استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Cognitive radio technology applications for wireless and mobile ad hoc networks
A location - aided routing - probabilistic protocol for flooding optimization in mobile ad hoc networks \
Wireless ad hoc and sensor networks : a cross-layer design perspective /
Quality of service routing for multimedia multicast over Ad Hoc networks \
Development and performance analysis of a probabilistic flooding algorithm in noisy mobile Ad Hoc networks \
Development and performance analysis of optimal multipoint relaying algorithm for noisy mobile Ad Hoc networks \
A threshold secret sharing scheme for self-securing noisy mobile ad hoc networks \
Wireless and mobile network architectures /
An energy efficient mechanism for localisation in wireless sensor networks/
An Energy Efficient Routing Algorithm Using Chaotic Grey Wolf with Mobile Sink-Based Path Optimization for Wireless Sensor Networks /
Quality of service architectures for wireless networks performance metrics and management /
A steganography-based SMS and MMS services for secure messages exchange on mobile networks \
Residential mobility in Riyadh : a study in intraurban migration /
Mobile computing /
Computer systems and networks /
Communication networks : fundamental concepts and key architectures /
3G wireless networks /
ROBuST : RCOG operative birth simulation training : course manual /
Authority and the individual /
Library and information networks in the United Kingdom /
Principles of information security /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Development and performance analysis of hybrid IPSec SSL VPN technology \
Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /
Enhancement of IEEE 802.11 layer handoff process and protocol \
E-business /
E-Commerce systems architecture and applications
Electronic finance : a new approach to financial sector development? /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
The effects of time triggered Ethernet on the network \
AN INTRODUCTION TO OSI / INCHOLAS HEAP
Introduction to E-business : Management and strategy /
Design and analysis of computer communication networks /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Networking in easy steps /
Computer networks : principles, technologies, and protocols for network design /
Cumputer Networks Lab /
Making search work : implementing Web, intranet, and enterprise search /
Introduction to information systems /
Communication systems /
A Mobile Application for Technical Fault Reporting at Imam University /
Using information technology : a practical introduction to computers & communications : complete version /
Using information technology : a practical introduction to computers & communications /
Data communication principles : for fixed and wireless networks /
Collaborative Caching for Efficient and Robust Certificate Authority Services in Mobile Ad-Hoc Networks /
The impact of knowledge sharing enablers on knowledge sharing capability : an empirical study on Jordanian telecommunication firms= أثر العوامل المساعد لتبادل المعرفة علي إمكانية زيادة تبادل المعرفة : دراسة ميدانية على شركات الاتصالات الأردنية \
Computers, communications, and information : a user's introduction : core version /