Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Articles
Current
Archives
Authors
Guidelines
Rights and Responsibilities
Benefits
Make a Submissions
Policies
Frequently Asked Questions
Editorial Policy
Open Access Policy
Privacy Policy
Publication Ethics
Withdrawal, Retraction, Correction
Editorial Team
About
About the Journal
Article Publishing Fee
Abstracting and Indexing
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 3 No. 2 (2015): Transactions on Networks and Communications
Vol. 3 No. 2 (2015): Transactions on Networks and Communications
Transactions on Networks and Communications
Volume 3, Issue 2, April 2015
DOI:
https://doi.org/10.14738/tnc.32.2015
Published:
2015-05-02
Full Issue
Volume 3 No 2; Complete Issue
Articles
BREAST CANCER RISK PREDICTION USING DATA MINING CLASSIFICATION TECHNIQUES
Kehinde Williams, Peter Adebayo Idowu, Jeremiah Ademola Balogun, Adeniran Ishola Oluwaranti
01
PDF
DOI:
https://doi.org/10.14738/tnc.32.662
Applying Fuzzy cluster index to improve searching in data warehouse
Ahmad Abdullah Mohammed, Shawkat Kamal Guirguis, Magda Mohamed Madbouly
12
PDF
DOI:
https://doi.org/10.14738/tnc.32.1021
Service Delivery Mechanism on Content Based Cluster using Similarity of Services
T.N Anitha, R Balakrishna
25
PDF
DOI:
https://doi.org/10.14738/tnc.32.1089
Segmentation of Broken and Isolated characters in Handwritten Gurumukhi Word using Neighboring pixel technique
Akashdeep Kaur, Dr.Paramjeet Singh, Shaveta Rani
36
PDF
DOI:
https://doi.org/10.14738/tnc.32.1094
Investigating Privacy Preserving Healthcare Social Network
Qurban A Memon, Asma Fayes Mustafa
42
PDF
DOI:
https://doi.org/10.14738/tnc.32.1116
A Comparative Analysis of Privacy Preserving Techniques in Online Social Networks
Firdous Kausar, Shoroq Odah Al Beladi
59
PDF
DOI:
https://doi.org/10.14738/tnc.32.854
Reversible nanoporous sensors of carbon monoxide in atmosphere
Alexander Novikov
70
PDF
DOI:
https://doi.org/10.14738/tnc.32.899
An Enriched Ciphering Method to Evaluate Performance of EEA2-algorithm for LTE Security
Gautam Siwach, Amir Esmailpour
77
PDF
DOI:
https://doi.org/10.14738/tnc.32.1092
A Mobile Dual VoIP System for Enhancing Speech Quality and Intelligibility: Simulation and Test bed
Francesco Beritelli, Corrado Rametta
91
PDF
DOI:
https://doi.org/10.14738/tnc.32.1157
Classification of Web Services using Fuzzy Classifiers with Feature Selection and Weighted Average Accuracy
V Mohan Patro, Manas Ranjan Patra
107
PDF
DOI:
https://doi.org/10.14738/tnc.32.1140
Offset Phase Shift Keying Modulation in Multiple-Input Multiple-Output Spatial Multiplexing
Adeyemo Zacheaus Kayode
116
PDF
DOI:
https://doi.org/10.14738/tnc.32.1144
Developing of Human Resources in E-learning and Practical Experience in its implementation
Tamar Gogoladze, Natia Zhozhuashvili, Elene Khojevanishvili, Ana Tsiklauri
127
PDF
DOI:
https://doi.org/10.14738/tnc.32.1087
Membership Protocols for the iTrust Network
Yung Ting Chuang, Peter M. Melliar Smith, Louise E Moser, Isai Michel Lombera
133
PDF
DOI:
https://doi.org/10.14738/tnc.32.1166
Do personal attributes and an understanding of sarcasm and metaphor explain problematic experiences on the Internet? —A survey for the development of information literacy education tools—
Hiroshi Ichikawa, Yuhiko TOYODA, Mika TAKEUCHI, Mitsuteru TASHIRO, Masao SUZUKI
158
PDF
DOI:
https://doi.org/10.14738/tnc.32.1169
Author Center
About the Journal
Current Issue
Archives
Make a Submission
Author Guidelines
Call for Papers
Indexing
Follow Us
Current Issue
Most Read Last Week
Cryptography and Steganography: New Approach
11
The Dark Side of the China: The Government, Society and the Great Cannon
8
Exploiting Cryptocurrency Miners with OISNT Techniques
7
BREAST CANCER RISK PREDICTION USING DATA MINING CLASSIFICATION TECHNIQUES
5
Holomorphy in Pseudo-Euclidean Spaces and the Classic Electromagnetic Theory
5
Keywords