Personal Information
Occupation
Network Protocols & Wireless Networks
Industry
Technology / Software / Internet
Website
About
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications.The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas
Tags
wireless sensor networks
routing
internet of things
network security
network protocols
security
networks wireless network
wireless sensor network
wireless networks
cloud computing
clustering
machine learning
network architectures
network
high speed networks
computer network
wsn
manet
computer networks
iot
qos
routing protocols
routing protocol
load balancing
aodv
quality of service
networks
wireless communications
intrusion detection
ubiquitous networks
communications
fuzzy logic
networking
5g
sdn
switching and addressing techniques
energy efficiency
optical networking
deep learning
ofdm
anomaly detection
vanet
blockchain
intrusion detection system
neural network
social network
localization
congestion control
protocols
wireless network
lte
mobile networks
performance analysis
tcp
network lifetime
cyber security
congestion
olsr
privacy
feature selection
reinforcement learning
computer networks & communications
authentication
ids
residual energy
cognitive radio
rpl
quality of service (qos)
routing algorithm
6g
mimo
ipv6
wireless
leach
channel estimation
mac
packet scheduling
particle swarm optimization
spectrum sensing
optimization
cybersecurity
network management
long term evolution (lte)
wireless lan
underwater wireless sensor networks
artificial intelligence
steganography
adhoc and sensor networks
cluster head
multimedia
social networking
ad hoc network
dsr
clustering algorithm
analytic hierarchy process
energy consumption
voip
bit error rate (ber)
wireless sensor networks (wsns)
smart home
handover
aes
cryptography
network protocols & wireless networks
wi-fi
internet
machine learning algorithms
network coding
delay
deep reinforcement learning
wlan
resource allocation
temperature
bittorrent
mobile ad hoc networks
network marketing
fog computing
machine learning.
wireless mesh network
energy efficient
performance evaluation
goal question metrics
web applications
vulnerability
virus
apt
mobile network
block cipher
wimax
nfv
ensemble learning
ipv4
vanets
trust
security effectiveness
reliability
multipath
mobile ad hoc network
algorithm
cognitive radio network
otfs
iot security
wireless internet
social networks
multi-criteria
energy-efficient
access control
lstm
dsrc
traffic congestion
adjustable range load balancing protocol (albp).
vehicle-to-everything
actor critic
openflow
satellites
usability
cisco access points
adhoc
clock synchronization
encryption and decryption
cellular mobile networks
distributed algorithms
attack detection
genetic algorithm.
zigbee
data fusion algorithms
correlation feature selection
topology control
nbtree
streaming
chi-square
gainratio
multilayer perceptron
naivebayes
ibk
topology
network monitoring
graph
q-learning
medium access control
dsdv
security.
elliptic curve cryptography
path planning
multiple-input multiple-output
network anomaly detection
throughput
beyond 5g
ultra-low latency
network architecture
humidity monitori
response time
cdma
mimo systems
energy
information security
urban area
cognitive radio networks
wireless sensor network (wsn)
opportunistic routing
sensor node
iots
anomaly detection.
next generation internet
multipath fading
data mining
ber
papr
internet of things (iot)
peer-to-peer
edca
cellular network
deep packet inspection
authentication framework
mano
contextual information
supervised learning
mutual authentication
graph theory
healthcare
web application
cross layer
performance evaluation.
wsns
optimal packet length
manets
simulation
logistic map
mobility
communication
omega network
cut-through
round robin algorithm.
data aggregation.
waiting time
dynamic task scheduling
semi-layer multistage networks
uniform traffic
hotspot traffic
banyan networks.
resource management
communication system security
global mobility network
health information management
p2p reputation management
homomorphic cryptosystem
eigentrust
paillier cryptosystem.
millimeter wave
cellular networks
otdoa
sound localization & wireless positioning.
cluster heads (chs)
game theory
clustering approach
energy efficient (ee)
leach.
des
mobile cloud computing
multi-criteria decision making
big data
smart grid
retrial
fgc
worms & trojan.
blowfish
scheduling
information-centric networking (icn)
named-data networking (ndn)
gps
in-network caching
cache replacement.
hello process
link change rate
hello interval
energy-saving application
neighbour table
virtual neighbour table
tree-based
content-centric networking
key distribution
broadband powerline (bb-pl)
hesitant fuzzy linguistic term
raspberry pi
benchmark
network topology
mosquitto
mqtt
neural network.
unsw-nb15
gradient boost classifier.
fpa
custom features
unsw-b15
error minimization.
hybrid beamforming (hbf)
massive multi-inputmulti-output (mmimo)
agriculture
group signature
collective signature
digital signature authenticati
sensor network
virtual routing function
matlab
multiagent q-learning
radio resource management
hybrid code
two-dimensional
codec
optical link
maximal ratio combining (mrc)
interleavers
interleave division multiple a
millimeter-wave (mmwave)
biometric
multifactor authentication (mfa)
explainable ai (xai)
shapley additive explanation
autoencoder
fingerprint recognition
non-orthogonal multiple access.
approximation
packet loss
torus
bit error rate
v2x communication.
mpr
cooperative localization
extreme learning machine (elm)
border gateway protocol (bgp)
distributed lifetime coverage optimization protoco
adjustable range deterministic energy efficient pr
deterministic energy efficient protocol (deep)
support vector machine
adaptive sensor sensing range (assr)
(wsn)
sniff
rule table
firewall
store-carry-forward
direct communication
v2x communication
improved throttle algorithm.
processing time
queuing delay.
iris recognition
data delivery
network operations & management
routing attack
urllc
random access
signal propagation
hybrid access scheme
field-programmable gate array (fpga).
hybrid model
switchable data dependent operation (sddo)
controlled substitutionpermutation network (cspn)
interference-to-interference-plus-noiseratio
signal-to-interference-plus-noise-ratio
next generation web architectures
internet and web applications
efficiency
rayleigh fading channels.
big data techniques
voice-assistance
intent-based networking & realtime visualization
performance prediction
markov chain
leach algorithm
ibleach algorithm
cellular
ad hoc
energy conserving
smart mobile devices
ieee 802.11
cw
wifi
par
long time evolutionadvanced
fuzzy logic control flc
alamouti
virtualization
bs
traffic engineering
genetic algorithm
channel assignment
qoe
markov reward models
attack graph
non-homogeneous markov model
addressing techniques
sensor networks
timestamp
ddos attack
service level agreement
heterogeneous network
user equipment
handover decision
carrier aggregation
burning ship fractal
multiple web access
infogain
positioning
home automation
pan
hilbert transformation
dynamic diffusion
heterogeneous wireless network
integer programming
utilization resource prediction.
multi user
wireless multimedia systems
authenticated key agreement
visible light communication
wireless communication
lifetime
node degree
wireless body area network
wormhole routing
mobile ad-hoc network (manet)
unmanned aerial vehicles (uav)
orchestration
self-pruning
wsn.
adaboosted ensemble learning
iot edge security
machine learning for iot
routing in iot. packets aggregation mechanism.
data aggregation
random waypoint model.
mobility models
multi-path routing
ad-hoc
simulations
cluster
live streaming
cloud security
whale optimization
monitoring.
mobile
evolutionary computing
reputation
aomdv
real-world networks
high-performance iot
power control
co-channel interference
quality of experience
prediction
real time switching control criteria (rsw).
infrastructure and platforms design tool for cloud
cloud application
virtual machine.
parameter optimization.
mobility speed
deepmimo
mmwave
coordinated beamforming
multimedia etc big data tools and systems big data
bioinformatics
privacy and trust big data applications
bloom filters
context-aware addressing
continuous-time markov chain
pdr.
csma
eec
hwsn
swarm intelligence
relay node placement
iptv
ddos
diffserv
unsupervised learning
heterogeneous networks
flow label
scalability
models and algorithms big data infrastructure and
networked systems
levy flight
software defined networking (sdn)
crossover
6g potential applications
mobile ad hoc
phishing attack
quality of experience metrics
cluster feature vector
cellular mobile network
available bandwidth estimation
adjacent channel
fog-cloud
co-channel
quality of service metrics
grpc
real time traffic
video streaming
software defined network
vehicular ad-hoc network
spectrum sharing
http
dynamic entropy
statistical analysis method
ddos attacks
privacy protection
mobile ip
throughput (tp)
android malware detection
malware detection
interactivity
random oversampling
imbalance data
blockchain security
distributed
arnold map
dct
vulnerabilities
web attack
route discovery
web architectures
rdm
dataset
stepwise conditional parameter
android
neighbour attack
ns-3
internet of medical things
data privacy
application shimming
internet mobile gateway select
vehicular relay selection & ro
security culture
security awareness
botnet
p2p botnet
information diffusion
communication graph
tapped-delay line
single-board computers
sip
mean square error
spider swarm optimization
data shifting
attack
e-content
interest selection
information technology
vehicular named data networks
rest
phishing
ray tracing
multiuser precoder
network bandwidth
networks & communications
secure navigation
dynamic selection
radar sensing
anti-jamming technique
jamming attack
awgn
range-free methods
psnr.
dwt
energy detection
mse
healthcare service
radio frequency attenuator
anchor node
underwater wireless sensor net
peafowl mating
filter bank
data security
ant colony optimization
iomt
quantization
pruning
hexagonal
node residual energy
enhanced efficiency
software-defined networking (s
multi-objective golden eagle o
spectrum efficiencies
rendezvous sequence
tailored treatment
cognitive networks
industrial internet
ieee 802.11p
synchronization
requirements
antennas
wban
clusterhead
post-disaster scenario
privacy preservation
forward secrecy
data gathering
compressive theory
asset tracking
modeling
5g and beyond
worms &trojon
fixed-grid network
node localization
peer selection
system capacity
measurement
packet-switching networks
olsr routing
leo
massive connectivity
lorawan
optimal network path
radar isac
music
data accumulation
mimo-ofdm
deep deterministic policy grad
non orthogonal multiple access
bluetooth low energy
fbmc
monitoring
vehicular networks
machin learning
dynamic authentication
resource-constrained network
entropy measu
adversary
complexity
ad hoc networks
multipath routing
smart transportation system
high mobility
layer depth
ransomware
internet marketing
computing
downlink mu-mimo
frame size optimization
heterogeneous traffic
throughput optimization
hash chain
algorithms
link quality
neighbor density
vehicle velocity
lsb technique
edge detector
pseudonym change
arithmetic coding
correction method
visual cryptography
content distribution
share generation
filter bank multicarrier
key exchange
millimeter-wave mimo systems
image compression
route establishment
and cloud compliance.
transmission power
packet reception ratio (prr)
immunization
infrastructure as a service
software as a service
peer-to-peer networks
multimedia streaming
addressing types
performance bounds
distributed algorithms.
distributed computing
secure clustering
mass balancing theorem
remaining energy
validation
node monitoring protocol(nmp)
optimisation
vnf
multicast
guarantee qos
openflow and openstack
coverage loss time
onf
vlan
maximum stability
vrf
vngn
reduction of power consumption
node lifetime
mobile sensor networks
wireless multimedia sensor networks.
federation
joint multiple resource allocation
access control.
multiple access points
total processing time.
identity management
different service quality
federated clouds
flow networks
orthogonal frequency division multiplexing.
minimum distance spanning tree
dynamic clustering and data aggregation
compressed sampling
sdl (specification and description language)
safety and liveness property.
remote healthcare
mobile device
patient monitoring
3-d mesh
hamiltonian model
broadcasting communication
elliptic
deadlockfree
femto-cells
lte-advanced (lte-a)
butterworth
orthogonal
exponential rule (exp-rule)
ifft
lte-sim-5.
modified largest weighted delay first (mlwdf)
intra-band contiguous
heterogeneous networks (hetnets)
carrier aggregation (ca)
logarithmic rule (log-rule)
scale-free network
eigenvalue
small-world network
random network
isi
embedding
hex-cell network
expansion
dilation
ftlr scheme
lognormal shadowing model
fft
model unit disk graph model
directories
multi-carrier
complex and virtual devices
representational state transfer
notch antenna
substrate
triangular microstrip antenna
broadband antenna
slotted antenna
wireless application
radio propagation models
dvb
network simulation
psd.
labview
energy saving
queuing delay
distribution
correlation
assortativity index
network graphs
clustering coefficient
transmission opportunity
maximal clique size
small-world networks
hpc clusters
rout discovery
ssh tunnelling
nfs
wavelength conversion
wavelength and converter assignment problem
wireless sensor networks.
characterization
wdm
nodes
social networking websites
cyber threats.
information dissemination
delay rate
spectral radius
dvb-t
computer networks; minimum-cost paths tree; geneti
network forensics
forensic analysis system
forensic system architecture
database management.
triangulation
dynamic position
tracking
zone prediction
multipath fading.
mincuts
non-state-space model
and reliability.
attack trees
split-protocol
3-d mesh topology
deadlock-free algorithm.
broadcast communication
chebyschev
ns2.
power consumption
best effort
hsi color space
gis
planning
owdm
rayleigh
ricean
mobile applications
frequency selective
digital video broadcasting
wavelets
virtual backbone
connected dominating set
logic programming
health & ansprolog
topology change
lr-aided
lll
network address translation
lattice
complexity.
noc
network on chip
peer-to-peer; live streaming; internet service pro
web services
fault tolerance methodologies
opportunistic relay selection
wi-fi.
lightfidelity
indoor communication
dra
dual band
dcs and wlan
visible light communications
lload balancing parameters
cloud computing.
virtual mmachines
performance.
cost analysis
efficiency criterion
cba
hierarchical hybrid edf/fifo
nms
integrated system
hiding a message
mp3 data set
lsb
classification
non real time traffic
l*a*b color space
ccdf
pso
service level agreement (sla)
adaptive service agreement
autism
self-organizing map
attention shift
distributed file system
data center
tcp incast
statistical methods & packet length.
chemical networking protocols
network simulator 2.
rate control.
hlts
spin
dd
evolutionary system
qualnet
self-optimization
wireless broadband
network stack composition
compuetr networks
minimum total network cost.
interference control
gis layers
and software fault injection & composed web servic
link cost
hybrid protocols.
self-configuration
heterogeneous wireless networks
dacs scheme
policy-based network management
adaptive retransmission
cooperative relay diversity
cross-layer design
adaptive modulation and coding
andsf (access network discovery and selection func
authenticated data structure (ads)
security kernels
broader gateway protocol (bgp)
alternative cluster head nodes
multi-hop
cloud sensor
multi-bs
encapsulation
media independent handover (mih)
vertical handover (vho)
pts
auction cluster head
hybrid
smart cities
cost estimation
city services
cloud architectures
received signal strength indicator (rssi)
wireless sensor network (wsn).
levenberg-marquardt (lm) algorithm
user satisfaction
bandwidth allocation
peer selection algorithm
p2p live streaming
as-friendliness
cost-minimizing algorithm
qos metric
weight
application weight
node- dependent
dynamic weight
unified qos metric
radio propagation
parallel crc computation
energy efficient sensing
ozo generator
cooperative spectrum sensing
ipv6 header and exhibition date.
distributed optimisation
potential game
decision making system
programming models
mobile cloud offloading
hysteresis
call admission control
mobile relay node
wireless sensors network (wsn)
dynamic clustering
energy balancing
optimal cluster size
video on demand
heuristic algorithm
interactivity.
routing path.
eventual consistancy
web browsing & mobile networks
wifi cellular interworking
network failure tolerance.
reliable hetnet
dynamic bandwidth distribution.
peer-to-peer (p2p)
manet.
cloud computing; cloud services; quality-of-servic
zigbee & rfid.
global positioning system
improve accuracy
cross-layer scheduling
accuracy factors
snr
ls
mmse
packet delay
cazac sequences
frft
connected candidate order
sto
mptcp
congestion controls
multi-homed
middleware & platform
token based coordination
management
orthogonal least squares ols.
fuzzy basis function fbf
adaptive m-qam/mpsk modulation
cooperative communications
overlay multicast tree
home network
odp polynomial
residential energy management
information-centric networking
rats (radio access technologies).
ims (ip multimedia subsystem)
vho (vertical handover)
ansf (access network selection function)
mih (media independent handover)
connectivity.
wireless ad hoc networks
transmission range
link distance
optisystem 7.0
visibility
atmospheric attenuation
free space optical communications
hello flood attack
passive attack
active attack
cloud service broker
key management.
grp
alloctc
modelling
system & network vir tualization
passive measurements
reac
hypervisor
complementary cumulative dist ribution function (c
orthogonal frequency division multiplexing ( ofdm)
ngn
profile of qosr
inf ogain
inline measurement tcp (imtcp)
available bandwidth
iqmsmp
qos management
bandwidth measurement
mobility management
ims
treeview
k-means
visualization
mobile agents
cluster 3.0
isp
qam & wdm.
multiplexing techniques
digital modulation formats
ieee 802.16d
sui- 4
16-qam
64-qam
sui-6.
qpsk
hybrid-based methods.
bpsk
sui-1
sui-2
sui-3
sui-5
mobile ad hoc network (manet)
collision avoidance.
cognitive network
admission control
energy detection .
bam
management dynamic
socioeconomic indicator s
imaginary value
phase sensitive detector method
re al value
bioimpedance
tetrapolar
mode of operation
encryption oracle
interasterisk excha nge protocol (iax)
stream cipher
maximum network welfare.
interworking
topology construction
ufas
proposed economic model
topology maintenance.
enr
radio resource management (rrm)
node classification.
erasure code
reciprocity.
pfr
optimized edge routing
sn mp
kdd cup 99
xbee
phase shift keying
quantum communication
energy co nsumption
tdma
ns 2.
link aware.
application level multicast
multicast tree
overla y networks
multi-hop relay stations
fairness and throughput
mobile stations
sched uling
middleware
mo bile device
mobile social network
wide area network
traffic density
shortest path algorithm
traffic matrix
onward routing.
all call query
video recording
root-music.
lu factorization
subspace estimation method
signal space
time delay
frequency estimation
null (noise) space
qr factorization
rank revealing
naming mechanism; name-specifiers; predicate-based
hierarchical routing
qos routing. 1. introduction
accident.
sms
intelligent transportation system
smart vehicle
grx (gprs roaming exchange)
short message service
mobile service
ipx (ip exchange)
event handling
in-network aggregation
simulations; mpls; traffic engineering; fast rerou
vertex cover
graph matching
attacker
signature
greedy algorithms
approximation algorithms
virtual backbone tree
hierarchical clustering.
breadth-first search tree.
wormhole attack
number portability
spectral efficiency
golden code
query on release
outage probability
call dropback
low complex sphere decoder.
cooperative communication
cooperative stbc
matrix decomposition
hosted
autonomic management
long- reach passive optical networks; dynamic band
resource provisioning
mam
g-rdm
binary exponential backoff.
network computing
real time traffic.
mesh-pull backup
multicast trees
resiliency technique
scalable codec
node disjoint routing
qos routing; mobile ad hoc networks; energy-aware
double stack
tcp and rtt
bgpv4
narrowband rf networks
encoding strategy
node coding
range-based methods
ospfv3
gsm
performance & 802.11p
fairness
802.11b
wlan network
distributed coordination function
video transmission
multimedia sensor networks
roaming
white label
bloom filter; zfilter; zformation; diffie-hellman-
mipv6
mipv4
hierarchical mobile ip
fast handover.
telecommunications
ip
interconnection
highly available
phone system
peering
bandwidth allocation models (bam)
alloctc-sharing.
elliptic filtering (ef)
interconnection topology
hex-cell topology
hex-cell topology
interconnection topology
dna
nist
mixcolumns
mds
histograms of colour image
power management
bottleneck energy
adaptive colour image steganography
random pixel selection
difference in histograms
steganogaraphic noise
uwsn
fuzzy c-means
honeypots
nids
hids
step-size.
grid point approximation algorithm
e-protection
epidemic disease
non-deterministic delays
sirs epidemic model
dtmc markov model
epidemic disease
sirs epidemic model
dtmc markov model
qos routing
sensor
applications
multi carrier
tora
psnr
multi carrier
lognormal sum
moment matching
log skew normal
amplitude clipping and filtering (acf)
elliptic filtering (ef)
iir (infinite impulse response
amplitude clipping and filtering (acf)
iir (infinite impulse response
video contents
passive optical network
gsa
teks
white space steganography
lzw
huffman coding
compression
adhoc using cisco devices.
lkh
tcp computation enhancement
qos for routing
wireless ad-hoc networks
smart routing.
artificial fish swarm algorithm
node clustering
peer-to-peer streaming
multimedia broadcast multicast services
link prediction
dynamic rekeying
dpcplp
signal strength
selfish nodes
maximizing network interruption problem
security breaking cost
mobile payment
and encryption.
distributed coordination
spectrum heterogeneity
slave
dual-slave
control channel dilemma
coordinator
sara
ant based routing
adt-android development tool.
gui-graphical user interface
ide-integrated development environment
petal routing
cross-layering
voip capacity
prior storing server
internet protocol television.
codec adaptation.
vowlan
smo
relevancy
interoperability cheking
security component
internet vulnerabilities and medical identity thef
cyber attacks
de-noising
wavelet
peak-to-average power ratio
identity theft
eigen vectors component.
m/d/1 with vacations
data stores
mean waiting time
m/h2/1
voice control
resources
energy management
z-wave
industrial automation
assistive homes
insteon
waveins
distributed manet management
performance routing
network life
heterogeneous
pops virtual mobile ip network.
internet service provider
point of presence
mobile ip border gateway
intrusion prevention
deauthentification
packet injection
tools
smart phone forensic
digital forensic
internal memory
digital evidence
analysis
eigenvalue spectrum
formal correction
wavelet- eigen vector
projection
firewall.
formal verification
misconfigurations detection
linux.
802.15.4
rdp
remote desktop environments
users perceived operability
tesbed
fleetnet
its
queuing theory
tcp v ariants
mobility .
real time
priority of traffic flow
history routing data
bandwidth - guaranteed routing alg orithm
security of e-content
multi-media. 1. introduction
broadcast trees
e-protection
web service
security of e-content
multi-media. 1. introduction
non-deterministic delays
6to4 tunnel
manual tunnel
piece selection
peak to average power ratio (papr)
orthogonal frequency division multiplexing (ofdm)
cumulative complementary distribution function (cc
high performance computing
heterogeneous environments
parallel computing
sir model; seirs model; delay differential equatio
lte; mimo ;ofdm
dynamic spectrum access
integrity
bluetooth network
jammer technology
vanet; mobility model; simulations
round trip time (rtt)
passive optical network (pon)
dynamic bandwidth allocation (dba)
cloud service provider and cloud security.
intrusions
degree of freedom "dof"
multiplicative interleaving wi
sac-ocdma systems
nzcc code
md code
spectral/spatial dimension (sd
humidity monitoring systems
energy reservation
environmental monitoring
signing group
multiplicative interleaving
tree algorithm (mita)
network protocols & wireless n
machine learning attack
xor-puf
one-time password
security routing protocol
quality-of-service (qos).
successive interference
wireless sensor networks (wsn)
sensor nodes (sns)
anchor nodes (ans)
rof-based radio access network
real-time monitoring
qos metrics
orthogonal frequency division
peak to average power ratio
selective mapping
filtering and clipping
aodvmo
mfo
stable & vanet.
context-aware architecture
probabilistic voting-based filtering
false positive attack
false negative attack
network security.
extended clas
elliptic curve encryption.
sumo.
data accuracy.
sumo
data accuracy
qos.
threshold based vm placement technique for load ba
virtual machine
aodv routing protocol
aodv routing protocol.
privacy.
security and privacy for iot iot-enabled innovatio
delay sensitive.
queuing dela
delay sensitive
packet capture
packet capture.
raspberry
cognitive radio resource
dos attack
standard-deviation based encod
variable encoding
dynamic spectrum allocation (d
single carrier-frequency divis
ws-olsr
mpr selection
wingsuit flying search
broadcast storm problem
tomek links
imbalanced data
distributed denial of service
feature extraction
tuning parameters
web usage
usage mining
http csic dataset
tomek link
5g and networks for big data
database and system security
security & ai integration
security & network management
security in remote work
cyberattack detection system
clustering techniques
3-dimension
techniques
high-traffic networks
posterior belief
3-dimension markov chain
rf energy transfer
one-time passwor
eagle optimization
euclidean distance
electronics
information technologies
successive interference cancel
mmtc
ijcnc
computernetwork
岳辿鉛辿界看馨馨顎稼庄界温岳庄看稼壊
bandwidth
radiation efficiency
microstrip patch antenna (mpa)
decentralized clusting
relay node.
light regions
comp
physical unc
cw.
signal to noise ratio (snr)
b
standa
dft spreading
single carrier effect
generalized dft
papr reduction
physical unclonable function
software systems and technologies
passive measurement
active measurement
fuzzy logic.
cloud business
cloud game
positional tracking
rendering of 3d game view.
link break
routing protocol.
android smart phone
internet of things (iots)
remote control.
vehicular ad-hoc network (vanet)
structured p2p systems
distributed hash table (dht)
locality awareness
replication.
cooperative systems
rayleigh fading channels
case studies
failure probability
sensor lifetime
subsets
classification model
random forest
k-nearest neighbors
naive bayes.
algorithms and applications bioinformatics compute
roadside unit (rsu)
urban topology
ns-2
vanetmobisim
quality of service (qos).
internet of things.
data collection
jamming detection
vehicular communications
level crossing rate
mobile communication
tetra (terrestrial trunked radio).
phishing detection
url
visual similarity
convolution neural network.
obs
quality of services (qos)
share-per- link (spl)
fiber delay lines (fdl)
retrial queueing.
m/bp/1system
average waiting latency
mean queueing delay.
d2d
olsr& coverage.
private blockchain networks
linear predictors
protection motivation theory
fear motivation
digital native
digital immigrant
information privacy
antivirus.
machine authentication
cryptography.
knuth shuffle method
image encryption
parallel processing
digital communication
pulse position modulation.
big data security
microstrip patch antenna
design optimization
ultra-wideband.
hpv vaccination
gini index
income inequality
rstudio
american adolescents
multiscale analysis
multilayer representation
graph signal processing
software defined networks
truncated mean
clock time duration.
red deer algorithm
computer networks & communications cyber trust and
transmit power.
transmit power
biogeography based optimization
optimal route
vehicular ad hoc network
visible light communication.
ims & mipv6
greedy algorithm
mmpp
ims & mipv6.
greedy algorithm.
mmpp.
traffic shaping
nfv.
broadcasting
flooding
neighbour coverage
forwarding probability
connectivity metric.
unmanned aerial vehicles
internet of everything
channel modelling
propagation model
fifth generation.
qlrp
qltpc.
iov
deep convolutional neural learning
per
differential privacy
collaborative learning
federated learning
threat
mcdm
mitre
nantar algorithm
machine learning techniques
cse-cic-ids 2018
litnet-2020
reactive
rwp
reinforcement learning-based r
automatic
cognitiveradio
deeplearning
mask r-cnn
instancesegmentation
direct-to-satellites
inertial navigation systems
ins errors
convolutional neural networks
packet drop
end-to-end delay
best-effort network topology
eniao
fish school search routing
duty cycling
macstrategy
high performance
architectures
wireless multimedia
mac strategy
traffic index
traffic sensing systems
ifog-simulator
mish
cnn-bigru
hogzilla dataset
sha-1
message digest
data integrity
digital signature
national security agency
cluster-based routing protocol
low-power and lossy networks
position information response
position information request p
pdr
eecrpsid
non-interactive zero-knowledge
radio networks
mobile marketing
radar
software development
software
sensor errors
low-cost inertial navigation
system
scopusindexed
scopuspublication
adhoc networks
framed slotted aloha
aloha-q
transmission probability
etx
routing metric
objective functions
clipping
threshold
estimation
eigen decomposition
industrial internet of things
improved elliptic curve
rnn
cryptographic algorithms
packet classification
handover authentication
lightweight hashing
ant-colony algorithm
harris hawk algorithm
cluster distance
bce-leach
ieec-a
oee-wcrd
software testing
wsn optimization
adaptive hybrid deep learning
mprs selection
links fineness
spatial relation
ns3 simulator
navigation systems
neural networks
innovation
wireless internet'
network operations
cooperative radio
hard fusion rule
additive white gaussian noise
non-cooperative wideb
spectrum sensin
cooperative wideb
movable anchor
priority scheduling
data packet
mobile agent
itinerary planning
smote
network security laboratory
shortest -path algorithms
entropy
mechanization
non-content bas
network securit
blockchain technology
vanet security
internet of thing
url phishing
newcwv
bursty tcp traffic
improved reptile search algori
nature inspired computational
convergence rate
cicids-2018 dataset
system calls
ecc
data
bluetooth
low energy
wireless sensor
rateless
advertisement
congestion detection
rateless and wireless sensor
mobile wsn-iot
k-means clustering
ch selection
weight function
fnd
intelligent transportation sys
salp swarm algorithm
quasi birth-death (qbd)
retrial queueing
ad-hoc network
unlicensed band
ranging localization methods
broadcast latency problems
reachability
average latency etc
vanet-lte integration
t
mobile adhoc network
broadcast latency problems;
dynamic
security training
security management
graph-mining
secure routing
kvm
benchmarks
kernel-based virtual machines
technology
radio technology
secure system
wearable wireless sensor
fifth-generation radio technol
long-te
wearable wireless sensor secur
ul-a
windows
shimming
radio network
spatioconstraints
mayfly optimization
delay efficiency
nsl-kdd dataset
kyoto dataset
two stage detection
mean detection time
architectural styles
orchestration and rest
resource utilization
multipoint relay
topology maintenance
message control
architectural
cloud
isolation forest
local outlier factor
smart designated node
intrusion detection systems
dimensionality reduction
multi-server security
cryptanalysis
fuzzy commitment
sdwn
nonlinear programming
navigation
anti-phishing
multi objective optimization
stable election protocol
contact tracing
covid-19
confidence interval
lightweight environment
smart contract security
os pen testing
exploit windows
persistence attack
mininet wi-fi
association control
access point selection
software-defined wireless net
content dissemination
content forwarding
network performance
spatio-constraints
cross-layer
cognitive radio network (crn)
intelligent systems
software process
web engineering
l software engineering
software maintenance
knowledge-based systems
formal methods
testing
total accessibility matrix
mobile adhoc networks (manets)
dynamic source routing (dsr)
preemptive routing
synchronization process
packet communications
asynchronous data stream
discrete information
channels with a random multiple access
program modeling
control flow
petri nets
composition operations
multi-commodity multi-cost flow
linear-programming
divide and conquer (d&c)
divide and conquer quad tree based multi hop stati
energy efficient routing protocol (eerp)
energy efficient wsns (eewsns).
response surface methodology
and modeling
mobile ad-hoc networks
design of experiments
minimum total network cost
fuzzy system
firefly algorithm
ieee 802.11af
ieee 802.11e
white-fi.
location-based
grid
cell-head election& void-handling algorithm.
knowledge science
flow of knowledge
velocity of knowledge
social sciences.
traffic model
processor sharing
network measurements
insensitive fuzzy c-means
stable election protocol(sep)
sepinsensitive fuzzy c-means.
sensitive persons
electromagnetic radiation (emr)
emr exposure level
signalling protocol
network auto-configuration.
cloud robotics
openstack
apache
ros.
transmission energy
simulation analysis.
network attack
dark-net monitoring
topology map
adjacency matrix
distributed leader election
internet gateway discovery
server
lan security
lanenforcer
ips
security hardware
multi-core processor
configuration model
multiple displays
pervasive display
content
user engagement.
multiple input multiple output(mimo)
orthogonal frequency division multiplexing(ofdm)
peak to average power ratio(papr). space time bloc
homomorphic encryption
elliptic curve cryptography (ecc)
elliptic curve digital signature algorithm (ecdsa)
honest-but-curious attack
malicious attac
pmipv6
aaa
fast handov
processing time.
housekeeper
robot
human
tasks.
laplacian matrix
path splitting
virtual optical network
virtual network embedding
elastic optical network
cloud applications
software-defined network
traffic flows
virtual data center
artificial bee colony (abc)
fuzzy logic system.
autonomous underwater vehicle
mission planning
heterogeneous group routing
evolutionary algorithm
encryption
mpi
supercomputer
attributed hierarchical graphs
big graphs
information visualization
visualization systems
secret sharing
lightweight cryptography
public key cryptography
fuzzy classifier
differential evolution
binary harmonic search
octagon-cell
interconnected networks
received power
code
electromagnetic radiation
power density
equipment spectrum analyzer.
global system for mobile communications (gsm)
radiation pattern
pgb
agf
fading channel
dirty paper coding
viterbi algorithm.
lattice encoding and decoding
indoor positioning
localisation
smart homes
internet of things & rfid
audio and video transmission
adaptive bitrate streaming
progressive download
global positioning system gps
forgetting factor (了)
ota carrier
interference
recursive least squares (rls) algorithm
energy-aware
ad-hoc networks
matlab simulink
mode selection
device-to-device
matlab.
life-time
mobility load balancing
lte networks
chaotic codes
lyapunov exponent
linear receivers
handoff
cellular wireless network
high bit error
explicit loss and handoff notification
confidentiality
integration
nsl-kdd
kernel
一糸糸99
kernel selection
soc
csp
coap
m2m
sla
oma
preemption
interconnection networks
priority-based data reporting
ieee 802.15.4 sensor networks
queue management
transport protocol
wsn testbed
congestion control.
home monitoring
has.
adhoc wireless networks
adhoc routing
event condition action (eca)
fat-tailedness
kurtosis
centrality metrics
degree distribution
concordance
opportunistic fair scheduling (ofs)
zero-forcing beamforming (zfb)
channel capacity
lte downlink
spate time block coding and throughput.
adaptive routing
disjoint paths
3d grid
data-oriented privacy
secure data aggregation
spread spectrum.
uwsns
akaike information criterion
network services
power consumption.
is-is
ospf
route redistribution
igrp
eigrp
multicommodity flow
ciphertext
sac
s-box
secure algorithm
avalanche effect
advanced encryption standard
client/server
mobile agent .
contact center
communication channel
p2p communication
webrct
802.11ad
deep neural networks
joint multiple resourceallocation
cloud computing environments
position accuracy
error rate
carrier interference
average carrier power
detection
accuracy
unb iscx2012.
mobile computing
computational offloading
dynamic task offloading
energy optimization.
eehmac protocol and clustering in wsn
protocol
signcryption
elliptic curve
sd-wan
edge computing
kubernetes
containers
services
switching
computer networks important dates
availability
opportunistic
communication protocol design
adhoc on demanddistance vector alternative (odva)
open linkstaterouting (olsr)
internet ofthing(iot)
random early detection
active queue management
online password attack detection
protocol analysis
dbscan clustering algorithm
cluster formation
inter-meeting time.
emergency applications
real-time packet
af cooperative
convolutional coding
path loss
power allocation
fading.
aifsn
packet delivery factor
queuing and scheduling.
index terms : cooperative systems
network protocols & wireless networks
node-trustworthiness
evolutionary computing based
traffic priority
structure
sniffing
geo encryption
attribute-based
dscp marking
jitter
hfc network
mos.
binary patterns
fingerprint biometrics
histogram
neighborhood tripartite authentication.
content delivery services
minimum network cost
black-hole attack
discrete trust
consensus trust
and contextual information.
6lowpan
local repair
6rlr-abc
lr-abc mechanism
multi-channel multi-radio
gravitational search algorithm.
hotspot issue
unequal clustering
multihop communication
adaptive threshold
flooding attack
software-defined networking
uav communication
private uav network
lans of drones
signaling frames
control and feedback singling
ranging methods
range-based &range-free.
lods
uav networks
minimum number of drones
intelligent transportation system (its)
weighted extreme learning machine
channel switching
delay minimization
network lifetime.
terrestial
aerial platforms
qos performance
temporary events
modbus
programmable logic controllers
network evaluation
benchmark.
mobile ipv6
fhmipv6
nemo
diffserv.
mcs
opportunistic networks
smart city
virtual machine migration
vertical compression
horizontal compression
data reliability
path selection
confidence
priority
fuzzy optimization.
virtual cache
communication networks
data center network
flow scheduling
network partition
stochastic scheduling model
software defined networking
real-time online interactive application
roia
network operating system
nox
ces
mplste
switch capacity
number of queues impact
qoe evaluation
bandwidth isolation
mobile-rpl
adaptive link quality
low power lossy network
malqi.
packet size optimization
2-hop
time diversity
5g network
mobile core network
ip-in-ip
gre
energy harvesting
decoding sinr
data security and privacy for cps
wireless sensor network security and privacy
multimedia traffic
routing.
single path
random channel
deterministic channels
network performances
mobile ad-hoc networks (manet)
self-organized networks (son)
ring
mcr
static routing algorithm
dynamic fault-tolerant routing.
lighting control
dimming
acoustic
underwater wireless device networks
void region
and normalized depth.
lightweight encryption
security analysis
simeck
bandwidth optimization
energy consumption (ec)
efficient reliability and interval discrepant rout
average delay (ad)
execution time (et)
swiittch capaciitty
vehicle
link stability
node rank
packet delivery ratio
threshold energy
heterogeneous infrastructure as a service
open jackson network
channel model
transfer function
noise modelling
bit error ratio
orthogonal frequency-division multiplexing.
mobile computing clouds
cloudlet network
mobile user
route model
connection channel
metropolitan area network
epc
network applications.
residual energ
intra wireless body sensor network (intra-wb
inter-meeting time
new network communication research articles
standalone communication systems
disaster communication systems
context-aware routing
virtual wan accelerator
and bandwidth utilization (bu).
uplink throughput maximization
full-duplex
self-interference
inter-cell interference
resource allocations and interference cancellation
weighted connectivity index
vehicular cloud computing
mobile edge computing
vehicular ad-hoc networks
computation offloading
vod
proxy-cache
all-cache
por-cache
random-cache
dsc-cache
sb
鉛韓s
lps
rfid
anomaly
energy aware routing protocol
ad-hoc multipath
particle swarm optimization algorithm
bayesian network
congestion propagation
soffttwarre deffiined nettworrkiing
qualliitty off serrviice
See more
Users being followed by IJCNCJournal