Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Articles
Current
Archives
Authors
Guidelines
Rights and Responsibilities
Benefits
Make a Submissions
Policies
Frequently Asked Questions
Editorial Policy
Open Access Policy
Privacy Policy
Publication Ethics
Withdrawal, Retraction, Correction
Editorial Team
About
About the Journal
Article Publishing Fee
Abstracting and Indexing
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 2 No. 3 (2014): Transactions on Networks and Communications
Vol. 2 No. 3 (2014): Transactions on Networks and Communications
Transactions on Networks and Communications
Volume 2, Issue 3, June 2014
DOI:
https://doi.org/10.14738/tnc.23.2014
Published:
2014-06-11
Full Issue
PDF
Articles
Policy-based Wide Area Network Management System
Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii
01-17
PDF
DOI:
https://doi.org/10.14738/tnc.23.192
Cloud Computing and Offloading Framework
Ahmed Haitham Najim, Shawkat k. Guirguis, Magda mohammed Madbouly
18-33
DOI:
https://doi.org/10.14738/tnc.23.236
Feature selection using closeness to centers for network intrusion detection
Sethu Rama Lingam, E. R. Naganathan
34-39
PDF
DOI:
https://doi.org/10.14738/tnc.23.286
Route Reliability Modelling in Mobile ad hoc Network (R2M2) model using Bayesian algorithm
Pankaj Kumar Sharma, Shruti Kohli, Ashok K Sinha
40-48
PDF
DOI:
https://doi.org/10.14738/tnc.23.285
Four Parallel Decoding Schemas of Product Block Codes
Abdeslam Ahmadi, Faissal EL Bouanani, Hussain Ben-Azza
49-69
PDF
DOI:
https://doi.org/10.14738/tnc.23.229
‘Green Wall Rating’: A Methodology to Evaluate Sustainable Development by Implementing Green Wall Model
Neeraj Kumar Tiwari, Ankit Kumar Srivastava
70-74
PDF
DOI:
https://doi.org/10.14738/tnc.23.254
Author Center
About the Journal
Current Issue
Archives
Make a Submission
Author Guidelines
Call for Papers
Indexing
Follow Us
Current Issue
Most Read Last Week
Cryptography and Steganography: New Approach
11
The Dark Side of the China: The Government, Society and the Great Cannon
8
Exploiting Cryptocurrency Miners with OISNT Techniques
7
BREAST CANCER RISK PREDICTION USING DATA MINING CLASSIFICATION TECHNIQUES
5
Holomorphy in Pseudo-Euclidean Spaces and the Classic Electromagnetic Theory
5
Keywords