


default search action
Search dblp for Publications
export results for "stream:journals/nct:"
@article{DBLP:journals/nct/DjomadjiPFT24, author = {{\'{E}}ric Michel Deussom Djomadji and Duplex Mbieda Petmegni and Bienvenue Arsene Roger Fouba and Emmanuel Tony{\'{e}}}, title = {External Interferences Detection by Examples in {LTE} Networks for 4G and 5G Networks Efficient Deployments}, journal = {Netw. Commun. Technol.}, volume = {9}, number = {1}, pages = {35}, year = {2024}, url = {https://doi.org/10.5539/nct.v9n1p35}, doi = {10.5539/NCT.V9N1P35}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/DjomadjiPFT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/KenfackATEFL24, author = {Patrick Dany Bavoua Kenfack and Alphonse Binele Abana and Emmanuel Tony{\'{e}} and Paul Salomon Ngohe Ekam and Linjouom Samira France and Benjamin Tanga Louk}, title = {Simulation of Rainfall Attenuation Prediction Models for the Optimization of High-Speed Links in Millimeter Bands (80GHz): Tropical Regions' Case}, journal = {Netw. Commun. Technol.}, volume = {9}, number = {1}, pages = {1}, year = {2024}, url = {https://doi.org/10.5539/nct.v9n1p1}, doi = {10.5539/NCT.V9N1P1}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/KenfackATEFL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/AbanaKTN23, author = {Alphonse Binele Abana and Patrick Dany Bavoua Kenfack and Emmanuel Tony{\'{e}} and Claude Francine Onana Nomo}, title = {Integration of Small Cells with Smart Antennas in Macrocells for Improving the Performance of Mobile Telephone Networks}, journal = {Netw. Commun. Technol.}, volume = {8}, number = {1}, pages = {8--37}, year = {2023}, url = {https://doi.org/10.5539/nct.v8n1p8}, doi = {10.5539/NCT.V8N1P8}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/AbanaKTN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Azim23, author = {Abu Toha Md Anowarul Azim}, title = {Future Hybrid Technology for Pay {TV} Platform}, journal = {Netw. Commun. Technol.}, volume = {8}, number = {2}, pages = {35--40}, year = {2023}, url = {https://doi.org/10.5539/nct.v8n2p35}, doi = {10.5539/NCT.V8N2P35}, timestamp = {Sun, 18 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/Azim23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/IazeollaF23, author = {Giuseppe Iazeolla and Sonia Forconi}, title = {Predicting the QoE of Video Streaming in Communication Networks}, journal = {Netw. Commun. Technol.}, volume = {8}, number = {1}, pages = {38--52}, year = {2023}, url = {https://doi.org/10.5539/nct.v8n1p38}, doi = {10.5539/NCT.V8N1P38}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/IazeollaF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/KenfackATEM23, author = {Patrick Dany Bavoua Kenfack and Alphonse Binele Abana and Emmanuel Tony{\'{e}} and Paul Salomon Ngohe Ekam and Gilles Herve J. Ngotty Mbang}, title = {Optimizing Telematics Network Performance through Resource Virtualization in a Disruptive Environment: The Case of the {IP/MPLS} Core Network}, journal = {Netw. Commun. Technol.}, volume = {8}, number = {2}, pages = {1}, year = {2023}, url = {https://doi.org/10.5539/nct.v8n2p1}, doi = {10.5539/NCT.V8N2P1}, timestamp = {Wed, 09 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/KenfackATEM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Lee23, author = {Bruce Lee}, title = {Reviewer Acknowledgements for Network and Communication Technologies Vol. 8, No. 1}, journal = {Netw. Commun. Technol.}, volume = {8}, number = {1}, pages = {53}, year = {2023}, url = {https://doi.org/10.5539/nct.v8n1p53}, doi = {10.5539/NCT.V8N1P53}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/Lee23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Lee23a, author = {Bruce Lee}, title = {Reviewer Acknowledgements for Network and Communication Technologies Vol. 8, No. 2}, journal = {Netw. Commun. Technol.}, volume = {8}, number = {2}, pages = {41}, year = {2023}, url = {https://doi.org/10.5539/nct.v8n2p41}, doi = {10.5539/NCT.V8N2P41}, timestamp = {Sun, 18 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/Lee23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Zhong23, author = {Johnson Zhong}, title = {Analyzing Out-of-Domain Generalization Performance of Pre-Trained Segmentation Models}, journal = {Netw. Commun. Technol.}, volume = {8}, number = {1}, pages = {1}, year = {2023}, url = {https://doi.org/10.5539/nct.v8n1p1}, doi = {10.5539/NCT.V8N1P1}, timestamp = {Mon, 06 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/Zhong23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/AdetunjiM22, author = {Adebisi J. Adetunji and Babatunde O. Moses}, title = {The Role of Network Technologies in the Enhancement of the Health, Education, and Energy Sectors}, journal = {Netw. Commun. Technol.}, volume = {7}, number = {1}, pages = {39--54}, year = {2022}, url = {https://doi.org/10.5539/nct.v7n1p39}, doi = {10.5539/NCT.V7N1P39}, timestamp = {Fri, 28 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/AdetunjiM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Iazeolla22, author = {Giuseppe Iazeolla}, title = {Power Management of Base Transceiver Stations for Mobile Networks}, journal = {Netw. Commun. Technol.}, volume = {7}, number = {1}, pages = {12--26}, year = {2022}, url = {https://doi.org/10.5539/nct.v7n1p12}, doi = {10.5539/NCT.V7N1P12}, timestamp = {Fri, 28 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/Iazeolla22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Lee22, author = {Bruce Lee}, title = {Reviewer Acknowledgements for Network and Communication Technologies Vol. 7, No. 1}, journal = {Netw. Commun. Technol.}, volume = {7}, number = {1}, pages = {61}, year = {2022}, url = {https://doi.org/10.5539/nct.v7n1p61}, doi = {10.5539/NCT.V7N1P61}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/Lee22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/NicolasE22, author = {Nkondock Mi Bahanag Nicolas and Atsa Etoundi Roger}, title = {An overview of Intrusion Detection within an Information System: The Improvment by Process Mining}, journal = {Netw. Commun. Technol.}, volume = {7}, number = {1}, pages = {55--60}, year = {2022}, url = {https://doi.org/10.5539/nct.v7n1p55}, doi = {10.5539/NCT.V7N1P55}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/NicolasE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/NikelA22, author = {Fosoh Holiness Nikel and Austin Oguejiofor Amaechi}, title = {An Assessment of Employee Knowledge, Awareness, Attitude towards Organizational Cybersecurity in Cameroon}, journal = {Netw. Commun. Technol.}, volume = {7}, number = {1}, pages = {1--11}, year = {2022}, url = {https://doi.org/10.5539/nct.v7n1p1}, doi = {10.5539/NCT.V7N1P1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/NikelA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/YangW22, author = {Ching{-}Yu Yang and Wen{-}Fong Wang}, title = {Hiding Secrets in Electrocardiogram Based on Integer Wavelet Transform with Coefficient Adjustment and {LSB} Substitution}, journal = {Netw. Commun. Technol.}, volume = {7}, number = {1}, pages = {27--38}, year = {2022}, url = {https://doi.org/10.5539/nct.v7n1p27}, doi = {10.5539/NCT.V7N1P27}, timestamp = {Fri, 28 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/YangW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Bryndin21, author = {Evgeniy Bryndin}, title = {Fiber Optic Network Technology of Communication of Specialists via Mental Neurointerfaces}, journal = {Netw. Commun. Technol.}, volume = {6}, number = {1}, pages = {1--9}, year = {2021}, url = {https://doi.org/10.5539/nct.v6n2p1}, doi = {10.5539/NCT.V6N2P1}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/Bryndin21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Bryndin21a, author = {Evgeny Bryndin}, title = {Simulation of Creative Manifestation by Functional Ensembles of Intellectual Agents Based on Live Information in Various Spheres of Life Activity}, journal = {Netw. Commun. Technol.}, volume = {6}, number = {1}, pages = {41--46}, year = {2021}, url = {https://doi.org/10.5539/nct.v6n2p41}, doi = {10.5539/NCT.V6N2P41}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/Bryndin21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Ladvanszky21, author = {J{\'{a}}nos Ladv{\'{a}}nszky}, title = {There is no Theoretical Limit for Noise Reduction in Digital Communications}, journal = {Netw. Commun. Technol.}, volume = {6}, number = {1}, pages = {34--42}, year = {2021}, url = {https://doi.org/10.5539/nct.v6n1p34}, doi = {10.5539/NCT.V6N1P34}, timestamp = {Tue, 27 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/Ladvanszky21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Lee21, author = {Bruce Lee}, title = {Reviewer Acknowledgements for Network and Communication Technologies Vol. 6, No. 1}, journal = {Netw. Commun. Technol.}, volume = {6}, number = {1}, pages = {43}, year = {2021}, url = {https://doi.org/10.5539/nct.v6n1p43}, doi = {10.5539/NCT.V6N1P43}, timestamp = {Tue, 27 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/Lee21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Lin21, author = {Bao{-}Shuh Paul Lin}, title = {Toward an AI-Enabled O-RAN-based and SDN/NFV-driven 5{\unicode{65319}}{\&} IoT Network Era}, journal = {Netw. Commun. Technol.}, volume = {6}, number = {1}, pages = {6}, year = {2021}, url = {https://doi.org/10.5539/nct.v6n1p6}, doi = {10.5539/NCT.V6N1P6}, timestamp = {Thu, 24 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/Lin21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Sapaty21, author = {Peter Simon Sapaty}, title = {Space Debris Removal under Spatial Grasp Technology}, journal = {Netw. Commun. Technol.}, volume = {6}, number = {1}, pages = {16--27}, year = {2021}, url = {https://doi.org/10.5539/nct.v6n1p16}, doi = {10.5539/NCT.V6N1P16}, timestamp = {Tue, 27 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/Sapaty21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Sapaty21a, author = {Peter Simon Sapaty}, title = {Management of Celestial Systems under Spatial Grasp Model}, journal = {Netw. Commun. Technol.}, volume = {6}, number = {1}, pages = {10--21}, year = {2021}, url = {https://doi.org/10.5539/nct.v6n2p10}, doi = {10.5539/NCT.V6N2P10}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/Sapaty21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Wakasiaka21, author = {Fred Juma Wakasiaka}, title = {Gender Differences in Academic Self-Concept among Standard Seven Pupils Using Learning Strategies in the Use of Information Communication Technology in Bungoma County, Kenya}, journal = {Netw. Commun. Technol.}, volume = {6}, number = {1}, pages = {22--40}, year = {2021}, url = {https://doi.org/10.5539/nct.v6n2p22}, doi = {10.5539/NCT.V6N2P22}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/Wakasiaka21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Wang21, author = {Jianyi Wang}, title = {The Performance and Future of {QUIC} Protocol in the Modern Internet}, journal = {Netw. Commun. Technol.}, volume = {6}, number = {1}, pages = {28--33}, year = {2021}, url = {https://doi.org/10.5539/nct.v6n1p28}, doi = {10.5539/NCT.V6N1P28}, timestamp = {Tue, 27 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/Wang21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Zhao21, author = {Yonghao Zhao}, title = {An Improved Indoor Positioning Method Based on Nearest Neighbor Interpolation}, journal = {Netw. Commun. Technol.}, volume = {6}, number = {1}, pages = {1}, year = {2021}, url = {https://doi.org/10.5539/nct.v6n1p1}, doi = {10.5539/NCT.V6N1P1}, timestamp = {Mon, 22 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/Zhao21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/AmusanTAA20, author = {O. Amusan and Aderonke F. Thompson and Timilehin B. Aderinola and Boniface K. Alese}, title = {Modelling Malicious Attack in Social Networks}, journal = {Netw. Commun. Technol.}, volume = {5}, number = {1}, pages = {37--43}, year = {2020}, url = {https://doi.org/10.5539/nct.v5n1p37}, doi = {10.5539/NCT.V5N1P37}, timestamp = {Wed, 04 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/AmusanTAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Chen20, author = {Shi Chen}, title = {Indoor Localization Based on Fingerprint Clustering}, journal = {Netw. Commun. Technol.}, volume = {5}, number = {2}, pages = {40--45}, year = {2020}, url = {https://doi.org/10.5539/nct.v5n2p40}, doi = {10.5539/NCT.V5N2P40}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/Chen20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Eddine20, author = {Meftah Mohammed Charaf Eddine}, title = {A Comparative Study of Formal Approaches for Web Service Oriented Architecture}, journal = {Netw. Commun. Technol.}, volume = {5}, number = {2}, pages = {15--33}, year = {2020}, url = {https://doi.org/10.5539/nct.v5n2p15}, doi = {10.5539/NCT.V5N2P15}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/Eddine20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/FuSY20, author = {Guifang Fu and Kexin Shi and Kai Ye}, title = {The Influence of Social Support on College Students' Mobile Phone Dependence: The Mediating Role of Security}, journal = {Netw. Commun. Technol.}, volume = {5}, number = {1}, pages = {44--50}, year = {2020}, url = {https://doi.org/10.5539/nct.v5n1p44}, doi = {10.5539/NCT.V5N1P44}, timestamp = {Thu, 18 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/FuSY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/GeslinBSTKKB20, author = {Erik Geslin and Olivier Bartheye and Colin T. Schmidt and Katy Tcha{-}Tokey and Teerawat Kulsuwan and Salah Keziz and Tanguy Belouin}, title = {Bernardo Autonomous Emotional Agents Increase Perception of {VR} Stimuli}, journal = {Netw. Commun. Technol.}, volume = {5}, number = {1}, pages = {11--25}, year = {2020}, url = {https://doi.org/10.5539/nct.v5n1p11}, doi = {10.5539/NCT.V5N1P11}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/GeslinBSTKKB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Ladvanszky20, author = {J. Ladv{\'{a}}nszky}, title = {A Modification to the Shannon Formula}, journal = {Netw. Commun. Technol.}, volume = {5}, number = {2}, pages = {1--6}, year = {2020}, url = {https://doi.org/10.5539/nct.v5n2p1}, doi = {10.5539/NCT.V5N2P1}, timestamp = {Thu, 18 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/Ladvanszky20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Lee20, author = {Bruce Lee}, title = {Reviewer Acknowledgements for Network and Communication Technologies Vol. 5, No. 2}, journal = {Netw. Commun. Technol.}, volume = {5}, number = {2}, pages = {46}, year = {2020}, url = {https://doi.org/10.5539/nct.v5n2p46}, doi = {10.5539/NCT.V5N2P46}, timestamp = {Thu, 18 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/Lee20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Lin20, author = {Bao{-}Shuh Paul Lin}, title = {Toward an AI-Enabled SDN-based 5G {\&} IoT Network}, journal = {Netw. Commun. Technol.}, volume = {5}, number = {2}, pages = {7--14}, year = {2020}, url = {https://doi.org/10.5539/nct.v5n2p7}, doi = {10.5539/NCT.V5N2P7}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/Lin20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Shen20, author = {Neil Shen}, title = {The Newspaper Industry in a Changing Landscape The Shift in News Content of Various Newspapers as a Response to the Rise of Social Media}, journal = {Netw. Commun. Technol.}, volume = {5}, number = {1}, pages = {1--10}, year = {2020}, url = {https://doi.org/10.5539/nct.v5n1p1}, doi = {10.5539/NCT.V5N1P1}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/Shen20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/ThompsonODA20, author = {Aderonke F. Thompson and Oghenerukevwe E. Oyinloye and Matthew T. David and Boniface K. Alese}, title = {A Secured System for Internet Enabled Host Devices}, journal = {Netw. Commun. Technol.}, volume = {5}, number = {1}, pages = {26--36}, year = {2020}, url = {https://doi.org/10.5539/nct.v5n1p26}, doi = {10.5539/NCT.V5N1P26}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/ThompsonODA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Zhu20, author = {Xuanyu Zhu}, title = {Indoor Localization Based on Optimized {KNN}}, journal = {Netw. Commun. Technol.}, volume = {5}, number = {2}, pages = {34--39}, year = {2020}, url = {https://doi.org/10.5539/nct.v5n2p34}, doi = {10.5539/NCT.V5N2P34}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/Zhu20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Arslan19, author = {Ayse Kok Arslan}, title = {Research Study: Towards a Collaborative Trust-Based Debugging Model for the Telecom Industry}, journal = {Netw. Commun. Technol.}, volume = {4}, number = {1}, pages = {36--51}, year = {2019}, url = {https://doi.org/10.5539/nct.v4n1p36}, doi = {10.5539/NCT.V4N1P36}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/Arslan19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/BenzidK19, author = {Djedjiga Benzid and Michel Kadoch}, title = {Fountain Codes and Linear Filtring to Mitigate Pilot Contamination Issue in Massive MiMo}, journal = {Netw. Commun. Technol.}, volume = {4}, number = {1}, pages = {1--12}, year = {2019}, url = {https://doi.org/10.5539/nct.v4n1p1}, doi = {10.5539/NCT.V4N1P1}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/BenzidK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Hutaibat19, author = {Areej Abed Hutaibat}, title = {Secure Image Steganography Algorithm Using Radial Basis Function Neural Network}, journal = {Netw. Commun. Technol.}, volume = {4}, number = {1}, pages = {16--25}, year = {2019}, url = {https://doi.org/10.5539/nct.v4n1p16}, doi = {10.5539/NCT.V4N1P16}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/Hutaibat19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/IbhazeOAI19, author = {Augustus Ehiremen Ibhaze and Ignatius K. Okakwu and Ayobami T. Akinrelere and Agbotiname Lucky Imoize}, title = {An Intelligent Dispatch System Operating in a Partially Closed Environment}, journal = {Netw. Commun. Technol.}, volume = {4}, number = {1}, pages = {26--35}, year = {2019}, url = {https://doi.org/10.5539/nct.v4n1p26}, doi = {10.5539/NCT.V4N1P26}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/IbhazeOAI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/JiY19, author = {Yanhui Ji and Hao Yang}, title = {Comparation of LoRa and NB-IoT}, journal = {Netw. Commun. Technol.}, volume = {4}, number = {1}, pages = {13--15}, year = {2019}, url = {https://doi.org/10.5539/nct.v4n1p13}, doi = {10.5539/NCT.V4N1P13}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/JiY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/JanQ18, author = {Saeed Ullah Jan and Fawad Qayum}, title = {A Robust Authentication Scheme for Client-Server Architecture With Provable Security Analysis}, journal = {Netw. Commun. Technol.}, volume = {3}, number = {1}, pages = {6--25}, year = {2018}, url = {https://doi.org/10.5539/nct.v3n1p6}, doi = {10.5539/NCT.V3N1P6}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/JanQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/OjugoO18, author = {Arnold Adimabua Ojugo and D. O. Otakore}, title = {Redesigning Academic Website for Better Visibility and Footprint: {A} Case of the Federal University of Petroleum Resources Effurun Website}, journal = {Netw. Commun. Technol.}, volume = {3}, number = {1}, pages = {33--44}, year = {2018}, url = {https://doi.org/10.5539/nct.v3n1p33}, doi = {10.5539/NCT.V3N1P33}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/OjugoO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/OyewoleNOS18, author = {Ogunsanwo Gbenga Oyewole and Goga Nicholas and Oludele Awodele and Okolie Samuel}, title = {Comparison of De-Noising Algorithms Technique}, journal = {Netw. Commun. Technol.}, volume = {3}, number = {1}, pages = {26--32}, year = {2018}, url = {https://doi.org/10.5539/nct.v3n1p26}, doi = {10.5539/NCT.V3N1P26}, timestamp = {Thu, 19 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/OyewoleNOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/ZhangLZ18, author = {Guohua Zhang and Zhen Li and Qiaoli Zhang}, title = {Controllability of Complex Power Networks}, journal = {Netw. Commun. Technol.}, volume = {3}, number = {1}, pages = {1--5}, year = {2018}, url = {https://doi.org/10.5539/nct.v3n1p1}, doi = {10.5539/NCT.V3N1P1}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/ZhangLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/AhujaM13, author = {Sanjay P. Ahuja and Bryan Moore}, title = {State of Big Data Analysis in the Cloud}, journal = {Netw. Commun. Technol.}, volume = {2}, number = {1}, pages = {62--68}, year = {2013}, url = {https://doi.org/10.5539/nct.v2n1p62}, doi = {10.5539/NCT.V2N1P62}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/AhujaM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/AhujaM13a, author = {Sanjay P. Ahuja and Bryan Moore}, title = {A Survey of Cloud Computing and Social Networks}, journal = {Netw. Commun. Technol.}, volume = {2}, number = {2}, pages = {11--16}, year = {2013}, url = {https://doi.org/10.5539/nct.v2n2p11}, doi = {10.5539/NCT.V2N2P11}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/AhujaM13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Benomar13, author = {Ahmed Benomar}, title = {Cylindrical Dielectric Resonator Antenna for {SHF} Band Application}, journal = {Netw. Commun. Technol.}, volume = {2}, number = {1}, pages = {28--33}, year = {2013}, url = {https://doi.org/10.5539/nct.v2n1p28}, doi = {10.5539/NCT.V2N1P28}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/Benomar13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/FongW13, author = {Ken Kin{-}Kiu Fong and Stanley Kam Sing Wong}, title = {Exploring the Weak Links of Internet Security: {A} Study of WiFi Security in Hong Kong}, journal = {Netw. Commun. Technol.}, volume = {2}, number = {2}, pages = {17--28}, year = {2013}, url = {https://doi.org/10.5539/nct.v2n2p17}, doi = {10.5539/NCT.V2N2P17}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/FongW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/LarsenV13, author = {Morten N. Larsen and Brian Vinter}, title = {Transparent Offloading of Computationally Demanding Operations in Microsoft .NET}, journal = {Netw. Commun. Technol.}, volume = {2}, number = {1}, pages = {52--61}, year = {2013}, url = {https://doi.org/10.5539/nct.v2n1p52}, doi = {10.5539/NCT.V2N1P52}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/LarsenV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/OgbulezieOUU13, author = {Julie C. Ogbulezie and M. U. Onuu and J. O. Ushie and B. E. Usibe}, title = {Propagation Models for {GSM} 900 and 1800 MHz for Port Harcourt and Enugu, Nigeria}, journal = {Netw. Commun. Technol.}, volume = {2}, number = {2}, pages = {1--10}, year = {2013}, url = {https://doi.org/10.5539/nct.v2n2p1}, doi = {10.5539/NCT.V2N2P1}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/OgbulezieOUU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/PirovanoG13, author = {Alain Pirovano and Fabien Garcia}, title = {A New Survey on Improving {TCP} Performances over Geostationary Satellite Link}, journal = {Netw. Commun. Technol.}, volume = {2}, number = {1}, pages = {1--18}, year = {2013}, url = {https://doi.org/10.5539/nct.v2n1p1}, doi = {10.5539/NCT.V2N1P1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/PirovanoG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/SanchesSBHB13, author = {Pedro Sanches and Eric{-}Oluf Svee and Markus Bylund and Benjamin Hirsch and Magnus Boman}, title = {Knowing Your Population: Privacy-Sensitive Mining of Massive Data}, journal = {Netw. Commun. Technol.}, volume = {2}, number = {1}, pages = {34--51}, year = {2013}, url = {https://doi.org/10.5539/nct.v2n1p34}, doi = {10.5539/NCT.V2N1P34}, timestamp = {Mon, 02 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/SanchesSBHB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/SukhovC13, author = {Andrei M. Sukhov and D. Yu. Chemodanov}, title = {The Neighborhoods Method and Virtual Polar Coordinates in Wireless Sensor Networks}, journal = {Netw. Commun. Technol.}, volume = {2}, number = {1}, pages = {19--27}, year = {2013}, url = {https://doi.org/10.5539/nct.v2n1p19}, doi = {10.5539/NCT.V2N1P19}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/SukhovC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/WaziriADIMA13, author = {Victor Onomza Waziri and Joseph Adebayo Ojeniyi and Hakimi Danladi and Audu Isah and Abubakar S. Magaji and Muhammad Bashir Abdullahi}, title = {Network Security in Cloud Computing with Elliptic Curve Cryptography}, journal = {Netw. Commun. Technol.}, volume = {2}, number = {2}, pages = {43--58}, year = {2013}, url = {https://doi.org/10.5539/nct.v2n2p43}, doi = {10.5539/NCT.V2N2P43}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/WaziriADIMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/WuHSBG13, author = {Yeqing Wu and Fei Hu and Qingquan Sun and Ke Bao and Mengcheng Guo}, title = {A Fast Raptor Codes Decoding Strategy for Real-Time Communication Systems}, journal = {Netw. Commun. Technol.}, volume = {2}, number = {2}, pages = {29--42}, year = {2013}, url = {https://doi.org/10.5539/nct.v2n2p29}, doi = {10.5539/NCT.V2N2P29}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/WuHSBG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/AhujaK12, author = {Sanjay P. Ahuja and Deepa Komathukattil}, title = {A Survey of the State of Cloud Security}, journal = {Netw. Commun. Technol.}, volume = {1}, number = {2}, pages = {66--75}, year = {2012}, url = {https://doi.org/10.5539/nct.v1n2p66}, doi = {10.5539/NCT.V1N2P66}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/AhujaK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/AhujaM12, author = {Sanjay P. Ahuja and Sindhu Mani}, title = {Availability of Services in the Era of Cloud Computing}, journal = {Netw. Commun. Technol.}, volume = {1}, number = {1}, pages = {2--6}, year = {2012}, url = {https://doi.org/10.5539/nct.v1n1p2}, doi = {10.5539/NCT.V1N1P2}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/AhujaM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/AhujaMZ12, author = {Sanjay P. Ahuja and Sindhu Mani and Jesus Zambrano}, title = {A Survey of the State of Cloud Computing in Healthcare}, journal = {Netw. Commun. Technol.}, volume = {1}, number = {2}, pages = {12--19}, year = {2012}, url = {https://doi.org/10.5539/nct.v1n2p12}, doi = {10.5539/NCT.V1N2P12}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/AhujaMZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/AhujaR12, author = {Sanjay P. Ahuja and Alan C. Rolli}, title = {Exploring the Convergence of Mobile Computing with Cloud Computing}, journal = {Netw. Commun. Technol.}, volume = {1}, number = {1}, pages = {97--102}, year = {2012}, url = {https://doi.org/10.5539/nct.v1n1p97}, doi = {10.5539/NCT.V1N1P97}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/AhujaR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/AsllaniA12, author = {Arben Asllani and Amjad Ali}, title = {Using Simulation to Investigate Virus Propagation in Computer Networks}, journal = {Netw. Commun. Technol.}, volume = {1}, number = {2}, pages = {76--85}, year = {2012}, url = {https://doi.org/10.5539/nct.v1n2p76}, doi = {10.5539/NCT.V1N2P76}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/AsllaniA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Bystricanova12, author = {Anna Bystricanov{\'{a}}}, title = {Diagnostic of Fault-tolerant System {S7-400H}}, journal = {Netw. Commun. Technol.}, volume = {1}, number = {2}, pages = {20--27}, year = {2012}, url = {https://doi.org/10.5539/nct.v1n2p20}, doi = {10.5539/NCT.V1N2P20}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/Bystricanova12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/CaballeroSZM12, author = {Iker Caballero and Javier Vicente S{\'{a}}ez and Bego{\~{n}}a Garc{\'{\i}}a Zapirain and Amaia M{\'{e}}ndez}, title = {A Complete Interoperable eHealth System Based on ZigBee Pro Standard}, journal = {Netw. Commun. Technol.}, volume = {1}, number = {1}, pages = {79--96}, year = {2012}, url = {https://doi.org/10.5539/nct.v1n1p79}, doi = {10.5539/NCT.V1N1P79}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/CaballeroSZM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/ChenCLZ12, author = {Jianwen Chen and Xiang Chen and Jing Liu and Ming Zhao}, title = {Open Wireless System Cloud: An Architecture for Future Wireless Communications System}, journal = {Netw. Commun. Technol.}, volume = {1}, number = {2}, pages = {28--35}, year = {2012}, url = {https://doi.org/10.5539/nct.v1n2p28}, doi = {10.5539/NCT.V1N2P28}, timestamp = {Tue, 06 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/ChenCLZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/ChowdhuryCNK12, author = {Md. Samee Ullah Chowdhury and Shamit Chakraborty and Tanveer Arif Nipu and M. Shamim Kaiser}, title = {Dynamic Radio Resource Allocation for Macro-Femto Hybrid Cellular Network Maintaining Fairness}, journal = {Netw. Commun. Technol.}, volume = {1}, number = {1}, pages = {67--78}, year = {2012}, url = {https://doi.org/10.5539/nct.v1n1p67}, doi = {10.5539/NCT.V1N1P67}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/ChowdhuryCNK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/FemmamZB12, author = {Smain Femmam and M. Faouzi Zerarka and Mohamed Ikbal Benakila}, title = {New Approach Construction for Wireless ZigBee Sensor Based on Embedding Pancake Graphs}, journal = {Netw. Commun. Technol.}, volume = {1}, number = {1}, pages = {7--25}, year = {2012}, url = {https://doi.org/10.5539/nct.v1n1p7}, doi = {10.5539/NCT.V1N1P7}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/FemmamZB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/GoonatilakeB12, author = {Rohitha Goonatilake and Rafic Bachnak}, title = {Modeling Latency in a Network Distribution}, journal = {Netw. Commun. Technol.}, volume = {1}, number = {2}, pages = {1--11}, year = {2012}, url = {https://doi.org/10.5539/nct.v1n2p1}, doi = {10.5539/NCT.V1N2P1}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/GoonatilakeB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/HirataD12, author = {Kouji Hirata and Dewiani}, title = {Dynamic Routing and Wavelength Assignment in Multifiber {WDM} Networks with Wavelength Conversion Capability}, journal = {Netw. Commun. Technol.}, volume = {1}, number = {2}, pages = {36--47}, year = {2012}, url = {https://doi.org/10.5539/nct.v1n2p36}, doi = {10.5539/NCT.V1N2P36}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/HirataD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/MostafaviMM12, author = {Mohammad Ali Mostafavi and Ayyoub Akbari{-}Moghanjoughi and Hamid Mousavi}, title = {A Review and Performance Analysis of Reactive and Proactive Routing Protocols on {MANET}}, journal = {Netw. Commun. Technol.}, volume = {1}, number = {2}, pages = {48--58}, year = {2012}, url = {https://doi.org/10.5539/nct.v1n2p48}, doi = {10.5539/NCT.V1N2P48}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/MostafaviMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/ParadiaKSDDGM12, author = {Maria Paradia and Yiouli Kritikou and Vera Stavroulaki and Panagiotis Demestichas and George Dimitrakopoulos and Sotirios Glavas and Napoleon Mitsis}, title = {Introducing Cognition in Web-Based, Learning Management Systems for Vocabulary Teaching}, journal = {Netw. Commun. Technol.}, volume = {1}, number = {1}, pages = {51--66}, year = {2012}, url = {https://doi.org/10.5539/nct.v1n1p51}, doi = {10.5539/NCT.V1N1P51}, timestamp = {Thu, 24 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/ParadiaKSDDGM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/RahmanM12, author = {Munshi Mahbubur Rahman and S. P. Majumder}, title = {Analysis of a Power Line Communication System Over a Non-white Additive Gaussian Noise Channel and Performance Improvement Using Diversity Reception}, journal = {Netw. Commun. Technol.}, volume = {1}, number = {1}, pages = {26--38}, year = {2012}, url = {https://doi.org/10.5539/nct.v1n1p26}, doi = {10.5539/NCT.V1N1P26}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/RahmanM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/SmritiKA12, author = {Zannatul Ferdous Smriti and M. Shamim Kaiser and Kazi M. Ahmed}, title = {Interference Mitigation for OFDM-Based Joint Macro-Femto Cellular Networks}, journal = {Netw. Commun. Technol.}, volume = {1}, number = {1}, pages = {103--110}, year = {2012}, url = {https://doi.org/10.5539/nct.v1n1p103}, doi = {10.5539/NCT.V1N1P103}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/SmritiKA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/UtsumiZ12, author = {Satoshi Utsumi and Salahuddin Muhammad Salim Zabir}, title = {Timestamp Retransmission Algorithm for TCP-Cherry over InterPlaNetary Internet}, journal = {Netw. Commun. Technol.}, volume = {1}, number = {2}, pages = {59--65}, year = {2012}, url = {https://doi.org/10.5539/nct.v1n2p59}, doi = {10.5539/NCT.V1N2P59}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/UtsumiZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Yan12, author = {Bin Yan}, title = {Limit and Dynamics of Information Entropy in Transmission}, journal = {Netw. Commun. Technol.}, volume = {1}, number = {1}, pages = {39--50}, year = {2012}, url = {https://doi.org/10.5539/nct.v1n1p39}, doi = {10.5539/NCT.V1N1P39}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/Yan12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.