Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Articles
Current
Archives
Authors
Guidelines
Rights and Responsibilities
Benefits
Make a Submissions
Policies
Frequently Asked Questions
Editorial Policy
Open Access Policy
Privacy Policy
Publication Ethics
Withdrawal, Retraction, Correction
Editorial Team
About
About the Journal
Article Publishing Fee
Abstracting and Indexing
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 3 No. 4 (2015): Transactions on Networks and Communications
Vol. 3 No. 4 (2015): Transactions on Networks and Communications
Transactions on Networks and Communications
Volume 3, Issue 4, August 2015
DOI:
https://doi.org/10.14738/tnc.34.2015
Published:
2015-08-31
Full Issue
Volume 3 No 4; Complete Issue
Articles
A Survey on LDPC Codes for Cooperative Communications
Phuong Thanh Tran
1
PDF
DOI:
https://doi.org/10.14738/tnc.34.1246
Light Weight Secure Key Generation Protocol with Hidden Generator Point using ECC
Ayaz Hassan Moon, Ummer Iqbal
20
PDF
DOI:
https://doi.org/10.14738/tnc.34.1295
Design and Development of Lower Limb Chair Exercise Support System with Depth Sensor
Toshiya Watanabe, Susumu Shibusawa, Masaru Kamada, Tatsuhiro Yonekura, Naohiro Ohtsuka
30
PDF
DOI:
https://doi.org/10.14738/tnc.34.1387
A Double Threshold Energy Estimation Approach to Optimize Spectrum Sensing in Cognitive Radio Network
H Venkatesh Kumar, M. N. Giriprasad
46
PDF
DOI:
https://doi.org/10.14738/tnc.34.1406
Survey of Probe Set and Probe Station Selection Algorithms for Fault Detection and Localization in Computer Networks
Balaji Madhavrao Patil, Vinay Kumar Pathak
57
PDF
DOI:
https://doi.org/10.14738/tnc.34.1023
Author Center
About the Journal
Current Issue
Archives
Make a Submission
Author Guidelines
Call for Papers
Indexing
Follow Us
Current Issue
Most Read Last Week
Cryptography and Steganography: New Approach
10
The Dark Side of the China: The Government, Society and the Great Cannon
9
A New Type of NLFSR Functions with Maximum Periods
7
Exploiting Cryptocurrency Miners with OISNT Techniques
7
Holomorphy in Pseudo-Euclidean Spaces and the Classic Electromagnetic Theory
5
Keywords