Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
About the Journal
Submit Article
HOME
Current
Archives
Author Guidelines
Aim and Scope
Publication Fee
Open Access and Publication Ethics
Reviewers Guidelines
Editorial Board
About IJIEE
Contact US
Subscription
FAQS
News
Search
Register
Login
Home
/
Archives
/
Vol. 2 No. 3 (2012): Volume 2 issue 3 (2012)
Vol. 2 No. 3 (2012): Volume 2 issue 3 (2012)
Published:
03.05.2012
Articles
Data Transmission at 12kb/s over 32kb/s ADPCM
Muhanned AL-Rawi, Member, IACSIT and Muaayed AL-Rawi (Author)
293-295
Pdf
Subjective Age Prediction of Face Images Using PCA
Hlaing Htake Khaung Tin, Member, IACSIT (Author)
296-299
Pdf
An Effective Method of Security Against Wormhole Attack
Mohamed Amine Ferrag and Mehdi Nafaa (Author)
300-306
Pdf
TDE-ILD-HRTF-Based 2D Whole-Plane Sound Source Localization Using Only Two Microphones and Source Counting
Ali Pourmohammad, Member, IACSIT and Seyed Mohammad Ahadi (Author)
307-313
Pdf
EMID: Maximizing Lifetime of Wireless Sensor Network by Using Energy Efficient Middleware Service
Chandrakant N, Tejas J, Harsha D, P. Deepa Shenoy, Venugopal K R, L M Patnaik, and Vice Chancellor (Author)
314-317
Pdf
EDCA Delay Analysis of Spatial Multiplexing in IEEE 802.11-Based Wireless Sensor and Actuator Networks
Mohsen Maadani, Member, IACSIT, Seyed Ahmad Motamedi, and Mohammadreza Soltani (Author)
318-322
Pdf
NHEEP: A New Hybrid Energy Efficient Partitioning Approach for Wireless Sensor Network Clustering
Shahram Babaie, Neda Zekrizadeh, and Solamaz Nobahary (Author)
323-327
Pdf
Implementation of Wavelet Transform-Based Algorithm for Iris Recognition System
Ayra G. Panganiban, Noel B. Linsangan, and Felicito S. Caluyo (Author)
328-332
Pdf
A Novel Scheduling Mechanism Based on Artificial Immune System for Communication between Cluster Head and Cluster Members in WSNs
Arash Nikdel, Seyed Mahdi Jameii, and Hagar Noori (Author)
333-337
Pdf
Evaluation of Rough Set Theory Based Network Traffic Data Classifier Using Different Discretization Method
Nandita Sengupta, Member, IACSIT and Jaya Sil, Member, IEEE (Author)
338-341
Pdf
ASSM: Agent Based Source Specific Multicast Routing Protocol for Wireless Mesh Networks
Mojtaba Khayat (Author)
342-346
pdf
A Multi-Factor Scheduling Algorithm for WIMAX Systems
Ahmed H. El-Shinnawy, Mohamed M. Elgazzar, and Amin M.Nassar (Author)
347-351
pdf
Dominating Set & Clustering Based Network Coverage for Huge Wireless Sensor Networks
Mohammad Mehrani, Ali Shaeidi, Mohammad Hasannejad, and Amir Afsheh (Author)
352-357
pdf
A Hybrid System for Detecting Misbehaving Nodes in Ad Hoc Networks
Alireza Shahrbanoonezhad, Dina Sadat Jalali, and Ali Harounabadi (Author)
358-361
pdf
A Strong Encryption Method of Sound Steganography by Encoding an Image to Audio
V. J. Rehna, Member, IACSIT and M. K. Jeya Kumar (Author)
362-365
pdf
Semiconductor Die: Processing and Packaging
Satya Sai Srikant and Rajendra Prasad Mahapatra (Author)
366-368
pdf
The Performance Analysis of Fast DCT Algorithms on Parallel Cluster Architecture
Atri Sanyal and Swapan K Samaddar, Member, IACSIT (Author)
369-373
pdf
ETSHRA: Energy Efficient Threshold Sensitive Hierarchical Routing Algorithm for Cognitive Wireless Sensor Networks
Shahansha Quadri and Garimella Rama Murthy (Author)
374-375
pdf
Formal Description of Services Interfaces of SMAL Services in Services Computing Environment
Amit Bhandari and Manpreet Singh (Author)
379-382
pdf
Software Tokens Based Two Factor Authentication Scheme
Manav Singhal and Shashikala Tapaswi (Author)
383-386
pdf
Secure Migration of Tables across Different Database Management Systems over a Cross-Platform Environment
Pvnss Krishna Murthy, Surabhi Agarwal, Tulsi Garbyal, and Pavan Chakrobarty (Author)
387-390
pdf
An UCWW-enabled Mobile Geographic Information System
Ivan Ganchev, Máirtín O’Droma, and Sachin K. Agrawal (Author)
391-394
pdf
Design a New Fuzzy Congestion Controller in Wireless Sensor Networks
M. Samimi, A. Rezaee, and M. H. Yaghmaee (Author)
395-399
pdf
Identifying the Parameters Affecting Network Coding in Wireless Networks
Najme Zehra Naqvi, Deepika Jindal, Srishti Ahuja, and Priyanka Singh (Author)
400-403
pdf
Cyber Crimes: Lessons from the Legal Position of Malaysia and Iran
Nazura Abdul Manap and Hossein Taji (Author)
404-408
pdf
Cyber Terrorism: Issues in Its Interpretation and Enforcement
Nazura Abdul Manap and Pardis Moslemzadeh Tehrani (Author)
409-413
pdf
Is Database Protected Under Copyright? A Legal Analysis
Nazura Abdul Manap, Safinaz Mohd Hussein, and Mahmud Zuhdi Mohd Nor, Member, IACSIT (Author)
414-417
pdf
Nazura Abdul Manap, Safinaz Mohd Hussein, and Mahmud Zuhdi Mohd Nor, Member, IACSIT
Preetam Naik, Madhuri Rao, S. S. Mantha, and J. A. Gokhale (Author)
418-420
pdf
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks
Manaswi Saha and P. Venkata Krishna (Author)
421-425
pdf
A Novel Backoff Algorithm with QoS Support in Heterogeneous Wireless Networks
A. Rajesh, Member, IACSIT and R. Nakkeeran (Author)
426-430
pdf
Asymmetric Circular Array Antenna Synthesis Based on Angular Positions
Mangolika Bhattacharya, Sudipta Das, Durbadal Mandal, and Anup Kumar Bhattacharjee (Author)
431-435
pdf
Enhanced Object Oriented WBEM Enabled Solution for Non-Homogeneous Network
Enhanced Object Oriented WBEM Enabled Solution for Non-Homogeneous Network (Author)
436-440
pdf
Cryptanalysis with Ternary Difference: Applied to Block Cipher PRESENT
Farzaneh Abazari and Babak Sadeghiyan (Author)
441-445
pdf
Improving ertPS Grant Allocation for VoIP Traffic in Silence Duration
S. Amir. Hoseini, S. Saed Rezaie, and H. Taheri (Author)
446-450
pdf
Worm Containment in Gnutella Network with Heterogeneity
Amir-Reza Niakan-Lahiji and Babak Sadeghiyan (Author)
451-455
pdf
Multiplierless FIR Filter Implementation on FPGA
S. M. Badave and A .S. Bhalchandra (Author)
456-459
pdf
Classification of Rice Leaf Diseases Based on Morphological Changes
S. Phadikar, J. Sil, and A. K. Das (Author)
460-463
pdf
Comparison of Different Rule Calculation Method for Rough Set Theory
Nandita Sengupta, Member, IACSIT and Jaya Sil, Member, IEEE (Author)
464-466
pdf
Confidence Factor Variations for Aerial Threat Perception
M. Anwar-ul-Haq and Shoab A. Khan (Author)
467-469
pdf
Reduction of Neural Network Training Time Using an Adaptive Fuzzy Approach in Real Time Applications
Hamidreza Rashidy Kanan and Mahdi Yousefi Azar Khanian (Author)
470-474
pdf
Interoperability between IPv4 and IPv6 Clients and Servers
Shilpa Verma and Kunal Meher (Author)
480-482
pdf
Latest publications
Information
For Readers
For Authors
For Librarians
Make a Submission
Make a Submission
Sidebar
What's New
Jun 01, 2020 News!
Papers published in Vol.10, No.2 have all received dois from Crossref.
May 15, 2020 News!
Papers published in Vol.9, No.1-Vol.10, No.1 have all received dois from Crossref.
May 15, 2020 News!
IJIEE Vol. 10, No. 2 issue has been published online!
[Click]