University of Bahrain
Scientific Journals

Browsing 11. International Journal of Computing and Network Technology by Issue Date

Browsing 11. International Journal of Computing and Network Technology by Issue Date

Sort by: Order: Results:

  • Tsuboi,Tsutomu; Oguri,Koji (2013)
    This paper describes new ITS potential application for natural disaster protection. In general ITS application is mainly for safety and efficiency of transportation system such as collision avoidance in cross section, ...
  • Sivaselvan, K.; Vijayalakshmi, C. (2013)
    Over the last few decades stream control mechanism has more attention in the early stages of research in communication network. The motivation of this work is deep understanding on the stream control mechanism problem in ...
  • masood, Omer; Akram,Adeel; Majeed,Muhammad Nadeem (2013)
    It is expected that wireless communication and access technologies will continue to evolve at a rapid speed. Different wireless networks such as IEEE 802.11, 3G/4G, WiMAX, multimedia networks and sensor networks, will ...
  • Tripathi,Anshuman (2013)
    Many multicast protocols for Delay Tolerant Networks fall in the class of tree based algorithms. Most of these tree computations aim to reduce the time taken by the message to reach its recipients. However, many scenarios ...
  • Zanganeh,Mehran (2013)
    The Electrical impedance tomography (EIT) is a relatively new technical imaging method for industrial applications, medical imaging and relative researches. The most important part of this system is an AC current source. ...
  • Sameni,Kamran; Yazdani, Nasser; Payandeh, Ali (2013)
    Security support in wireless systems is a vital necessity to protect users and network in some applications. Since wireless media are available to all, attackers can easily reach the network and network will be more ...
  • Rehman,A.; Mustafa,M.; Israr I.; Yaqoob,M. (2013)
    Wearable sensors are the major part of Wireless Body Area Networks (WBANs) for provision of health care services and physical activity monitoring. In this paper, a brief survey of different types of wearable sensors presented ...
  • Baloch,Fariha; Pendse ,Ravi (2013)
    a transmission control scheme plays an important role in determining a protocol’s performance. Protocol performance can be measured based on a variety of factors. In this paper we compared four protocols that are compatible ...
  • Salvadori,F.; Gehrke, C.S.; Campos, M.de; Sausen, P. S.; Oliveira, A. C. (2013)
    The smart grid can be defined as a modern electric power grid infrastructure for improved efficiency, reliability and safety, with smooth integration of renewable and alternative energy sources, through automated control ...
  • Benham,Anthony; Read, Huw; Sutherland,Iain (2013)
    Behaviour Engines allow the acquisition of tacit knowledge by using a learn-by-doing workflow and provide a direct interface between the expert user and the developing project code based on an intuitive justification-conclusion ...
  • R,Anisha P; C,Kishor Kumar Reddy; K,Prashanth S (2013)
    Cloud computing is a promising development, deployment and delivery model in information technology sector across the globe. The burgeoning cloud computing model attempts to tackle the hotheaded growth of web-connected ...
  • Tah,Arya; Rakshit,Debasish Kumar (2013)
    In the upcoming article, we lay down a particular method of devising the frequency parameter of ring oscillators. We also bring about a comparative analysis of ring oscillators, and try to find out a way of relating their ...
  • Cartmell,John (2013)
    In this paper we consider the connectivity of an end-user with the Cloud. We examine a method to perform traffic offloading and load balancing in a network comprised of both WiFi access points and Cellular cells to better ...
  • Shenfield,A.; Fleming, P. J. (2013)
    The distribution of computational tasks across a diverse set of geographically distributed heterogeneous resources is a critical issue in the realisation of true computational grids. Conventionally, workload allocation ...
  • Amjad,K. (2013)
    Simulation based performance analysis studies for very large (i.e. up to thousands of nodes) Mobile Adhoc NETworks (MANETs) have considered simplistic radio propagation environment (i.e. for urban structures) such as Free ...
  • Susanto,Hengky; Kim ,ByungGuk (2013)
    This paper primarily addresses how available bandwidth should be optimally distributed among competing streams of elastic traffic like TCP traffic while taking Quality-of-Service (QoS) and delay into consideration. Network ...
  • Tabassum*, Muhammad Naveed; Meer, Rashed; Ali, Zeshan (2013)
    This paper introduces a comparatively new technique for Particle Swarm Optimization (P.S.O). The standard P.S.O technique is modified in a unique way to come up with B-positive Particle Swarm Optimization. The B.P.S.O which ...
  • Mir*,Nader F.; Musa*, Sarhan M.; Torresand,Richard; Swamy,Sudha (2014)
    In high-speed communication networks, a failure in a multicast node or on a link is often possible. It is especially critical to understand how these failures affect the transmission of real-time applications in convergent ...
  • Andel*, Todd R.; Fritzke, Austin; Humphries, Jeffrey W.; McDonald, J. Todd (2014)
    While AES is computationally secure, it is not without weakness. Side-channel attacks on AES hardware implementations can reveal its secret key. Because of this vulnerability, countermeasures to side-channel attacks are ...
  • Susanto ,Hengky; Kim, Byung Guk (2014)
    As a mobile node switches from one subnet to another, Mobile IPv6 requires that it authenticate the new Care of Address of the new subnet with the corresponding node. The authentication process, called Return Routability ...

All Journals


Advanced Search

Browse

Administrator Account