Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Articles
Current
Archives
Authors
Guidelines
Rights and Responsibilities
Benefits
Make a Submissions
Policies
Frequently Asked Questions
Editorial Policy
Open Access Policy
Privacy Policy
Publication Ethics
Withdrawal, Retraction, Correction
Editorial Team
About
About the Journal
Article Publishing Fee
Abstracting and Indexing
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 4 No. 1 (2016): Transactions on Networks and Communications
Vol. 4 No. 1 (2016): Transactions on Networks and Communications
Transactions on Networks and Communications
Volume 4, Issue 1, February 2016
DOI:
https://doi.org/10.14738/tnc.41.2016
Published:
2016-03-05
Full Issue
Volume 4 No 1; Complete Issue
Articles
Traffic Management in 5G Mobile Networks: Selfish Users and Fair Network
Toktam Mahmoodi, Menglan Jiang
01
PDF
DOI:
https://doi.org/10.14738/tnc.41.1447
The Effects of Need Factors and Environment on the Formation of Security Consciousness
Yuhiko Toyoda, Mika Takeuchi, Hiroshi Ichikawa, Mitsuteru Tashiro, Masao Suzuki
16
PDF
DOI:
https://doi.org/10.14738/tnc.41.1890
Window Based Pulse Shaping Technique for DVB-T System
Mohammed Tarique, Mussab Mohammed Saleh
25
PDF
DOI:
https://doi.org/10.14738/tnc.41.1762
Spectrum Sensing-Energy efficient on Cluster Based Cooperative Cognitive Radio Networks
Zina Chkirbene, Noureddine Hamdi
38
PDF
DOI:
https://doi.org/10.14738/tnc.41.1868
Author Center
About the Journal
Current Issue
Archives
Make a Submission
Author Guidelines
Call for Papers
Indexing
Follow Us
Current Issue
Most Read Last Week
The Impact of Policy on Farmer Suicide in India: A Scoping Review
85
Aquaponics: A Sustainable Approach to Integrated Fish and Plant Farming
44
Assessing the Physicochemical, Nutritional and Sensory Properties of Cake Made with Wheat and Orange-Fleshed Sweet Potatoes Flour Blend
41
Cryptography and Steganography: New Approach
24
An Enriched Ciphering Method to Evaluate Performance of EEA2-algorithm for LTE Security
19
Keywords