Journal cover image

Browse issues


Vol. 13
Vol. 12
Vol. 11
Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Information and Communication Technology

2018 Vol. 13 No. 3

 

PagesTitle and authors
257-274Converged services composition with case-based reasoning
Hui Na Chua; S.M.F.D. Syed Mustapha
DOI: 10.1504/IJICT.2018.10012282

275-290Optimised cost considering Huffman code for biological data compression
Youcef Gheraibia; Sohag Kabir; Abdelouahab Moussaoui; Smaine Mazouzi
DOI: 10.1504/IJICT.2018.10012283

291-304A trust management based on a cooperative scheme in VANET
Ahmed Zouinkhi; Amel Ltifi; Chiraz Chouaib; Mohamed Naceur Abdelkrim
DOI: 10.1504/IJICT.2018.10012284

305-315Visible light communication-based high-speed high-performance multimedia transmission
Atul Sewaiwar; Samrat Vikramaditya Tiwari; Yeon-Ho Chung
DOI: 10.1504/IJICT.2018.10012285

316-328Analysis of energy aware job offloading in mobile cloud
Hong Min; Jinman Jung; Junyoung Heo
DOI: 10.1504/IJICT.2018.10012286

329-339Method of trajectory privacy protection based on restraining trajectory in LBS
Zemao Zhao; Jiabo Wang; Chuanlin Sun; Youwei Yuan; Bin Li
DOI: 10.1504/IJICT.2018.10005451

340-350An improved design of P4P based on distributed tracker
Lixin Li; Feng Wang; Wentao Yu; Xiuqing Mao; Mengmeng Yang; Zuohui Li
DOI: 10.1504/IJICT.2018.10012287

351-360Chinese-Naxi syntactic statistical machine translation based on tree-to-tree
Shengxiang Gao; Zhiwen Tang; Zhengtao Yu; Chao Liu; Lin Wu
DOI: 10.1504/IJICT.2018.10012288

361-374Research on wireless sensor network for mechanical vibration monitoring
Liang Zong; Wencai Du; Yong Bai
DOI: 10.1504/IJICT.2018.10012289

375-387Security and robustness of a modified ElGamal encryption scheme
Karima Djebaili; Lamine Melkemi
DOI: 10.1504/IJICT.2018.10012290