• Home
  • Login
  • Register

HOME / ENGINEERING AND TECHNOLOGY / INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND INFORMATION SECURITY (IJCNIS) / Volume 10 / ISSUE NO 2

INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND INFORMATION SECURITY (IJCNIS)

Ferry–Based Directional Forwarding Mechanism for Improved Network Life-Time in Cluster-Based Wireless Sensor Network

Author(s): Ali Eyadeh, Mohammad Bani Amerah

Keyword(s): WSN, mobile nodes (ferries), Network lifetime, energy saving, data latency

Abstract | Download PDF | Website Link

Dynamic Network State Learning Model for Mobility Based WMSN Routing Protocol

Author(s): A.Ajina , Mydhili K.Nair

Keyword(s): Mobility, Wireless Multimedia Sensor Network, Network state learning, Dynamic power management, Q-learning, Markov decision process

Abstract | Download PDF | Website Link

A New Multi-threaded and Interleaving Approach to Enhance String Matching for Intrusion Detection Systems

Author(s): Ali Shatnawi, Bushra AlHajou, Moath Jarrah

Keyword(s): network intrusion detection systems, string matching, pattern matching, Aho-Corasick, GPUs/CUDA

Abstract | Download PDF | Website Link

Performance Analysis of User Speed Impact on IEEE 802.11ah Standard affected by Doppler Effect

Author(s): Abdul Aziz Marwan, Doan Perdana, Danu Dwi Sanjoyo

Keyword(s): Restricted Access Window (RAW), IEEE 802.11ah, Random Waypoint, Modulation and Coding Scheme (MCS), Network Simulator 3

Abstract | Download PDF | Website Link

Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System

Author(s): Bisyron Wahyudi, Kalamullah Ramli, Hendri Murfi

Keyword(s): intrusion detection system, preprocessing, feature selection, model selection

Abstract | Download PDF | Website Link

PERFORMANCE ANALYSIS IN WIRELESS POWERED D2D- AIDED NON-ORTHOGONAL MULTIPLE ACCESS NETWORKS

Author(s): Dinh-Thuan Do

Keyword(s): D2D, energy harvesting, throughput, outage

Abstract | Download PDF | Website Link

PMSS: Producer Mobility Support Scheme Optimization with RWP Mobility Model in Named Data Networking

Author(s): M. Hussaini, S. A. Nor, A. Ahmad

Keyword(s): Network analytical model, random waypoint model, handoff latency, Named data networking, Producer mobility support, Signaling cost

Abstract | Download PDF | Website Link

Assisted Navigation Algorithm for Wireless Sensor Actuator and Robot Networks

Author(s): Franco Frattolillo

Keyword(s): Wireless Sensor Networks, wireless sensor actuator and robot networks, assisted navigation, energy consumption

Abstract | Download PDF | Website Link

OpenDaylight vs. Floodlight: Comparative Analysis of a Load Balancing Algorithm for Software Defined Networking

Author(s): Jonier Porras Duque, Daniel Ducuara Beltrán, Gustavo Puerto Leguizamón

Keyword(s): Software Defined Networking, Load Balancing, Floodlight, OpenDaylight, MININET

Abstract | Download PDF | Website Link

Statistical-Based Heuristic for Scheduling of Independent Tasks in Cloud Computing

Author(s): Ahmad Al-Qerem, Ala Hamarsheh

Keyword(s): Cloud Computing, Batch mode Heuristic, Scheduling Tasks, Makespan, Resource Utilization

Abstract | Download PDF | Website Link

Fuzzy Logic based Intrusion Detection System against Black Hole Attack in Mobile Ad Hoc Networks

Author(s): Houda Moudni, Mohamed Er-rouidi, Hicham Mouncif, Benachir El Hadadi

Keyword(s): Mobile Ad Hoc Networks, intrusion detection system, Black Hole Attack, ANFIS, PSO

Abstract | Download PDF | Website Link

A New Approach in Expanding the Hash Size of MD5

Author(s): Esmael V. Maliberan, Ariel M. Sison, Ruji P. Medina

Keyword(s): MD5 algorithm, hashing, client-server communication, modified MD5, hacking, bruteforce, rainbow table

Abstract | Download PDF | Website Link

Bandwidth Allocation Mechanism based on Users' Web Usage Patterns for Campus Networks

Author(s): Rolysent K. Paredes, Ariel M. Sison, Ruji P. Medina

Keyword(s): Bandwidth Allocation, Web Usage Patterns, Neural Network for LDA/GSVD, Linear Discriminant Analysis

Abstract | Download PDF | Website Link

Attacking AES-Masking Encryption Device with Correlation Power Analysis

Author(s): Septafiansyah Dwi Putra, Adang Suwandi Ahmad, Sarwono Sutikno, Yusuf Kurniawan

Keyword(s): AES, CPA, SCA, Attack

Abstract | Download PDF | Website Link

Implementing Enhanced MIMO with F-OFDM to Increase System Efficiency for Future 5G Cellular Networks

Author(s): Syed Shoaib Ullah Shah, Majid Ashraf, Ruhul Amin Khalil, Tariqullah Jan, M. Inayatullah Babar

Keyword(s): 5G, OFDM, F-OFDM, MIMO, Digital Modulation

Abstract | Download PDF | Website Link

Delay aware optimal resource allocation in MU MIMO-OFDM using enhanced spider monkey optimization

Author(s): Voruganti Hindumathi, Katta Rama Linga Reddy

Keyword(s): Scheduling, Resource allocation, CSI, optimization algorithm

Abstract | Download PDF | Website Link

Resource Allocation using Genetic Algorithm in Multimedia Wireless Networks

Author(s): Yaser Khamayseh, Rabiah Al-qudah

Keyword(s): Resource allocation, Wireless Networks, Multimedia, Genetic algorithm

Abstract | Download PDF | Website Link

Using Quaternion Fourier Transform in Steganography Systems

Author(s): M.I.Khalil

Keyword(s): Quaternions, Steganography, Fourier Transform, Cryptography

Abstract | Download PDF | Website Link

Reliability and Failure Functions of the Consecutive k-out-of-m-from-n: F Linear and Circular System

Author(s): Imad I. H. Nashwan

Keyword(s): Consecutive k-out-of-n: F system, Consecutive k-outof-m-from-n: F system, Modular arithmetic, Equivalent relation

Abstract | Download PDF | Website Link

A Multilevel Scheduling MAC Protocol for Underwater Acoustic Sensor Networks (UASN)

Author(s): Sri Lekha Sampath, S. Subashini

Keyword(s): Underwater Acoustic Sensor Networks (UASN), Wireless Sensor Network (WSN), Cluster Algorithm, Round Robin Scheduling, First Come First served (FCFS), Medium Access Control (MAC)

Abstract | Download PDF | Website Link

Internet Voting Protocols: An Analysis of the Cryptographic Operations per Phase

Author(s): Cristina Satizábal, Rafael Páez

Keyword(s): Cryptographic operations, e-voting systems, Internet voting protocols, protocol phases, Security

Abstract | Download PDF | Website Link

A CASE STUDY OF VARIOUS WIRELESS NETWORK SIMULATION TOOLS

Author(s): V. Venkataramanan, S. Lakshmi

Keyword(s): Network Simulator, Graphical User Interface, System Generator, Hardware Co simulation, Field Programmable Gate Array, Long Term Evolution

Abstract | Download PDF | Website Link

cat

x

Top 10 Authors of the Journal

  • Abdessamad El Rharras
  • Mohammed Saber
  • Rachid Saadane
  • Hatim Kharraz Aroussi
  • Mohammed Wahbi
  • Sâad Khoudali
  • Karim Benzidane
  • Said Jai Andaloussi
  • Abderrahim Sekkaki
  • Leila Fetjah

About PRDB.pk

Pakistan Research Database helps individuals, professionals and institutions to access all research published in Pakistan at one platform.

  • Blog
  • CareerGuidance
  • eAdmissions
  • About Us
  • Work for PRDB
  • Contact Us
  • Privacy Policy
  • Copyright Policy
  • End User Terms