IJCNCJournal
40
Followers
Personal Information
Beruf
Network Protocols & Wireless Networks
Branche
Technology / Software / Internet
Webseite
airccse.org/journal/ijcnc.html
Info
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications.The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas
Tags
wireless sensor networks
routing
wireless sensor network
internet of things
security
cloud computing
clustering
manet
computer network
network protocols
qos
aodv
wsn
machine learning
routing protocols
fuzzy logic
iot
load balancing
network security
quality of service
network
energy efficiency
routing protocol
intrusion detection
sdn
vanet
lte
anomaly detection
networking
5g
computer networks & communications
congestion
neural network
protocols
congestion control
tcp
high speed networks
network lifetime
wireless networks
reinforcement learning
deep learning
quality of service (qos)
wireless network
ipv6
cyber security
authentication
blockchain
ubiquitous networks
mac
underwater wireless sensor networks
residual energy
intrusion detection system
leach
long term evolution (lte)
network management
olsr
performance analysis
localization
networks
social network
network architectures
ids
privacy
ofdm
packet scheduling
social networking
rpl
feature selection
wlan
optimization
resource allocation
analytic hierarchy process
mimo
cognitive radio
aes
dsr
bit error rate (ber)
voip
delay
multimedia
network protocols & wireless networks
routing algorithm
steganography
computer networks
network marketing
temperature
6g
deep reinforcement learning
cybersecurity
goal question metrics
web applications
vulnerability
energy consumption
adhoc and sensor networks
particle swarm optimization
wireless sensor networks (wsns)
wi-fi
reliability
mobile networks
performance evaluation
handover
nfv
social networks
trust
block cipher
cluster head
wimax
ipv4
bittorrent
virus
mobile network
cryptography
artificial intelligence
iot security
machine learning algorithms
vehicle-to-everything
dsrc
humidity monitori
adjustable range load balancing protocol (albp).
network architecture
ultra-low latency
beyond 5g
data fusion algorithms
elliptic curve cryptography
cellular mobile networks
machine learning.
fog computing
energy-efficient
communication
switching and addressing techniques
next generation internet
edca
optimal packet length
response time
performance evaluation.
mobile ad hoc network
web application
manets
wireless sensor network (wsn)
logistic map
cellular network
ad hoc network
cognitive radio network
clustering algorithm
graph theory
deep packet inspection
channel estimation
cross layer
energy
mobility
cdma
clock synchronization
adhoc
cisco access points
usability
internet
energy efficient
mobile ad hoc networks
zigbee
correlation feature selection
nbtree
chi-square
gainratio
multilayer perceptron
naivebayes
ibk
spectrum sensing
medium access control
dsdv
openflow
streaming
graph
encryption and decryption
data mining
anomaly detection.
ber
network coding
peer-to-peer
opportunistic routing
machin learning
ransomware
android malware detection
imbalance data
route discovery
levy flight
crossover
quality of experience metrics
quality of service metrics
video streaming
software defined network
vehicular ad-hoc network
http
phishing
multiuser precoder
ray tracing
information technology
single-board computers
communication graph
p2p botnet
botnet
security awareness
security culture
security effectiveness
vehicular relay selection & ro
internet mobile gateway select
hexagonal
spectrum sharing
co-channel
adjacent channel
available bandwidth estimation
cellular mobile network
actor critic
cluster feature vector
ensemble learning
phishing attack
networks & communications
communications
data privacy
internet of medical things
ns-3
neighbour attack
stepwise conditional parameter
attack detection
web attack
dct
arnold map
random oversampling
throughput (tp)
throughput optimization
heterogeneous traffic
frame size optimization
downlink mu-mimo
entropy measu
dynamic authentication
fbmc
filter bank multicarrier
millimeter-wave mimo systems
route establishment
image compression
key exchange
share generation
visual cryptography
correction method
arithmetic coding
edge detector
lsb technique
vehicle velocity
neighbor density
link quality
compressive theory
clusterhead
antennas
ieee 802.11p
industrial internet
cognitive networks
node localization
massive connectivity
non orthogonal multiple access
software-defined networking (s
multi-objective golden eagle o
resource-constrained network
group signature
collective signature
digital signature authenticati
matlab
multiagent q-learning
radio resource management
hybrid code
two-dimensional
optical link
maximal ratio combining (mrc)
interleavers
interleave division multiple a
broadband powerline (bb-pl)
hesitant fuzzy linguistic term
raspberry pi
benchmark
mosquitto
mqtt
neural network.
unsw-nb15
gradient boost classifier.
fpa
custom features
unsw-b15
error minimization.
hybrid beamforming (hbf)
massive multi-input–multi-output (mmimo)
millimeter-wave (mmwave)
distributed lifetime coverage optimization protoco
adjustable range deterministic energy efficient pr
deterministic energy efficient protocol (deep)
adaptive sensor sensing range (assr)
(wsn)
sniff
rule table
firewall
store-carry-forward
direct communication
v2x communication
improved throttle algorithm.
processing time
queuing delay.
explainable ai (xai)
shapley additive explanation
autoencoder
network anomaly detection
non-orthogonal multiple access.
multiple-input multiple-output
bit error rate
genetic algorithm.
v2x communication.
cooperative localization
extreme learning machine (elm)
border gateway protocol (bgp)
security.
key distribution
paillier cryptosystem.
eigentrust
homomorphic cryptosystem
p2p reputation management
health information management
global mobility network
communication system security
banyan networks.
hotspot traffic
uniform traffic
semi-layer multistage networks
cut-through
omega network
round robin algorithm.
waiting time
dynamic task scheduling
data aggregation.
tree-based
virtual neighbour table
neighbour table
energy-saving application
hello interval
link change rate
hello process
cache replacement.
in-network caching
named-data networking (ndn)
information-centric networking (icn)
scheduling
worms & trojan.
fgc
retrial
leach.
energy efficient (ee)
clustering approach
cluster heads (chs)
sound localization & wireless positioning.
otdoa
cellular networks
random waypoint model.
traffic congestion
algorithm
whale optimization
evolutionary computing
routing in iot. packets aggregation mechanism.
high-performance iot
bloom filters
context-aware addressing
continuous-time markov chain
pdr.
csma
eec
hwsn
swarm intelligence
relay node placement
iptv
diffserv
heterogeneous networks
flow label
co-channel interference
prediction
infrastructure and platforms design tool for cloud
cloud application
parameter optimization.
mobility speed
deepmimo
mmwave
coordinated beamforming
multimedia etc big data tools and systems big data
bioinformatics
privacy and trust big data applications
models and algorithms big data infrastructure and
big data techniques
performance prediction
cellular
ad hoc
routing attack
urllc
random access
signal propagation
hybrid access scheme
field-programmable gate array (fpga).
hybrid model
switchable data dependent operation (sddo)
controlled substitution–permutation network (cspn)
interference-to-interference-plus-noiseratio
signal-to-interference-plus-noise-ratio
multi-criteria
long time evolutionadvanced
heterogeneous network
user equipment
handover decision
carrier aggregation
infogain
positioning
utilization resource prediction.
channel assignment
ddos attack
service level agreement
optical networking
sensor networks
dynamic diffusion
hilbert transformation
burning ship fractal
efficiency
internet and web applications
next generation web architectures
network operations & management
cw
ieee 802.11
smart mobile devices
energy conserving
ibleach algorithm
leach algorithm
markov chain
intent-based networking & realtime visualization
voice-assistance
rayleigh fading channels.
virtual machine.
unsupervised learning
ddos
machine learning for iot
iot edge security
adaboosted ensemble learning
mobile ad-hoc network (manet)
wireless communication
visible light communication
wireless
cluster
simulations
multi-path routing
mobility models
big data
smart home
content-centric networking
resource management
millimeter wave
data aggregation
approximation
fingerprint recognition
multifactor authentication (mfa)
biometric
iris recognition
network topology
codec
simulation
virtual routing function
torus
mimo systems
multipath
smart grid
mobile cloud computing
live streaming
cloud security
reputation
real-world networks
node degree
wormhole routing
unmanned aerial vehicles (uav)
wsn.
power control
quality of experience
par
integer programming
multi user
alamouti
bs
wsns
timestamp
non-homogeneous markov model
attack graph
markov reward models
qoe
traffic engineering
fuzzy logic control “flc”
pan
home automation
multiple web access
wifi
wireless mesh network
scalability
throughput
ad-hoc
des
blowfish
sensor network
agriculture
distributed algorithms
peer selection
vehicular networks
multipath routing
mobile ip
distributed
rdm
software defined networking (sdn)
range-free methods
anchor node
network monitoring
sip
rest
interactivity
topology
worms &trojon
network bandwidth
e-content
information diffusion
ant colony optimization
mse
android
awgn
data gathering
content distribution
filter bank
dwt
psnr.
real time traffic
ad hoc networks
papr
mimo-ofdm
measurement
data
algorithms
ecc
system calls
cicids-2018 dataset
convergence rate
nature inspired computational
improved reptile search algori
bursty tcp traffic
newcwv
dynamic entropy
statistical analysis method
ddos attacks
url phishing
internet of thing
vanet security
blockchain technology
network securit
non-content bas
anti-phishing
ul-a
wearable wireless sensor secur
long-te
fifth-generation radio technol
wearable wireless sensor
secure system
radio technology
technology
kernel-based virtual machines
benchmarks
kvm
secure routing
graph-mining
security management
security training
dynamic
broadcast latency problems;
mobile adhoc network
t
vanet-lte integration
average latency etc
reachability
broadcast latency problems
ranging localization methods
underwater wireless sensor net
unlicensed band
radio frequency attenuator
ad-hoc network
retrial queueing
quasi birth-death (qbd)
3-dimension markov chain
posterior belief
high-traffic networks
techniques
lstm
3-dimension
clustering techniques
cyberattack detection system
security in remote work
security & network management
security & ai integration
database and system security
5g and networks for big data
tomek link
networked systems
http csic dataset
usage mining
web usage
tuning parameters
feature extraction
distributed denial of service
imbalanced data
tomek links
broadcast storm problem
vanets
wingsuit flying search
mpr selection
ws-olsr
single carrier-frequency divis
dynamic spectrum allocation (d
computing
internet marketing
variable encoding
standard-deviation based encod
red deer algorithm
physical unclonable function
papr reduction
generalized dft
single carrier effect
dft spreading
standa
b
signal to noise ratio (snr)
cw.
physical unc
comp
light regions
relay node.
decentralized clusting
microstrip patch antenna (mpa)
radiation efficiency
bandwidth
télécommunications
computernetwork
ijcnc
mmtc
successive interference cancel
information technologies
electronics
euclidean distance
eagle optimization
one-time passwor
aodvmo
filtering and clipping
selective mapping
peak to average power ratio
orthogonal frequency division
qos metrics
real-time monitoring
rof-based radio access network
5g and beyond
anchor nodes (ans)
sensor nodes (sns)
wireless sensor networks (wsn)
successive interference
quality-of-service (qos).
security routing protocol
one-time password
xor-puf
machine learning attack
network protocols & wireless n
tree algorithm (mita)
multiplicative interleaving
signing group
environmental monitoring
energy reservation
humidity monitoring systems
spectral/spatial dimension (sd
md code
nzcc code
sac-ocdma systems
multiplicative interleaving wi
rf energy transfer
dos attack
cognitive radio resource
raspberry
packet capture.
packet capture
delay sensitive
queuing dela
delay sensitive.
security and privacy for iot iot-enabled innovatio
privacy.
aodv routing protocol.
aodv routing protocol
virtual machine
threshold based vm placement technique for load ba
qos.
data accuracy
sumo
data accuracy.
sumo.
elliptic curve encryption.
access control
extended clas
network security.
false negative attack
false positive attack
probabilistic voting-based filtering
context-aware architecture
stable & vanet.
mfo
clock time duration.
truncated mean
monitoring.
software defined networks
graph signal processing
multilayer representation
multiscale analysis
american adolescents
rstudio
income inequality
gini index
hpv vaccination
ultra-wideband.
design optimization
microstrip patch antenna
big data security
pulse position modulation.
digital communication
parallel processing
image encryption
knuth shuffle method
cryptography.
machine authentication
authenticated key agreement
antivirus.
information privacy
digital immigrant
digital native
fear motivation
protection motivation theory
deep convolutional neural learning
iov
qltpc.
qlrp
q-learning
fifth generation.
propagation model
channel modelling
internet of everything
unmanned aerial vehicles
connectivity metric.
forwarding probability
neighbour coverage
self-pruning
flooding
broadcasting
nfv.
traffic shaping
mmpp.
greedy algorithm.
ims & mipv6.
mmpp
greedy algorithm
ims & mipv6
visible light communication.
vehicular ad hoc network
optimal route
biogeography based optimization
transmit power
transmit power.
algorithms and applications bioinformatics compute
naive bayes.
k-nearest neighbors
random forest
classification model
subsets
sensor lifetime
failure probability
case studies
rayleigh fading channels
cooperative systems
replication.
locality awareness
distributed hash table (dht)
structured p2p systems
vehicular ad-hoc network (vanet)
remote control.
internet of things (iots)
android smart phone
routing protocol.
link break
rendering of 3d game view.
positional tracking
cloud game
cloud business
fuzzy logic.
active measurement
passive measurement
software systems and technologies
computer networks & communications cyber trust and
linear predictors
private blockchain networks
olsr& coverage.
d2d
mean queueing delay.
average waiting latency
m/bp/1system
retrial queueing.
fiber delay lines (fdl)
share-per- link (spl)
quality of services (qos)
obs
convolution neural network.
visual similarity
url
phishing detection
tetra (terrestrial trunked radio).
mobile communication
level crossing rate
vehicular communications
jamming detection
data collection
internet of things.
quality of service (qos).
vanetmobisim
ns-2
urban topology
roadside unit (rsu)
intelligent transportation system (its)
minimum number of drones
uav networks
lods
range-based &range-free.
ranging methods
control and feedback singling
signaling frames
lans of drones
private uav network
uav communication
software-defined networking
flooding attack
adaptive threshold
multihop communication
unequal clustering
hotspot issue
gravitational search algorithm.
multi-channel multi-radio
lr-abc mechanism
6rlr-abc
local repair
6lowpan
and contextual information.
consensus trust
discrete trust
black-hole attack
minimum network cost
content delivery services
virtual wan accelerator
virtual cache
fuzzy optimization.
priority
confidence
path selection
data reliability
horizontal compression
vertical compression
virtual machine migration
smart city
opportunistic networks
mcs
diffserv.
nemo
fhmipv6
mobile ipv6
benchmark.
network evaluation
programmable logic controllers
modbus
temporary events
qos performance
satellites
aerial platforms
terrestial
network lifetime.
delay minimization
channel switching
cluster formation
dbscan clustering algorithm
protocol analysis
online password attack detection
active queue management
random early detection
internet ofthing(iot)
open linkstaterouting (olsr)
adhoc on demanddistance vector alternative (odva)
communication protocol design
opportunistic
availability
wireless lan
wireless multimedia systems
computer networks important dates
addressing techniques
switching
services
containers
kubernetes
virtualization
edge computing
sd-wan
elliptic curve
signcryption
protocol
eehmac protocol and clustering in wsn
energy optimization.
dynamic task offloading
computational offloading
mobile computing
unb iscx2012.
accuracy
weighted extreme learning machine
neighborhood tripartite authentication.
histogram
fingerprint biometrics
binary patterns
mos.
hfc network
jitter
dscp marking
attribute-based
geo encryption
sniffing
structure
traffic priority
evolutionary computing based
node-trustworthiness
• network protocols & wireless networks
index terms : cooperative systems
queuing and scheduling.
packet delivery factor
aifsn
fading.
power allocation
path loss
convolutional coding
af cooperative
real-time packet
data delivery
emergency applications
inter-meeting time.
context-aware routing
disaster communication systems
standalone communication systems
new network communication research articles
inter-meeting time
intra wireless body sensor network (intra-wb
residual energ
network applications.
epc
metropolitan area network
connection channel
route model
mobile user
cloudlet network
mobile computing clouds
orthogonal frequency-division multiplexing.
bit error ratio
noise modelling
transfer function
channel model
open jackson network
heterogeneous infrastructure as a service
threshold energy
packet delivery ratio
node rank
link stability
vehicle
swiittch capaciitty
qualliitty off serrviice
soffttwarre deffiined nettworrkiing
congestion propagation
bayesian network
particle swarm optimization algorithm
ad-hoc multipath
energy aware routing protocol
anomaly
rfid
lps
lf’s
sb
dsc-cache
random-cache
por-cache
all-cache
proxy-cache
vod
computation offloading
vehicular ad-hoc networks
mobile edge computing
vehicular cloud computing
weighted connectivity index
resource allocations and interference cancellation
inter-cell interference
self-interference
full-duplex
uplink throughput maximization
decoding sinr
energy harvesting
gre
ip-in-ip
mobile core network
5g network
wireless body area network
multipath fading
time diversity
2-hop
packet size optimization
malqi.
low power lossy network
adaptive link quality
mobile-rpl
bandwidth isolation
qoe evaluation
number of queues impact
switch capacity
mplste
ces
nox
network operating system
roia
real-time online interactive application
software defined networking
stochastic scheduling model
network partition
flow scheduling
data center network
communication networks
and bandwidth utilization (bu).
execution time (et)
average delay (ad)
efficient reliability and interval discrepant rout
energy consumption (ec)
bandwidth optimization
simeck
security analysis
lightweight encryption
and normalized depth.
void region
underwater wireless device networks
acoustic
dimming
lighting control
dynamic fault-tolerant routing.
static routing algorithm
mcr
ring
self-organized networks (son)
mobile ad-hoc networks (manet)
network performances
deterministic channels
random channel
aomdv
single path
routing.
multimedia traffic
wireless sensor network security and privacy
data security and privacy for cps
tasks.
mobile
human
robot
housekeeper
processing time.
fast handov
aaa
pmipv6
malicious attac
honest-but-curious attack
elliptic curve digital signature algorithm (ecdsa)
elliptic curve cryptography (ecc)
homomorphic encryption
peak to average power ratio(papr). space time bloc
orthogonal frequency division multiplexing(ofdm)
multiple input multiple output(mimo)
user engagement.
content
pervasive display
multiple displays
configuration model
multi-core processor
security hardware
ips
lanenforcer
lan security
server
internet gateway discovery
distributed leader election
akaike information criterion
binary harmonic search
differential evolution
fuzzy classifier
public key cryptography
lightweight cryptography
secret sharing
visualization systems
information visualization
big graphs
attributed hierarchical graphs
supercomputer
mpi
encryption
evolutionary algorithm
heterogeneous group routing
mission planning
autonomous underwater vehicle
fuzzy logic system.
artificial bee colony (abc)
virtual data center
traffic flows
software-defined network
cloud applications
elastic optical network
virtual network embedding
virtual optical network
path splitting
white-fi.
ieee 802.11e
ieee 802.11af
firefly algorithm
fuzzy system
minimum total network cost
design of experiments
mobile ad-hoc networks
and modeling
response surface methodology
energy efficient wsns (eewsns).
energy efficient routing protocol (eerp)
divide and conquer quad tree based multi hop stati
divide and conquer (d&c)
linear-programming
multi-commodity multi-cost flow
composition operations
petri nets
control flow
program modeling
channels with a random multiple access
discrete information
asynchronous data stream
packet communications
synchronization process
preemptive routing
dynamic source routing (dsr)
mobile adhoc networks (manets)
total accessibility matrix
laplacian matrix
adjacency matrix
topology map
dark-net monitoring
network attack
simulation analysis.
transmission energy
ros.
apache
openstack
cloud robotics
network auto-configuration.
signalling protocol
wireless communications
emr exposure level
electromagnetic radiation (emr)
sensitive persons
sepinsensitive fuzzy c-means.
stable election protocol(sep)
insensitive fuzzy c-means
network measurements
processor sharing
traffic model
social sciences.
velocity of knowledge
flow of knowledge
knowledge science
cell-head election& void-handling algorithm.
grid
location-based
uwsns
spread spectrum.
secure data aggregation
data-oriented privacy
3d grid
disjoint paths
adaptive routing
spate time block coding and throughput.
lte downlink
channel capacity
zero-forcing beamforming (zfb)
opportunistic fair scheduling (ofs)
concordance
degree distribution
centrality metrics
kurtosis
fat-tailedness
event condition action (eca)
adhoc routing
adhoc wireless networks
has.
home monitoring
congestion control.
wsn testbed
transport protocol
queue management
ieee 802.15.4 sensor networks
priority-based data reporting
detection
average carrier power
carrier interference
error rate
position accuracy
cloud computing environments
joint multiple resourceallocation
deep neural networks
802.11ad
webrct
p2p communication
communication channel
contact center
mobile agent .
client/server
advanced encryption standard
avalanche effect
secure algorithm
s-box
sac
ciphertext
multicommodity flow
eigrp
igrp
route redistribution
ospf
is-is
power consumption.
ad-hoc networks
energy-aware
recursive least squares (rls) algorithm
interference
ota carrier
forgetting factor (λ)
global positioning system gps
progressive download
adaptive bitrate streaming
audio and video transmission
internet of things & rfid
smart homes
localisation
indoor positioning
lattice encoding and decoding
viterbi algorithm.
dirty paper coding
fading channel
agf
pgb
radiation pattern
global system for mobile communications (gsm)
equipment spectrum analyzer.
power density
urban area
electromagnetic radiation
code
received power
interconnected networks
octagon-cell
network services
interconnection networks
preemption
oma
sla
m2m
coap
csp
soc
kernel selection
support vector machine
kdd’99
kernel
nsl-kdd
integration
confidentiality
internet of things (iot)
explicit loss and handoff notification
high bit error
cellular wireless network
handoff
linear receivers
lyapunov exponent
chaotic codes
lte networks
mobility load balancing
life-time
matlab.
device-to-device
mode selection
interference control
minimum total network cost.
wireless broadband
qualnet
dd
spin
hlts
network simulator 2.
tcp incast
data center
distributed file system
attention shift
self-organizing map
autism
adaptive service agreement
service level agreement (sla)
auction cluster head
encapsulation
multi-bs
cloud sensor
multi-hop
alternative cluster head nodes
broader gateway protocol (bgp)
security kernels
authenticated data structure (ads)
adaptive modulation and coding
cross-layer design
cooperative relay diversity
adaptive retransmission
policy-based network management
dacs scheme
self-configuration
link cost
packet loss
and software fault injection & composed web servic
fault tolerance methodologies
web services
network on chip
noc
complexity.
lattice
lll
lr-aided
topology change
mpr
connected dominating set
virtual backbone
wavelets
digital video broadcasting
frequency selective
ricean
rayleigh
owdm
gis
hsi color space
gis layers
l*a*b color space
classification
lsb
mp3 data set
hiding a message
integrated system
nms
cba
efficiency criterion
cost analysis
virtual mmachines
cloud computing.
lload balancing parameters
visible light communications
indoor communication
lightfidelity
wi-fi.
opportunistic relay selection
cooperative communications
adaptive m-qam/mpsk modulation
fuzzy basis function “fbf”
orthogonal least squares ”ols”.
management
middleware & platform
multi-homed
congestion controls
mptcp
sto
frft
cazac sequences
mmse
ls
snr
accuracy factors
gps
improve accuracy
global positioning system
zigbee & rfid.
manet.
selfish nodes
grp
key management.
active attack
passive attack
hello flood attack
free space optical communications
atmospheric attenuation
visibility
optisystem 7.0
link distance
transmission range
wireless ad hoc networks
connectivity.
mih (media independent handover)
ansf (access network selection function)
vho (vertical handover)
ims (ip multimedia subsystem)
rats (radio access technologies).
information-centric networking
residential energy management
home network
cooperative spectrum sensing
energy efficient sensing
radio propagation
unified qos metric
dynamic weight
application weight
weight
qos metric
as-friendliness
p2p live streaming
peer selection algorithm
bandwidth allocation
user satisfaction
levenberg-marquardt (lm) algorithm
wireless sensor network (wsn).
received signal strength indicator (rssi)
cloud architectures
city services
cost estimation
smart cities
hybrid
overlay multicast tree
peer-to-peer (p2p)
dynamic bandwidth distribution.
reliable hetnet
network failure tolerance.
wifi cellular interworking
web browsing & mobile networks
multi-criteria decision making
interactivity.
video on demand
optimal cluster size
energy balancing
dynamic clustering
wireless sensors network (wsn)
mobile relay node
call admission control
hysteresis
mobile cloud offloading
decision making system
potential game
distributed optimisation
packet reception ratio (prr)
transmission power
game theory
joint multiple resource allocation
multiple access points
total processing time.
different service quality
flow networks
mass balancing theorem
optimisation
vnf
openflow and openstack
onf
vlan
mano
vrf
vngn
reduction of power consumption
guarantee qos
multicast
node monitoring protocol(nmp)
validation
safety and liveness property.
sdl (specification and description language)
compressed sampling
orthogonal frequency division multiplexing.
federated clouds
identity management
access control.
federation
wireless multimedia sensor networks.
multimedia streaming
performance bounds
distributed algorithms.
peer-to-peer networks
and cloud compliance.
distributed computing
infrastructure as a service
software as a service
immunization
delay rate
information dissemination
nodes
characterization
wireless sensor networks.
nfs
ssh tunnelling
hpc clusters
small-world networks
maximal clique size
clustering coefficient
network graphs
assortativity index
correlation
distribution
sensor node
energy saving
power consumption
ns2.
lifetime
broadcast communication
deadlock-free algorithm.
3-d mesh topology
split-protocol
attack trees
and reliability.
non-state-space model
mincuts
multipath fading.
zone prediction
tracking
dynamic position
triangulation
database management.
forensic system architecture
forensic analysis system
network forensics
computer networks; minimum-cost paths tree; geneti
spectral radius
random network
small-world network
eigenvalue
scale-free network
logarithmic rule (log-rule)
carrier aggregation (ca)
heterogeneous networks (hetnets)
intra-band contiguous
modified largest weighted delay first (mlwdf)
lte-sim-5.
exponential rule (exp-rule)
lte-advanced (lte-a)
femto-cells
deadlockfree
broadcasting communication
hamiltonian model
3-d mesh
patient monitoring
mobile device
remote healthcare
labview
network simulation
radio propagation models
wireless application
slotted antenna
broadband antenna
triangular microstrip antenna
substrate
notch antenna
representational state transfer
complex and virtual devices
orchestration
directories
model unit disk graph model
lognormal shadowing model
ftlr scheme
dilation
expansion
hex-cell network
embedding
signal strength
dpcplp
link prediction
peer-to-peer streaming
node clustering
artificial fish swarm algorithm
smart routing.
wireless ad-hoc networks
qos for routing
tcp computation enhancement
adhoc using cisco devices.
compression
huffman coding
lzw
white space steganography
teks
passive optical network
video contents
internet protocol television.
prior storing server
petal routing
ant based routing
sara
coordinator
cognitive radio networks
control channel dilemma
dual-slave
slave
spectrum heterogeneity
distributed coordination
information security
and encryption.
mobile payment
security breaking cost
maximizing network interruption problem
grid point approximation algorithm
step-size.
fuzzy c-means
uwsn
bottleneck energy
power management
mds
mixcolumns
nist
dna
interconnection topology
hex-cell topology
hex-cell topology
interconnection topology
elliptic filtering (ef)
iir (infinite impulse response
amplitude clipping and filtering (acf)
iir (infinite impulse response
elliptic filtering (ef)
amplitude clipping and filtering (acf)
log skew normal
moment matching
lognormal sum
multi carrier
multi carrier
applications
sensor
non-deterministic delays
non-deterministic delays
web service
broadcast trees
genetic algorithm
bandwidth - guaranteed routing alg orithm
history routing data
priority of traffic flow
real time
mobility .
tcp v ariants
queuing theory
its
fleetnet
tesbed
user’s perceived operability
remote desktop environments
rdp
802.15.4
matlab simulink
degree of freedom "dof"
intrusions
dynamic bandwidth allocation (dba)
passive optical network (pon)
round trip time (rtt)
vanet; mobility model; simulations
jammer technology
bluetooth network
heterogeneous wireless network
dynamic spectrum access
lte; mimo ;ofdm
sir model; seirs model; delay differential equatio
parallel computing
heterogeneous environments
high performance computing
cumulative complementary distribution function (cc
orthogonal frequency division multiplexing (ofdm)
peak to average power ratio (papr)
piece selection
manual tunnel
6to4 tunnel
distributed manet management
waveins
insteon
assistive homes
industrial automation
z-wave
energy management
voice control
m/h2/1
mean waiting time
m/d/1 with vacations
eigen vectors component.
peak-to-average power ratio
wavelet
de-noising
wavelet- eigen vector
analysis
digital evidence
internal memory
digital forensic
smart phone forensic
tools
packet injection
deauthentification
intrusion prevention
mobile ip border gateway
point of presence
internet service provider
pops virtual mobile ip network.
heterogeneous
network life
performance routing
optimized edge routing
pfr
erasure code
node classification.
topology control
enr
topology maintenance.
topology construction
interworking
real time switching control criteria (rsw).
interasterisk excha nge protocol (iax)
tetrapolar
bioimpedance
re al value
phase sensitive detector method
imaginary value
socioeconomic indicator s
traffic matrix
shortest path algorithm
traffic density
wide area network
mobile social network
mo bile device
middleware
sched uling
mobile stations
fairness and throughput
multi-hop relay stations
overla y networks
multicast tree
application level multicast
link aware.
ns 2.
tdma
energy co nsumption
sn mp
mobile agents
bandwidth measurement
available bandwidth
inline measurement tcp (imtcp)
inf ogain
orthogonal frequency division multiplexing ( ofdm)
complementary cumulative dist ribution function (c
hypervisor
system & network vir tualization
modelling
alloctc
management dynamic
bam
energy detection .
collision avoidance.
mobile ad hoc network (manet)
sui-5
sui-3
sui-2
sui-1
bpsk
qpsk
sui-6.
64-qam
16-qam
sui- 4
ieee 802.16d
digital modulation formats
multiplexing techniques
qam & wdm.
isp
ospfv3
bgpv4
tcp and rtt
double stack
qos routing; mobile ad hoc networks; energy-aware
node disjoint routing
scalable codec
resiliency technique
multicast trees
mesh-pull backup
real time traffic.
long- reach passive optical networks; dynamic band
hosted
peering
interconnection
white label
roaming
ipx (ip exchange)
grx (gprs roaming exchange)
smart vehicle
intelligent transportation system
accident.
video recording
all call query
onward routing.
call dropback
query on release
number portability
wormhole attack
hierarchical clustering.
virtual backbone tree
signature
attacker
in-network aggregation
event handling
simulations; mpls; traffic engineering; fast rerou
vertex cover
graph matching
greedy algorithms
approximation algorithms
breadth-first search tree.
spectral efficiency
golden code
outage probability
low complex sphere decoder.
cooperative communication
cooperative stbc
matrix decomposition
root-music.
lu factorization
subspace estimation method
music
signal space
time delay
frequency estimation
null (noise) space
qr factorization
rank revealing
naming mechanism; name-specifiers; predicate-based
hierarchical routing
qos routing. 1. introduction
sms
short message service
mobile service
gsm
performance & 802.11p
fairness
802.11b
wlan network
distributed coordination function
video transmission
multimedia sensor networks
bloom filter; zfilter; zformation; diffie-hellman-
mipv6
mipv4
hierarchical mobile ip
fast handover.
telecommunications
ip
highly available
phone system
bandwidth allocation models (bam)
alloctc-sharing.
autonomic management
resource provisioning
mam
g-rdm
binary exponential backoff.
network computing
narrowband rf networks
encoding strategy
node coding
range-based methods
hybrid-based methods.
cognitive network
admission control
passive measurements
reac
ngn
profile of qosr
iqmsmp
qos management
mobility management
ims
treeview
k-means
visualization
cluster 3.0
kdd cup 99
xbee
phase shift keying
quantum communication
mode of operation
encryption oracle
stream cipher
maximum network welfare.
ufas
proposed economic model
radio resource management (rrm)
reciprocity.
eigenvalue spectrum
formal correction
projection
firewall.
formal verification
misconfigurations detection
relevancy
interoperability cheking
security component
internet vulnerabilities and medical identity thef
cyber attacks
identity theft
data stores
resources
integrity
cloud service provider and cloud security.
linux.
security of e-content
multi-media. 1. introduction
e-protection
security of e-content
multi-media. 1. introduction
e-protection
epidemic disease
sirs epidemic model
dtmc markov model
epidemic disease
sirs epidemic model
dtmc markov model
qos routing
tora
psnr
histograms of colour image
adaptive colour image steganography
random pixel selection
difference in histograms
steganogaraphic noise
honeypots
nids
hids
adt-android development tool.
gui-graphical user interface
ide-integrated development environment
cross-layering
voip capacity
codec adaptation.
vowlan
smo
gsa
lkh
multimedia broadcast multicast services
dynamic rekeying
isi
fft
multi-carrier
dvb
psd.
elliptic
butterworth
orthogonal
ifft
dvb-t
chebyschev
best effort
queuing delay
transmission opportunity
rout discovery
wavelength conversion
wavelength and converter assignment problem
wdm
social networking websites
cyber threats.
ipv6 header and exhibition date.
addressing types
attack
secure clustering
dynamic clustering and data aggregation
remaining energy
coverage loss time
node lifetime
maximum stability
minimum distance spanning tree
mobile sensor networks
programming models
heuristic algorithm
routing path.
eventual consistancy
cost-minimizing algorithm
node- dependent
parallel crc computation
ozo generator
odp polynomial
cloud service broker
cloud computing; cloud services; quality-of-servic
cross-layer scheduling
packet delay
connected candidate order
token based coordination
dra
dual band
dcs and wlan
performance.
hierarchical hybrid edf/fifo
non real time traffic
planning
mobile applications
logic programming
health & ansprolog
network address translation
peer-to-peer; live streaming; internet service pro
hybrid protocols.
heterogeneous wireless networks
andsf (access network discovery and selection func
media independent handover (mih)
vertical handover (vho)
pts
ccdf
pso
packet-switching networks
modeling
statistical methods & packet length.
chemical networking protocols
rate control.
evolutionary system
self-optimization
network stack composition
compuetr networks
Mehr anzeigen
- Präsentationen
- Dokumente
- Infografiken