Skip to content
NADIA

IJFGCN Vol. 9, No. 6, 2016

  • HOME
  • Journals
    • Triannually
      • IJGDC
      • IJSIA
      • JSEM
    • Quarterly
      • IJAST
      • IJFGCN
    • Semiannually
      • IJCA
      • IJSIP
      • IJUNESST
      • IJDTA
      • IJDRBC
      • IJEL
      • IJT
      • JETM
      • JHRM
      • JCHD
    • Annually
      • IJSACS
      • JNM
      • JBMA
      • JUH
  • Guidelines
    • NADIA Paper Format
    • Copyright Form
    • Publication Ethics and Malpractice Statement
    • Author Guidelines
    • NADIA Journal Special Issue Proposal Form
    • NADIA Journal Editorial Board Application Form
    • NADIA Editorials Responsibilities, Benefits and Terms
  • Contact
2019 Issues
Vol. 12, No. 3
Vol. 12, No. 2
Vol. 12, No. 1
2018 Issues
Vol. 11, No. 6
Vol. 11, No. 5
Vol. 11, No. 4
Vol. 11, No. 3
Vol. 11, No. 2
Vol. 11, No. 1
2017 Issues
Vol. 10, No. 12
Vol. 10, No. 11
Vol. 10, No. 10
Vol. 10, No. 9
Vol. 10, No. 8
Vol. 10, No. 7
Vol. 10, No. 6
Vol. 10, No. 5
Vol. 10, No. 4
Vol. 10, No. 3
Vol. 10, No. 2
Vol. 10, No. 1
2016 Issues
Vol. 9, No. 12
Vol. 9, No. 11
Vol. 9, No. 10
Vol. 9, No. 9
Vol. 9, No. 8
Vol. 9, No. 7
Vol. 9, No. 6
Vol. 9, No. 5
Vol. 9, No. 4
Vol. 9, No. 3
Vol. 9, No. 2
Vol. 9, No. 1
2015 Issues
Vol. 8, No. 6
Vol. 8, No. 5
Vol. 8, No. 4
Vol. 8, No. 3
Vol. 8, No. 2
Vol. 8, No. 1
2014 Issues
Vol. 7, No. 6
Vol. 7, No. 5
Vol. 7, No. 4
Vol. 7, No. 3
Vol. 7, No. 2
Vol. 7, No. 1
2013 Issues
Vol. 6, No. 6
Vol. 6, No. 5
Vol. 6, No. 4
Vol. 6, No. 3
Vol. 6, No. 2
Vol. 6, No. 1
2012 Issues
Vol. 5, No. 4
Vol. 5, No. 3
Vol. 5, No. 2
Vol. 5, No. 1
2011 Issues
Vol. 4, No. 4
Vol. 4, No. 3
Vol. 4, No. 2
Vol. 4, No. 1
2010 Issues
Vol. 3, No. 4
Vol. 3, No. 3
Vol. 3, No. 2
Vol. 3, No. 1
2009 Issues
Vol. 2, No. 4
Vol. 2, No. 3
Vol. 2, No. 2
Vol. 2, No. 1
2008 Issues
Vol. 1, No. 1
2016
2016
Volume 9, Number 6, 2016 June
    • Robust Beamforming Problem in Cognitive One-way Relay Networks, Hongyan Cai and Wenbo Wang (pp. 1-8).
    • A Critical Analysis of Congestion Adaptive Routing Protocols for Mobile Ad-Hoc Networks, Laxmi Shrivastava and G. S. Tomar (pp. 9-16).
    • A Novel Multi-Targets Cycle Control Coverage Preservation Protocol in Wireless Sensor Network, Yaping Li and Yali Yun (pp. 17-28).
    • TTKC: A Taylor Triangle K Coverage Algorithm in WSNs, Xiaohui Ji, Jie Xie and Yuanbo Li (pp. 29-40).
    • Trust and Reputation Based Seurity of MANET by Worm Hole Attack, Shabina Parbin and Leeladhar Mahor (pp. 41-54).
    • Study of IoT Terminal Interface Platform Based on Embedded Technology and Zigbee Protocol, Cui Jiantao and Zhao Xiaojun (pp. 55-64).
    • Modeling of SACK-based Fast Retransmission and Recovery, Zhiming Wang, Xiaoping Zeng, Xiaofan Jia, Xue Liu and Li Chen (pp. 65-74).
    • An Ant Colony based Routing Algorithm for Wireless Sensor Network, Wang Jun Xuan and Kong Ling Bin (pp. 75-86).
    • An Energy-Efficiency Enhanced Mobile Storage Platform in Cloud Environments, Ning Han (pp. 87-98).
    • Evaluation of the Caching Placement Algorithms in Named Data Network for Video on Demand Service, Kire Jakimoski, Slavcho Chungurski and Sime Arsenovski (pp. 99-112).
    • NSDA: A Novel Node Selecting Optimal Algorithm Based on Dijkstra, Tianbo Lu, Jiao Zhang, Lingling Zhao and Yang Li and Xiaoyan Zhang (pp. 113-128).
    • Fiber-Optic Current Sensor Head Based on the Giant Magnetostrictive Materials, Naikui Ren, Yanling Xiong, Mingze Wu, Yuelan Lv and Lianjin Hong (pp. 129-136).
    • Overview of Trust Management in VANET and Various Cryptography Fundamentals, Pallavi Agarwal and Neha Bhardwaj (pp. 137-144).
    • Research into Positioning of the Least Square Support Vector Machine based on Fisher Fishing in WSN, Aihua Yu and Shuhong Lv (pp. 145-150).
    • A Novel Scheme for NLOS Identification using Energy Detector in 60 GHz Systems, Xiaolin Liang, Hao Zhang, Tingting Lv, Xuerong Cui and T. Aaron. Gulliver (pp. 151-164).
    • The Mobile Visual Search Guiding System Based on SIFT, Gongwen Xu, Xiaomei Li, Honglan Zhou, Jian Lei and Zhijun Zhang (pp. 165-178).
    • Application of Large Scale MIMO Technology in the Heterogeneous Networks, Zhiyong Ren (pp. 179-190).
    • Impacts of Human Body Shadowing in Wireless Body-Centric Communications, Mojaiana Synthia (pp. 191-200).
    • A Novel Machine Selection Method Combining Group Eigenvalue Method with TOPSIS Method, Tonghua Yang, Shenghua Xu and Neal N. Xiong (pp. 201-210).
    • Implementing of High Capacity Tbps DWDM System Optical Network, Daleep Singh Sekhon, Harmandar Kaur (pp. 211-218).
    • A Novel Algorithm for Improving the SINR of D2D Communication in the Cellular Network, Cheng Huan, Youhua Fu and Jin Wang (pp. 219-230).
    • Interference Aware Full-Duplex MAC Protocols Design and Evaluation for the Next WLANs, Haifeng Luo, Qian Jiang, Yong Liu, Huaixing Wang and Liang Huang (pp. 231-244).
    • Mathematical Model on Attack of Worm and Virus in Computer Network, Binay Kumar Mishra (pp. 245-254).
    • A Driver Circuit of Spatial Light Modulator, Lan Wu, Fu-na Zhou and Minghao Zhu (pp. 255-262).
    • WSN Missing Data Imputing Based on Multiple Time Granularity, Jianfeng Xu, Yu Li, Yuanjian Zhang and Azhar Mahmood (pp. 263-274).
    • WPAN Based Cattle Health Monitoring With Labview as A Data Logger, Ateev Agarwal, Eesh Mehandiratta, Rohit Sanket, Rohit Samkaria, Ambujaksh Shah, Rajesh Singh and Anita Gehlot (pp. 275-284).
    • A Linear Programming with Alliance Strategy Coverage in Wireless Sensor Networks, Zeyu Sun, Tao Yang and Xiaoming Dong (pp. 285-296).
    • A Wireless Sensor Network Clustering Algorithm based on Hypergraph, Xu Qian, Hu Ji-cheng, Lin Hai, Kong Ruo-shan, Luo Yong-en, Zhu Li and Mao Hua-qing (pp. 297-312).
    • A Long Reach Coherent m-QAM OFDM PON Downstream Transmission, Vyankatesh Maske, Pawase Ramesh S and R. P. Labade (pp. 313-320).
    • Research into Network Optimization based on PSO Algorithm in RFID Network Layout, Jiangang Jin (pp. 321-326).
    • A Novel Method to Predict Connectivity Probability of a Plane in Multi-Airline AANET, Xue Liu, Xiaoping Zeng, Zhiming Wang,Ya Wen and Bin Zhu (pp. 327-338).
    • Rule-Based Network Intrusion Detection System for Port Scanning with Efficient Port Scan Detection Rules Using Snort, Satyendra Kumar Patel, Abhilash Sonker (pp. 339-350).
    • Minimum Delay Query in Low-duty-cycle Sensor Networks, Zuzhi Fan (pp. 351-362).
    • A Quad-band Compact Diversity Antenna for Mobile Handset Devices, Yang Yang, Yuan’An Liu and Fan Wu (pp. 363-372).
  • HOME
  • Journals
  • Guidelines
  • Contact
Copyright © 2023 NADIA