Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Articles
Current
Archives
Authors
Guidelines
Rights and Responsibilities
Benefits
Make a Submissions
Policies
Frequently Asked Questions
Editorial Policy
Open Access Policy
Privacy Policy
Publication Ethics
Withdrawal, Retraction, Correction
Editorial Team
About
About the Journal
Article Publishing Fee
Abstracting and Indexing
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 3 No. 3 (2015): Transactions on Networks and Communications
Vol. 3 No. 3 (2015): Transactions on Networks and Communications
Transactions on Networks and Communications
Volume 3, Issue 3, June 2015
DOI:
https://doi.org/10.14738/tnc.33.2015
Published:
2015-07-03
Full Issue
Volume 3 No 3; Complete Issue
Articles
Radio Frequency Identification Upon Near Field Communication and Far Field Communication For Next Generation Wireless Network Infrastructures
Gowher Mushtaq, Shashank Singh, Neeraj Kumar Tiwari, Seemab Rasheed, Yogesh pal, Kavita Srivastava
1
PDF
DOI:
https://doi.org/10.14738/tnc.33.1167
An Amalgamated Approach of Fuzzy Logic and Genetic Algorithm forBetter Recruitment Process
Anju Khandelwal, Ashish Agrawal
23
PDF
DOI:
https://doi.org/10.14738/tnc.33.1080
Li-Fi the future of Vehicular Ad hoc Networks
Diyar Khairi M S, Amine Berqia
31
PDF
DOI:
https://doi.org/10.14738/tnc.33.1223
Android Application Development for Secure Data Transmission using Steganography
Vineet Ramesh Jeswani, Savita Kulkarni, Manisha Ingle
39
PDF
DOI:
https://doi.org/10.14738/tnc.33.1292
The Non-Uniform Communication Performance of Adaptive Routing for Hierarchical Interconnection Network for 3D VLSI
Yasuyuki Miura, Shigeyoshi Watanabe, M.M. Hafizur Rahman
49
PDF
DOI:
https://doi.org/10.14738/tnc.33.1293
Author Center
About the Journal
Current Issue
Archives
Make a Submission
Author Guidelines
Call for Papers
Indexing
Follow Us
Current Issue
Most Read Last Week
Cryptography and Steganography: New Approach
16
The Dark Side of the China: The Government, Society and the Great Cannon
8
Exploiting Cryptocurrency Miners with OISNT Techniques
7
BREAST CANCER RISK PREDICTION USING DATA MINING CLASSIFICATION TECHNIQUES
6
Holomorphy in Pseudo-Euclidean Spaces and the Classic Electromagnetic Theory
5
Keywords