Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Articles
Current
Archives
Authors
Guidelines
Rights and Responsibilities
Benefits
Make a Submissions
Policies
Frequently Asked Questions
Editorial Policy
Open Access Policy
Privacy Policy
Publication Ethics
Withdrawal, Retraction, Correction
Editorial Team
About
About the Journal
Article Publishing Fee
Abstracting and Indexing
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 4 No. 6 (2016): Transactions on Networks and Communications
Vol. 4 No. 6 (2016): Transactions on Networks and Communications
Transactions on Networks and Communications
Volume 4, No 6, Dec 2016
DOI:
https://doi.org/10.14738/tnc.46.2016
Published:
2016-12-30
Full Issue
Volume 4 No 6, Dec 2016
Articles
Cognitive Improved LEACH (CogILEACH) Protocol for Wireless Sensor Network
Md Mahbubur Rahman, Md Sipon Miah, Dilruba Sharmin
01
PDF
DOI:
https://doi.org/10.14738/tnc.46.2301
Performance Investigation of 112 Gb/s Hybrid Multiband CAP/QAM Schemes for Short Reach Optical Communication Systems
Majidah Hameed Majeed, Raad Sami Fyath
10
PDF
DOI:
https://doi.org/10.14738/tnc.46.2370
Estimating an Efficient Routing in MANET for UDP and TCP Traffic
Md. Repon Hossen, Khandaker Takdir Ahmed, Sonali Saha, Zakir Hossain
33
PDF
DOI:
https://doi.org/10.14738/tnc.46.2443
Secure File Sharing in Multi-clouds using Shamir’s Secret Sharing Scheme
Ibrahim Abdullah Althamary, Talal Mousa Alkharobi
43
PDF
DOI:
https://doi.org/10.14738/tnc.46.2560
Multi-layers Video Steganography: A Novel Technique for Image Hiding
Shadi Ayman Alhaj, Ahmad M. Shaheen, Talal M. Alkharobi
53
PDF
DOI:
https://doi.org/10.14738/tnc.46.2529
Non Regenerative Fiber backbone Power Loss Budget
K. A. Dotche, W Banuenumah, Willie K Ofosu
68
PDF
DOI:
https://doi.org/10.14738/tnc.46.2535
Author Center
About the Journal
Current Issue
Archives
Make a Submission
Author Guidelines
Call for Papers
Indexing
Follow Us
Current Issue
Most Read Last Week
Cryptography and Steganography: New Approach
10
The Dark Side of the China: The Government, Society and the Great Cannon
9
A New Type of NLFSR Functions with Maximum Periods
7
Exploiting Cryptocurrency Miners with OISNT Techniques
7
Holomorphy in Pseudo-Euclidean Spaces and the Classic Electromagnetic Theory
5
Keywords