Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Articles
Current
Archives
Authors
Guidelines
Rights and Responsibilities
Benefits
Make a Submissions
Policies
Frequently Asked Questions
Editorial Policy
Open Access Policy
Privacy Policy
Publication Ethics
Withdrawal, Retraction, Correction
Editorial Team
About
About the Journal
Article Publishing Fee
Abstracting and Indexing
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 3 No. 5 (2015): Transactions on Networks and Communications
Vol. 3 No. 5 (2015): Transactions on Networks and Communications
Transactions on Networks and Communications
Volume 3, Issue 4, October 2015
DOI:
https://doi.org/10.14738/tnc.35.2015
Published:
2015-11-04
Full Issue
Volume 3 No 5; Complete Issue
Articles
Links Utilization in MPLS Networks Operating with Traffic Engineering Signal Protocols
Ghufran Saady Abd-almuhsen, Mahmoud M. Al-Quzwin, Raad Sami Fyath
1
PDF
DOI:
https://doi.org/10.14738/tnc.35.1448
Efficient On-Line Traffic Policing for Confidence Level based Traffic Model
Lie Qian
28
PDF
DOI:
https://doi.org/10.14738/tnc.35.1446
Mobile Operators as Banks or Vice-Versa? and: Regulators’ Interest in the Best Efficiency of Payments
Louis François Pau
42
PDF
DOI:
https://doi.org/10.14738/tnc.35.1524
An SMS Based Push Email Server
Ayokunle Ayobami Omotunde, Aaron Afan Izang, Shade Kuyoro, Samuel B Abel, Yaw Mensah
54
PDF
DOI:
https://doi.org/10.14738/tnc.35.1529
Network Flexibility and Policy Making in Software Defined Networks
Abhinav Sharma, Manu Sood
63
PDF
DOI:
https://doi.org/10.14738/tnc.35.1517
Efficient Cooperative MAC and Routing in Wireless Networks
Lillykutty Jacob, H.R. Shamna
79
PDF
DOI:
https://doi.org/10.14738/tnc.35.1586
Author Center
About the Journal
Current Issue
Archives
Make a Submission
Author Guidelines
Call for Papers
Indexing
Follow Us
Current Issue
Most Read Last Week
Cryptography and Steganography: New Approach
16
The Dark Side of the China: The Government, Society and the Great Cannon
8
Exploiting Cryptocurrency Miners with OISNT Techniques
7
BREAST CANCER RISK PREDICTION USING DATA MINING CLASSIFICATION TECHNIQUES
6
Holomorphy in Pseudo-Euclidean Spaces and the Classic Electromagnetic Theory
5
Keywords