- J. Ladvánszky:
A Modification to the Shannon Formula. Netw. Commun. Technol. 5(2): 1-6 (2020) - Bruce Lee:
Reviewer Acknowledgements for Network and Communication Technologies Vol. 5, No. 2. Netw. Commun. Technol. 5(2): 46 (2020) - Bao-Shuh Paul Lin:
Toward an AI-Enabled SDN-based 5G & IoT Network. Netw. Commun. Technol. 5(2): 7-14 (2020) - Neil Shen:
The Newspaper Industry in a Changing Landscape The Shift in News Content of Various Newspapers as a Response to the Rise of Social Media. Netw. Commun. Technol. 5(1): 1-10 (2020) - Aderonke F. Thompson, Oghenerukevwe E. Oyinloye, Matthew T. David, Boniface K. Alese:
A Secured System for Internet Enabled Host Devices. Netw. Commun. Technol. 5(1): 26-36 (2020) - Xuanyu Zhu:
Indoor Localization Based on Optimized KNN. Netw. Commun. Technol. 5(2): 34-39 (2020) - 2019
- Ayse Kok Arslan:
Research Study: Towards a Collaborative Trust-Based Debugging Model for the Telecom Industry. Netw. Commun. Technol. 4(1): 36-51 (2019) - Djedjiga Benzid, Michel Kadoch:
Fountain Codes and Linear Filtring to Mitigate Pilot Contamination Issue in Massive MiMo. Netw. Commun. Technol. 4(1): 1-12 (2019) - Areej Abed Hutaibat:
Secure Image Steganography Algorithm Using Radial Basis Function Neural Network. Netw. Commun. Technol. 4(1): 16-25 (2019) - Augustus Ehiremen Ibhaze, Ignatius K. Okakwu, Ayobami T. Akinrelere, Agbotiname Lucky Imoize:
An Intelligent Dispatch System Operating in a Partially Closed Environment. Netw. Commun. Technol. 4(1): 26-35 (2019) - Yanhui Ji, Hao Yang:
Comparation of LoRa and NB-IoT. Netw. Commun. Technol. 4(1): 13-15 (2019) - 2018
- Saeed Ullah Jan
, Fawad Qayum:
A Robust Authentication Scheme for Client-Server Architecture With Provable Security Analysis. Netw. Commun. Technol. 3(1): 6-25 (2018) - Arnold Adimabua Ojugo
, D. O. Otakore:
Redesigning Academic Website for Better Visibility and Footprint: A Case of the Federal University of Petroleum Resources Effurun Website. Netw. Commun. Technol. 3(1): 33-44 (2018) - Ogunsanwo Gbenga Oyewole, Goga Nicholas, Oludele Awodele
, Okolie Samuel:
Comparison of De-Noising Algorithms Technique. Netw. Commun. Technol. 3(1): 26-32 (2018) - Guohua Zhang, Zhen Li, Qiaoli Zhang:
Controllability of Complex Power Networks. Netw. Commun. Technol. 3(1): 1-5 (2018) - 2013
- Sanjay P. Ahuja, Bryan Moore:
State of Big Data Analysis in the Cloud. Netw. Commun. Technol. 2(1): 62-68 (2013) - Sanjay P. Ahuja, Bryan Moore:
A Survey of Cloud Computing and Social Networks. Netw. Commun. Technol. 2(2): 11-16 (2013) - Ahmed Benomar:
Cylindrical Dielectric Resonator Antenna for SHF Band Application. Netw. Commun. Technol. 2(1): 28-33 (2013) - Ken Kin-Kiu Fong, Stanley Kam Sing Wong:
Exploring the Weak Links of Internet Security: A Study of WiFi Security in Hong Kong. Netw. Commun. Technol. 2(2): 17-28 (2013) - Morten N. Larsen, Brian Vinter:
Transparent Offloading of Computationally Demanding Operations in Microsoft .NET. Netw. Commun. Technol. 2(1): 52-61 (2013) - Julie C. Ogbulezie, M. U. Onuu, J. O. Ushie, B. E. Usibe:
Propagation Models for GSM 900 and 1800 MHz for Port Harcourt and Enugu, Nigeria. Netw. Commun. Technol. 2(2): 1-10 (2013) - Alain Pirovano
, Fabien Garcia:
A New Survey on Improving TCP Performances over Geostationary Satellite Link. Netw. Commun. Technol. 2(1): 1-18 (2013) - Pedro Sanches
, Eric-Oluf Svee, Markus Bylund, Benjamin Hirsch
, Magnus Boman:
Knowing Your Population: Privacy-Sensitive Mining of Massive Data. Netw. Commun. Technol. 2(1): 34-51 (2013) - Andrei M. Sukhov, D. Yu. Chemodanov:
The Neighborhoods Method and Virtual Polar Coordinates in Wireless Sensor Networks. Netw. Commun. Technol. 2(1): 19-27 (2013) - Victor Onomza Waziri, Joseph Adebayo Ojeniyi, Hakimi Danladi, Audu Isah, Abubakar S. Magaji, Muhammad Bashir Abdullahi:
Network Security in Cloud Computing with Elliptic Curve Cryptography. Netw. Commun. Technol. 2(2): 43-58 (2013) - Yeqing Wu, Fei Hu, Qingquan Sun, Ke Bao, Mengcheng Guo:
A Fast Raptor Codes Decoding Strategy for Real-Time Communication Systems. Netw. Commun. Technol. 2(2): 29-42 (2013) - 2012
- Sanjay P. Ahuja, Deepa Komathukattil:
A Survey of the State of Cloud Security. Netw. Commun. Technol. 1(2): 66-75 (2012) - Sanjay P. Ahuja, Sindhu Mani:
Availability of Services in the Era of Cloud Computing. Netw. Commun. Technol. 1(1): 2-6 (2012) - Sanjay P. Ahuja, Sindhu Mani, Jesus Zambrano:
A Survey of the State of Cloud Computing in Healthcare. Netw. Commun. Technol. 1(2): 12-19 (2012) - Sanjay P. Ahuja, Alan C. Rolli:
Exploring the Convergence of Mobile Computing with Cloud Computing. Netw. Commun. Technol. 1(1): 97-102 (2012)