University of Bahrain
Scientific Journals

Browsing 11. International Journal of Computing and Network Technology by Title

Browsing 11. International Journal of Computing and Network Technology by Title

Sort by: Order: Results:

  • Sethi, Anita; Vijay, Sandip (2019-01-01)
    In this paper, different heuristics for cross-layer optimization for vehicular ad-hoc network are reviewed and analysed. Up to a large extent safety issues and traffic congestion in daily life can be resolved by integrating ...
  • Purkayastha ,Debashish; Li, Jun; Balazinski, Bartosz; Cartmell , John; Reznik,Alex (2014)
    An explosive growth of the use of the public internet by mobile phones along with new high speed data technologies increases the challenge of mobile data delivery. The owners of popular media typically use content delivery ...
  • Al-Qaraawi, Salih; Croock, Muayad Sadik; Alawi, Shahad Hussain (2018-05-01)
    Recently, the Electroencephalography (EEG) signals of human brain are considered by researchers for performing different applications that can solve numerous problems. These research works tackle the problems of movements ...
  • Sivaselvan, K.; Vijayalakshmi, C. (2013)
    Over the last few decades stream control mechanism has more attention in the early stages of research in communication network. The motivation of this work is deep understanding on the stream control mechanism problem in ...
  • Vu*,Tran Hoang; Thanh,Tran; Trong, Vu Quang; Thanh Nguyen Huu; Nam,Pham Ngoc (2014)
    Improving energy efficiency in switch is becoming an increasingly important research topic. In this paper, we present the lesson gained by experimenting with a power management mechanism aimed at reducing the power ...
  • Othman, Ali; Ameen, Siddeeq Y.; Al-Rizzo,Hussian (2015)
    The paper investigates the effects of Users Equipment (UEs) mobility on the performance of 4G LTE-A under high data rate services. One of the key techniques supporting LTE services is Adaptive Modulation and Coding (AMC) ...
  • Ariwa, Koodichimma Chinazom; Ariwa,Ezendu (2017-05)
    The cloud computing can be seen as change and innovative technology that has leveraged the Internet world and its application to business enterprise and education. In developed nations cloud computing and virtualisation ...
  • Jumaah, Alaa K.; Al-Janabi, Sufyan; Ali, Nazar Abedlqader (2015)
    Many privacy preserving data mining algorithms attempt to hide what database owners consider as sensitive. Specifically, in the association rules domain, many of these algorithms are based on item restriction methods; that ...
  • Hammood , Maytham M.; Yoshigoe ,Kenji; Sagheer, Ali M. (2015)
    Wireless communication security is a critical factor for secure communication among large scale of wireless networks. A limited resource constraint, such as power and memory size presents a significant challenge to implement ...
  • Halepoto,Imtiaz A.; Phulpoto, Nazar H.; Jokhio, Fareed A.; Khatri, Abdul R. (2017-09)
    Concurrent Multipath Transfer using the Stream Control Transmission Protocol (CMT-SCTP) enables multi-interface devices to send and receive data at the same time over more than one path. However, because of the fair Round ...
  • Mir*,Nader F.; Musa*, Sarhan M.; Torresand,Richard; Swamy,Sudha (2014)
    In high-speed communication networks, a failure in a multicast node or on a link is often possible. It is especially critical to understand how these failures affect the transmission of real-time applications in convergent ...
  • El-Kattan, Walaa; Kandil, Magy; Said, El-Sayed A.; Hussein, Abd El-Razik (2015)
    The relatively high dangerous thermal effects of electric cable in the Nuclear Power Plants (NPPs) is the concern to study the cable insulation behavior during a fire accident. This paper provides a comprehensive evaluation ...
  • El-Medany,Wael M (2016)
    Internet of Things (IoT) becomes an attractive field of research in the last decade. The main objective of IoT is enabling the integration and interconnection of the physical world and the cyber space. The aim of such space ...
  • El-Medany,Wael M. (2015)
    This paper presents reconfigurable hardware architecture for MWD (Minimum Weight Decoding) algorithm for network error correction, with high throughput on Field Programmable Gate Array (FPGA). Network Error Correction (NEC) ...
  • Alsabbagh, Taha A. (2019-05-01)
    In this paper, a modified approach for frequency permutation of speech signal has been designed implemented and verified based on MATLAB Simulink. A separate permutation of real and imaginary parts of the frequency component ...
  • Susanto ,Hengky; Kim, Byung Guk (2014)
    As a mobile node switches from one subnet to another, Mobile IPv6 requires that it authenticate the new Care of Address of the new subnet with the corresponding node. The authentication process, called Return Routability ...
  • Khan,Salman A. (2017-09)
    Security has become a crucial performance measure in today's computer and network systems. One important aspect of this security is to understand the issue as to how different threats could lead to a negative impact and ...
  • Ali, Dia M. (2019-01-01)
    One of the most rapidly advancing available imaging techniques is Magnetic resonance imaging (MRI). This technique has many side effects can be digested in to main categories: The first is the High Magnetic field effects: ...
  • Salvadori,F.; Gehrke, C.S.; Campos, M.de; Sausen, P. S.; Oliveira, A. C. (2013)
    The smart grid can be defined as a modern electric power grid infrastructure for improved efficiency, reliability and safety, with smooth integration of renewable and alternative energy sources, through automated control ...
  • Anh ,Tran Minh; Trinh,Nguyen Chien (2016)
    QoS (Quality of Service) routing algorithm based on localized information has recently been proposed as an alternative approach to the traditional QoS routing algorithms that use global state information. By this method, ...

All Journals


Advanced Search

Browse

Administrator Account