node