Content
June 2024, Volume 9, Issue 1
- 1-34 Simulation of Rainfall Attenuation Prediction Models for the Optimization of High-Speed Links in Millimeter Bands (80GHz): Tropical Regions’ Case
by Patrick Dany Bavoua Kenfack & Alphonse Binele Abana & Emmanuel Tonye & Paul-Salomon Ngohe-Ekam & Linjouom Samira France & Benjamin Tanga Louk - 35-54 External Interferences Detection by Examples in LTE Networks for 4G and 5G Networks Efficient Deployments
by Eric Michel Deussom Djomadji & Duplex Mbieda Petmegni & Bienvenue Arsene Roger FOUBA & Emmanuel TONYE
December 2023, Volume 8, Issue 2
- 1-34 Optimizing Telematics Network Performance through Resource Virtualization in a Disruptive Environment: The Case of the IP/MPLS Core Network
by Patrick Dany Bavoua Kenfack & Alphonse Binele Abana & Emmanuel Tonye & Paul Salomon Ngohe Ekam & Gilles Herve J. Ngotty Mbang - 1-41 Reviewer Acknowledgements for Network and Communication Technologies Vol. 8, No. 2
by Bruce Lee - 35-40 Future Hybrid Technology for Pay TV Platform
by Abu Toha Md Anowarul Azim
June 2023, Volume 8, Issue 1
- 1-7 Analyzing Out-of-Domain Generalization Performance of Pre-Trained Segmentation Models
by Johnson Zhong - 1-53 Reviewer Acknowledgements for Network and Communication Technologies Vol. 8, No. 1
by Bruce Lee - 8-37 Integration of Small Cells with Smart Antennas in Macrocells for Improving the Performance of Mobile Telephone Networks
by Alphonse Binele Abana & Patrick Dany Bavoua Kenfack & Emmanuel Tonye & Claude Francine Onana Nomo - 38-52 Predicting the QoE of Video Streaming in Communication Networks
by Giuseppe Iazeolla & Sonia Forconi
June 2022, Volume 7, Issue 1
- 1-12 Power Management of Base Transceiver Stations for Mobile Networks
by Giuseppe Iazeolla - 1-27 Hiding Secrets in Electrocardiogram Based on Integer Wavelet Transform with Coefficient Adjustment and LSB Substitution
by Ching-Yu Yang & Wen-Fong Wang - 1-39 The Role of Network Technologies in the Enhancement of the Health, Education, and Energy Sectors
by Adebisi J. Adetunji & Babatunde O. Moses - 1-55 An overview of Intrusion Detection within an Information System: The Improvment by Process Mining
by Nkondock Mi Bahanag Nicolas & Atsa Etoundi Roger - 1-61 Reviewer Acknowledgements for Network and Communication Technologies Vol. 7, No. 1
by Bruce Lee
September 2022, Volume 7, Issue 1
- 1-1 An Assessment of Employee Knowledge, Awareness, Attitude towards Organizational Cybersecurity in Cameroon
by Fosoh Holiness Nikel & Austin Oguejiofor Amaechi
December 2021, Volume 6, Issue 2
- 1-1 Fiber Optic Network Technology of Communication of Specialists via Mental Neurointerfaces
by Evgeniy Bryndin - 1-10 Management of Celestial Systems under Spatial Grasp Model
by Peter Simon Sapaty - 1-22 Gender Differences in Academic Self-Concept among Standard Seven Pupils Using Learning Strategies in the Use of Information Communication Technology in Bungoma County, Kenya
by Fred Juma Wakasiaka - 1-41 Simulation of Creative Manifestation by Functional Ensembles of Intellectual Agents Based on Live Information in Various Spheres of Life Activity
by Evgeny Bryndin - 1-47 Reviewer Acknowledgements for Network and Communication Technologies Vol. 6, No. 2
by Bruce Lee
June 2021, Volume 6, Issue 1
- 1-1 An Improved Indoor Positioning Method Based on Nearest Neighbor Interpolation
by Yonghao Zhao - 1-6 Toward an AI-Enabled O-RAN-based and SDN/NFV-driven 5G& IoT Network Era
by Bao-Shuh Paul LinI - 1-16 Space Debris Removal under Spatial Grasp Technology
by Peter Simon Sapaty - 1-28 The Performance and Future of QUIC Protocol in the Modern Internet
by Jianyi Wang - 1-34 There is no Theoretical Limit for Noise Reduction in Digital Communications
by János Ladvánszky - 1-43 Reviewer Acknowledgements for Network and Communication Technologies Vol. 6, No. 1
by Bruce Lee
December 2021, Volume 5, Issue 2
- 1-1 A Modification to the Shannon Formula
by J. Ladvánszky - 1-7 Toward an AI-Enabled SDN-based 5G & IoT Network
by Bao-Shuh Paul Lin - 1-15 A Comparative Study of Formal Approaches for Web Service Oriented Architecture
by Meftah Mohammed Charaf Eddine - 1-34 Indoor Localization Based on Optimized KNN
by Xuanyu Zhu - 1-40 Indoor Localization Based on Fingerprint Clustering
by Shi Chen - 1-46 Reviewer Acknowledgements for Network and Communication Technologies Vol. 5, No. 2
by Bruce Lee
June 2020, Volume 5, Issue 1
- 1-1 The Newspaper Industry in a Changing Landscape The Shift in News Content of Various Newspapers as a Response to the Rise of Social Media
by Neil Shen - 1-11 Bernardo Autonomous Emotional Agents Increase Perception of VR Stimuli
by Erik Geslin & Olivier Bartheye & Colin Schmidt & Katy Tcha Tokey & Teerawat Kulsuwan & Salah Keziz & Tanguy Belouin - 1-26 A Secured System for Internet Enabled Host Devices
by Aderonke F. Thompson & Oghenerukevwe E. Oyinloye & Matthew T. David & Boniface K. Alese - 1-37 Modelling Malicious Attack in Social Networks
by Amusan O. & Thompson A. F. & Aderinola T. B. & Alese B. K. - 1-44 The Influence of Social Support on College Students’ Mobile Phone Dependence: The Mediating Role of Security
by Guifang Fu & Kexin Shi & Kai Ye
December 2019, Volume 4, Issue 1
- 1-1 Fountain Codes and Linear Filtring to Mitigate Pilot Contamination Issue in Massive MiMo
by Djedjiga Benzid & Miche Kadoch - 1-13 Comparation of LoRa and NB-IoT
by Yanhui Ji & Hao Yang - 1-16 Secure Image Steganography Algorithm Using Radial Basis Function Neural Network
by Areej Abed Hutaibat - 1-26 An Intelligent Dispatch System Operating in a Partially Closed Environment
by Augustus E. Ibhaze & Ignatius K. Okakwu & Ayobami T. Akinrelere & Agbotiname L. Imoize - 1-36 Research Study: Towards a Collaborative Trust-Based Debugging Model for the Telecom Industry
by Ayse Kok Arslan - 1-52 Reviewer Acknowledgements for Network and Communication Technologies Vol. 4, No. 1
by Bruce Lee
December 2017, Volume 3, Issue 1
- 1-1 Controllability of Complex Power Networks
by Guohua Zhang & Zhen Li & Qiaoli Zhang - 1-6 A Robust Authentication Scheme for Client-Server Architecture With Provable Security Analysis
by Saeed Ullah Jan & Fawad Qayum - 1-26 Comparison of De-Noising Algorithms Technique
by Ogunsanwo Gbenga Oyewole & Goga Nicholas & Awodele Oludele & Okolie Samuel - 1-33 Redesigning Academic Website for Better Visibility and Footprint: A Case of the Federal University of Petroleum Resources Effurun Website
by Arnold Ojugo & D. O. Otakore - 1-45 Reviewer Acknowledgements for Network and Communication Technologies Vol. 3, No. 1
by Bruce Lee
November 2013, Volume 2, Issue 2
- 1-1 Propagation Models for GSM 900 and 1800 MHz for Port Harcourt and Enugu, Nigeria
by Julie Ogbulezie & M. U. Onuu & J. O. Ushie & B. E. Usibe - 1-11 A Survey of Cloud Computing and Social Networks
by Sanjay Ahuja & Bryan Moore - 1-17 Exploring the Weak Links of Internet Security: A Study of WiFi Security in Hong Kong
by Ken Fong & Stanley Wong - 1-29 A Fast Raptor Codes Decoding Strategy for Real-Time Communication Systems
by Yeqing Wu & Fei Hu & Qingquan Sun & Ke Bao & Mengcheng Guo - 1-43 Network Security in Cloud Computing with Elliptic Curve Cryptography
by Victor Waziri & Ojeniyi Adebayo & Hakimi Danladi & Audu Isah & Abubakar Magaji & Muhammad Abdullahi
May 2013, Volume 2, Issue 1
- 1-1 A New Survey on Improving TCP Performances over Geostationary Satellite Link
by Alain Pirovano & Fabien Garcia - 1-19 The Neighborhoods Method and Virtual Polar Coordinates in Wireless Sensor Networks
by A. Sukhov & D. Chemodanov - 1-28 Cylindrical Dielectric Resonator Antenna for SHF Band Application
by Ahmed Benomar & Noureddine Hacene & Hicham Megnafi & Patrick Vaudon - 1-34 Knowing Your Population: Privacy-Sensitive Mining of Massive Data
by Pedro Sanches & Eric-Oluf Svee & Markus Bylund & Benjamin Hirsch & Magnus Boman - 1-52 Transparent Offloading of Computationally Demanding Operations in Microsoft .NET
by Morten Larsen & Brian Vinter - 1-62 State of Big Data Analysis in the Cloud
by Sanjay Ahuja & Bryan Moore
November 2012, Volume 1, Issue 2
- 1-1 Modeling Latency in a Network Distribution
by Rohitha Goonatilake & Rafic Bachnak - 1-12 A Survey of the State of Cloud Computing in Healthcare
by Sanjay Ahuja & Sindhu Mani & Jesus Zambrano - 1-20 Diagnostic of Fault-tolerant System S7-400H
by Anna Bystricanová - 1-28 Open Wireless System Cloud: An Architecture for Future Wireless Communications System
by Jianwen Chen & Xiang Chen & Jing Liu & Ming Zhao - 1-36 Dynamic Routing and Wavelength Assignment in Multifiber WDM Networks with Wavelength Conversion Capability
by Kouji Hirata & Dewiani * - 1-48 A Review and Performance Analysis of Reactive and Proactive Routing Protocols on MANET
by Mohammad Ali Mostafavi & Ayyoub Akbari Moghanjoughi & Hamid Mousavi - 1-59 Timestamp Retransmission Algorithm for TCP-Cherry over InterPlaNetary Internet
by Satoshi Utsumi & Salahuddin Zabir - 1-66 A Survey of the State of Cloud Security
by Sanjay Ahuja & Deepa Komathukattil - 1-76 Using Simulation to Investigate Virus Propagation in Computer Networks
by Arben Asllani & Amjad Ali
May 2012, Volume 1, Issue 1
- 1-2 Availability of Services in the Era of Cloud Computing
by Sanjay Ahuja & Sindhu Mani - 1-7 New Approach Construction for Wireless ZigBee Sensor Based on Embedding Pancake Graphs
by S. Femmam & M. Zerarka & M. Benakila - 1-26 Analysis of a Power Line Communication System Over a Non-white Additive Gaussian Noise Channel and Performance Improvement Using Diversity Reception
by Munshi Rahman & S. Majumder - 1-39 Limit and Dynamics of Information Entropy in Transmission
by Bin Yan - 1-51 Introducing Cognition in Web-Based, Learning Management Systems for Vocabulary Teaching
by Maria Paradia & Yiouli Kritikou & Vera Stavroulaki & Panagiotis Demestichas & George Dimitrakopoulos & Sotirios Glavas & Napoleon Mitsis - 1-67 Dynamic Radio Resource Allocation for Macro-Femto Hybrid Cellular Network Maintaining Fairness
by Md. Samee Chowdhury & Shamit Chakraborty & Tanveer Nipu & M. Kaiser - 1-79 A Complete Interoperable eHealth System Based on ZigBee Pro Standard
by Iker Caballero & Javier Vicente & Begoña García & Amaia Mendez - 1-97 Exploring the Convergence of Mobile Computing with Cloud Computing
by Sanjay Ahuja & Alan Rolli - 103-103 Interference Mitigation for OFDM-Based Joint Macro-Femto Cellular Networks
by Zannatul Smriti & M. Kaiser & Kazi Ahmed