


default search action
International Journal of Information and Communication Technology, Volume 6
Volume 6, Number 1, 2014
- Miaomiao Tian, Liusheng Huang, Wei Yang:
On the security of an enhanced signature scheme. 1-6 - Shihu Liu, Fusheng Yu:
Hesitation degree-based similarity measures for intuitionistic fuzzy sets. 7-22 - Jia Wu
, Zhihua Cai:
Learning attribute weighted AODE for ROC area ranking. 23-38 - Wenbo Shi, Debiao He, Shuhua Wu:
Cryptanalysis and improvement of a DoS-resistant ID-based password authentication scheme without using smart card. 39-48 - Hazhir Ghasemnezhad, Siamak Talebi, Mohamad Javad Dehghani
:
A new low complexity technique for PAPR reduction by using peak-flipping. 49-57 - Sahel Alouneh
, Sa'ed Abed
, Bassam Jamil Mohd, Ahmad Al-Khasawneh
:
Software comprehension based on database relational algebra. 58-70 - B. Yamuna
, T. R. Padmanabhan:
A minimal search soft decision list decoding algorithm for Reed-Solomon codes. 71-85 - Parismita Gogoi
, Kandarpa Kumar Sarma
:
Kalman filter and semi-blind technique-based channel estimation for coded STBC multi-antenna set-ups in faded wireless channels. 86-108
Volume 6, Number 2, 2014
- G. Jaspher Willsie Kathrine
, Kirubakaran Ezra
, Elijah Blessing Rajsingh
:
Enhancing security of electronic health records through grid-based user authentication scheme. 109-121 - S. Santhi, G. Sudha Sadasivam
:
Enhanced AOMDV for energy conservation in hybrid ad hoc networks. 122-141 - Varsha Namdeo, Ramjeevan Singh Thakur
:
Classification of data at multilevel abstraction. 142-155 - Subasish Mohapatra, Banshidhar Majhi, Srikanta Patnaik
:
Scalable architecture for ubiquitous healthcare using sensor cloud platform. 156-174 - S. Senthil, L. Robert:
Reinforced intelligent dictionary-based encoding scheme. 175-188 - Sugam Sharma, Udoyara Sunday Tim, Shashi K. Gadia, Johnny Wong:
Does SNAP eligibility have racial or ethnic gradients: a geospatial social exploratory. 189-212 - Gagandeep Kaur, Vikas Saxena
, J. P. Gupta:
A multi scale approach to distinguish flash crowds from PDDoS attacks. 213-238
Volume 6, Numbers 3/4, 2014
- Yong Yang, Yu-Song Yan, Zuo-An Hu, Pan Xie:
Algorithm research for capacity-constrained stochastic traffic assignment model. 241-250 - A. Ruhan Bevi
, S. Malarvizhi, Shubhra Saxena:
RC5 implementation in ARM platform for cryptographic applications. 251-259 - Anbazhagan Rajesh
, Rangaswamy Nakkeeran:
Investigation on cooperative contention-based bandwidth request mechanism for heterogeneous networks. 260-271 - Tarachand Amgoth, Prasanta K. Jana:
Energy efficient and load balanced clustering algorithms for wireless sensor networks. 272-291 - M. Esther Hannah
, Saswati Mukherjee:
A classification-based summarisation model for summarising text documents. 292-308 - Asutosh Kar
, Mahesh Chandra:
A novel variable tap-length learning algorithm for low complexity, fast converging stereophonic acoustic echo cancellation. 309-325 - Sivaranjan Goswami, Bijeet Bardoloi, Pinky Deka, Darathi Dutta, Dipjyoti Sarma:
A novel approach for design of a speech enhancement system using auto-trained NLMS adaptive filter. 326-338 - Parismita A. Kashyap, Kandarpa Kumar Sarma:
Adaptive gain and variable effective aperture aided multi antenna set-ups for faded Rayleigh channels. 339-354 - Mounira Zerari:
Business process artefact adaptability approach based on artificial immune systems. 355-368 - V. Neelaya Dhatchayani, V. S. Shankar Sriram
:
Trust aware identity management for cloud computing. 369-380 - Pirita Ihamäki:
User experiences in the Official WikiLeaks Forum. 381-402 - Sengathir Janakiraman, Rajendiran Manoharan:
Reliability factor-based mathematical model for isolating selfish nodes in MANETs. 403-421 - Wen-Yu Chiang:
A new procedure of market segmentation for dynamic CRM systems: a case study of airlines in Taiwan. 422-430

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.