Journal Publications

International Journal of Advances in Computer Networks and Its Security

(23) Papers Found

A High Capacity Image Steganography Method Using Lorenz Chaotic Map

Author(s) : LEYLA ROOHI, REZZA MOIENI, SUBARIAH IBRAHIM

No of Author(s) : 3
Page(s) : 1 - 5
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 406   |   Download(s) : 209

A Traffic Signature Sensitive to Client Machines

Author(s) : KAZUMASA OIDA

No of Author(s) : 1
Page(s) : 6 - 10
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 473   |   Download(s) : 164

Load-Based Fuzzy Logic Approach to Cluster-Head Election for Wireless Sensor Networks

Author(s) : CHONG ENG TAN, NANCY AK BUNDAN

No of Author(s) : 2
Page(s) : 11 - 15
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 474   |   Download(s) : 142

Animal Tracking Using Checkpoint Method in Wireless Sensor Network

Author(s) : CHANWIT SUWANNAPONG, CHATCHAI KHUNBOA

No of Author(s) : 2
Page(s) : 16 - 19
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 449   |   Download(s) : 174

Piezoelectric in Energy Harvesting Systems for Wireless Sensor Nodes

Author(s) : CHATCHAI KHUNBOA, THONGCHAI CHOTWATTANAKANKUL

No of Author(s) : 2
Page(s) : 20 - 24
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 447   |   Download(s) : 200

Multiple antennas for Underground-to-Aboveground Communication in Wireless Underground Sensor Networks

Author(s) : CHATCHAI KHUNBOA, TANAWAT DANGDRAGOOL  , WASU CHAOPANON

No of Author(s) : 3
Page(s) : 25 - 28
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 400   |   Download(s) : 153

Election Root Node of Flooding Time Synchronization Protocol by Value of Neighbor Node

Author(s) : CHATCHAI KHUNBOA, RONNACHAI SIVASR

No of Author(s) : 2
Page(s) : 29 - 31
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 415   |   Download(s) : 130

Performance Evaluation of Channel Equalization for nonlinear Channels using ANFIS

Author(s) : AMIRA A. ELBIBAS, ISSMAIL M. ELLABIB, YOUSEF HWEGY

No of Author(s) : 3
Page(s) : 32 - 35
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 436   |   Download(s) : 132

Intrusion Detection System in IPv6 Network Based on Data Mining Techniques – Survey

Author(s) : REDHWAN M. A. SAAD, SELVAKUMAR MANICKAM, SURESWARAN RAMADASS

No of Author(s) : 3
Page(s) : 36 - 40
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 477   |   Download(s) : 163

An Efficient and Scalable Search Mechanism in Unstructured Peer to Peer Network

Author(s) : MD. SOHRAB MAHMUD, MD.NASIM AKHTAR, S.M.G. MORTUZA AZAM

No of Author(s) : 3
Page(s) : 41 - 44
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 464   |   Download(s) : 155

Simulated Annealing Algorithm-basedSubcarrierAllocation forMultiuser OFDM Relay Systems

Author(s) : WEI-CHEN PAO, YUNG-FANG CHEN

No of Author(s) : 2
Page(s) : 45 - 49
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 437   |   Download(s) : 205

A Detailed Study of Transport Layer SCT Protocol and its Security Solutions

Author(s) : RAGHAVENDRA GANIGA , SANOOP MALLISSERY

No of Author(s) : 2
Page(s) : 50 - 55
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 379   |   Download(s) : 175

A New Dual Channel Based Medium Access Control Protocol for Ad Hoc Networks

Author(s) : JONGIN JOO, JOOSEOK SONG

No of Author(s) : 2
Page(s) : 56 - 60
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 407   |   Download(s) : 202

The Need for Two Factor Authentication in Social Media

Author(s) : CHRIS O. IMAFIDON, EHINOME J. IKHALIA

No of Author(s) : 2
Page(s) : 61 - 67
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 430   |   Download(s) : 122

A Secure and Efficient Multi-Device Authentication Protocol Based on Secret Sharing in Heterogeneous Networks

Author(s) : HAEJUN JUNG , JOOSEOK SONG

No of Author(s) : 2
Page(s) : 68 - 72
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 473   |   Download(s) : 116

Energy Efficient With Throughput Maximization Routing In Manets

Author(s) : M.JANARDHANA RAJU, P.SUBBAIAH

No of Author(s) : 2
Page(s) : 73 - 76
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 441   |   Download(s) : 147

Lifetime Enhancement Of WSN Using Cooperative Game Theory Based Routing Protocol

Author(s) : P. DANANJAYAN, P. RAJA

No of Author(s) : 2
Page(s) : 77 - 81
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 458   |   Download(s) : 142

Power Loading and Subcarrier Group Assignment for MCCDMA-MIMO System Using Water Filling Game Theory

Author(s) : A.SUNDHAR, P. DANANJAYAN

No of Author(s) : 2
Page(s) : 82 - 86
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 442   |   Download(s) : 134

Accuracy Analysis of Machine Learning Algorithms for Intrusion Detection System using NSL-KDD Dataset

Author(s) : RAGHAVENDRA GANIGA , SANOOP MALLISSERY, SUCHETA KOLEKAR

No of Author(s) : 3
Page(s) : 87 - 92
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 456   |   Download(s) : 196

Energy Efficient Data Aggregation Using Bitmask techniques for Wireless Sensor Networks

Author(s) : SANTHOSH KAMATH

No of Author(s) : 1
Page(s) : 93 - 97
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 503   |   Download(s) : 192

Enhancing the Security of Visa 3-D Secure against Spoofing Attacks

Author(s) : PITA JARUPUNPHOL, WIPAWAN BUATHONG

No of Author(s) : 2
Page(s) : 98 - 104
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 448   |   Download(s) : 118

Energy Comparison of Different NOC Router

Author(s) : ANUPAM JAMATIA  , BIMAN DEBBARMA , S. N. PRADHAN

No of Author(s) : 3
Page(s) : 105 - 107
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 474   |   Download(s) : 184

Intelligent Intrusion Detection Approach for SCADA System Protection

Author(s) : J. JIANG, S. L. P YASAKETHU

No of Author(s) : 2
Page(s) : 108 - 112
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 1
Views : 447   |   Download(s) : 130