International Journal of Computer Networks & Communications (IJCNC)
Citations, h-index, i10-index of IJCNC
Citations 8262 h-index 38 i10-index 230
---- Scopus, ERA Listed ----
Scopus CiteScore 2018 .6 CiteScore 2019 1.0 CiteScore 2020 1.3 CiteScore 2021 1.5 CiteScore 2022 1.8 CiteScore 2023 1.6
IJCNC is listed in ERA 2023 as per the Australian Research Council (ARC) Journal Ranking
Call for Papers
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications.The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
Topics of Interest
- Network Protocols & Wireless Networks
- Network Architectures
- High speed networks
- Routing, switching and addressing techniques
- Next Generation Internet
- Next Generation Web Architectures
- Network Operations & management
- Adhoc and sensor networks
- Internet and Web applications
- Ubiquitous networks
- Mobile networks & Wireless LAN
- Wireless Multimedia systems
- Wireless communications
- Heterogeneous wireless networks
- Measurement & Performance Analysis
- Peer to peer and overlay networks
- QoS and Resource Management
- Network Based applications
- Network Security
- Self-Organizing Networks and Networked Systems
- Optical Networking
- Mobile & Broadband Wireless Internet
- Recent trends & Developments in Computer Networks
Paper Submission
Authors are invited to submit papers for this journal through E-mail: ijcnc@airccse.org or through Submission System.Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
Submission Deadline | : | October 12, 2024 |
Authors Notification | : | November 12, 2024 |
Final Manuscript Due | : | November 19, 2024 |
Publication Date | : | Determined by the Editor-in-Chief |
Note:
AIRCC's International Journal of Computer Network & Communications( IJCNC) is dedicated to strengthen the field of Computer Networks and Communications and publishes only good quality papers. IJCNC is highly selective and maintains less than 5% acceptance rate. All accepted papers will be tested for plagiarism manually as well as by Docoloc . Papers published in IJCNC has received enormous citations and has been regarded as one of the best Journal in the networking research field.
Related Conferences
September 2024, Volume 16, Number 5
Intelligent Efficient Routing and Localization in the Underwater Wireless Sensor Network to Improve Network Lifetime Full Text
Vinayprasad M S and Jayaram M N, JSS Science and Technology University, India
Radio Frequency Interference Detection and Automatic Modulation Recognition Based on Mask RCNN Full Text
Noureddine El-haryqy, Zhour Madini and Younes Zouine, IbnTofail University, Morocco
Beacon-Based Uplink Transmission for LoRaWAN Direct to LEO Satellite Internet of Things Full Text
Mohammad Al mojamed, UMM Al-QURA University, Saudi Arabia
Evaluating the Impact of Convolutional Neural Network Layer Depth on the Enhancement of Inertial Navigation System Solutions Full Text
Mohammed AFTATAH and Khalid ZEBBARA, Ibn Zohr University, Morocco
Evaluating the Impact of Mid-Link Bandwidth Constraints on Video Streaming Performance Using NS2 Full Text
Zahraa Khazal Rashad, University of Valladolid, Spain
ENIAO: Energy Aware Faulty Node Re-Placement Integrated With Duty Cycling and Improved Harmony Search Based Clustering through Adaptive Fish School Search Routing for WSN Optimization Full Text
RM.Alamelu1, J.Naveen Ananda Kumar2, C.Jayapratha3 and Govindaprabhu GB4, 1Sri sarada Niketan College for Women, India, 2Tekinvaderz LLC, USA, 3Karpaga Vinayaga College of Engineering & Technology, India, 4Madurai Kamaraj University (MKU), India
Adaptive Hybrid Deep Learning Based Effective Channel Estimation in MIMO-Noma for Millimeter-Wave Systems with an Enhanced Optimization Algorithm Full Text
Belcy D Mathews and Tamilarasi Muthu, Puducherry Technological University, India
A Link’s Fineness Based on Spatial Relation for Multipoint Relays Selection Algorithm in Mobile Ad Hoc Networks Algorithm Full Text
Ayoub Abdellaoui, Jamal Elmhamdi, Es-Sadek Mohamed Zeriab and Mohammed Bekkali, Mohammed V University, Morocco
July 2024, Volume 16, Number 4
Enhancing IoT Security: A Novel Approach with Federated Learning and Differential Privacy Integration Full Text
Aziz Ullah Karimy and P. Chandrasekhar Reddy, Jawaharlal Nehru Technological University, India
Enhancing Cybersecurity Defenses: A Multicriteria Decision-Making Approach to Mitre ATT&CK Mitigation Strategy Full Text
Ihab Mohamed, Hesham A. Hefny and Nagy R. Darwish, Cairo University, Egypt
Enhancing IoT Routing Security and Efficiency: Towards AI-Enabled RPL Protocol Full Text
Abubakar Wakili and Sara Bakkali, Euromed University of Fez (UEMF), Morocco
Extending Network Intrusion Detection with Enhanced Particle Swarm Optimization Techniques Full Text
Surasit Songma, Watcharakorn Netharn and Siriluck Lorpunmanee, Suan Dusit University, Thailand
An Anti-Jamming Technique by Jammer Localization for Multi-Channel Wireless Sensor Networks Full Text
Maoyejatun Hasana1 and Hossen Asiful Mustafa2, 1Asian University of Bangladesh, Bangladesh, 2Bangladesh University of Engineering and Technology (BUET), Bangladesh
Real Time Parameter Estimation for Adaptive OFDM/OTFS Selection Full Text
Amina Darghouthi1, Abdelhakim Khlifi2 and Belgacem Chibani1, 1University of Gabes, Tunisia, 2University of Carthage, Tunisia
Modified Route Request Broadcasting for Improving Multipath Routing Scheme Performance in MANET Full Text
Priyanka Pandey and Raghuraj Singh, Harcourt Butler Technical University, India
IRLR: an Improved Reinforcement Learning-Based Routing Algorithm for Wireless Mesh Networks Full Text
Le Huu Binh1, Tu T. Vo1 and Le Duc Huy2, 1Hue University, Vietnam, 2Ha Noi University of Business and Technology, Vietnam
May 2024, Volume 16, Number 3
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol Full Text
Waleed Khalid Ahmed, Mohd Nazri bin Mohd Warip, Mohamed Elshaikh Elobaid Said Ahmed and Phaklen Ehkan, Universiti Malaysia Perlis, Malaysia
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post-Disaster Scenario Full Text
Junhyung Kim, Yeungnam University College, Korea
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Based Investigation using IFOG-Simulator Full Text
lzahraa Elsayed, Khalil Mohamed and Hany Harb, Al Azhar University, Egypt
An Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation Full Text
Amina Darghouthi1, Abdelhakim Khlifi2, Hmaied Shaiek3, Fatma Ben Salah1 and Belgacem Chibani1, 1University of Gabes, Tunisia, 2Sup’COM, University of Carthage, Tunisia, 3CEDRIC/LAETITIA Laboratory, France
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis Full Text
Asmaa BENCHAMA and Khalid ZEBBARA, Ibn zohr University, Morocco
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique Full Text
Malek M. Al-Nawashi, Obaida M. Al-hazaimeh, Isra S. Al-Qasrawi, Ashraf A. Abu-Ein and Monther H. Al-Bsool
Al-Balqa Applied University, Jordan
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection for WSN-Assisted IoT Full Text
Darshan B D and Prashanth C R, S J B Institute of Technology, India
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Service Full Text
Dongju Lee1 and Hyunsung Kim1,2, 1Kyungil University, Korea, 2University of Malawi, Malawi
March 2024, Volume 16, Number 2
Enhancing Traffic Routing Inside a Network through IoT Technology & Network Clustering by Selecting Smart Leader Nodes Full Text
Radwan S.Abujassar, Arab Open University Kuwait, Kuwait
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered Feature Selection with ML Model for IoT Threats & Attack Detection Full Text
J. I. Christy Eunaicy1 , C. Jayapratha2 and H.Salome Hemachitra3, 1Thiagarajar College, India, 2Karpaga Vinayaga College of Engineering and Technology, India, 3Sri Meenakshi Government College of Arts for Women, India
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic Full Text
Abderezak Touzene, Ahmed Al Farsi and Nasser Al Zeidi, Sultan Qaboos University, Oman
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection Full Text
P Sumalatha and G.S. Mahalakshmi, Anna University, India
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems Full Text
Ali Muayed Fadhil1,2 , Norashidah Md Din,1 Norazizah Binti Mohd Aripin1 and Ali Ahmed Abed2, 1University Tenaga Nasional, Malaysia, 2University of Basrah, Iraq
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy Commitment Full Text
Stanley Mlato1 , Yesaya Gabriel1, Prince Chirwa1, and Hyunsung Kim1,2, 1 University of Malawi, Malawi, 2 Kyungil University, Korea
A Topology Control Algorithm Taking into Account Energy and Quality of Transmission for Software-Defined Wireless Sensor Network Full Text
Hong Thi Chu Hai1 , Le Huu Binh2, and Le Duc Huy3, 1Banking Academy of Vietnam, Vietnam, 2Hue University, Vietnam,3Ha Noi University of Business and Technology, Vietnam
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless Body Area Networks Full Text
Nabila Azdad and Mohamed Elboukhari, Mohammed First University, Morocco
January 2024, Volume 16, Number 1
Secure Supervised Learning-Based Smart Home Authentication Framework Full Text
K. Swapna Sudha1 ,N. Jeyanthi1 and Celestine Iwendi2, 1Vellore Institute of Technology, India, 2University of Bolton, UK
Effective Multi-Stage Training Model for Edge Computing Devices in Intrusion Detection Full Text
Trong Thua Huynh, Hoang Thanh Nguyen, Posts and Telecommunications Institute of Technology, Vietnam
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks Full Text
Kanneboina Ashok and Gopikrishnan S, VIT-AP University, India
Feature Selection using the Concept of Peafowl Mating in IDS Full Text
Partha Ghosh, Joy Sharma and Nilesh Pandey, Netaji Subhash Engineering College, India
Sensing Time Improvement using Two Stage Detectors for Cognitive Radio System Full Text
Mohamed Khalaf1 ,Ahmed Fawzi1 and Ahmed Yahya2, 11Modern Academy for Engineering and Technology, Maadi, Egypt, 2Al-Azhar University, Cairo, Egypt
Comparative Study of Orchestration using gRPC API and REST API in Server Creation Time: An Openstack Case Full Text
Hari Krishna S M and Rinki Sharma, M. S. Ramaiah University of Applied Sciences, India
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocation in Fog-Cloud Environments Full Text
Ahmed A. A. Gad-Elrab1,2 , Almohammady S. Alsharkawy1, Mahmoud E. Embabi1, Ahmed Sobhi1,3 , Farouk A. Emara1, 1Al-Azhar University, Cairo, Egypt, 2King Abdulaziz University, Jeddah, Saudi Arabia,3AlRyada University for Science and
Technology (RST), Egypt
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimized Link State Routing-Based for VANET Full Text
Waleed Khalid Ahmed, Mohd Nazri bin Mohd Warip, Mohamed Elshaikh Elobaid Said Ahmed and Phaklen Ehkan,
Universiti Malaysia Perlis, Malaysia
November 2023, Volume 15, Number 6
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient Reinforcement Learning Framework Full Text
Shruthi N1 and Siddesh G K2, 1Visvesvaraya Technological University, India, 2ALVA’s Institute of Engineering & Technology, India
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Internet of Thingsk Full Text
Batamu Anderson Chiphiko1 and Hyunsung Kim1,2, 1University of Malawi, Malawi, 2Kyungil University, Korea
Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examination and Codification of Vulnerabilities in Prominent Blockchains Full Text
Oualid Zaazaa and Hanan El Bakkali, Mohammed V University in Rabat, Morocco
Unveiling Advanced Persistence Techniques Through Application Shimming and Countermeasures Full Text
Akashdeep Bhardwaj1, Naresh Kumar2 and Shawon S. M. Rahman3, 1University of Petroleum and Energy Studies, India, 2University of Nizwa, Oman, 3University of Hawai‘i at Hilo, USA
Channel Estimation in MIMO OFDM Systems with Tapped Delay Line Model Full Text
Ravi Hosamani and Yerriswamy T, K.L.E . Institute of Technology, India
Maximum Throughput First Access Point Selection Scheme for Multi-Rate Software-Defined Wireless Network Full Text
Hassen A. Mogaibel and Majed Hashim, Al-Ahgaff University, Yemen
Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicular Named Data Networks Full Text
Nithin Rao R and Rinki Sharma, Ramaiah University of Applied Sciences, India
Random Relay Selection based Heuristic Optimization Model for the Scheduling and Effective Resource Allocation
in the Cognitive Radio Network Full Text
Aravindkumaran.S and Dr.Saraswady.D, Puducherry Technological University, India
September 2023, Volume 15, Number 5
BLE Beacon with Data Accumulation Functionality Full Text
KOBAYASHI Kakeru and FUJITA Satoshi, Hiroshima University, Japan
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireless Multimedia Sensor Network Full Text
Mohammadjavad Abbasi, A. S. Abdullah and and N. Fisal, Universiti Teknologi Malaysia (UTM), Malaysia
Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection based on Delaying the First Node Death in MWSN-IoT Full Text
Awatef Chniguir and Zouhair Ben Jemaa, University of Tunis El Manar, Tunisia
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Transportation System Full Text
Saureng Kumar and S C Sharma, IIT Roorkee, India
Multi Objective Salp Swarm based Energy Efficient Routing Protocol for Heterogeneous Wireless Networks Full Text
Salima Nebti1 and Mohammed Redjimi2, 1Emir Abdelkader University, Algeria, 220 Août 1955 University, Algeria
Analysis of System Capacity and Spectral Efficiency of Fixed-Grid Network Full Text
Adarsha M1, S. Malathi1 and Santosh Kumar2, 1M. S. Ramaiah University of Applied Sciences, India, 2Liaocheng University, China
A Privacy-Aware Tracking and Tracing System Full Text
Ali M. Allam, Helwan University, Egypt
A Survey on CDN Vulnerability to DoS Attacks Full Text
Maurizio D’Arienzo and Serena Gracco, Universit`a della Campania ”L.Vanvitelli”, Italy
July 2023, Volume 15, Number 4
Enhancing HTTP Web Protocol Performance with Updated Transport Layer Techniques Full Text
Ziaul Hossain1 and Gorry Fairhurst2, 1University of Fraser Valley, Canada, 2University of Aberdeen, UK
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks Full Text
Varun P. Sarvade1 and Shrirang Ambaji Kulkarni2, 1B. G. M. Institute of Technology, Mudhol, India, 2The National Institute
IoT Resource Allocation and Optimization Using Improved Reptile Search Algorithm Full Text
Prabhakar Narasappa Kota1, Pravin Balaso Chopade1, Bhagvat D. Jadhav2, Pravin Marotrao Ghate2 and Shankar Dattatray Chavan3, 1MES’s College of Engineering, India, 2JSPM's Rajarshi Shahu College of Engineering, India, 3Dr. D. Y. Patil Institute
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment Full Text
Mohamed Ali Shaaban1, Almohammady S. Alsharkawy2, Mohammad T. Abou-Kreisha2 and Mohammed Abdel Razek2,
1Sinai University, Egypt, 2Al-Azhar University, Egypt
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utilization in Wireless Sensor Network Full Text
Shanmugavalli R and Subashini P, Avinashilingam Institute for Home Science and Higher Education for Women, India
Intrusion Detection System(IDS) Development Using Tree-Based Machine Learning Algorithms Full Text
Witcha Chimphlee and Siriporn Chimphlee, Suan Dusit University, Thailand
Machine Learning Based Ensemble Classifier for Android Malware Detection Full Text
P Sumalatha1 and G.S. Mahalakshmi2, 1Bhoj Reddy Engineering College for Women, India, 2Anna University, India
Ransomware Attack Detection based on Pertinent System Calls Using Machine Learning Techniques Full Text
Ahmed Dib, Sabri Ghazi and Mendjel Mohamed Said Mehdi, Mokhtar Annaba University, Algeria
May 2023, Volume 15, Number 3
Improved Q-Reinforcement Learning based Optimal Channel Selection in Cognitive Radio Networks Full Text
Sopan Talekar1, Satish Banait2 and Mithun Patil3, 1MVPS’s KBT College of Engineering, India, 2K.K. Wagh Institute of Engineering Education & Research, India, 3N.K. Orchid College of Engineering & Technology, India
Evaluating Latency in Fifth-Generation Vehicle-to-Everything Communications using Adaptive Neuro-Fuzzy Inference System Model Full Text
Hamdy A.M. Sayedahmed1,3, Emadeldin M. Elgamal1,2, Hesham A. Hefny1, 1Cairo University, Egypt, 2Tarleton State University, USA, 3Central Metallurgical Research and Development Institute, Egypt
IoT-Based Mobile Adaptive Routing Algorithm in a Ubiquitous Network Full Text
Prasanna Kumar G and Shankaraiah N, Jayachamarajendra College of Engineering, India
Enabling Ray Tracing for 5G Full Text
Vladislav Ryzhov, Moscow Institute of Physics and Technology, Russia
Congestion and Energy Aware Multipath Load Balancing Routing for LLNs Full Text
Kala Venugopal and T G Basavaraju, Government Engineering College, India
PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Polymorphic Treatment of Features Full Text
S. Chanti, T. Chithralekha, and K. S. Kuppusamy, Pondicherry University, India
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Practical Environment Full Text
Dinh Thi Thai Mai, Nguyen Tien Dat, Pham Minh Bao, Can Quang Truong, Nguyen Thanh Tung, VNU University of Engineering and Technology, Hanoi, Vietnam
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications Full Text
Hariharasudhan V and P.Vetrivelan, VIT, India
March 2023, Volume 15, Number 2
Performance Evaluation of ERGR-EMHC Routing Protocol using LSWTS and 3DUL Localization Schemes in UWSNs Full Text
Faiza Al-Salti1,, N. Alzeidi2, Khaled Day2, Abderezak Touzene2,1Sultan Qaboos Comprehensive Cancer Care and Research Centre, Oman, 2Sultan Qaboos University, Oman
F-802.11P: Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks Full Text
Chandra Kanta Samal, Delhi University, India
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network Full Text
Savita Jadhav1 and Sangeeta Jadhav2, 1Dr. D. Y. Patil Institute of Technology Pimpri, India,2Army Institute of Technology, Dhighi, India
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in Heterogeneous LTE-VANET
Networks Full Text
Driss Abada1, Rachid Adrdor2, Omar Boutkhoum3, and Adil Bohouch4, 1,3Chouaïb Doukkali University, Morocco,
2Ibn Zohr University, Morocco, 4Mohamed V University, Morocco
Security Culture, Top Management, and Training on Security Effectiveness: A Correlational Study Without CISSP
Participants Full Text
Joshua Porche1 and Shawon Rahman2, 1Information Security System Engineer, USA, 2University of Hawaii-Hilo
Hilo, USA
Detection of Peer-to-Peer Botnets using Graph Mining Full Text
Dhruba Jyoti Borah and Abhijit Sarma, Gauhati University, India
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET Full Text
Nitesh Ghodichor1, Raj Thaneeghav1. V1, Dinesh Sahu1, Gautam Borkar2, Ankush Sawarkar3, 1SRK University, India,
2DY Patil University, India, 3VNIT, India
Performance Evaluation of the KVM Hypervisor Running on ARM-Based Single-Board Computers Full Text
Eric Gamess, Mausam Parajuli, and Syed Shah, Jacksonville State University, USA
January 2023, Volume 15, Number 1
An Intrusion Detection Mechanism for MANETS based on Deep Learning Artificial Neural Networks (ANNS) Full Text
Mohamad T Sultan1,2,Hesham El Sayed1,2,and Manzoor Ahmed Khan3, 1,3College of Information Technology United Arab Emirates University, UAE, 2United Arab Emirates University, United Arab Emirates
Phishing URL Detection using LSTM Based Ensemble Learning Approaches Full Text
Bireswar Banik and Abhijit Sarma, Gauhati University, India
A Lightweight Method for Detecting Cyber Attacks in High-traffic Large Networks based on Clustering Techniques Full Text
Nguyen Hong Son1 and Ha Thanh Dung2, 1Posts and Telecommunications Institute of Technology, Vietnam,2Saigon University, Vietnam
Actor Critic Approach based Anomaly Detection for Edge Computing Environments Full Text
Shruthi N1 and Siddesh G K2, 1BNMIT, India,
2New Horizon College of Engineering, India
An Efficient Method to Compute the Rate Matrix for Multi-Server Retrial Queues with Cloud Computing Systems Full Text
Dang Thanh Chuong, Hoa Ly Cuong, Hoang Dinh Long and Duong Duc Hung, Hue University, Vietnam
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network Full Text
Nibedita Jagadev1, Binod Kumar Pattanayak1, Ahmadkhader habboush2, Bassam Mohammad Elzaghmouri2,Mahmoud Ali Al Shugran2,1Siksha’O’ Anusandhan Deemed to be University, India, 2Jerash University, Jordan
Dynamic Interference Suppression for TV White Space: the Case of Thailand Full Text
Prathana Thaopanya1, and Teerapat Sanguankotchakorn2, 1Thai Public Broadcasting Service (ThaiPBS), Thailand,2Asian Institute of Technology, Thailand
Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcement Learning Full Text
Bayarmaa Ragchaa and Kazuhiko Kinoshita, Tokushima University, Japan
September 2022, Volume 14, Number 5
Mobility and Routing based Channel Estimation for Hybrid Millimeter-Wave MIMO WSNs Full Text
Geeta and A.M. Bhavikatti, Bheemanna Khandre Institute of Technology, India
F-802.11P: Performance Improvement for the Single Carrier in FBMC Systems by PAPR Reduction Full Text
Mohammed A. Salem1 Mohamed A. Aboul-Dahab2,Sherine M. Abd El-kader3,and Radwa A. Roshdy1,1Higher Technological Institute, Tenth of Ramadan city, Egypt, 2Arab Academy for Science & Technology and Maritime Transport, Egypt,3Electronics Research Institute, Egypt
Hybrid Red Deer Algorithm with Physical Unclonable Function for Security Enhancement in IoT-WSN Full Text
Shilpa Venkata Rao and Vidya Anantha, Vivekananda Institute of Technology, India
Controlling Adaptive Contention Window to Improve Safe Message Received Rate in VANET Full Text
Nguyen Hoang Chien1 and Pham Thanh Giang2,1University of Economics – Technology for Industries, Vietnam, 2Vietnam Academy of Science and Technology, Vietnam
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation with Hybrid Beam Forming Power Transfer in WSN-IoT Applications Full Text
Reginald Jude Sixtus J and Tamilarasi Muthu, Puducherry Technological University, India
Multi-Layer Digital Validation of Candidate Service Appointment with Digital Signature and Bio-Metric Authentication Approach Full Text
Saikat Bose1 Tripti Arjariya1,Anirban Goswami2,Soumit Chowdhury3,1Bhabha University, India, 2Techno Main Salt Lake, Sec – V, India,3Government College of Engineering & Ceramic Technology, India
Controller Placement Problem Resiliency Evaluation in SDN-based Architectures Full Text
Maurizio D’Arienzo1 Manfredi Napolitano1and Simon Pietro Romano2,1Dipartimento di Scienze Politiche Universita della Campania ”L.Vanvitelli”, Italy, 2DIETI Universita di Napoli ”Federico II”, Italy
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machine for Trust Model and Link Reliability Full Text
Shalini Sharma and Syed Zeeshan Hussain, Jamia Millia Islamia University New Delhi, India
July 2022, Volume 14, Number 4
Cross Layering using Reinforcement Learning in Cognitive Radio-based Industrial Internet of Ad-hoc Sensor Network Full Text
Chetna Singhal and Thanikaiselvan V, VIT Vellore, India
F-802.11P: A Fuzzy Enhancement for IEEE 802.11P in Vehicle-to-Everything Communications Full Text
Hamdy A.M. Sayedahmed1, Emadeldin M. Elgamal2,1 and Hesham A. Hefny1, 1Cairo University, Egypt, 2Tarleton State University, USA
Design and Analysis of MIMO Patch Antenna for 5G Wireless Communication Systems Full Text
Pallavi H. V1, A P Jagadeesh Chandra2 and Paramesha3, 1Government Engineering College, Haasan, India, 2Adichunchanagiri Institute of Technology, India, 3Central University of Karnataka, India
Energy Aware Talented Clustering with Compressive Sensing (TCCS) for Wireless Sensor Networks Full Text
Bejjam Komuraiah and M.S. Anuradha, AU College of Engineering (A), India
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks Full Text
Rashmi Patil1 and Rekha Patil2, 1Sharnbasva University, India, 2PDA college of Engineering, India
Developing Algorithms for Image Steganography and Increasing the Capacity Depending on Choosing the Best Pixels Full Text
Mayar khaled and Ahmed H. Abu El-Atta, Benha University, Egypt
Innovative Low-Cost Perimeter Security Gadget With In-built Mechanism to Ensure Confidentiality, Authenticity and Non-Repudiation Full Text
Ritesh Mukherjee1, Anirban Goswami2, Soumit Chowdhury3 and Nabin Ghoshal4, 1Centre for Development of Advanced Computing, India, 2Techno Main Salt Lake, India, 3Government College of Engineering & Ceramic Technology, India, 4University of Kalyani, India
An Efficient Machine Learning Optimization Model for Route Establishment Mechanism in IoT Environment Full Text
Kishore Golla and S. PallamSetty, Andhra University, India
May 2022, Volume 14, Number 3
A New Security Boundary of Component Differentially Challenged XOR Pufs Against Machine Learning Modeling Attacks Full Text
Gaoxiang Li1 , Khalid T. Mursi2 , Ahmad O. Aseeri3 , Mohammed S. Alkatheiri2 and Yu Zhuang1 , 1 Texas Tech University, USA 2 University of Jeddah, Saudi Arabia, 3 Prince Sattam Bin Abdulaziz University, Saudi Arabia
AODVMO: A Security Routing Protocol using One-Time Password Authent