Solution to the Access Network of the Celia Sanchez Manduley Hospital in Granma Province

Author(s): Edilberto Santiesteban Santos | Dilber Rosabal Montero | Riubisel Perez Cedeno | Leonel Figueredo Fernandez
Volume: 2
Issue: 3
Year: 2011





Evaluating the 3G Network Performance by Virtual Testing

Author(s): Prabu Jayakumar | Chiew Foong Kwong
Volume: 2
Issue: 3
Year: 2011





Factors Affecting Malaysian Mobile Banking Adoption: An Empirical Analysis

Author(s): Ching Mun Cheah | Aik Chuan Teo | Jia Jia Sim | Kam Hoe Oon | Boon In Tan
Volume: 2
Issue: 3
Year: 2011





Optimal Routing Protocol for TCP-NewReno in Wireless Mobile Ad-hoc Networks

Author(s): Monika Rani | Harish Kumar | Gurpal Singh
Volume: 2
Issue: 3
Year: 2011





Performance Analysis of Collision Avoidance MAC Protocol in Multi-hop Wireless Ad-hoc Network

Author(s): I. Mustapha | J. D. Jiya | B. U. Musa | J. Usman
Volume: 2
Issue: 3
Year: 2011





BER Performance Evaluation of FFT-OFDM and DWT-OFDM

Author(s): Swati Sharma | Sanjeev Kumar
Volume: 2
Issue: 2
Year: 2011





Modeling and Analysis of Production System using Operational Petri Nets with Resources Sharing

Author(s): Sunita Kumawat | G.N. Purohit
Volume: 2
Issue: 2
Year: 2011





Routing Mechanism for MANET in Disaster Area

Author(s): A.K. Vatsa | Prince Chauhan | Meenakshi Chauhan | Jyoti Sharm
Volume: 2
Issue: 2
Year: 2011





Wireless Controlled Two Wheel Balancing Robot

Author(s): Charles Yong | Chiew Foong Kwong
Volume: 2
Issue: 2
Year: 2011





Handover Performance Evaluation in WiFi/WiMax Networks using M-SIP

Author(s): Prince Edward E | Sumathy V
Volume: 2
Issue: 2
Year: 2011





An Empirical Analysis of Malaysian Pre-university Students' ICT Competency Gender Differrences

Author(s): Teck Soon Hew | Lai Ying Leong
Volume: 2
Issue: 1
Year: 2011





Simulating Denial of Service Attack Using WiMAX Experimental Setup

Author(s): John Kok Han Hong | Mohamad Yusoff Alias | Bok Min Goi
Volume: 2
Issue: 1
Year: 2011





Exploring the Individual Characteristics on the Adoption of Broadband: An Empirical Analysis

Author(s): Jia Jia Sim | Garry Wei Han Tan | Keng Boon Ooi | Voon Hsien Lee
Volume: 2
Issue: 1
Year: 2011





A Blending of A Generalized Playfair Cipher and A Modified Hill Cipher

Author(s): V.U.K. Sastry | N. Ravi Shankar | S. Durga Bhavani
Volume: 2
Issue: 1
Year: 2011





Performance of OFDM in the Variation of the Path Quantity in Power Line Communications

Author(s): Aminuddin Bin Ahmad Kayani | Mohamad Yusoff Bin Alias
Volume: 2
Issue: 1
Year: 2011





A Spectrum Sharing Game with Varying Number of Players

Author(s): Anh Tuan Tran | Chiew Tong Lau | A.B. Premkumar
Volume: 1
Issue: 2
Year: 2010





A Generalized Playfair Chipher involving Intertwining, Interweaving and Iteration

Author(s): V.U.K. Sastry | N. Ravi Shankar | S. Durga Bhavani
Volume: 1
Issue: 2
Year: 2010





Establishment of IPv6 Network on Intranet Environment

Author(s): Nazrulazhar Bahaman | Mohd Zaki | Erman Hamid | Mohd Faizal Abdullah | Azman Mat Ariff
Volume: 1
Issue: 2
Year: 2010





Electromagnetic Radiation towards Adult Human Head from Handheld Mobile Phones

Author(s): D.A.A. Mat | W.T. Kho | A. Joseph | K. Kipli | K. Lias | A.S.W. Marzuki | S. Sahrani
Volume: 1
Issue: 2
Year: 2010





Cleaning Various Noise Patterns in Web Pages for Web Data Extraction

Author(s): Thanda Htwe
Volume: 1
Issue: 2
Year: 2010





Evaluation of the IEEE 802.11p-based TDMA MAC Method for Road Side-to-Vehicle Communications

Author(s): Rashid A. Saeed | Amran Bin Hj Naemat | Azrin Bin Aris | Mat Kamil Bin Awang
Volume: 1
Issue: 2
Year: 2010





Adaptive Network Fuzzy Inference System (ANFIS) Handoff Algorithm

Author(s): Chiew Foong Kwong | Teong Chee Chuah | Sze Wei Lee
Volume: 1
Issue: 2
Year: 2010





Image Interpolation framework using non-adaptive approach and NL means

Author(s): Ah Nge Htwe
Volume: 1
Issue: 1
Year: 2010





Semantic XML Filtering Technique of Multiple XPath Queries Using NFA Representation

Author(s): Yi Yi Hlain
Volume: 1
Issue: 1
Year: 2010





Improving Supply Chain Traceability Using RFID Technology

Author(s): Said A. Elshayeb | Khalid Bin Hasnan | Chua Yik Yen
Volume: 1
Issue: 1
Year: 2010





Design of Multimedia Messaging Service for Mobile Telemedicine System

Author(s): Andik Setyono | Md. Jahangir Alam | Raed Ali Al-Saqour
Volume: 1
Issue: 1
Year: 2010





Enhanced Features Ranking and Selection using Recursive Feature Elimination(RFE) and k-Nearest Neighbor Algorithms in Support Vector Machine for Intrusion Detection System

Author(s): Kyaw Thet Khaing
Volume: 1
Issue: 1
Year: 2010




