To search, Click below search items.
All Published Papers Search Service
Title
Design and Implementation of Computer Worms Based on Monitoring Replication and Damage
Author
Yazed B. Al-Saawy, Sulaiman Al amro
Vol. 16 No. 11 pp. 55-65
Keywords
Computer worms behavior detection, replication damage..
An Investigation and Comparison of the Performance of Different Techniques of Reducing PAPR in OFDM Systems
Hamideh Rezaei-Nezhad
Vol. 16 No. 11 pp. 66-70
OFDM, Peak-to-Average Power Ratio (PAPR), SLM technique
Impact of Link Quality Estimators and Garranted Time Slot in Wireless Sensor Network
Tahar Ezzedine, Mohamed Bouyahi, Houria Rezig
Vol. 16 No. 11 pp. 71-74
Link Quality Estimation (LQE), Collection Tree Protocol (CTP), Superframe Order (SO), Beacon Order (BO), Guaranteed Time Slot (GTS).
4G LTE Network Growth in India and Security Issue in Network
Hina Firdaus
Vol. 16 No. 11 pp. 75-85
Security, 4G Wireless, LTE, Wimax, Wireless communication, Jio 4G, VoLTE.