Skip to content
NADIA

IJFGCN Vol. 11, No. 5, 2018

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2018 Issues
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2017 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2016 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2015 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2014 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2013 Issues
Vol. 6, No. 6
Vol. 6, No. 5
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2012 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2011 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2010 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2009 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2008 Issues
Vol. 1, No. 1
2018
2018
Volume 11, Number 5, 2018 September
    • Performance Analysis of RN-LEACH Protocol over LEACH Protocol, >Piyush Rawat and Siddhartha Chauhan (pp. 1-10).
    • Isolating Malicious Controller(s) In Distributed Software-Defined Networks with Centralized Reputation Management, Bilal Karim Mughal, Sufian Hameed and Bilal Hameed (pp. 11-26).
    • Combined User and Antenna Selection in Massive MIMO Using Precoding Technique, Tasher Ali Sheikh, Joyatri Bora and Md. Anwar Hussain (pp. 27-36).
      This paper was removed because it was withdrawn by the authors.
    • GA GSA-based Energy Efficient Pegasis Protocol for WSN, Suraj Srivastava and Dinesh Grover (pp. 37-44).
    • Study of Security Mechanisms and Simulation Analysis of Packet Drop in RPL in Low Power Lossy Networks, Nikita Malik, Prakash Rao Ragiri and Aarti Jain (pp. 45-62).
    • PGA Implementation of Secure Internet of Things (SIT) Algorithm for High Throughput Area Ratio, Um e Rabab, Irfan Ahmed, Muhammad Imran Aslam and Muhammad Usman (pp. 63-72).
    • A Scheme of Mobility Management in UDN Based on PPP, Junxuan Wang, Ruixin Li and Tianxiang Ji (pp. 73-84).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2025 NADIA