May 2013, Volume 5. Number 3

Designing Run-Time Environments to Have Predefined Global Dynamics [Pdf]
Massimo Monti, Pierre Imai and Christian, Tschudin University of Basel, Switzerland
Probability Density Functions of the Packet Length for Computer Networks with Bimodal Traffic[Pdf]
Ewerton R. S. Castro1, Marcelo S. Alencar2 and Iguatemi E. Fonseca1, 1Federal Institute of Paraiba, Brazil and 2Federal University of Campina Grande, Brazil
Reducing the Peak to Average Power Ratio of MIMO-OFDM Systems[Pdf]
Asim M. Mazin and Garth V. Crosby, Southern Illinois University Carbondale.
I Am 4 VHO: New Approach to Improve Seamless Vertical Handover in Heterogeneous Wireless Networks[Pdf]
Omar Khattab and Omar Alani, University of Salford, UK.
The Extended Clustering AD HOC Routing Protocol (ECRP)[Pdf]
Buthayna Al-Sharaa, Al Balqa Applied University, Jordan.
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration[Pdf]
Mohammad Z. M. Masoud, Huazhong University of Science and Technology, China.
Healthy Nutrition Under ASP-PROLOG[Pdf]
Fernando Zacarias F, Rosalba Cuapa, Erick Madrid and Dionicio Zacarias,BUAP, Mexico.
Analysis of Hierarchical Scheduling for Heterogeneous Traffic Over Network[Pdf]
Rabie Barhoun1, Abdelwahed Namir1 and Anas Barhoun2, 1 University Hassan II, Morocco and 2Syracuse University, USA.
A Compact Dual Band Dielectric Resonator Antenna For Wireless Applications[Pdf]
H. Raggad1, M. Latrach2, A. Gharsallah3 and T. Razban3, 1Radio-Frequency and Microwave Research Group, France, 2Unit of Research in High Frequency Electronic Circuits and Systems ,Tunisia and 3IETR, France.
A Secure Data Communication System Using Cryptogaphy And Steganography[Pdf]
Saleh Saraireh,Philadelphia University, Jordan.
ETOR-Efficient Token based Opportunistic Routing[Pdf]
A. Saichand and A. R. Naseer, JNTU Hyderabad,India.
Centrality-Based Network Coder Placement for Peer-To-Peer Content Distribution[Pdf]
Dinh Nguyen and Hidenori Nakazato,Waseda University, Japan
LTE QOS Dynamic Resource Block Allocation with Power Source Limitation and Queue Stability Constraints[Pdf]
Mohamed A. Abd El-Gawad 1, Mohsen M. Tantawy 1 and Mohamed El-Mahallawy2, 1National Telecommunication Institute, Egypt and 2Arab Academy for Science, Egypt.
A Framework for SOFTWARE-AS-A-SERVICE Selection and Provisioning[Pdf]
Elarbi Badidi ,College of Information Technology, United Arab Emirates.
An Optimal Software Framework for Parallel Computation of CRC[Pdf]
Hamed Sheidaeian and Behrouz Zolfaghari, Islamic Azad University,Iran

March 2013, Volume 5. Number 2

System Architecture of HatterHealthConnect: An Integration of Body Sensor Networks and Social Networks to Improve Health Awareness [Pdf]
Hala ElAarag, David Bauschlicher and Steven Bauschlicher, Stetson University,USA
Cognitive Radio Engine Model Utilizing Soft Fusion Based Genetic Algorithm for Cooperative Spectrum Optimization [Pdf]
Md. Kamal Hossain andAyman Abd El-Saleh, Multimedia University, Malaysia
Energy and Bandwidth Constrained QoS Enabled Routing for MANETs [Pdf]
N.Sumathi1 and C.P.Sumathi2, 1S.N.R.Sons College, India and 2SDNB Vaishnav College for Women, India
New Metric for HWMP Protocol (NMH). [Pdf]
Sidi Ould Cheikh, Malik Mubashir Hassan and Abdelhak Geuroui, University of Versailles, France
Replay Attack Prevention in Kerberos Authentication Protocol using Triple Password [Pdf]
Gagan Dua1, Nitin Gautam2, Dharmendar Sharma3 and Ankit Arora4, 1National Institute of Technology, India, 2Raj Kumar Goel Institute of Technology, India, 3Satyug Darshan Technical Campus, India and 4RIMT-Institute of Engineering & Technology, India
Area Efficient Rapid Signal Acquisition scheme for High Doppler DSSS Signals [Pdf]
D. Karunakar Reddy and T. Satya Savithri, JNTUH College of Engineering, India
An Energy Efficient Analysis of S-MAC And H-MAC Protocols for Wireless Sensor Networks [Pdf]
P.T.Kalaivaani1 and A.Rajeswari2, 1MNM Jain Engineering College, India and 2Coimbatore Institute of Technology, India
A New Approach for Complex Encrypting and Decrypting Data [Pdf]
Obaida Mohammad Awad Al-Hazaimeh, AL-Huson University College, Jordan
A Survey on Energy Efficiency for Wireless Mesh Network [Pdf]
Sarra Mamechaoui1, Fedoua Didi1 and Guy Pujolle2, 1Abou Bekr Belkaid University ,Algeria and 2Pierre et Marie Curie University, France
A Pair-Wise Key Establishment Scheme for AD HOC Networks [Pdf]
Isra Sitan Al-Qasrawi and Obaida Mohammed Al-Hazaimeh, AL-Huson University College, Jordan
Performance study of IEEE 802.16d under Stanford University Interim (SUI)Channel [Pdf]
Abdul HashibSiddique1, A K M Arifuzzman2 and Mohammed Tarique3, 1The Petroleum Institute, UAE, 2American International University, Bangladesh and 3Ajman University of Science and Technology, UAE
Architectural Evaluation of Algorithms RSA, ECC and MQQ in Arm Processors [Pdf]
Gustavo da Silva Quirino1 and Edward David Moreno2, 1IFBA, Brasil and 2UFS, Brasil
Performance Evaluation of Distributed Synchronous Greedy Graph Coloring Algorithms on Wireless Ad Hoc and Sensor Networks [Pdf]
Esra Ruzgar1 and Orhan Dagdeviren2, 1Izmir University, Izmir, Turkey and 2Ege University, Izmir, Turkey
Simulation of Cognitive Radio System Applying Different Wireless Channel Models [Pdf]
Mohamed Shalaby1, Mona Shokair2 and Yaser S. E. Abdo1, 1National Institute for Standards, Egypt and 2Menoufia University, Egypt
Fine-tuning of k in a K-fold Multicast Network with Finite Queue using Markovian Model [Pdf]
Md. Mahmudul Hasan, Daffodil International University, Bangladesh

January 2013, Volume 5. Number 1

Finite Horizon Adaptive Optimal Distributed Power Allocation for Enhanced Cognitive Radio Network in the Presence of Channel Uncertainties[Pdf]
Hao Xu and S. Jagannathan, Missouri University of Science and Technology, USA
Further Results on the Dirac Delta Approximation and the Moment Generating Function Techniques for Error Probability Analysis in Fading Channels[Pdf]
Annamalai Annamalai, Eyidayo Adebola and Oluwatobi Olabiyi, Prairie View A&M University, USA
Improving Quality of Service and Reducing Power Consumption with WAN accelerator in Cloud Computing Environments[Pdf]
Shin-ichi Kuribayashi, Seikei University, Japan
A Malicious Users Detecting Model Based on Feedback Correlations[Pdf]
Yong WANG, Yang BAI, Jie Hou and Yuan-wei TAN, University of Electronic and Science Technology of China, China
A New Improved Storage Model of Wireless Devices using the Cloud[Pdf]
Zyad Nossire1 and Khaled Elleithy1 and Boraq Ammourah2, 1University of Bridgeport, USA and 2Najran University, Kingdom of Saudi Arabia
Investigate the Performance Evaluation of IPTV Over WiMAX Networks[Pdf]
Jamil M. Hamodi and Ravindra C. Thool, Shri Guru Gobind Singhji Institute of Engineering and Technology (SGGS), India
A Novel Two-Stage Algorithm Protecting Internal Attack from WSNs[Pdf]
Muhammad Ahmed1, Xu Huang1 and Hongyan Cui2, 1University of Canberra, Australia and 2Beijing University of Posts and Telecommunications, China
The Affects of Different Queuing Algorithms within the Router on QoS VoIP application Using OPNET[Pdf]
Hussein A. Mohammed1, Adnan Hussein Ali2, Hawraa Jassim Mohammed1, 1Iraqi Commission for Computers and Informatics, Iraq and 2Electrical & Electronics Techniques College - Baghdad, Iraq
Effect of Duty Cycle on Energy Consumption in Wireless Sensor Networks[Pdf]
Jyoti Saraswat and Partha Pratim Bhattacharya, Mody Institute of Technology & Science (Deemed University), India
Predicting Communication Delay and Energy Consumption for IEEE 802.15.4/Zigbee Wireless Sensor Networks[Pdf]
Sofiane Ouni1 and Zayneb Trabelsi Ayoub2, 1National Institute of Applied Sciences and Technology (INSAT), Tunisia and 2University of Manouba, Tunisia
Autoconfiguration Algorithm for a Multiple Interfaces Adhoc Network Running OLSR Routing Protocol[Pdf]
Saadi Boudjit, University of Paris13, France
A User Profile Based Access Control Model and Architecture[Pdf]
Meriem Zerkouk1, Abdallah Mhamed2 and Belhadri Messabih1, 1University of Sciences and Technology Oran, Algeria and 2Institut Mines-Telecom / Telecom SudParis, France