Journal Contents: International Journal of Mobile Computing and Multimedia Communications (IJMCMC)

Volume 9 (2018)
Issue 1
Article 1
An Enhanced Mobile Device-Based Navigation Model: Ubiquitous Computing (pages 1-20)
Emmanuel Ajayi Olajubu (Department of Computer Science and Engineering, Obafemi Awolowo University, Ile-Ife, Nigeria), John E. Efiong (Wesley University, Ondo, Nigeria), Aderounmu G. Adesola (Obafemi Awolowo University, Ile-Ife, Nigeria)
Article 2
GNSS Positioning Enhancement Based on NLOS Multipath Biases Estimation Using Gaussian Mixture Noise (pages 21-39)
Guermah Bassma (STRS Laboratory, National Institute of Posts and Telecommunication, Morocco), Sadiki Tayeb (Faculty of Computing and Logistics, TICLab, International University of Rabat (UIR), Morocco), El Ghazi Hassan (STRS Laboratory, National Institute of Posts and Telecommunication, Morocco)
Article 3
Fast HEVC Inter-Prediction Algorithm Based on Matching Block Features (pages 40-61)
Meifeng Liu (East China University of Technology, Nanchang, China), Guoyun Zhong (East China University of Technology, Nanchang, China), Yueshun He (East China University of Technology, Nanchang, China), Kai Zhong (East China University of Technology, Nanchang, China), Hongmao Chen (East China University of Technology, Nanchang, China), Mingliang Gao (Shandong University of Technology, Zibo, China)
Article 4
Performance Measurement Study on Two Video Service Providers in China (pages 62-78)
Jiali You (Institute of Acoustics, Chinese Academy of Sciences, Beijing, China), Hanxing Xue (Institute of Acoustics, Chinese Academy of Sciences, Beijing, China), Yu Zhuo (Institute of Acoustics, Chinese Academy of Sciences, Beijing, China), Guoqiang Zhang (School of Computer Science and Technology, Nanjing Normal University, Nanjing, China), Jinlin Wang (Institute of Acoustics, Chinese Academy of Sciences, Beijing, China), Weining Qi (Institute of Acoustics, Chinese Academy of Sciences, Beijing, China)
Volume 8 (2017)
Issue 1
Security, Privacy, and Trust in Mobile and Multimedia Computing (SecPriTrust)
Guest Editorial Preface
C. P. Gupta (Department of Computer Engineering, Rajasthan Technical University, Rajasthan, India), Nishtha Kesswani (Department of Computer Science, Central University of Rajasthan, Rajasthan, India)
Article 1
Secure Modified Ad Hoc On-Demand Distance Vector (MAODV) Routing Protocol (pages 1-18)
Geetanjali Rathee (Jaypee University of Information Technology, Department of Computer Science and Engineering, Waknaghat, India), Hemraj Saini (Jaypee University of Information Technology, Department of Computer Science and Engineering, Waknaghat, India)
Article 2
Crisis Management Using Centrality Measurement in Social Networks (pages 19-33)
Ruchi Verma (Jaypee University of Information Technology, Department of Computer Science and Engineering, Waknaghat, India), Vivek Kumar Sehgal (Jaypee University of Information Technology, Department of Computer Science and Engineering, Waknaghat, India), Nitin (Jaypee Institute of Information Technology, Department of Computer Science and Engineering, Noida, India)
Article 3
A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security (pages 34-47)
Pratiksha Gautam (Jaypee University of Information Technology, Department of Computer Science, and Engineering, Waknaghat, India), Hemraj Saini (Jaypee University of Information Technology, Department of Computer Science, and Engineering, Waknaghat, India)
Article 4
Certain Investigation on Secured Data Transmission in Wireless Sensor Networks (pages 48-61)
P. Padmaja (S. V. U. College of Engineering, Department of Electrical and Electronic Engineering, Tirupati, India), G.V. Marutheswar (S. V. U. College of Engineering, Department of Electrical and Electronic Engineering, Tirupati, India)
Issue 2
Article 1
Testing a Commercial BCI Device for In-Vehicle Interfaces Evaluation: A Simulator and Real-World Driving Study (pages 1-13)
Nicolas Louveton (University of Luxembourg, Interdisciplinary Centre for Security, Reliability and Trust, Luxembourg City, Luxembourg), Korok Sengupta (University of Koblenz, Koblenz, Germany), Rod McCall (Luxembourg Institute of Science and Technology, Esch-sur-Alzette, Luxembourg), Raphael Frank (University of Luxembourg, Interdisciplinary Centre for Security, Reliability and Trust, Luxembourg City, Luxembourg), Thomas Engel (University of Luxembourg, Interdisciplinary Centre for Security, Reliability and Trust, Luxembourg City, Luxembourg)
Article 2
A Trusted Ubiquitous Healthcare Monitoring System for Hospital Environment (pages 14-26)
Durga Prasad (NMAM Institute of Technology, Department of Electronics and Communication, Nitte, India), Niranjan N. Chiplunkar (NMAM Institute of Technology, Department of Computer Science and Engineering, Nitte, India), K. Prabhakar Nayak (Manipal Institute of Technology, Department of Electronics and Communication, Manipal, India)
Article 3
Exact and Efficient Heuristic Deployment in WSN under Coverage, Connectivity, and Lifetime Constraints (pages 27-43)
Soumaya Fellah (University of Oran1 Ahmed Ben Bella, Laboratory LITIO, Oran, Algeria), Mejdi Kaddour (University of Oran1 Ahmed Ben Bella, Laboratory LITIO, Oran, Algeria)
Article 4
Indonesian Mobile Learning Information System Using Social Media Platforms (pages 44-67)
Mario Tulenan Parinsi (Manado State University, Manado, Indonesia), Keith Francis Ratumbuisang (Yogyakarta State University, Yogyakarta, Indonesia)
Issue 3
Special Issue on Recent Advance of Multimedia Big Data
Editorial Preface
Zhigao Zheng (Central China Normal University, Wuhan, China), Ford Lumban Gaol (Bina Nusantara University, Republik, Indonesia), Krishn K. Mishra (University of Missouri, Columbia, MO, USA)
Article 1
A Method for Angular Super-Resolution via Big Data Radar System (pages 1-20)
Xin Zhang (School of Information Science and Technology, Dalian Maritime University, Dalian, China), Xiaoming Liu (School of Information Science and Technology, Dalian Maritime University, Dalian, China), Zhenyu Na (School of Information Science and Technology, Dalian Maritime University, Dalian, China)
Article 2
A New Intelligent Optimization Network Online Learning Behavior in Multimedia Big Data Environment (pages 21-31)
Shao Heng (School of Information Science and Engineering, Qilu Normal University, Jinan, China)
Article 3
Article 4
A Novel Fast Hierarchical Projection Algorithm for Skew Detection in Multimedia Big Data Environment (pages 44-65)
Li Cheng (School of Power and Mechanical Engineering, Wuhan University, Wuhan, China & School of Computer Science, South-Central University for Nationalities, Wuhan, China), Gongping Wu (School of Power and Mechanical Engineering, Wuhan University, Wuhan, China)
Article 5
A Comparative Study of Shape and Texture Features for Finger Spelling Recognition in Big Data Applications (pages 66-78)
Yong Hu (Jinling Institute of Technology, Nanjing, China)
Article 6
Towards A Virtual Machine Migration Algorithm Based On Multi-Objective Optimization (pages 79-89)
Xiang Chen (School of Civil Engineering, Xi'an Technological University, Xi'an, China), Jun-rong Tang (School of Computer Science and Engineering, Xi'an Technological University, Xi'an, China), Yong Zhang (Wuhan University of Science and Technology, Wuhan, Hubei, China)
Article 7
Modulation Recognition of Digital Multimedia Signal Based on Data Feature Selection (pages 90-111)
Hui Wang (College of Information and Communication Engineering, Harbin Engineering University, Harbin, China), Li Li Guo (College of Information and Communication Engineering, Harbin Engineering University, Harbin, China), Yun Lin (College of Information and Communication Engineering, Harbin Engineering University, Harbin, China)
Issue 4
Article 1
Proactive Mobile Fog Computing using Work Stealing: Data Processing at the Edge (pages 1-19)
Sander Soo (University of Tartu, Tartu, Estonia), Chii Chang (University of Tartu, Tartu, Estonia), Seng W. Loke (Deakin University, Melbourne, Australia), Satish Narayana Srirama (University of Tartu, Tartu, Estonia)
Article 2
Multi-Criteria Recommender Systems: A Survey and a Method to Learn New User's Profile (pages 20-48)
Ferdaous Hdioud (High School of Technology, Lab LTTI, Sidi Mohammed Benabdellah University, Fez, Morocco), Bouchra Frikh (High School of Technology, Lab LTTI, Sidi Mohammed Benabdellah University, Fez, Morocco), Brahim Ouhbi (High School of Arts and Crafts, Lab. M2I, Moulay Ismail University, Meknes, Morocco), Ismail Khalil (Department of Telecooperation, Johannes Kepler University, Linz, Austria)
Article 3
TEEM: Technology-Enhanced Emergency Management for Supporting Data Communication During Patient Transportation (pages 49-65)
Massimo Canonico (University of Piemonte Orientale, Alessandria, Italy), Stefania Montani (University of Piemonte Orientale, Alessandria, Italy), Diego Gazzolo (Neonatal Intensive Care Unit of Alessandria Children Hospital, Alessandria, Italy), Mariachiara Strozzi (Neonatal Intensive Care Unit of Alessandria Children Hospital, Alessandria, Italy), Manuel Striani (University of Turin, Turin, Italy)
Article 4
Mobile Data Offloading Using Opportunistic Communication and AP Deployment: A Case Study (pages 66-84)
Sanjit Kumar Dash (College of Engineering and Technology, Bhubaneswar, India), Sasmita Mishra (Indira Gandhi Institute of Technology, Saranga, India), Jibitesh Mishra (College of Engineering and Technology, Bhubaneswar, India)
Volume 7 (2016)
Issue 1
Article 1
Apps, Apps, and More Apps: Motivations and User Behaviours (pages 1-14)
Matthew J. Haught (Department of Journalism, University of Memphis, Memphis, TN, USA), Ran Wei (School of Journalism and Mass Communications, University of South Carolina, Columbia, SC, USA), Jack V. Karlis (SUNY Buffalo State, Buffalo, NY, USA)
Article 2
Awareness of Mobile Device Security: A Survey of User's Attitudes (pages 15-31)
Nathan Clarke (Plymouth University, Plymouth, UK), Jane Symes (Plymouth University, Plymouth, UK), Hataichanok Saevanee (Plymouth University, Plymouth, UK), Steve Furnell (Plymouth University, Plymouth, UK)
Article 3
Maximizing Power Saving for VoIP over WiMAX Systems (pages 32-40)
Tamer Z. Emara (Higher Institute of Engineering and Technology Kafr El-Sheikh, Kafr El-Sheikh, Egypt)
Article 4
Throughput-Delay Evaluation of a Hybrid-MAC Protocol for M2M Communications (pages 41-60)
Pawan Kumar Verma (Motilal Nehru National Institute of Technology, Allahabad - 211004, India), Rajesh Verma (Ideal Institute of Technology, Ghaziabad - 201003, India), Arun Prakash (Motilal Nehru National Institute of Technology, Allahabad - 211004, India), Rajeev Tripathi (Motilal Nehru National Institute of Technology, Allahabad - 211004, India)
Issue 2
Article 1
Secure Deployment with Optimal Connectivity in Wireless Sensor Networks (pages 1-21)
Anju Sangwan (Guru Jambheshwar University of Science & Technology, Hisar, India), Rishipal Singh (Guru Jambheshwar University of Science & Technology, Hisar, India)
Article 2
Mobile GPU Computing Based Filter Bank Convolution for Three-Dimensional Wavelet Transform (pages 22-35)
Di Zhao (Computer Network Information Center, Chinese Academy of Sciences, Beijing, China)
Article 3
How can Mobile Accounting Reporting Benefit from the ‘Imagined Communities'?: A Conceptual Communication Framework (pages 36-52)
Androniki Kavoura (Technological Educational Institute of Athens, Athens, Greece)
Article 4
Research on Soft Computing Techniques for Cognitive Radio (pages 53-73)
Subhashree Mishra (School of Electronics Engineering, KIIT University, Bhubaneswar, India), Sudhansu Sekhar Singh (KIIT University, Bhubaneswar, India), Bhabani Shankar Prasad Mishra (School of Computer Engineering, KIIT University, Bhubaneswar, India), Prabin Kumar Panigrahi (KIIT University, Bhubaneswar, India)
Issue 3
Article 1
Garment Simulation and Collision Detection on a Mobile Device (pages 1-15)
Tzvetomir Ivanov Vassilev (University of Ruse, Ruse, Bulgaria)
Article 2
Multilayer Perceptron Based Equalizer with an Improved Back Propagation Algorithm for Nonlinear Channels (pages 16-31)
Zohra Zerdoumi (Batna University, Batna, Algeria), Djamel Chikouche (M'sila University, M'sila, Algeria), Djamel Benatia (Batna University, Batna, Algeria)
Article 3
Social Media Communication in the Artisan Economy (pages 32-41)
Angela Au (Higher Learning Institute, Tucson, AZ, USA), Peter J. Anthony (Walden University, Minneapolis, MN, USA)
Article 4
LEAP Enhanced: A Lightweight Symmetric Cryptography Scheme for Identifying Compromised Node in WSN (pages 42-66)
Maleh Yassine (Hassan 1st University Settat, Morocco), Abdellah Ezzati (Hassan 1st University, Morocco)
Issue 4
Article 1
AODV Energy Routing Mechanism for Multi-Channel Multi-Interface Ad Hoc Networks (EMCMI-AODV) Using a Dynamic Programming Algorithm (pages 1-16)
Hassan Faouzi (Sultan Moulay Slimane University, Faculty of Science and Techniques, Beni Mellal, Morocco), Hicham Mouncif (Sultan Moulay Slimane University, Polydisciplinary Faculty, Laboratory LIRST, Beni Mellal, Morocco), Mohamed Lamsaadi (Sultan Moulay Slimane University, Polydisciplinary Faculty, Beni Mellal, Morocco)
Article 2
A Novel Adaptive Scanning Approach for Effective H.265/HEVC Entropy Coding (pages 17-27)
Wei Li (Xi'an University of Technology, Xi'an, China), Fan Zhao (Xi'an University of Technology, Xi'an, China), Peng Ren (Xidian University, Xi'an, China), Zheng Xiang (Xidian University, Xi'an, China)
Article 3
SRMIP: A Software-Defined RAN Mobile IP Framework for Real Time Applications in Wide Area Motion (pages 28-49)
Walaa Farouk Elsadek (American University in Cairo, Computer Science and Engineering Department, Cairo, Egypt), Mikhail N. Mikhail (American University in Cairo, Computer Science and Engineering Department, Cairo, Egypt)
Article 4
Dict-Based Energy and Latency Efficient Air Indexing Technique for Full Text Search Over Wireless Broadcast Stream (pages 50-72)
Vikas Goel (Ajay Kumar Garg Engineering College, Department of Computer Science & Engineering, Ghaziabad, India), Anil Kumar Ahlawat (Krishna Institute of Engineering & Technology, Department of Computer Application, Ghaziabad, India), M N Gupta (Amity School of Engineering & Technology, Department of Computer Science & Engineering, New Delhi, India)
Volume 6 (2014)
Issue 1
Article 1
Web Algorithms for Information Retrieval: A Performance Comparative Study (pages 1-16)
Bouchra Frikh (LTTI Laboratory, Ecole Supérieure de Technologie, Fes, Morocco), Brahim Ouhbi (LM2I Laboratory, Ecole Nationale Supérieure d'Arts et Métiers, Moulay Ismaïl University, Meknes, Morocco)
Article 2
A Hybrid Technique Using PCA and Wavelets in Network Traffic Anomaly Detection (pages 17-53)
Stevan Novakov (Department of Systems and Computer Engineering, Carleton University, Ottawa, Canada), Chung-Horng Lung (Department of Systems and Computer Engineering, Carleton University, Ottawa, Canada), Ioannis Lambadaris (Department of Systems and Computer Engineering, Carleton University, Ottawa, Canada), Nabil Seddigh (Solana Networks, Ottawa, Canada)
Article 3
Optimal Channel Assignment Algorithm for Least Interfered Wireless Mesh Networks (pages 54-67)
Tarik Mountassir (IR2M Laboratory, Hassan 1st University, Settat, Morocco), Bouchaib Nassereddine (IR2M Laboratory, Hassan 1st University, Settat, Morocco), Abdelkrim Haqiq (IR2M Laboratory, Hassan 1st University, Settat, Morocco), Samir Bennani (RIME Laboratory, Mohammedia Engineering School, Rabat, Morocco)
Issue 2
Special Issue on Security and Optimization Techniques for Mobile and Multimedia Computing
Guest Editorial Preface
Xiaofeng Chen (School of Telecommunications Engineering, Xidian University, Xi'an, China), Fatos Xhafa (Department of Languages and Informatics Systems, Technical University of Catalonia, Barcelona, Spain), Leonard Barolli (Department of Information and Communication Engineering, Fukuoka Institute of Technology, Fukuoka, Japan)
Article 1
Reconstructing Handwriting Character Font Models with Incorrect Stroke Order (pages 1-12)
Hirotsugu Matsukida (Fukuoka Institute of Technology, Fukuoka, Japan), Yuta Mieno (Fukuoka Institute of Technology, Fukuoka, Japan), Hiroyuki Fujioka (Fukuoka Institute of Technology, Fukuoka, Japan)
Article 2
Application of WMN-SA Simulation System for Node Placement in Wireless Mesh Networks: A Case Study for a Realistic Scenario (pages 13-21)
Shinji Sakamoto (Fukuoka Institute of Technology, Fukuoka, Japan), Algenti Lala (Polytechnic University of Tirana, Tirana, Albania), Tetsuya Oda (Fukuoka Institute of Technology, Fukuoka, Japan), Vladi Kolici (Polytechnic University of Tirana, Tirana, Albania), Leonard Barolli (Fukuoka Institute of Technology, Fukuoka, Japan), Fatos Xhafa (Technical University of Catalonia, Barcelona, Spain)
Article 3
An Improved Counter-Forensic Algorithm to Erase the JPEG Compression Artifacts (pages 22-32)
Guorui Sheng (College of Information and Electric Engineering, LuDong University, YanTai, China), Bo Yang (Yantai Vocational College, Yantai, China)
Article 4
A Local Statistical Information Active Contour Model for Image Segmentation (pages 33-49)
Shigang Liu (Key Laboratory of Modern Teaching Technology, Ministry of Education, Xi'an, China), Yali Peng (Key Laboratory of Modern Teaching Technology, Ministry of Education, Xi'an, China), Guoyong Qiu (School of Computer Science, Shaanxi Normal University, Xi'an, China), Xuanwen Hao (School of Computer Science, Shaanxi Normal University, Xi'an, China)
Article 5
A Distributed and Scalable Solution for Applying Semantic Techniques to Big Data (pages 50-67)
Alba Amato (Second University of Naples, Aversa, Italy), Salvatore Venticinque (Second University of Naples, Aversa, Italy), Beniamino Di Martino (Second University of Naples, Aversa, Italy)
Article 6
Relay Selection Scheme for Cooperative Communication Systems in Fixed Decode-and-Forward Mode (pages 68-77)
Jyh-Horng Wen (Department of Electrical Engineering, Tunghai University, Taichung, Taiwan), Jheng-Sian Li (Department of Communications Engineering, National Chung Cheng University, Minxiong, Taiwan), Hsiang-Shan Hou (Department of Electrical Engineering, Tunghai University, Taichung, Taiwan), Cheng-Ying Yang (Department of Computer Science, University of Taipei, Taipei, Taiwan)
Issue 3
Special Issue on Physical Layer Security Techniques and Applications in Wireless Networks
Guest Editorial Preface
Saeed Ur Rehman (Unitec Institute of Technology, Auckland, New Zealand), Shafiq Alam (The University of Auckland, Auckland, New Zealand), Iman Tabatabaei Ardekani (Unitec Institute of Technology, Auckland, New Zealand)
Article 1
An Overview of Radio Frequency Fingerprinting for Low-End Devices (pages 1-21)
Saeed Ur Rehman (Unitec Institute of Technology, Auckland, New Zealand), Shafiq Alam (The University of Auckland, Auckland, New Zealand), Iman T. Ardekani (Unitec Institute of Technology, Auckland, New Zealand)
Article 2
MIMO-Based Secret Key Generation Strategies: Rate Analysis (pages 22-55)
Kan Chen (Kansas State University, Manhattan, KS, USA), Bala Natarajan (Kansas State University, Manhattan, KS, USA)
Article 3
A Context Transfer Model for Secure Handover in WiMAX/LTE Integrated Networks (pages 56-74)
E. Prince Edward (Sri Krishna Polytechnic College, Coimbatore, India)
Article 4
Improving the Security of Storage Systems: Bahrain Case Study (pages 75-105)
Wasan Shaker Awad (Ahlia University, Manama, Bahrain), Hanin Mohammed Abdullah (University of Bahrain, Sakheer, Bahrain)
Issue 4
Emerging Security Threats and Defense Technologies in Mobile Computing and Networking
Guest Editorial Preface
Ilsun You (Korean Bible University, Seoul, South Korea), Xianglin Wei (Nanjing Telecommunication Technology Research Institute, Nanjing, China), Chunfu Jia (College of Computer and Control Engineering, Nankai University, Tianjin, China)
Article 1
Jammer Location-Oriented Noise Node Elimination Method for MHWN (pages 1-19)
Jianhua Fan (PLA University of Science and Technology, Nanjing, China), Qiping Wang (College of Communications Engineering, PLA University of Science and Technology, Nanjing, China), Xianglin Wei (PLA University of Science and Technology, Nanjing, China), Tongxiang Wang (College of Communications Engineering, PLA University of Science and Technology, Nanjing, China)
Article 2
A Strategy on Selecting Performance Metrics for Classifier Evaluation (pages 20-35)
Yangguang Liu (Ningbo Institute of Technology, Zhejiang University, Ningbo, China), Yangming Zhou (Ningbo Institute of Technology, Zhejiang University, Ningbo, China), Shiting Wen (Ningbo Institute of Technology, Zhejiang University, Ningbo, China), Chaogang Tang (China University of Mining and Technology, Xuzhou, China)
Article 3
What is New about the Internet Delay Space? (pages 36-55)
Zhang Guomin (Department of Network Engineering, PLA University of Science and Technology, Nanjing, China), Wang Zhanfeng (Department of Network Engineering, PLA University of Science and Technology, Nanjing, China), Wang Rui (College of Command Information System, PLA University of Science and Technology, Nanjing, China), Wang Na (Department of Electronic Technology, PLA University of Science and Technology, Nanjing, China), Xing Changyou (Department of Network Engineering, PLA University of Science and Technology, Nanjing, China)
Article 4
Machine Learning Based Prediction and Prevention of Malicious Inventory Occupied Orders (pages 56-72)
Qinghong Yang (School of Economics and Management, Beihang University, Beijing, China), Xiangquan Hu (School of Software, Beihang University, Beijing, China), Zhichao Cheng (School of Economics and Management, Beihang University, Beijing, China), Kang Miao (School of Software, Beihang University, Beijing, China)
Article 5
Interactive Multi-View Visualization for Fraud Detection in Mobile Money Transfer Services (pages 73-97)
Evgenia Novikova (Saint Petersburg Institute for Informatics and Automation (SPIIRAS), Saint Petersburg, Russia), Igor Kotenko (Saint Petersburg Institute for Informatics and Automation (SPIIRAS), Saint Petersburg, Russia), Evgenii Fedotov (Saint Petersburg Electrotechnical University (LETI), Saint Petersburg, Russia)
Article 6
Framework for Infrastructure Attack Modeling in Hybrid Networks (pages 98-114)
Konstantin Borisenko (Saint Petersburg Electrotechnical University, Saint Petersburg, Russia), Ivan Kholod (Saint Petersburg Electrotechnical University, Saint Petersburg, Russia), Andrey Shorov (Saint Petersburg Electrotechnical University, Saint Petersburg, Russia)
Volume 5 (2013)
Issue 1
Article 1
Reconnaissance Attack on IPv6 to IPv4 Tunneling (pages 1-9)
Nazrulazhar Bahama (Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia), Anton Satria Prabuwono (Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia), Teddy Mantoro (Advanced Informatics School, Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia)
Article 2
The Novel Method of Adaptive Multiplayer Games for Mobile Application using Neural Networks (pages 10-24)
Widodo Budiharto (Bina Nusantara University, Jakarta, Indonesia), Michael Yoseph Ricky (Bina Nusantara University, Jakarta, Indonesia), Ro’fah Nur Rachmawati (Bina Nusantara University, Jakarta, Indonesia)
Article 3
Exploration and Development of the JPEG Compression for Mobile Communications System (pages 25-46)
Andik Setyono (Faculty of Computing and Informatics, Multimedia University, Cyberjaya, Malaysia & Faculty of Computer Science, Dian Nuswantoro University, Semarang,, Indonesia), Md. Jahangir Alam (Faculty of Computing and Informatics, Multimedia University, Cyberjaya, Sepang, Selangor, Malaysia), C. Eswaran (Faculty of Computing and Informatics, Multimedia University, Cyberjaya, Malaysia)
Article 4
Path Loss Model Tuning at GSM 900 for a Single Cell Base Station (pages 47-56)
Allam Mousa (Department of Electrical Engineering, An-Najah National University, Nablus, Palestine), Mahmoud Najjar (Department of Electrical Engineering, An-Najah National University, Nablus, Palestine), Bashar Alsayeh (Department of Electrical Engineering, An-Najah National University, Nablus, Palestine)
Article 5
Power Layer Energy Efficient Routing Protocol in Wireless Sensor Network (PLRP) (pages 57-68)
Sardjoeni Moedjiono (Budi Luhur University, Jalan Raya Ciledug Petukangan Utara, Jakarta Selatan, Indonesia), Aries Kusdaryono (Budi Luhur University, Jalan Raya Ciledug Petukangan Utara, Jakarta Selatan, Indonesia)
Article 6
Effects of Web Accessibility on Search Engines and Webometrics Ranking (pages 69-94)
Media Anugerah Ayu (Department of Information Systems, International Islamic University Malaysia, Kuala Lumpur, Malaysia), Mohamed Ahmed Elgharabawy (Department of Information Systems, International Islamic University Malaysia, Kuala Lumpur, Malaysia)
Issue 2
Article 1
Statistically Enhanced Multi-Dimensional Trust Computing Mechanism for Cloud Computing (pages 1-17)
Mohamed Firdhous (InterNetWorks Research Lab, School of Computing, Universiti Utara Malaysia, Sintok Kedah, Malaysia, & Faculty of Information Technology, University of Moratuwa, Moratuwa, Sri Lanka), Suhaidi Hassan (InterNetWorks Research Lab, School of Computing, Universiti Utara Malaysia, Sintok Kedah, Malaysia), Osman Ghazali (InterNetWorks Research Lab, School of Computing, Universiti Utara Malaysia, Sintok Kedah, Malaysia)
Article 2
Node Placement Strategy in Wireless Sensor Network (pages 18-31)
Puteri Azwa Ahmad (School of Computing, College of Arts and Sciences, Universiti Utara Malaysia, Sintok, Kedah, Malaysia), M. Mahmuddin (School of Computing, College of Arts and Sciences, Universiti Utara Malaysia, Sintok, Kedah, Malaysia), Mohd Hasbullah Omar (School of Computing, College of Arts and Sciences, Universiti Utara Malaysia, Sintok, Kedah, Malaysia)
Article 3
Handoff and Route Optimization in Mobile Networks over IEEE 802.16e (pages 32-45)
Badiea Abdulkarem Mohammed (School of Computer Sciences, Universiti Sains Malaysia, Penang, Malaysia), Tat-Chee Wan (School of Computer Sciences/ National Advanced IPv6 Centre (NAV6), Universiti Sains Malaysia, Penang, Malaysia)
Article 4
The Robustness of RM-DSR Multipath Routing Protocol with Different Network Size in MANET (pages 46-57)
Naseer Ali Husieen (InterNetWorks Research Lab, School of Computing, Universiti Utara Malaysia, Sintok Kedah, Malaysia), Suhaidi Hassan (InterNetWorks Research Lab, School of Computing, Universiti Utara Malaysia, Sintok Kedah, Malaysia), Osman Ghazali (InterNetWorks Research Lab, School of Computing, Universiti Utara Malaysia, Sintok Kedah, Malaysia), Lelyzar Siregar (Faculty of Computer Science and Information Technology, Universitas Sumatra Utara, Medan, Indonesia)
Article 5
Wireless Communication Technologies for Vehicular Nodes: A Survey (pages 58-77)
Vasuky Mohanan (School of Computer Science, Universiti Sains Malaysia, Sintok Kedah, Malaysia), Rahmat Budiarto (School of Computing, Universiti Utara Malaysia, Sintok Kedah, Malaysia)
Article 6
ICMPV6 Vulnerability: The Importance of Threat Model and SF-ICMP6 (pages 78-100)
Abidah Hj Mat Taib (Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA, Shah Alam, Selangor, Malaysia), Wan Nor Ashiqin Wan Ali (Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA, Shah Alam, Selangor, Malaysia), Nurul Sharidah Shaari (Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA, Shah Alam, Selangor, Malaysia)
Issue 3
Article 1
Secure Broadcast with One-Time Signatures in Controller Area Networks (pages 1-18)
Bogdan Groza (Department of Automatics and Computer Science, Politehnica University of Timisoara, Timi?oara, Romania), Pal-Stefan Murvay (Department of Automatics and Computer Science, Politehnica University of Timisoara, Timi?oara, Romania)
Article 2
Adaptive Dynamic Path Planning Algorithm for Interception of a Moving Target (pages 19-33)
H. H. Triharminto (Department of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia), A.S. Prabuwono (Department of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia), T. B. Adji (Department of Electrical Engineering and Information Technology, Gadjah Mada University, Yogyakarta, Indonesia), N. A. Setiawan (Department of Electrical Engineering and Information Technology, Gadjah Mada University, Yogyakarta, Indonesia)
Article 3
A Trustworthy Usage Control Enforcement Framework (pages 34-49)
Ricardo Neisse (Information Systems Quality (ISQ), Fraunhofer IESE, Kaiserslautern, Germany), Alexander Pretschner (Department of Computer Science, TU München, Garching, Germany), Valentina Di Giacomo (Engineering Ingegneria Informatica, Rome, Italy)
Article 4
Classification and Recovery of Fragmented Multimedia Files using the File Carving Approach (pages 50-67)
Rainer Poisel (Institute of IT Security Research, St. Poelten University of Applied Sciences, Sankt Pölten, Austria), Marlies Rybnicek (Institute of IT Security Research, St. Poelten University of Applied Sciences, Sankt Pölten, Austria), Bernhard Schildendorfer (Institute of IT Security Research, St. Poelten University of Applied Sciences, Sankt Pölten, Austria), Simon Tjoa (Institute of IT Security Research, St. Poelten University of Applied Sciences, Sankt Pölten, Austria)
Article 5
Neighborhood-Based Route Discovery Protocols for Mobile Ad Hoc Networks (pages 68-87)
Sanaa A. Alwidian (Department of Computer Science and Applications, The Hashemite University, Zarqa, Jordan), Ismail M. Ababneh (Department of Computer Science, Al al-Bayt University, Mafraq, Jordan), Muneer O. Bani Yassein (Department of Computer Science, Jordan University of Science and Technology, Irbid, Jordan)
Article 6
3D Maps in Mobile Devices: Pathway Analysis for Interactive Navigation Aid (pages 88-106)
Teddy Mantoro (Department of Informatics, Advanced Informatics School, Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia), Adamu I. Abubakar (Department of Information System, KICT, International Islamic University, Kuala Lumpur, Malaysia), Media A. Ayu (Department of Information System, KICT, International Islamic University, Kuala Lumpur, Malaysia)
Issue 4
Article 1
Estimation of Always Best Connected Network in Heterogeneous Environment Based on Prediction of Recent Call History and Call Blocking Probability (pages 1-14)
Bhuvaneswari Mariappan (Electronics & Communication Engineering, Bharathidasan Institute of Technology, Anna University Chennai, Chennai, Tamil Nadu, India), Shanmugalakshmi Ramachandran (Government College of Technology, Coimbatore, Tamil Nadu, India)
Article 2
A Novel Prediction-Based Location Management Technique for Mobile Networks (pages 15-34)
Sanjay Kumar Biswash (Department of Informatics Engineering, Faculty of Science & Technology, University of Coimbra Polo II, Coimbra, Portugal), Chiranjeev Kumar (Department of Computer Science and Engineering, Indian School of Mines (ISM), Dhanbad, Jharkhand, India)
Article 3
Towards Scalable Certificate Status Validation in Mobile Ad Hoc Networks (pages 35-48)
Mohammad Masdari (Department of Computer Engineering, Islamic Azad University, Urmia, Iran), Javad Pashaei Barbin (Department of Computer Engineering, Islamic Azad University, Naghadeh, Iran), Moazam Bidaki (Department of Computer Engineering, Islamic Azad University, Neyshabur, Iran)
Article 4
Proposal of a Hierarchical and Distributed Method for Selecting a Radio Network and a Transmission Mode (pages 49-81)
J. Penhoat (Orange Labs, Paris, France), K. Guillouard (Orange Labs, Paris, France), N. Omnès (Orange Labs, Paris, France), J. Zhang (Orange Labs, Paris, France), T. Lemlouma (IRISA Labs, Lannion, France), M. Salaun (Ecole des Mines, Nantes, France)
Article 5
Vision-Based Human Face Recognition Using Extended Principal Component Analysis (pages 82-94)
A. F. M. Saifuddin Saif (Faculty of Information Science and Technology, University Kebangsaan, Bangi, Selangor, Malaysia), Anton Satria Prabuwono (Faculty of Computing and Information Technology, King Abdulaziz University, Rabigh, Saudi Arabia), Zainal Rasyid Mahayuddin (Faculty of Information Science and Technology, University Kebangsaan, Bangi, Selangor, Malaysia), Teddy Mantoro (Faculty Science and Technology, Universitas Siswa Bangsa International, Jakarta, Indonesia)
Volume 4 (2012)
Issue 1
Article 1
A Secure Architecture for Nomadic User in IMS Network (pages 1-17)
A. Abou El Kalam (Université de Toulouse, France, and Université Cadi-Ayyad, Morocco), M. Maachaoui (Université de Toulouse, France, and Université Cadi-Ayyad, Morocco), N. Idboufker (Université Cadi-Ayyad, Morocco), H. Ait Lahcen (Université de Toulouse, France, and Université Cadi-Ayyad, Morocco), A.Ait Ouahman (Université Cadi-Ayyad, Morocco)
Article 2
Householder Algorithm Applied to Localization for Wireless Sensor Networks (pages 18-30)
Abderrahim Beni Hssane (Chouaïb Doukkali University, Morocco), Moulay Lahcen Hasnaoui (Chouaïb Doukkali University, Morocco), Said Benkirane (Chouaïb Doukkali University, Morocco), Driss El Ouadghiri (Moulay Ismail University, Morocco), Mohamed Laghdir (Chouaïb Doukkali University, Morocco)
Article 3
LTE-A Implementation Scenarios: RF Planning Comparison (pages 31-42)
Mohammed Jaloun (EMI School, Morocco), Zouhair Guennoun (EMI School, Morocco)
Article 4
Delivery of Unified Communications over Thin-IMS (pages 43-56)
T. Rachidi (Al Akhawayn University in Ifrane, Morocco), A. Mourhir (Al Akhawayn University Ifrane, Morocco), F. Chaatit (Al Akhawayn University in Ifrane, Morocco)
Article 5
Combined Queue Management and Scheduling Mechanism to Improve Intra-User Multi-Flow QoS in a Beyond 3,5G Network (pages 57-68)
Amine Berqia (University of Algarve, Portugal), Mohamed Hanini (Hassan I University, Morocco), Abdelkrim Haqiq (Hassan I University, Morocco)
Article 6
Advances on Adaptive Systems in NGN (pages 69-78)
Yves-Gael Billet (Université de Lyon, France), Christophe Gravier (Université de Saint-Etienne, France), Jacques Fayolle (Télécom Saint-Etienne, France)
Issue 2
Article 1
Prediction and Validation Approach with Accumulation Applied to Video Segmentation (pages 1-10)
Larbi Guezouli (University of Batna, Algeria), Hassane Essafi (French Atomic Energy Commission (CEA), France), Lahcene Guezouli (University of Batna, Algeria)
Article 2
Hajj Crowd Tracking System in a Pervasive Environment (pages 11-29)
Teddy Mantoro (University of Technology Malaysia, Malaysia), Media Ayu (International Islamic University Malaysia, Malaysia), Murni Mahmud (International Islamic University Malaysia, Malaysia)
Article 3
Multipath Extension of the ZigBee Tree Routing in Cluster-Tree Wireless Sensor Networks (pages 30-48)
Zahia Bidai (Oran Es-Sénia University, Algeria), Moufida Maimour (CNRS—Nancy University, France), Hafid Haffaf (Oran Es-Sénia University, Algeria)
Article 4
Distributed Resource Allocation: Generic Model and Solution Based on Constraint Programming and Multi-Agent System for Machine to Machine Services (pages 49-62)
Kamal Moummadi (Casablanca University, Morocco), Rachida Abidar (Casablanca University, Morocco), Hicham Medromi (Casablanca University, Morocco)
Article 5
Edge Features and Geometrical Properties Based Approach for Vehicle License Plate Detection and Localization (pages 63-75)
Hinde Anoual (Mohammed V University, Rabat, Morocco), Sanaa El Fkihi (Mohammed V University, Souissi, Morocco), Abdelilah Jilbab (ENSET-Rabat Ecole Normale Supérieure de l’Enseignement Technique, Morocco), Driss Aboutajdine (Mohammed V University, Rabat, Morocco)
Article 6
Securing EPR Data Using Cryptography and Image Watermarking (pages 76-87)
Youssef Zaz (Abdelmalek Essaâdi University, Morocco), Lhoussain El Fadil (Ibn Zohr University, Morocco), Mohamed El Kayyali (Universidad Technologica del Peru, Peru)
Issue 3
Article 1
Progressive Data Synchronization Model for Mobile Devices (pages 1-20)
Mehdi Adda (University of Quebec at Rimouski, Canada)
Article 2
Ontology-Based Knowledge Model for Multi-View KDD Process (pages 21-33)
EL Moukhtar Zemmouri (Ecole Nationale Supérieure d’Arts et Métiers, Morocco), Hicham Behja (Ecole Nationale Supérieure d’Arts et Métiers, Morocco, and INRIA Sophia Antipolis, France), Abdelaziz Marzak (Universite Hassan II Mohammedia - Casablanca, Morocco), Brigitte Trousse (INRIA Sophia Antipolis, France)
Article 3
Collaborative Access to Ancient Documents: Towards a Distributed Comparison of Pre-Processing Approaches (pages 34-53)
Ines Ben Messaoud Ben Arbia (École Nationale d’Ingénieurs de Tunis, Tunisia), Haikal El Abed (Technische Universität Braunschweig, Germany), Volker Märgner (Technische Universität Braunschweig, Germany), Hamid Amiri (École Nationale d’Ingénieurs de Tunis, Tunisia)
Article 4
Quality of Service Analysis and Queuing Performance Modeling of Orthogonal Frequency Division Multiple Access Based IEEE 802.16/WiMAX System (pages 54-70)
Abdelali El Bouchti (Hassan 1st University and e-Next Generation Networks Research Group, Morocco), Abdelkrim Haqiq (Hassan 1st University and e-Next Generation Networks Research Group, Morocco), Said El Kafhali (Hassan 1st University and e-Next Generation Networks Research Group, Morocco)
Article 5
Performance Evaluation of Space-Time and Harq Diversity in MIMO HSDPA (pages 71-86)
Walid Hakimi (Sys’Com Laboratory,National School of Engineering, Tunis, Tunisia), Ammar Mahmoud (Sys’Com Laboratory, National School of Engineering, Tunis, Tunisia)
Article 6
Performance Evaluation of Multimedia Traffic Transmission Under Binomial and Poissonian Primary Traffics in Cognitive Radio Networks (pages 87-105)
Abdelaali Chaoub (Electronic and Communication Laboratory, Mohammadia School of Engineers, Mohammed V-Agdal University, Morocco), Elhassane Ibn-Elhaj (National Institute of Posts and Telecommunications, Morocco)
Issue 4
Article 1
Inspired Social Spider Behavior for Secure Wireless Sensor Networks (pages 1-10)
Khelifa Benahmed (School of Computing & Mathematical Sciences, Liverpool John Moores University, Liverpool, UK & University of Es-Sénia Oran, Oran, Algeria), Madjid Merabti (School of Computing & Mathematical Sciences, Liverpool John Moores University, Liverpool, UK), Hafid Haffaf (University of Es-Sénia Oran, Oran, Algeria)
Article 2
Face Recognition System using Discrete Cosine Transform combined with MLP and RBF Neural Networks (pages 11-35)
Fatma Zohra Chelali (Speech Communication and Signal Processing Laboratory, Houari Boumedienne University of Sciences and Technologies, El Alia, Algeria), Amar Djeradi (Speech Communication and Signal Processing Laboratory, Houari Boumedienne University of Sciences and Technologies, El Alia, Algeria)
Article 3
Location Leveling (pages 36-61)
Ayse Yasemin Seydim (Central Bank of the Republic of Turkey, Ankara, Turkey), Margaret H. Dunham (Department of Computer Science and Engineering, Southern Methodist University, Dallas, TX, USA), Yu Meng (Department of Computer Science and Engineering, Southern Methodist University, Dallas, TX, USA)
Article 4
An Interactive Device for Quick Arabic News Story Browsing (pages 62-82)
Hichem Karray (Department of Electrical Engineering, Research Group on Intelligent Machines, University of Sfax, Sfax, Tunisia), Monji Kherallah (Department of Electrical Engineering, Research Group on Intelligent Machines, University of Sfax, Sfax, Tunisia), Mohamed Ben Halima (Department of Electrical Engineering, Research Group on Intelligent Machines, University of Sfax, Sfax, Tunisia), Adel M. Alimi (Department of Electrical Engineering, Research Group on Intelligent Machines, University of Sfax, Sfax, Tunisia)
Volume 3 (2011)
Issue 1
Article 1
Dual-Level Attack Detection, Characterization and Response for Networks Under DDoS Attacks (pages 1-20)
Anjali Sardana (Indian Institute of Technology Roorkee, India), Ramesh C. Joshi (Indian Institute of Technology Roorkee, India)
Article 2
Improving Effectiveness of Intrusion Detection by Correlation Feature Selection (pages 21-34)
Hai Thanh Nguyen (Gjøvik University College, Norway), Katrin Franke (Gjøvik University College, Norway), Slobodan Petrovic (Gjøvik University College, Norway)
Article 3
Threat and Risk-Driven Security Requirements Engineering (pages 35-50)
Holger Schmidt (Technical University of Dortmund, Germany)
Article 4
Analysis of Sensors’ Coverage through Application-Specific WSN Provisioning Tool (pages 51-62)
Sami J. Habib (Kuwait University, Kuwait)
Article 5
Establishing A Personalized Information Security Culture (pages 63-79)
Shuhaili Talib (University of Plymouth, UK and International Islamic University, Malaysia), Nathan L. Clarke (University of Plymouth, UK and Edith Cowan University, Australia), Steven M. Furnell (University of Plymouth, UK and Edith Cowan University, Australia)
Issue 2
Article 1
2-clickAuth: Optical Challenge-Response Authentication Using Mobile Handsets (pages 1-18)
Anna Vapen (Linköping University, Sweden), Nahid Shahmehri (Linköping University, Sweden)
Article 2
FlexRFID Middleware in the Supply Chain: Strategic Values and Challenges (pages 19-32)
M. E. Ajana (ENSIAS Rabat, Morocco), H. Harroud (Alakhawayn University in Ifrane, Morocco), M. Boulmalf (Alakhawayn University in Ifrane, Morocco), M. Elkoutbi (ENSIAS Rabat, Morocco)
Article 3
An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations (pages 33-51)
Yehia Elrakaiby (TELECOM Bretagne, France), Frédéric Cuppens (TELECOM Bretagne, France), Nora Cuppens-Boulahia (TELECOM Bretagne, France)
Article 4
Prioritization Schemes in Queuing Handoff and New Calls to Reduce Call Drops in Cellular Systems (pages 52-61)
Allam Mousa (An-Najah National University, Palestine)
Article 5
A Proposal for Enhancing the Mobility Management in the Future 3GPP Architectures (pages 62-81)
J. Penhoat (Orange Labs, France), K. Guillouard (Orange Labs, France), S. Bonjour (Orange Labs, France), P. Seïté (Orange Labs, France)
Issue 3
Article 1
An Adaptive Backoff Algorithm for Mobile Ad-Hoc Networks (pages 1-19)
Yaser Khamayseh (Jordan University of Science and Technology, Jordan), Muneer Bani Yassein (Jordan University of Science and Technology, Jordan), Iman I. Badran (Jordan University of Science and Technology, Jordan), Wail Mardini (Jordan University of Science and Technology, Jordan)
Article 2
Cooperative Caching in Mobile Ad Hoc Networks (pages 20-35)
Naveen Chauhan (National Institute of Technology, Hamirpur, India), Lalit K. Awasthi (National Institute of Technology, Hamirpur, India), Narottam Chand (National Institute of Technology, Hamirpur, India), R.C. Joshi (Indian Institute of Technolgy, Roorkee, India), Manoj Misra (Indian Institute of Technolgy, Roorkee, India)
Article 3
Resource Allocation for Multi Access MIMO Systems (pages 36-50)
Shailendra Mishra (Kumaon Engineering College, India), D. S. Chauhan (Uttrakhand Technical University, India)
Article 4
Reducing Network Overhead with Common Junction Methodology (pages 51-61)
Shashi Bhushan (Haryana Engineering College, Jagadhri, India), M. Dave (National Institute of Technology Kurukshetra, India), R.B. Patel (DCRUST, Murthal, India)
Article 5
An Energy-Efficient Multilevel Clustering Algorithm for Heterogeneous Wireless Sensor Networks (pages 62-79)
Surender Soni (National Institute of Technology Hamirpur, India), Vivek Katiyar (National Institute of Technology Hamirpur, India), Narottam Chand (National Institute of Technology Hamirpur, India)
Issue 4
Article 1
Primary Research on Arabic Visemes, Analysis in Space and Frequency Domain (pages 1-19)
Fatma Zohra Chelali (Houari Boumedienne University of Sciences and Technologies, Algeria), Amar Djeradi (Houari Boumedienne University of Sciences and Technologies, Algeria)
Article 2
On Cryptographically Strong Bindings of SAML Assertions to Transport Layer Security (pages 20-35)
Florian Kohlar (Ruhr University Bochum, Germany), Jörg Schwenk (Ruhr University Bochum, Germany), Meiko Jensen (Ruhr University Bochum, Germany), Sebastian Gajek (Tel Aviv University, Israel)
Article 3
Systems Development Methodology for Mobile Commerce Applications (pages 36-52)
Muazzan Binsaleh (Prince of Songkla University, Thailand), Shahizan Hassan (Universiti Utara Malaysia, Malaysia)
Article 4
Enhancing Data Availability in MANETs with Cooperative Caching (pages 53-66)
Prashant Kumar (National Institute of Technology, Hamirpur, India), Naveen Chauhan (National Institute of Technology, Hamirpur, India), LK Awasthi (National Institute of Technology, Hamirpur, India), Narottam Chand (National Institute of Technology, Hamirpur, India)
Volume 2 (2010)
Issue 1
Article 1
Security Management for Mobile Ad Hoc Network of Networks (MANoN) (pages 1-19)
Ali H. Al-Bayatti (De Montfort University, UK), Hussein Zedan (De Montfort University, UK), Antoniuo Cau (De Montfort University, UK), François Siewe (De Montfort Universtiy, UK)
Article 2
A Proposed Intelligent Denoising Technique for Spatial Video Denoising for Real-Time Applications (pages 20-39)
Amany Sarhan (Mansoura University, Egypt), Mohamed T. Faheem (Tanta University, Egypt), Rasha Orban Mahmoud (Nile Institute of Commerce & Computer Technology, Egypt)
Article 3
Building an Intelligent Mobile Advertising System (pages 40-67)
Jerry Zeyu Gao (San Jose State University, USA), Angela Ji (Acresso Software, USA)
Article 4
Improving Throughput of Starved TCP Flow by Sidestepping Bottleneck Nodes Using Concurrent Transmission (pages 68-83)
Rajesh Verma (MNNIT, India), Arun Prakash (MNNIT, India), Rajeev Tripathi (MNNIT, India), Neeraj Tyagi (MNNIT, India)
Issue 2
Article 1
Extended Mobile IPv6 Route Optimization for Mobile Networks in Local and Global Mobility Domain (pages 1-17)
Arun Prakash (Motilal Nehru National Institute of Technology, India), Rajesh Verma (Motilal Nehru National Institute of Technology, India), Rajeev Tripathi (Motilal Nehru National Institute of Technology, India), Kshirasagar Naik (University of Waterloo, Canada)
Article 2
Pertinent Prosodic Features for Speaker Identification by Voice (pages 18-33)
Halim Sayoud (USTHB University, Algeria), Siham Ouamour (USTHB University, Algeria)
Article 3
A CASE Tool for Java Mobile Computing Applications (pages 34-48)
Ioannis T. Christou (Athens Information Technology, Greece), Sofoklis Efremidis (Athens Information Technology, Greece), Aikaterini Roukounaki (Athens Information Technology, Greece)
Article 4
Options for WiMAX Uplink Media Streaming (pages 49-66)
Salah Saleh (University of Essex, UK), Martin Fleury (University of Essex, UK)
Article 5
On Uplink Channel Estimation in WiMAX Systems (pages 67-77)
Yushi Shen (Microsoft, USA), Pamela C. Cosman (University of California, San Diego, USA), Laurence B. Milstein (University of California, San Diego, USA), Eduardo F. Martinez (Freescale Semiconductor Inc., USA)
Issue 3
Article 1
Utilization of an Improvement Manual Configuration for Multimedia in 6to4 Tunneling (pages 1-14)
Abdellah Jamali (INPT and FSTM, Morocco), Najib Naja (INPT, Morocco), Driss El Ouadghiri (Meknes, Morocco)
Article 2
Automatic Speaker Localization and Tracking: Using a Fusion of the Filtered Correlation with the Energy Differential (pages 15-33)
Siham Ouamour (USTHB University, Algeria), Halim Sayoud (USTHB University, Algeria), Salah Khennouf (USTHB University, Algeria)
Article 3
An Inter-Domain Agent Based Secure Authorization and Communication for Mobile Clients in Wireless AdHoc Networks (pages 34-46)
Neeraj Kumar (SMVD University, India), R. B. Patel (MM University, India)
Article 4
Network Layer Mobility Management Schemes for IP-Based Mobile Networks: A Survey (pages 47-60)
Paramesh C. Upadhyay (Sant Longowal Institute of Engineering & Technology, India), Sudarshan Tiwari (Motilal Nehru National Institute of Technology, India)
Article 5
Throughput Analysis of IEEE 802.11 DCF with Modified Binary Exponential Backoff in Mobile Ad Hoc Networks (pages 61-70)
Rishipal Singh (Jawaharlal Nehru University, India), D. K. Lobiyal (Jawaharlal Nehru University, India)
Issue 4
Article 1
Quality of Experience Models for Multimedia Streaming (pages 1-20)
Vlado Menkovski (Eindhoven University of Technology, The Netherlands), Georgios Exarchakos (Eindhoven University of Technology, The Netherlands), Antonio Liotta (Eindhoven University of Technology, The Netherlands), Antonio Cuadra Sánchez (Telefonica R&D, Spain)
Article 2
A Probabilistic Routing Protocol in VANET (pages 21-37)
Gongjun Yan (Indiana University Kokomo, USA), Stephan Olariu (Old Dominion University, USA), Shaharuddin Salleh (Universiti Teknologi Malaysia, Malaysia)
Article 3
Building Wireless Sensor Network Applications with LooCI (pages 38-64)
Daniel Hughes (Xi’an Jiaotong-Liverpool University, USA), Klaas Thoelen (Katholieke Universiteit Leuven, Belgium), Wouter Horré (Katholieke Universiteit Leuven, Belgium), Nelson Matthys (Katholieke Universiteit Leuven, Belgium), Javier Del Cid (Katholieke Universiteit Leuven, Belgium), Sam Michiels (Katholieke Universiteit Leuven, Belgium), Christophe Huygens (Katholieke Universiteit Leuven, Belgium), Wouter Joosen (Katholieke Universiteit Leuven, Belgium), Jo Ueyama (University of São Paulo, Brazil)
Article 4
Memorizing Algorithm: Protecting User Privacy using Historical Information of Location–Based Services (pages 65-86)
Quynh Chi Truong (National University of Ho Chi Minh City, Vietnam), Anh Tuan Truong (National University of Ho Chi Minh City, Vietnam), Tran Khanh Dang (National University of Ho Chi Minh City, Vietnam)
Volume 1 (2009)
Issue 1
Article 1
Scenario-Based Cluster Formation and Management in Mobile Ad Hoc Networks (pages 1-15)
V. S. Anitha (National Institute of Technology - Calicut, India), M. P. Sebastian (National Institute of Technology - Calicut, India)
Article 2
Fast Vector Quantization Encoding Algorithms for Image Compression (pages 16-28)
Ahmed Swilem (Minia University, Egypt)
Article 3
FCVW: Experiments in Groupware (pages 29-52)
Ivan Tomek (Acadia University, Canada), Elhadi Shakshuki (Acadia University, Canada)
Article 4
A Cross-Layer Model for Video Multicast Based TCP-Adaptive FEC over Heterogeneous Networks (pages 53-69)
Ghaida A. AL-Suhail (University of Basrah, Iraq), Liansheng Tan (Central China Normal University, China), Rodney A. Kennedy (The Australian National University, Australia)
Article 5
A Model for Mobile Learning Service Quality in University Environment (pages 70-91)
Nabeel Farouq Al-Mushasha (Jerash Private University, Jordan), Shahizan Hassan (Universiti Utara Malaysia, Malaysia)
Article 6
Evaluating E-Communities of Wireless Networks Worldwide (pages 92-109)
Theodoros I. Kavaliotis (University of Macedonia, Greece), Anastasios A. Economides (University of Macedonia, Greece)
Issue 2
Article 1
The Accuracy of Location Prediction Algorithms Based on Markovian Mobility Models (pages 1-21)
Péter Fülöp (Budapest University of Technology and Economics, Hungary), Sándor Imre (Budapest University of Technology and Economics, Hungary), Sándor Szabó (Budapest University of Technology and Economics, Hungary), Tamás Szálka (Budapest University of Technology and Economics, Hungary)
Article 2
Optimizing Message Verbosity and Energy Consumption in Secured Wireless Mobile Networks (pages 22-35)
P. P. Abdul Haleem (National Institute of Technology Calicut, India), M. P. Sebastian (National Institute of Technology Calicut, India)
Article 3
Optimal Spectral Resolution in Speaker Authentication Application in Noisy Environment and Telephony (pages 36-47)
Siham Ouamour (USTHB University, Algeria), Halim Sayoud (University of Bab-Ezzouar, Algeria), Mhania Guerti (ENS.Polytechnique, Algeria)
Article 4
Improving Energy Efficiency and Throughput in Heterogeneous Mobile Ad Hoc Networks (pages 48-60)
Manu.J. Pillai (Kerala University, India), M. P. Sebastian (National Institute of Technology Calicut, India)
Article 5
Mobile Community Networks: Evolution and Challenges (pages 61-79)
Vijayan Sugumaran (Oakland University, USA), Shriram Raghunathan (B. S. Abdur Rahman University, India), K. Vivekanandan (Bharathiar University, India)
Issue 3
Article 1
Frequency Domain Equalization And Adaptive Ofdm Vs Single Carrier Modulation (pages 1-7)
Inderjeet Kaur (Ajay Kumar Garg Engineering College, India)
Article 2
A Secure and Trustworthy Framework for Mobile Agent-Based E-Marketplace with Digital Forensics and Security Protocols (pages 8-26)
Qi Wei (University Kebangsaan Malaysia, Malaysia), Ahmed Patel (University Kebangsaan Malaysia, Malaysia)
Article 3
Performance Enhancement of Routing Protocols in Mobile Ad hoc Networks (pages 27-39)
Kais Mnif (University of Sfax, Tunisia), Michel Kadoch (University of Quebec, Canada)
Article 4
Definition and Analysis of a Fixed Mobile Convergent Architecture for Enterprise VoIP Services (pages 40-56)
Joel Penhoat (France Telecom Orange Labs, France), Olivier Le Grand (France Telecom Orange Labs, France), Mikael Salaun (France Telecom Orange Labs, France), Tayeb Lemlouma (Université de Rennes 1 IRISA, France)
Article 5
Realization of Route Reconstructing Scheme for Mobile Ad hoc Network (pages 57-77)
Qin Danyang (Harbin Institute of Technology, China), Ma Lin (Harbin Institute of Technology, China), Sha Xuejun (Harbin Institute of Technology, China), Xu Yubin (Harbin Institute of Technology, China)
Article 6
Buffer Management in Cellular IP Network using PSO (pages 78-93)
Mohammad Anbar (Jawaharlal Nehru University, New Delhi, India), Deo Prakash Vidyarthi (Jawaharlal Nehru University, New Delhi, India)
Issue 4
Article 1
A Fast Image Encoding Algorithm Based on the Pyramid Structure of Codewords (pages 1-13)
Ahmed A. Radwan (Minia University, Egypt), Ahmed Swilem (Minia University, Egypt), Mamdouh M. Gomaa (Minia University, Egypt)
Article 2
Analysis and Modeling of H.264 Unconstrained VBR Video Traffic (pages 14-31)
Harilaos Koumaras (Business College of Athens (BCA), Greece), Charalampos Skianis (University of Aegean, Greece), Anastasios Kourtis (Institute of Informatics and Telecommunications NCSR, Greece)
Article 3
Throughput Optimization of Cooperative Teleoperated UGV Network (pages 32-46)
Ibrahim Y. Abualhaol (Broadcom Corporation, USA), Mustafa M. Matalgah (The University of Mississippi, USA)
Article 4
Speaker Discrimination on Broadcast News and Telephonic Calls Using a Fusion of Neural and Statistical Classifiers (pages 47-63)
Siham Ouamour (USTHB University, Algeria), Halim Sayoud (USTHB University, Algeria)
Article 5
Mobile Application Benchmarking Based on the Resource Usage Monitoring (pages 64-75)
Reza Rawassizadeh (University of Vienna, Austria)