Issue | Title | |
Vol 2, No 3 (2015) | Task scheduling in Cloud Using Hybrid Cuckoo Algorithm | Abstract PDF |
Sumandeep Aujla, Amandeep Ummat | ||
Vol 10, No 4 (2023) | Taxonomy of Various Routing Protocols of IoT-Based on Wireless Sensor Networks for Healthcare: Review | Abstract PDF |
Monika Pahuja, Dinesh Kumar | ||
Vol 7, No 4 (2020) | Taylor Based Grey Wolf Optimization Algorithm (TGWOA) For Energy Aware Secure Routing Protocol | Abstract PDF |
Robbi Rahim, S. Murugan, S. Priya, S. Magesh, R. Manikandan | ||
Vol 10, No 4 (2023) | TCP Performance Enhancement in IoT and MANET: A Systematic Literature Review | Abstract PDF |
Sultana Parween, Syed Zeeshan Hussain | ||
Vol 5, No 6 (2018) | Textual Data Hiding in Digital Images Using Chaotic Maps | Abstract PDF |
Vipul Sharma, Roohie Naaz Mir | ||
Vol 8, No 5 (2021) | The Impact of Mobility Models on Geographic Routing in Multi-Hop Wireless Networks and Extensions – A Survey | Abstract PDF |
T. Sakthivel, Allam Balaram | ||
Vol 2, No 2 (2015) | The Influence of Smart Phones on Human Health and Behavior: Jordanians' Perceptions | Abstract PDF |
Emad Abu-Shanab, Eman Haddad | ||
Vol 2, No 4 (2015) | The Provision of Information Technology Security Considerations by Legal Prescripts: South African Case | Abstract PDF |
Ntjatji Gosebo, Sipho Seepe | ||
Vol 3, No 2 (2016) | Throughput and Delay Analysis of AODV, DSDV and DSR Routing Protocols in Mobile Ad Hoc Networks | Abstract PDF |
Saima Zafar, Hina Tariq, Kanza Manzoor | ||
Vol 8, No 4 (2021) | Throughput Optimization - Based Gateways Placement Methods in Wireless Networks | Abstract PDF |
Suvarna Patil, Prasad Gokhale | ||
Vol 2, No 6 (2015) | Time Based Fault Detection and Isolation in Wireless Sensors Network | Abstract PDF |
Imane Merzougui, Youssef Benabbassi | ||
Vol 9, No 5 (2022) | Towards an Adaptive Routing Protocol for Low Power and Lossy Networks (RPL) for Reliable and Energy Efficient Communication in the Internet of Underwater Things (IoUT) | Abstract PDF |
R. Saravanan, T. Sakthivel, P. Karpagam, K. Gunasekaran | ||
Vol 10, No 1 (2023) | Towards Blockchain-Based Secure IoT Communication for 5G Enabled Intelligent Transportation System | Abstract PDF |
Sakthi Kumaresh | ||
Vol 8, No 1 (2021) | Towards Improved Detection of Intrusions with Constraint-Based Clustering (CBC) | Abstract PDF |
J. Rene Beulah, C. Pretty Diana Cyril, S. Geetha, D. Shiny Irene | ||
Vol 11, No 1 (2024) | TriChain: Kangaroo-Based Intrusion Detection for Secure Multipath Route Discovery and Route Maintenance in MANET Using Advanced Routing Protocol | Abstract PDF |
Jayantkumar A. Rathod, Manjunath Kotari | ||
Vol 9, No 6 (2022) | Trust Management Techniques and their Challenges in Cloud Computing: A Review | Abstract PDF |
Pooja Goyal, Sukhvinder Singh Deora | ||
Vol 9, No 3 (2022) | Trust-Based Co-Operative Cross-Layer Routing Protocol for Industrial Wireless Sensor Networks | Abstract PDF |
Manish Panchal, Raksha Upadhyay, Prakash Vyavahare | ||
Vol 8, No 4 (2021) | Trust-Based Energy Efficient Secure Multipath Routing in MANET Using LF-SSO and SH2E | Abstract PDF |
Valanto Alappatt, Joe Prathap P. M. | ||
Vol 6, No 5 (2019) | Two-Level Grid Access Control Model Based on Resource Performance and Request Priority | Abstract PDF |
Sarra Namane, Nacira Ghoualmi | ||
Vol 3, No 6 (2016) | Usage of Machine Learning for Intrusion Detection in a Network | Abstract PDF |
Prachi | ||
Vol 11, No 1 (2024) | Vehicular Ad Hoc Networks Assisted Clustering Nodular Framework for Optimal Packet Routing and Scaling | Abstract PDF |
V. M. Niaz Ahamed, K. Sivaraman | ||
Vol 5, No 4 (2018) | Virtualization and IoT Resource Management:A Survey | Abstract PDF |
Saniya Zahoor, Roohie Naaz Mir | ||
Vol 7, No 1 (2020) | Vulnerability Exploitations Using Steganography in PDF Files | Abstract PDF |
Istteffanny Isloure Araujo, Hassan Kazemian | ||
Vol 8, No 4 (2021) | Whale Optimization Routing Protocol for Minimizing Energy Consumption in Cognitive Radio Wireless Sensor Network | Abstract PDF |
J. Ramkumar, R. Vadivel | ||
Vol 5, No 4 (2018) | Wireless Sensor Network Surveillance on Forest Illegal Mining using ‘Planned Behaviour Abortion Tower’:Analytical Modelling | Abstract PDF |
Eric Opoku Osei, James B. Hayfron-Acquah, Michael Asante | ||
326 - 350 of 353 Items | First Previous 9 10 11 12 13 14 15 Next Last |
Browse Title Index
Scroll