Volume 11 (2015)

Network Security and Data Mining/Editorial
A New Compact Small Circular Patch Antenna for UWB Communication/Open Call Articles
Novel Algorithm in Activation Process of GPON Networks/Open Call Articles
PMD Study & Measurement – Fixed Analyzer Method/Open Call Articles
Software-Defined Optics in Last Mile for Research and Education in the Czech Republic/Open Call Articles
The Influence of Digital Modulations on 320 Gbit/s Optical Time Division Multiplexing/Open Call Articles
Analytical bound for the CCDF of Crest Factor in NC-OFDM Systems/Open Call Articles
Parameter Tuning for Scalable Multi-Resource Server Consolidation in Cloud Systems/Open Call Articles
Energy Efficiency of Image Transmission in Embedded Linux based Wireless Visual Sensor Network/Open Call Articles
Radiating Slot in the Coaxial Cable Shield: Measurement Based Characterization/Open Call Articles
A New Approach to Sequence Construction With Good Correlation by Particle Swarm Optimization/Open Call Articles
Designing Robust LMCA-based Threshold Secret Sharing Scheme for Digital Images Using Multiple Configurations Assignment/Open Call Articles
Simulation of Vehicular Ad-hoc Network Routing Protocols with a Performance Analysis/Open Call Articles
An Optimized Node Selection Routing Protocol for Vehicular Ad-hoc Networks – A Hybrid Model/Open Call Articles
A Web-based Software System for Behavior Analysis of Laboratory Animals/Open Call Articles
Efficient Web Navigator for Multi-Constrained Spatial Keyword Queries/Open Call Articles
A Novel Approach to Design 2-bit Binary Arithmetic Logic Unit (ALU) Circuit Using Optimized 8:1 Multiplexer with Reversible logic/Open Call Articles
Single Sign-on Mechanism for Secure Web Service Access through ISSO/Open Call Articles
Towards Effective Control of P2P Traffic Aggregates in Network Infrastructures/Open Call Articles
Mining Software Repositories for Defect Categorization/Open Call Articles
Effectiveness of Support Vector Machines in Medical Data mining/Open Call Articles
Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT/Open Call Articles
Efficient Routing in Mobile Adhoc Networks Emphasizing Quality of Service by Trust & Energy based AODV/Open Call Articles