Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computer and Communication Engineering

ISSN: 2010--3743
Publisher: IACSIT Press


ADD TO MY LIST
 
Study of SQL Injection Attacks and Countermeasures PDF available

Author(s): Sayyed Mohammad Sadegh Sajjadi | Bahare Tajalli Pour
Volume: 2
Issue: 5
Year: 2013
A Survey on Energy Efficiency for the Future Internet PDF available

Author(s): Tiago Silva | Artur Arsenio
Volume: 2
Issue: 5
Year: 2013
Migration towards NGN: Common Applied Strategies PDF available

Author(s): Sven Pärand
Volume: 2
Issue: 5
Year: 2013
Proposal for Wireless Controlled Threat Monitoring and Targeting Vehicles PDF available

Author(s): Muhammad Sulleman Memon | Asif Ali Laghari
Volume: 2
Issue: 5
Year: 2013
IEEE802.11n Time Synchronization for MIMO OFDM WLAN PDF available

Author(s): A. Ali | W. Mahmood | I. Javed | I. Ur Rehman
Volume: 2
Issue: 5
Year: 2013
A Time Synchronized Wireless Sensor Tree Network using SimpliciTI PDF available

Author(s): Vaibhav Pratap Singh | Nitin Chandrachoodan | Anil Prabhakar
Volume: 2
Issue: 5
Year: 2013
Performance Analysis of WAVE Control Channels for Public Safety Services in VANETs PDF available

Author(s): Jae-Min Lee | Min-Soo Woo | Sung-Gi Min
Volume: 2
Issue: 5
Year: 2013
Data Reduction for Finding Silhouette Edges on 3D-Animated Model PDF available

Author(s): Nucharee Thongthungwong | Rajalida Lipikorn
Volume: 2
Issue: 5
Year: 2013
An Algorithm for Variable Cache Ways PDF available

Author(s): S. Subha
Volume: 2
Issue: 5
Year: 2013
Enhanced Channel Assignment Algorithm for Relaying Nodes in W-CDMA Multihop Cellular Network PDF available

Author(s): Kishana R. Kashwan | S. G. Balakrishnan
Volume: 2
Issue: 5
Year: 2013
Design of High Speed -Low Power-High Accurate (HS-LP-HA) Adder PDF available

Author(s): Muddapu Parvathi | N. Vasantha | K. Satya Prasad
Volume: 2
Issue: 5
Year: 2013
A Trusted Bootstrapping Scheme Using USB Key Based on UEFI PDF available

Author(s): Abhishek Singh Kushwaha
Volume: 2
Issue: 5
Year: 2013
Broadband Wireless Access (BWA): Spectrum Refarming in Thailand PDF available

Author(s): Settapong Malisuwan | Jesada Sivaraks | Navneet Madan
Volume: 2
Issue: 4
Year: 2013
A New Mathematical Model of High Speed Satellite Channel PDF available

Author(s): Zheng Xiaotian | Li Jilin | Lin Mo | Wang Jian | Li Xinhua
Volume: 2
Issue: 4
Year: 2013
Localization in Wireless Sensor Network Using a Mobile Anchor in Obstacle Environment PDF available

Author(s): Sayyed Majid Mazinani | Fatemeh Farnia
Volume: 2
Issue: 4
Year: 2013
Cognitive Selection Mechanism for Indoor Propagation PDF available

Author(s): W. Hashim | A. F. Ismail | S. Dzulkifly | N. A. Abd Ghafar
Volume: 2
Issue: 4
Year: 2013
Comparison of Radar Derived Rain Attenuation with the RazakSAT’s X-Band Link Signal Measurement PDF available

Author(s): K. Badron | A. F. Ismail | A. Z. Jusoh | N. H. M. Sobli | M. Ismail | W. Hashim
Volume: 2
Issue: 4
Year: 2013
Microstrip Triangular Loop Resonator Duplexer PDF available

Author(s): A. Chinig | J. Zbitou | A. Errkik | A.Tribak | H. Bennis | M. Latrach
Volume: 2
Issue: 4
Year: 2013
Assisted-Leach (A-Leach) Energy Efficient Routing Protocol for Wireless Sensor PDF available

Author(s): Sunkara Vinodh Kumar | Ajit Pal
Volume: 2
Issue: 4
Year: 2013
A Low Cost Broadband Planar Antenna PDF available

Author(s): R. Dakir | J. Zbitou | A. Mouhsen | A.Tribak | Angel Mediavilla Sanchez | M. Latrach
Volume: 2
Issue: 4
Year: 2013
A New Path Loss Model for LTE Network to Address Propagation Delay PDF available

Author(s): J. Ramkumar | R. Gunasekaran
Volume: 2
Issue: 4
Year: 2013
Rain Fade Estimations for the X-Band Satellite Communication Link in the Tropics PDF available

Author(s): A. C. M. Nuroddin | A. F. Ismail | K. Abdullah | K. Badron | M. Ismail | W. Hashim
Volume: 2
Issue: 4
Year: 2013
An Analytical Model of Web Server Load Distribution by Applying a Minimum Entropy Strategy PDF available

Author(s): Teeranan Nandhakwang | Settapong Malisuwan | Jesada Sivaraks | Navneet Madan
Volume: 2
Issue: 4
Year: 2013
Research on Feature Extraction for Flaw Ultrasonic Echo Based on Wavelet Pack Analysis PDF available

Author(s): Wang Hai-Tao | Zhang Ze
Volume: 2
Issue: 4
Year: 2013
Design of F8 Encryption Algorithm Based on Customized Kasumi Block Cipher PDF available

Author(s): Nabil H. Shaker | Hanady H. Issa | Khaled A. Shehata | Somaia N. Hashem
Volume: 2
Issue: 4
Year: 2013
Medical Diagnosis Expert System as Service in Cloud PDF available

Author(s): A. B. Rajesh Kumar | G. V. Ramesh Babu | C. Phani Ramesh | P. Madhura | M. Padmavathamma
Volume: 2
Issue: 4
Year: 2013
Estimation of Mobility Models Based on Mobility Metrics and Their Impact on Routing Protocols in MANET PDF available

Author(s): S. C. Sharma | Santosh Kumar
Volume: 2
Issue: 4
Year: 2013
The on-Line Shopping Consumption Patterns of Saudi Shoppers PDF available

Author(s): Faisal Fahhad Alsharif | François Siewe | Chris Fidler | Giampaolo Bella
Volume: 2
Issue: 4
Year: 2013
Replication of Data in Database Systems for Backup and Failover – An Overview PDF available

Author(s): Tarandeep Singh | Parvinder S. Sandhu | Harbax Singh Bhatti
Volume: 2
Issue: 4
Year: 2013
Strongest AES with S-Boxes Bank and Dynamic Key MDS Matrix (SDK-AES) PDF available

Author(s): Fatma Ahmed | Dalia Elkamchouchi
Volume: 2
Issue: 4
Year: 2013
Associative Informatics: An Approach Shift to Address Growing Technological Demand PDF available

Author(s): Kamal Kumar Ghanshala | Durgesh Pant
Volume: 2
Issue: 4
Year: 2013
A Secure Parking Reservation System Using GSM Technology PDF available

Author(s): Yusnita Rahayu | Fariza N. Mustapa
Volume: 2
Issue: 4
Year: 2013
An Improved LSB Based Steganography Technique for RGB Color Images PDF available

Author(s): Mamta Juneja | Parvinder S. Sandhu
Volume: 2
Issue: 4
Year: 2013
A New Efficient Protocol for Authenticated Key Agreement PDF available

Author(s): Fatma Ahmed | Dalia Elkamchouchi
Volume: 2
Issue: 4
Year: 2013
Web Based Application for Supporting Knowledge Sharing at Cipadu Village PDF available

Author(s): Dian Anubhakti | Basuki Hari Prasetyo | Nazir Harjanto
Volume: 2
Issue: 4
Year: 2013
Domain-Specific Front-End For Virtual System Performance Exploration PDF available

Author(s): Janne Vatjus-Anttila
Volume: 2
Issue: 4
Year: 2013
BER and PAPR Analysis of DFT Precoded OFDM Multilayer IDMA (P-OFDM ML IDMA) Signals PDF available

Author(s): Mohamed A. Aboul-Dahab | Esam A. A. A. Hagras | Ahmad A. Elhaseeb
Volume: 2
Issue: 4
Year: 2013
Adaptive Backstepping Control and Tracking Control for New Chaotic Dynamical System PDF available

Author(s): Qian Zhang | Junyi Zhao
Volume: 2
Issue: 4
Year: 2013
Predicting Radio Frequency Radiation from Mobile Communication Base Stations PDF available

Author(s): A. F. Ismail | N. I. Sidek | K. Abdullah | W. Hashim
Volume: 2
Issue: 4
Year: 2013
Cognitive Selection Mechanism Performance in IEEE 802.11 WLAN PDF available

Author(s): W. Hashim | A. F. Ismail | N. A. Abd Ghafar | S. Dzulkifly
Volume: 2
Issue: 4
Year: 2013
Protecting Personal Medical Information: Asian Perspectives PDF available

Author(s): Suhaila Samsuri | Zuraini Ismail | Rabiah Ahmad
Volume: 2
Issue: 4
Year: 2013
Detecting Period and Burst Durations in Video Streaming by Means of Active Probing PDF available

Author(s): Bjørn J. Villa | Poul E. Heegaard
Volume: 2
Issue: 4
Year: 2013
Mobile-to-Mobile Multimedia Service Provisioning in the IMS Using REST-Based Mobile Services PDF available

Author(s): Muzzamil Aziz Chaudhary | Matthias Jarke
Volume: 2
Issue: 4
Year: 2013
Cloud Computing and Its Vision 2015!! PDF available

Author(s): Anurag S. Barde
Volume: 2
Issue: 4
Year: 2013
Knowledge Sharing for the Islamic Banking Sector in Malaysia

Author(s): Abdusalam A. A. Abuazoum | Nurdiana Azizan | Nursilah Ahmad
Volume: 2
Issue: 3
Year: 2013
Analysis for Memory Reduction of the UOV Scheme with the Application of PRNG

Author(s): Jihyun Kim | Howon Kim
Volume: 2
Issue: 3
Year: 2013
Examining the User Satisfaction on Web APP in LUI, PUI, and GUI

Author(s): Sin-Ho Chin
Volume: 2
Issue: 3
Year: 2013
An Evaluation to Security of Distributed System

Author(s): Alsharif Mohamed Y. Ahmed | Qian Depei
Volume: 2
Issue: 3
Year: 2013
A Distributed Online Service-Oriented Platform for the Airport Community

Author(s): A. Mastoris | S. Mouzakitis | D. Askounis
Volume: 2
Issue: 3
Year: 2013
Privacy-Preserving P2P Information Sharing Protocol for Mobile Social Networks

Author(s): Eric Ke Wang | Yunming Ye | S. M. Yiu | L. C. K. Hui
Volume: 2
Issue: 3
Year: 2013
Integration of Hierarchical Access Control and Keyword Search Encryption in Cloud Computing Environment

Author(s): Chih Hung Wang | Chia-Chun Hsu
Volume: 2
Issue: 3
Year: 2013
Traffic Flow Statistic Based on Computer Vision

Author(s): Liu Qiushi | Ray C. C. Cheung | Fu Ziyi | Sun Yihang
Volume: 2
Issue: 3
Year: 2013
Warning System for Detecting Malicious Applications on Android System

Author(s): Sung-Hoon Lee | Seung-Hun Jin
Volume: 2
Issue: 3
Year: 2013
A Quality Ratio-Based Novel Unequal Loss Protection Scheme in Wi-Fi Broadcasting System

Author(s): Dong Hyun Kim | Jong Min Kong | Jong Deok Kim
Volume: 2
Issue: 3
Year: 2013
Segmentation of 3D Stereoscopic Images Using LoG Operator for the Detection of Excessive Disparities

Author(s): Sang Hyun Kim | eong Yeop Kim | Gil Ja So
Volume: 2
Issue: 3
Year: 2013
A Very Fast Algorithm for Detecting Partially Plagiarized Documents Using FM-Index

Author(s): Chang SeokOck | JongKyuSeo | Sung-Hwan Kim | Hwan-Gue Cho
Volume: 2
Issue: 3
Year: 2013
Insider Attack-Resistant OTP (One-Time Password) Based on Bilinear Maps

Author(s): Yunjin Lee | Howon Kim
Volume: 2
Issue: 3
Year: 2013
Enhanced Attribute-Based Proxy Re-Encryption for Home Network

Author(s): Jongseok Choi | Howon Kim
Volume: 2
Issue: 3
Year: 2013
A New Model for Web Content Distributed Data Mining Based on SOAP and Ontology

Author(s): Ibrahim S. Alwatban | Ahmed Z. Emam | Azeddine Chikh
Volume: 2
Issue: 3
Year: 2013
Measuring Database Objects Relatedness in Peer-to-Peer Databases

Author(s): M. Basel Almourad
Volume: 2
Issue: 3
Year: 2013
In-Door Localization Using Orthogonal Antenna Direction

Author(s): Seungwoo Jeon | Mikyung Choi | Bonghee Hong | Joonho Kwon
Volume: 2
Issue: 3
Year: 2013
Extracting and Labelling the Objects from an Image by Using the Fuzzy Clustering Algorithm and a New Cluster Validity

Author(s): Chien-Hsing Chou | Yi-Zeng Hsieh | Mu-Chun Su | Yung-Long Chu
Volume: 2
Issue: 3
Year: 2013
Extracting the Critical Frequency Bands to Classify Vigilance States of Rats by Using a Novel Feature Selection Algorithm

Author(s): Chien-Hsing Chou | Chung-Chih Kuo | Zong-En Yu | Hsien-Pang Tai | Ke-Wei Chen
Volume: 2
Issue: 3
Year: 2013
An Interference Aware Routing Scheme Based on Channel Load for Multi-Radio Multi-Channel Wireless Mesh Networks

Author(s): Jeong-Soo Kim | Sang-Hwa Chung | Hyun-Suk Choi
Volume: 2
Issue: 3
Year: 2013
Exact Solution for Search-and-Rescue Path Planning

Author(s): Jean Berger | Nassirou Lo | Martin Noel
Volume: 2
Issue: 3
Year: 2013
Pan-Sharpening of Multispectral Imagery Using Content-Specific Orthogonal Linear Transform

Author(s): Vladimir M. Buntilov
Volume: 2
Issue: 3
Year: 2013
Optimized Multi-Precision Multiplication for Public-Key Cryptography on Embedded Microprocessors

Author(s): Hwajeong Seo | Howon Kim
Volume: 2
Issue: 3
Year: 2013
An Anonymous Roaming Payment System with Low Communication Cost by Using Group Signatures

Author(s): Chih-Hung Wang | Chih-Yu Lin | Tai-Yuan Tu
Volume: 2
Issue: 3
Year: 2013
The Effects of an Information-Technology Gifted Program on Friendship Using Scratch Programming Language and Clutter

Author(s): Seungki Shin | Phanwoo Park | Youngkwon Bae
Volume: 2
Issue: 3
Year: 2013
Impact of Warp Formation on GPU Performance

Author(s): Hong Jun Choi | Dong Oh Son | Cheol Hong Kim
Volume: 2
Issue: 3
Year: 2013
Using Unlabeled Data to Improve Author Identification

Author(s): R. Guzmán Cabrera | J. R. Guzmán Sepúlveda | J. A. Gordillo Sosa | M. Torres Cisneros | J. Herrera Cabral
Volume: 2
Issue: 3
Year: 2013
Parallel Binary Approach for Frequent Itemsets Mining

Author(s): Boutheina Missaoui | Khedija Arour | Yahya Slimani
Volume: 2
Issue: 3
Year: 2013
A Combinator Language for Software Quality Reports

Author(s): Pedro Martins | João P. Fernandes | João Saraiva
Volume: 2
Issue: 3
Year: 2013
Design and Implementation of Multi-Rate Broadcast Based Link Quality Measurement for Wireless Mesh Network

Author(s): Seung-Chur Yang | Hyung-Yoon Seo | Jong-Deok Kim
Volume: 2
Issue: 3
Year: 2013
Anti Phishing for Mid-Range Mobile Phones PDF available

Author(s): mran Khan Memon | Muhammad Khalid Khan
Volume: 2
Issue: 2
Year: 2013
Routing in WOBAN: A Review PDF available

Author(s): Asad Ali
Volume: 2
Issue: 2
Year: 2013
Parallel Implementation of 1-D Complex FFT Using Multithreading and Multi-Core Systems PDF available

Author(s): Umar Hamid | Haroon Shahzad | Muhammad Irfan
Volume: 2
Issue: 2
Year: 2013
Chaos Based Optical Communication PDF available

Author(s): Kamran Rauf | Muhammad Yasir
Volume: 2
Issue: 2
Year: 2013
Key Requirements for Component Configuration Management (CCM) PDF available

Author(s): Imran Ali Qureshi | Asif Iqbal Paracha | Saqib Afzal | Shahzad Rafiq
Volume: 2
Issue: 2
Year: 2013
Heterogenous Networks Architectures and Their Security Weaknesses PDF available

Author(s): Samad Baseer
Volume: 2
Issue: 2
Year: 2013
A Method of “Hard-Spot” Threshold Extraction of Pantograph-Catenary Current Collection Parameters of Train-Set PDF available

Author(s): Zhigang Liu | Zhiwei Han | Gang Chen | Jian Xie
Volume: 2
Issue: 2
Year: 2013
A Survey of Bandwidth Allocation in the Virtual Network PDF available

Author(s): Sima Ahmadpour | Omar Amer Abouabdalla | Ali abdulqader Bin Salem | Mahmoud Baklizi
Volume: 2
Issue: 2
Year: 2013
Robust Hand Gesture Recognition Algorithm for Simple Mouse Control PDF available

Author(s): Vivek Veeriah J. | Swaminathan P. L.
Volume: 2
Issue: 2
Year: 2013
An Efficient Heuristics for Minimizing Total Holding Cost with no Tardy Jobs in Job Shop Scheduling PDF available

Author(s): G. Ramya | M. Chandrasekaran
Volume: 2
Issue: 2
Year: 2013
A Novel Tabu Search Algorithm for Solving Robust Multiple Resource-Constrained Project Scheduling Problem PDF available

Author(s): Rong-Hwa Huang | Tung-Han Yu
Volume: 2
Issue: 2
Year: 2013
Information Entropy Estimation Using Indirect Conditional Information PDF available

Author(s): Nol Premasathian | Watcharee Tantikittipiisut
Volume: 2
Issue: 2
Year: 2013
An Approach for Secure Data Storage in Cloud Environment PDF available

Author(s): M. Gobi | R. Sridevi
Volume: 2
Issue: 2
Year: 2013
A New Model for Enterprise Expert Retrieval PDF available

Author(s): Valentin O. Molokanov | Dmitry A. Romanov | Valentin V. Tsibulsky
Volume: 2
Issue: 2
Year: 2013
Analysis of Cloud Computing Security Considerations for Platform as a Service PDF available

Author(s): Keyur S. Mehta
Volume: 2
Issue: 2
Year: 2013
New Software Development Methodology for Student of Java Programming Language PDF available

Author(s): Tejinder Singh | Jhunjhunu Rajasthan
Volume: 2
Issue: 2
Year: 2013
An Insight of Students‟ Technology Engagement in an A-Level College in Malaysia PDF available

Author(s): Ravichandran Purushothaman
Volume: 2
Issue: 2
Year: 2013
Analysis of Population Based Metaheuristic Used for Gene Clustering PDF available

Author(s): Arpit Jain | Shikha Agrawal | Jitendra Agrawal | Sanjeev Sharma
Volume: 2
Issue: 2
Year: 2013
Text Independent Speaker Identification and Verification System Using Bessel Featuress PDF available

Author(s): Mayank Gupta | Suryakanth V. Gangashetty
Volume: 2
Issue: 2
Year: 2013
A New Variant of TCP for Heterogeneous Networks PDF available

Author(s): Moumita Deb | Soumya Sarkar | Abhijit Bagchi
Volume: 2
Issue: 2
Year: 2013
A Universal Lexical Steganography Technique PDF available

Author(s): Ahmad Alabish | Abdulbaset Goweder | Anes Enakoa
Volume: 2
Issue: 2
Year: 2013
Immediate Family ACK Tree for Reliable Multicast in Mobile Ad Hoc Networks PDF available

Author(s): Tzu-Chiang Chiang | Chan-Yu Hsu | Jia-Lin Chang
Volume: 2
Issue: 2
Year: 2013
Optimizing Gateway Placement in Wireless Mesh Networks Based on ACO Algorithm PDF available

Author(s): Huyao Dac-Nhuong Le | Nhu Gia Nguyen | Nghia Huu Dinh | Nguyen Dang Le | Vinh Trong Le
Volume: 2
Issue: 2
Year: 2013
A Location-Based Distributed Routing Algorithm for Mobile Ad-Hoc Networks PDF available

Author(s): Tzu-Chiang Chiang | Jia-Lin Chang | Shih-Wei Lin
Volume: 2
Issue: 2
Year: 2013
An Investigation of the Efficacy of the Off-the-Shelf Malware Scanners and Combination Techniques PDF available

Author(s): Ibrahim Ejdayid A. Mansour
Volume: 2
Issue: 2
Year: 2013
A Review and Analysis of Software Complexity Metrics in Structural Testing PDF available

Author(s): Mrinal Kanti Debbarma | Swapan Debbarma | Nikhil Debbarma | Kunal Chakma | Anupam Jamatia
Volume: 2
Issue: 2
Year: 2013
A Novel Ear Identification System for Security Applications PDF available

Author(s): S. Tayyaba | M. W. Ashraf | N. Afzulpurkar | A. Hussain | M. Imran | A. Noreen
Volume: 2
Issue: 2
Year: 2013
Personalized Information Seeking Powered by Mobile Ontology for Sightless Residents of under Developing States PDF available

Author(s): Ahmad C. Bukhari | Mehtab Afzal | Yong-Gi Kim
Volume: 2
Issue: 2
Year: 2013
Free Forms + CRM     Why do you need a reservation system?