SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
International Journal of Distributed and Parallel systems (IJDPS)
ISSN : 0976 - 9757 [Online] ; 2229 - 3957 [Print]
http://airccse.org/journal/ijdps/ijdps.html
Most Cited Articles - 2012
Mobile-Assisted Language Learning
Tayebeh Mosavi Miangah and Amin Nezarat, IJDPS Journal, Vol.3, No.1, January 2012, PP.
309 -319 DOI : 10.5121/ijdps.2012.3126
A Study of BNP Parallel Task Scheduling Algorithms Metric’s for Distributed Database System
Manik Sharma,Gurdev Singh and Harsimran Kaur, IJDPS Journal, Vol.3, No.1, January 2012,
PP. 157 -166 DOI : 10.5121/ijdps.2012.3112
Embedded System for Hazardous Gas detection and Alerting
V.Ramya and B.Palaniappan, IJDPS Journal, Vol.3, No.3, May 2012, PP. 289 -300
Evaluation of various Traffic loads in MANET with DSR routing protocol through use of
OPNET Simulator
Parulpreet Singh,Ekta Barkhodia and Gurleen Kaur Walia, IJDPS Journal, Vol.3, No.3, May
2012, PP. 75 -83 DOI : 10.5121/ijdps.2012.3308
Mobile Learning (M-LEARNING) and Educational Environments
Mohamed Sarrab,Laila Elgamel and Hamza Aldabbas, IJDPS Journal, Vol.3, No.4, July 2012,
PP. 31 -48 DOI : 10.5121/ijdps.2012.3404
Overview of Mc Cdma PAPR Reduction Techniques
B.Sarala,D.S.Venkateswarulu and B.N.Bhandari, IJDPS Journal, Vol.3, No.2, March 2012, PP.
193-206 DOI : 10.5121/ijdps.2012.3217
Most Cited Articles - 2011
FAVQCHOKE: To Allocate Fair Buffer to a Dynamically Varying Traffic in an IP Network
K.Chitra and G.Padmavathi, IJDPS Journal, Vol.2, No.1, January 2011, PP. 73 -82
DOI : 10.5121/ijdps.2011.2106
Performance Evaluation of on Demand Routing Protocols AODV and Modified AODV
(RAODV) in MANETS
Humaira Nishat,Vamsi Krishna K,D.Srinivasa Rao and Shakeel Ahmed, IJDPS Journal, Vol.2,
No.1, January 2011, PP. 94 -101 DOI : 10.5121/ijdps.2011.2108
WEP: An Energy Efficient Protocol for Cluster Based Heterogeneous Wireless Sensor Network
Md. Golam Rashed, M. Hasnat Kabir and Shaikh Enayet Ullah, IJDPS Journal, Vol.2, No.2,
March 2011, PP. 54-60 DOI : 10.5121/ijdps.2011.2205
To Prallelize or not to Parallelize, Speed up Issue
Alaa Ismail El-Nashar, IJDPS Journal, Vol.2, No.2, March 2011, PP. 14-28
DOI : 10.5121/ijdps.2011.2202
Cryptanalysis of Two Mutual Authentication Protocols for Low-Cost RFID
Mohammad Hassan Habibi, Mahmoud Gardeshi Mahdi Alaghband, IJDPS Journal, Vol.2, No.1,
January 2011, PP. 103-114 DOI : 10.5121/ijdps.2011.2109
Smart Radio Spectrum Management for Cognitive Radio
Partha Pratim Bhattacharya, Ronak Khandelwal, Rishita Gera and Anjali Agarwal , IJDPS
Journal, Vol.2, No.4, July 2011, PP. 12 to 24 DOI : 10.5121/ijdps.2011.2402
Most Cited Articles - 2010
Data Mining System and Applications: A Review
S.P.Deshpande and V.M.Thakare, IJDPS Journal, Vol.1, No.1, September 2010, PP. 32 -44
DOI : 10.5121/ijdps.2010.1103
Network Reliability Computation by using Different Binary Decision Diagrams
Manoj Singhal,R. K.Chauhan and Girish Sharma, IJDPS Journal, Vol.1, No.1, September 2010,
PP. 82 -91 DOI : 10.5121/ijdps.2010.1106
An Implementation Possibilitiesf for Aodv Routing Protocol in Real World
Nitiket N Mhala and N K Choudhari, IJDPS Journal, Vol.1, No.2, November 2010, PP. 118 -127
DOI : 10.5121/ijdps.2010.1210
Scalable and Robust Location Aware Multicast Algorithm (SRLAMA) for Manet
Pariza Kamboj and Ashok.K.Sharma, IJDPS Journal, Vol.1, No.2, November 2010, PP. 11-24
Scalable and Robust Location Aware Multicast Algorithm (SRLAMA) for MANET
Pariza Kamboj and Ashok. K. Sharma, IJDPS Journal, Vol.1, No.2, November 2010, PP. 10-24
DOI : 10.5121/ijdps.2010.1202
AIRCC Publishing Corporation
www.airccse.org

Contenu connexe

Similaire à Ijdps(most cited articles)

International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)
IJCNCJournal
 

Similaire à Ijdps(most cited articles) (10)

Ijasuc(most cited articles)
Ijasuc(most  cited articles)Ijasuc(most  cited articles)
Ijasuc(most cited articles)
 
Ijaia(most cited article)
Ijaia(most cited article)Ijaia(most cited article)
Ijaia(most cited article)
 
Ijsea
IjseaIjsea
Ijsea
 
Iju(most cited articles)
Iju(most cited articles)Iju(most cited articles)
Iju(most cited articles)
 
International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC)
 
Vlsics(most cited article)
Vlsics(most cited article)Vlsics(most cited article)
Vlsics(most cited article)
 
Ijwest(most cited article)
Ijwest(most cited article)Ijwest(most cited article)
Ijwest(most cited article)
 
Ijsc(most cited article)
Ijsc(most cited article)Ijsc(most cited article)
Ijsc(most cited article)
 
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
 
Lastresume
LastresumeLastresume
Lastresume
 

Dernier

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Dernier (20)

How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 

Ijdps(most cited articles)

  • 1. International Journal of Distributed and Parallel systems (IJDPS) ISSN : 0976 - 9757 [Online] ; 2229 - 3957 [Print] http://airccse.org/journal/ijdps/ijdps.html Most Cited Articles - 2012 Mobile-Assisted Language Learning Tayebeh Mosavi Miangah and Amin Nezarat, IJDPS Journal, Vol.3, No.1, January 2012, PP. 309 -319 DOI : 10.5121/ijdps.2012.3126 A Study of BNP Parallel Task Scheduling Algorithms Metric’s for Distributed Database System Manik Sharma,Gurdev Singh and Harsimran Kaur, IJDPS Journal, Vol.3, No.1, January 2012, PP. 157 -166 DOI : 10.5121/ijdps.2012.3112 Embedded System for Hazardous Gas detection and Alerting V.Ramya and B.Palaniappan, IJDPS Journal, Vol.3, No.3, May 2012, PP. 289 -300 Evaluation of various Traffic loads in MANET with DSR routing protocol through use of OPNET Simulator Parulpreet Singh,Ekta Barkhodia and Gurleen Kaur Walia, IJDPS Journal, Vol.3, No.3, May 2012, PP. 75 -83 DOI : 10.5121/ijdps.2012.3308 Mobile Learning (M-LEARNING) and Educational Environments Mohamed Sarrab,Laila Elgamel and Hamza Aldabbas, IJDPS Journal, Vol.3, No.4, July 2012, PP. 31 -48 DOI : 10.5121/ijdps.2012.3404 Overview of Mc Cdma PAPR Reduction Techniques B.Sarala,D.S.Venkateswarulu and B.N.Bhandari, IJDPS Journal, Vol.3, No.2, March 2012, PP. 193-206 DOI : 10.5121/ijdps.2012.3217 Most Cited Articles - 2011 FAVQCHOKE: To Allocate Fair Buffer to a Dynamically Varying Traffic in an IP Network K.Chitra and G.Padmavathi, IJDPS Journal, Vol.2, No.1, January 2011, PP. 73 -82 DOI : 10.5121/ijdps.2011.2106 Performance Evaluation of on Demand Routing Protocols AODV and Modified AODV (RAODV) in MANETS Humaira Nishat,Vamsi Krishna K,D.Srinivasa Rao and Shakeel Ahmed, IJDPS Journal, Vol.2, No.1, January 2011, PP. 94 -101 DOI : 10.5121/ijdps.2011.2108 WEP: An Energy Efficient Protocol for Cluster Based Heterogeneous Wireless Sensor Network Md. Golam Rashed, M. Hasnat Kabir and Shaikh Enayet Ullah, IJDPS Journal, Vol.2, No.2, March 2011, PP. 54-60 DOI : 10.5121/ijdps.2011.2205 To Prallelize or not to Parallelize, Speed up Issue Alaa Ismail El-Nashar, IJDPS Journal, Vol.2, No.2, March 2011, PP. 14-28 DOI : 10.5121/ijdps.2011.2202
  • 2. Cryptanalysis of Two Mutual Authentication Protocols for Low-Cost RFID Mohammad Hassan Habibi, Mahmoud Gardeshi Mahdi Alaghband, IJDPS Journal, Vol.2, No.1, January 2011, PP. 103-114 DOI : 10.5121/ijdps.2011.2109 Smart Radio Spectrum Management for Cognitive Radio Partha Pratim Bhattacharya, Ronak Khandelwal, Rishita Gera and Anjali Agarwal , IJDPS Journal, Vol.2, No.4, July 2011, PP. 12 to 24 DOI : 10.5121/ijdps.2011.2402 Most Cited Articles - 2010 Data Mining System and Applications: A Review S.P.Deshpande and V.M.Thakare, IJDPS Journal, Vol.1, No.1, September 2010, PP. 32 -44 DOI : 10.5121/ijdps.2010.1103 Network Reliability Computation by using Different Binary Decision Diagrams Manoj Singhal,R. K.Chauhan and Girish Sharma, IJDPS Journal, Vol.1, No.1, September 2010, PP. 82 -91 DOI : 10.5121/ijdps.2010.1106 An Implementation Possibilitiesf for Aodv Routing Protocol in Real World Nitiket N Mhala and N K Choudhari, IJDPS Journal, Vol.1, No.2, November 2010, PP. 118 -127 DOI : 10.5121/ijdps.2010.1210 Scalable and Robust Location Aware Multicast Algorithm (SRLAMA) for Manet Pariza Kamboj and Ashok.K.Sharma, IJDPS Journal, Vol.1, No.2, November 2010, PP. 11-24 Scalable and Robust Location Aware Multicast Algorithm (SRLAMA) for MANET Pariza Kamboj and Ashok. K. Sharma, IJDPS Journal, Vol.1, No.2, November 2010, PP. 10-24 DOI : 10.5121/ijdps.2010.1202 AIRCC Publishing Corporation www.airccse.org