Previous Issue

PDF Icon

A PROTOTYPE OF ADVANCED MANAGEMENT INFORMATION SYSTEM FOR CONFERENCES

Author/s:  Kota MORIGAKI, Keizo SAISHO
Pages:  60-65   /   DOI:  http://dx.doi.org/10.17781/P002234
PDF Icon

DYNAMIC OPTIMIZATION OF IEEE 802.11 DCF BASED ON ACTIVE STATIONS AND COLLISION PROBABILITY

Author/s:  Nithya Balasubramanian, Shreenivas Bharadwaj Venkataramanan and Aravind Aathma
Pages:  66-74   /   DOI:  http://dx.doi.org/10.17781/P002235
PDF Icon

Modeling Improved Low Latency Queueing Scheduling Scheme for Mobile Ad Hoc Networks

Author/s:  Kakuba Samuel, Kyanda S. Kaawaase, Michael Okopa
Pages:  75-92   /   DOI:  http://dx.doi.org/10.17781/P002270
PDF Icon

Mining Top-T Web Traversal Subsequences

Author/s:  Santosh Kumar, Neha Tyagi
Pages:  93-105   /   DOI:  http://dx.doi.org/10.17781/P002279
PDF Icon

Development of Electronic Document Archive Management System (EDAMS): A Case Study of a University Registrar in the Philippines

Author/s:  Las Johansen B. Caluza
Pages:  106-117   /   DOI:  http://dx.doi.org/10.17781/P002280
PDF Icon

Data Mining and Analysis for off Grid Solar PV Power System

Author/s:  Mohamed D. Almadhoun
Pages:  118-123   /   DOI:  http://dx.doi.org/10.17781/P002281
PDF Icon

Vulnerability Assessment and Penetration Testing: A proactive approach towards Network and Information Security

Author/s:  Muhammad Zeeshan, Shams Un Nisa, Tazeen Majeed, Nayab Nasir, Saadia Anayat
Pages:  124-142   /   DOI:  http://dx.doi.org/10.17781/P002308