Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Articles
Current
Archives
Authors
Guidelines
Rights and Responsibilities
Benefits
Make a Submissions
Policies
Frequently Asked Questions
Editorial Policy
Open Access Policy
Privacy Policy
Publication Ethics
Withdrawal, Retraction, Correction
Editorial Team
About
About the Journal
Article Publishing Fee
Abstracting and Indexing
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 2 No. 5 (2014): Transactions on Networks and Communications
Vol. 2 No. 5 (2014): Transactions on Networks and Communications
Transactions on Networks and Communications
Volume 2, Issue 5, October 2014
DOI:
https://doi.org/10.14738/tnc.25.2014
Published:
2014-11-03
Full Issue
Volume 2 No 5; Complete Issue
Articles
Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks
Arif Sari
01-06
PDF
DOI:
https://doi.org/10.14738/tnc.25.431
E-Health Monitoring System using Wireless Sensor Network
Syed Abdur Rauf Magrabi
07-14
PDF
DOI:
https://doi.org/10.14738/tnc.25.382
Flexible Pricing Models for Cloud Services
Sururah A. Bello, Gazali Abdul Wakil
15-27
DOI:
https://doi.org/10.14738/tnc.25.281
An Organizational Role-based Extrusion Detection Model with Profile Migration
Tirthankar Ghosh, Kasun Abeykoon, Thusith Abeykoon
28-44
PDF
DOI:
https://doi.org/10.14738/tnc.25.473
Rate Dynamics and Transmission Algorithms in Clustered Sensor Networks
A.T. Burrell, P. Papantoni-Kazakos
45-59
PDF
DOI:
https://doi.org/10.14738/tnc.25.482
TDOA Wireless Localization Comparison Influence of Network Topology
Mourad Oussalah, Hao Li
104-115
PDF
DOI:
https://doi.org/10.14738/tnc.25.515
Cylindrical rf network antennas for coupled plasma sources Copper legs delayed in time system stability analysis
Ofer Aluf
116-146
PDF
DOI:
https://doi.org/10.14738/tnc.25.570
N-Cryptographic Multilevel Algorithm for Effective Information Security
Olawale S Adebayo, Morufu Olalere, Amit Mishra, Joel N. Ugwu, M. A. Mabayoje
147-155
PDF
DOI:
https://doi.org/10.14738/tnc.25.504
Fractal Antennas : A Novel Miniaturization Technique for wireless Networks
Abdelati REHA, Abdelkebir EL AMRI, Othmane BENHMAMMOUCH, Ahmed OULAD SAID
165-193
PDF
DOI:
https://doi.org/10.14738/tnc.25.566
Enhanced TCP Westwood Slow Start Phase
Mohanad Al-Hasanat, Kamaruzzaman Seman, Kamarudien Saadan
194-200
PDF
DOI:
https://doi.org/10.14738/tnc.25.601
Enhancing the competence of enterprise network using contemporary networking paradigms
Aditya Ahuja, Kamal Dewan, Nikita Gupta, Meenakshi Sood
201-213
PDF
DOI:
https://doi.org/10.14738/tnc.25.565
Technical Reviews
Modeling Structural Behaviour of Inhibitors of Cloud Computing: A TISM Approach
Ambikadevi Amma T., N. Radhika, V.R. Pramod
60-74
PDF
DOI:
https://doi.org/10.14738/tnc.25.390
A Review Study on Analytical Estimation of Optimal Number of Clusters in Wireless Sensor Networks
Vinay Kumar, Sanjay B Dhok, Rajeev Tripathi, Sudarshan Tiwari
75-103
PDF
DOI:
https://doi.org/10.14738/tnc.25.488
Central Locker System for shopping mall using NFC Based Smartphone
Siddarth Poddar
156-164
PDF
DOI:
https://doi.org/10.14738/tnc.25.520
Author Center
About the Journal
Current Issue
Archives
Make a Submission
Author Guidelines
Call for Papers
Indexing
Follow Us
Current Issue
Most Read Last Week
Cryptography and Steganography: New Approach
17
The Dark Side of the China: The Government, Society and the Great Cannon
7
Exploiting Cryptocurrency Miners with OISNT Techniques
7
Holomorphy in Pseudo-Euclidean Spaces and the Classic Electromagnetic Theory
5
Condition Absolute Stability Control System of Electromagnetoelastic Actuator for Communication Equipment
5
Keywords