Current Issue

June 2017, Volume 7, Number 3

An Overview of the Bank Fraud and its Detection Techniques Through Data Mining 

Seyyed Hedayat Tarighi Nejad1 and Mohammad Nikbakht2 and Mohammad Hossein Afrakhteh21Islamic Azad University, Iran and 2Keshavarzi Bank Staff Management, Iran

 

April 2017, Volume 7, Number 1/2

Secondary User Undercover Cooperative Dynamic Access Protocol for Overlay Cognitive Radio Networks
A. Masri1, Y. A. S. Dama1, 2, N Eya2, R. A. Abd-Alhameed2, N. Odeh1, F.Hasan1, A. Mousa1 and J. M. Noras2, 1An-Najah National University, Palestine and 2University of Bradford, UK

Business Models for the Next Generation of Mobile Communications
Ghoul Smail and Jia Weijia, Shanghai Jiao Tong University, China

Investigation a New Approach to Detect and Track Fraud in Virtual Learning Environments by Using CHAYD Model
Sayyed Jalalaldin Gharibi Karyak1 and Sayyed Hedayat Tarighinejad2, 1Technical and Vocational University, Iran and 2Islamic Azad University of Yasuj, Iran

December 2016, Volume 6, Number 4/5/6

Journey of Mobile Generation and Cognitive Radio Technology in 5G
Parnika De and Shailendra Singh, National Institute of Technical Teacher Training and Research – Bhopal, India

June 2016, Volume 6, Number 3

An Overview of Peak-to-Average Power Ratio Reduction Techniques for OFDM Signals
Zhuo Wang, Enchang Sun, Yanhua Zhang, Beijing University of Technology, China

April 2016, Volume 6, Number 2

Design and Implementation a New Energy Efficient Clustering Algorithm Using the Fuzzy Logic and Genetic Algorithm for Wireless Sensor Networks

Sayyed Hedayat Tarighinejad and Reza Alinaghian and Mehdi Sadeghzadeh, Islamic Azad University, Iran

February 2016, Volume 6, Number 1

Trust based Security model to withstand against black hole and grey hole attacks in Military based Mobile ad hoc Networks

 S.Sivagurunathan and K.Prathapchandran, Gandhigram Rural Institute, India

Advertisements