International Journal of Wireless and Microwave Technologies(IJWMT)
ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)
DOI: 10.5815/ijwmt
Published By: MECS Press
IJWMT Vol. 5, No. 6, Nov. 2015
Cover page and Table of Contents: PDF (size: 308KB)
Contents
REGULAR PAPERS
-
CoAP Protocol for Constrained Networks
Manveer Joshi, Bikram Pal Kaur
Abstract | References | Full Paper: PDF (Size:316KB), PP.1-10, Pub. Date: 2015-11-08
DOI: 10.5815/ijwmt.2015.06.01
-
Cybercrimes Solutions using Digital Forensic Tools
Dhwaniket Ramesh Kamble, Nilakshi Jain, Swati Deshpande
Abstract | References | Full Paper: PDF (Size:210KB), PP.11-18, Pub. Date: 2015-11-08
DOI: 10.5815/ijwmt.2015.06.02
-
Loss Less and Privacy Preserved Data Retrieval in Cloud Environment using TRSE
T. Kavitha, B. Narendra, K.Thejaswi, P. Nageswara Rao
Abstract | References | Full Paper: PDF (Size:348KB), PP.19-25, Pub. Date: 2015-11-08
DOI: 10.5815/ijwmt.2015.06.03
-
An Extended Research on the Blood Donor Community as a Mobile Application
A Bhowmik, N A Nabila, M A Imran, M A U Rahman, D Karmaker
Abstract | References | Full Paper: PDF (Size:264KB), PP.26-34, Pub. Date: 2015-11-08
DOI: 10.5815/ijwmt.2015.06.04
-
A Design Approach of GSM, Bluetooth and Dual band Notched UWB Antenna
Durgesh Katre, Rekha Labade
Abstract | References | Full Paper: PDF (Size:677KB), PP.35-43, Pub. Date: 2015-11-08
DOI: 10.5815/ijwmt.2015.06.05
-
Optimum Resource Allocation in Orthogonal Frequency Division Multiplexing Communication System using Fuzzy Rule Base System and Particle Swarm Optimization and Comparison with Conventional other Techniques
Farhana Mustafa, Padma Lohiya
Abstract | References | Full Paper: PDF (Size:242KB), PP.44-52, Pub. Date: 2015-11-08
DOI: 10.5815/ijwmt.2015.06.06
-
A New Technique for Detection and Prevention of Passive Attacks in Web Usage Mining
Roop Kamal Kaur, Kamaljit Kaur
Abstract | References | Full Paper: PDF (Size:590KB), PP.53-62, Pub. Date: 2015-11-08
DOI: 10.5815/ijwmt.2015.06.07