Published: 2015-03-09
The first issue of the Open Access International Journal of Information, Communication Technology and Applications. All papers are peer reviewed and a similarity score search is used to ensure the papers are suitable for publication.
Articles
Mechanisms for QoE optimisation of Video Traffic: A review paper
Abstract 1020 | PDF Downloads 13 | DOI https://doi.org/10.17972/ajicta2015117
PDF
Page 1-18
Frequency-Adaptive Approach In IEEE 802.15.4 Wireless Body Sensor Networks: Continuous-Assessment or Periodic-Assessment?
Abstract 536 | PDF Downloads 12 | DOI https://doi.org/10.17972/ajicta2015113
PDF
Page 19-34
Increasing Wireless Adhoc Network Capacity through Simultaneous Transmissions
Abstract 597 | PDF Downloads 8 | DOI https://doi.org/10.17972/ajicta20151113
PDF
Page 35-54
Evaluating the Cascade Effect in Interdependent Networks via Algebraic Connectivity
Abstract 677 | PDF Downloads 11 | DOI https://doi.org/10.17972/ajicta2015115
PDF
Page 55-68
A novel delay line buffering architecture for asynchronous optical packet switched networks
Abstract 504 | PDF Downloads 6 | DOI https://doi.org/10.17972/ajicta20151112
PDF
Page 69-82
Robust Cooperation in Mobile Ad Hoc Networks
Abstract 606 | PDF Downloads 8 | DOI https://doi.org/10.17972/ajicta2015114
PDF
Page 83-95
Efficiency Evaluation for Femtocell Spectrum Access in LTE-Advanced
Abstract 690 | PDF Downloads 10 | DOI https://doi.org/10.17972/ajicta20151114
PDF
Page 96-111
DVB-S2 Channel Estimation and Decoding in The Presence of Phase Noise for Non-Linear Channels
Abstract 906 | PDF Downloads 8 | DOI https://doi.org/10.17972/ajicta2015111
PDF
Page 112-127
Passive Optical Network Survivability: Protection, Detection and Restoration
Abstract 936 | PDF Downloads 7 | DOI https://doi.org/10.17972/ajicta20151115
PDF
Page 128-142
A Statistical Approach to Determine Handover Success Using the Principle of Inclusion and Load Variation on Links in Wireless Networks
Abstract 396 | PDF Downloads 1 | DOI https://doi.org/10.17972/ijicta20151121
PDF
Page 143-151
Improving Remote Method Invocation via Method Authorization and Elimination of Registry: An Exploration of Java and Haxe
Abstract 548 | PDF Downloads 3 | DOI https://doi.org/10.17972/ijicta20151116
PDF
Page 152-179