2019 Issues Vol. 12, No. 3 Vol. 12, No. 2 Vol. 12, No. 1 2018 Issues Vol. 11, No. 6 Vol. 11, No. 5 Vol. 11, No. 4 Vol. 11, No. 3 Vol. 11, No. 2 Vol. 11, No. 1 2017 Issues Vol. 10, No. 12 Vol. 10, No. 11 Vol. 10, No. 10 Vol. 10, No. 9 Vol. 10, No. 8 Vol. 10, No. 7 Vol. 10, No. 6 Vol. 10, No. 5 Vol. 10, No. 4 Vol. 10, No. 3 Vol. 10, No. 2 Vol. 10, No. 1 2016 Issues Vol. 9, No. 12 Vol. 9, No. 11 Vol. 9, No. 10 Vol. 9, No. 9 Vol. 9, No. 8 Vol. 9, No. 7 Vol. 9, No. 6 Vol. 9, No. 5 Vol. 9, No. 4 Vol. 9, No. 3 Vol. 9, No. 2 Vol. 9, No. 1 2015 Issues Vol. 8, No. 6 Vol. 8, No. 5 Vol. 8, No. 4 Vol. 8, No. 3 Vol. 8, No. 2 Vol. 8, No. 1 2014 Issues Vol. 7, No. 6 Vol. 7, No. 5 Vol. 7, No. 4 Vol. 7, No. 3 Vol. 7, No. 2 Vol. 7, No. 1 2013 Issues Vol. 6, No. 6 Vol. 6, No. 5 Vol. 6, No. 4 Vol. 6, No. 3 Vol. 6, No. 2 Vol. 6, No. 1 2012 Issues Vol. 5, No. 4 Vol. 5, No. 3 Vol. 5, No. 2 Vol. 5, No. 1 2011 Issues Vol. 4, No. 4 Vol. 4, No. 3 Vol. 4, No. 2 Vol. 4, No. 1 2010 Issues Vol. 3, No. 4 Vol. 3, No. 3 Vol. 3, No. 2 Vol. 3, No. 1 2009 Issues Vol. 2, No. 4 Vol. 2, No. 3 Vol. 2, No. 2 Vol. 2, No. 1 2008 Issues Vol. 1, No. 1 2016 2016 Volume 9, Number 6, 2016 June Robust Beamforming Problem in Cognitive One-way Relay Networks, Hongyan Cai and Wenbo Wang (pp. 1-8). A Critical Analysis of Congestion Adaptive Routing Protocols for Mobile Ad-Hoc Networks, Laxmi Shrivastava and G. S. Tomar (pp. 9-16). A Novel Multi-Targets Cycle Control Coverage Preservation Protocol in Wireless Sensor Network, Yaping Li and Yali Yun (pp. 17-28). TTKC: A Taylor Triangle K Coverage Algorithm in WSNs, Xiaohui Ji, Jie Xie and Yuanbo Li (pp. 29-40). Trust and Reputation Based Seurity of MANET by Worm Hole Attack, Shabina Parbin and Leeladhar Mahor (pp. 41-54). Study of IoT Terminal Interface Platform Based on Embedded Technology and Zigbee Protocol, Cui Jiantao and Zhao Xiaojun (pp. 55-64). Modeling of SACK-based Fast Retransmission and Recovery, Zhiming Wang, Xiaoping Zeng, Xiaofan Jia, Xue Liu and Li Chen (pp. 65-74). An Ant Colony based Routing Algorithm for Wireless Sensor Network, Wang Jun Xuan and Kong Ling Bin (pp. 75-86). An Energy-Efficiency Enhanced Mobile Storage Platform in Cloud Environments, Ning Han (pp. 87-98). Evaluation of the Caching Placement Algorithms in Named Data Network for Video on Demand Service, Kire Jakimoski, Slavcho Chungurski and Sime Arsenovski (pp. 99-112). NSDA: A Novel Node Selecting Optimal Algorithm Based on Dijkstra, Tianbo Lu, Jiao Zhang, Lingling Zhao and Yang Li and Xiaoyan Zhang (pp. 113-128). Fiber-Optic Current Sensor Head Based on the Giant Magnetostrictive Materials, Naikui Ren, Yanling Xiong, Mingze Wu, Yuelan Lv and Lianjin Hong (pp. 129-136). Overview of Trust Management in VANET and Various Cryptography Fundamentals, Pallavi Agarwal and Neha Bhardwaj (pp. 137-144). Research into Positioning of the Least Square Support Vector Machine based on Fisher Fishing in WSN, Aihua Yu and Shuhong Lv (pp. 145-150). A Novel Scheme for NLOS Identification using Energy Detector in 60 GHz Systems, Xiaolin Liang, Hao Zhang, Tingting Lv, Xuerong Cui and T. Aaron. Gulliver (pp. 151-164). The Mobile Visual Search Guiding System Based on SIFT, Gongwen Xu, Xiaomei Li, Honglan Zhou, Jian Lei and Zhijun Zhang (pp. 165-178). Application of Large Scale MIMO Technology in the Heterogeneous Networks, Zhiyong Ren (pp. 179-190). Impacts of Human Body Shadowing in Wireless Body-Centric Communications, Mojaiana Synthia (pp. 191-200). A Novel Machine Selection Method Combining Group Eigenvalue Method with TOPSIS Method, Tonghua Yang, Shenghua Xu and Neal N. Xiong (pp. 201-210). Implementing of High Capacity Tbps DWDM System Optical Network, Daleep Singh Sekhon, Harmandar Kaur (pp. 211-218). A Novel Algorithm for Improving the SINR of D2D Communication in the Cellular Network, Cheng Huan, Youhua Fu and Jin Wang (pp. 219-230). Interference Aware Full-Duplex MAC Protocols Design and Evaluation for the Next WLANs, Haifeng Luo, Qian Jiang, Yong Liu, Huaixing Wang and Liang Huang (pp. 231-244). Mathematical Model on Attack of Worm and Virus in Computer Network, Binay Kumar Mishra (pp. 245-254). A Driver Circuit of Spatial Light Modulator, Lan Wu, Fu-na Zhou and Minghao Zhu (pp. 255-262). WSN Missing Data Imputing Based on Multiple Time Granularity, Jianfeng Xu, Yu Li, Yuanjian Zhang and Azhar Mahmood (pp. 263-274). WPAN Based Cattle Health Monitoring With Labview as A Data Logger, Ateev Agarwal, Eesh Mehandiratta, Rohit Sanket, Rohit Samkaria, Ambujaksh Shah, Rajesh Singh and Anita Gehlot (pp. 275-284). A Linear Programming with Alliance Strategy Coverage in Wireless Sensor Networks, Zeyu Sun, Tao Yang and Xiaoming Dong (pp. 285-296). A Wireless Sensor Network Clustering Algorithm based on Hypergraph, Xu Qian, Hu Ji-cheng, Lin Hai, Kong Ruo-shan, Luo Yong-en, Zhu Li and Mao Hua-qing (pp. 297-312). A Long Reach Coherent m-QAM OFDM PON Downstream Transmission, Vyankatesh Maske, Pawase Ramesh S and R. P. Labade (pp. 313-320). Research into Network Optimization based on PSO Algorithm in RFID Network Layout, Jiangang Jin (pp. 321-326). A Novel Method to Predict Connectivity Probability of a Plane in Multi-Airline AANET, Xue Liu, Xiaoping Zeng, Zhiming Wang,Ya Wen and Bin Zhu (pp. 327-338). Rule-Based Network Intrusion Detection System for Port Scanning with Efficient Port Scan Detection Rules Using Snort, Satyendra Kumar Patel, Abhilash Sonker (pp. 339-350). Minimum Delay Query in Low-duty-cycle Sensor Networks, Zuzhi Fan (pp. 351-362). A Quad-band Compact Diversity Antenna for Mobile Handset Devices, Yang Yang, Yuan’An Liu and Fan Wu (pp. 363-372).