Journal cover image

Browse issues


Vol. 11
Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Information and Communication Technology

2014 Vol. 6 No. 3/4

Special Issue on Recent Trends in Intelligent Computation and Communication System Design

Guest Editor: Professor Kandarpa Kumar Sarma

 

Editorial
PagesTitle and authors
241-250Algorithm research for capacity-constrained stochastic traffic assignment model
Yong Yang; Yu-Song Yan; Zuo-An Hu; Pan Xie
DOI: 10.1504/IJICT.2014.063214

251-259RC5 implementation in ARM platform for cryptographic applications
A. Ruhan Bevi; S. Malarvizhi; Shubhra Saxena
DOI: 10.1504/IJICT.2014.063225

260-271Investigation on cooperative contention-based bandwidth request mechanism for heterogeneous networks
Rajesh Anbazhagan; Nakkeeran Rangaswamy
DOI: 10.1504/IJICT.2014.063215

272-291Energy efficient and load balanced clustering algorithms for wireless sensor networks
Tarachand Amgoth; Prasanta K. Jana
DOI: 10.1504/IJICT.2014.063216

292-308A classification-based summarisation model for summarising text documents
M. Esther Hannah; Saswati Mukherjee
DOI: 10.1504/IJICT.2014.063217

309-325A novel variable tap-length learning algorithm for low complexity, fast converging stereophonic acoustic echo cancellation
Asutosh Kar; Mahesh Chandra
DOI: 10.1504/IJICT.2014.063219

326-338A novel approach for design of a speech enhancement system using auto-trained NLMS adaptive filter
Sivaranjan Goswami; Bijeet Bardoloi; Pinky Deka; Darathi Dutta; Dipjyoti Sarma
DOI: 10.1504/IJICT.2014.063224

339-354Adaptive gain and variable effective aperture aided multi antenna set-ups for faded Rayleigh channels
Parismita A. Kashyap; Kandarpa Kumar Sarma
DOI: 10.1504/IJICT.2014.063222

355-368Business process artefact adaptability approach based on artificial immune systems
Mounira Zerari
DOI: 10.1504/IJICT.2014.063218

369-380Trust aware identity management for cloud computing
V. Neelaya Dhatchayani; V.S. Shankar Sriram
DOI: 10.1504/IJICT.2014.063220

381-402User experiences in the Official WikiLeaks Forum
Pirita Ihamäki
DOI: 10.1504/IJICT.2014.063221

403-421Reliability factor-based mathematical model for isolating selfish nodes in MANETs
J. Sengathir; R. Manoharan
DOI: 10.1504/IJICT.2014.063223

Regular Paper

422-430A new procedure of market segmentation for dynamic CRM systems: a case study of airlines in Taiwan
Wen-Yu Chiang
DOI: 10.1504/IJICT.2014.063227