Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Articles
Current
Archives
Authors
Guidelines
Rights and Responsibilities
Benefits
Make a Submissions
Policies
Frequently Asked Questions
Editorial Policy
Open Access Policy
Privacy Policy
Publication Ethics
Withdrawal, Retraction, Correction
Editorial Team
About
About the Journal
Article Publishing Fee
Abstracting and Indexing
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 2 No. 5 (2014): Transactions on Networks and Communications
Vol. 2 No. 5 (2014): Transactions on Networks and Communications
Transactions on Networks and Communications
Volume 2, Issue 5, October 2014
DOI:
https://doi.org/10.14738/tnc.25.2014
Published:
2014-11-03
Full Issue
Volume 2 No 5; Complete Issue
Articles
Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks
Arif Sari
01-06
PDF
E-Health Monitoring System using Wireless Sensor Network
Syed Abdur Rauf Magrabi
07-14
PDF
Flexible Pricing Models for Cloud Services
Sururah A. Bello, Gazali Abdul Wakil
15-27
An Organizational Role-based Extrusion Detection Model with Profile Migration
Tirthankar Ghosh, Kasun Abeykoon, Thusith Abeykoon
28-44
PDF
Rate Dynamics and Transmission Algorithms in Clustered Sensor Networks
A.T. Burrell, P. Papantoni-Kazakos
45-59
PDF
TDOA Wireless Localization Comparison Influence of Network Topology
Mourad Oussalah, Hao Li
104-115
PDF
Cylindrical rf network antennas for coupled plasma sources Copper legs delayed in time system stability analysis
Ofer Aluf
116-146
PDF
N-Cryptographic Multilevel Algorithm for Effective Information Security
Olawale S Adebayo, Morufu Olalere, Amit Mishra, Joel N. Ugwu, M. A. Mabayoje
147-155
PDF
Fractal Antennas : A Novel Miniaturization Technique for wireless Networks
Abdelati REHA, Abdelkebir EL AMRI, Othmane BENHMAMMOUCH, Ahmed OULAD SAID
165-193
PDF
Enhanced TCP Westwood Slow Start Phase
Mohanad Al-Hasanat, Kamaruzzaman Seman, Kamarudien Saadan
194-200
PDF
Enhancing the competence of enterprise network using contemporary networking paradigms
Aditya Ahuja, Kamal Dewan, Nikita Gupta, Meenakshi Sood
201-213
PDF
Technical Reviews
Modeling Structural Behaviour of Inhibitors of Cloud Computing: A TISM Approach
Ambikadevi Amma T., N. Radhika, V.R. Pramod
60-74
PDF
A Review Study on Analytical Estimation of Optimal Number of Clusters in Wireless Sensor Networks
Vinay Kumar, Sanjay B Dhok, Rajeev Tripathi, Sudarshan Tiwari
75-103
PDF
Central Locker System for shopping mall using NFC Based Smartphone
Siddarth Poddar
156-164
PDF
Author Center
About the Journal
Current Issue
Archives
Make a Submission
Author Guidelines
Call for Papers
Indexing
Follow Us
Current Issue
Most Read Last Week
Exploiting Cryptocurrency Miners with OISNT Techniques
11
ZRSA Algorithm
7
Cryptography and Steganography: New Approach
5
Do personal attributes and an understanding of sarcasm and metaphor explain problematic experiences on the Internet? —A survey for the development of information literacy education tools—
5
Consumer Perceptions towards Online Retailing in Botswana: A Case Study of the University of Botswana
5
Keywords