EconPapers    
Economics at your fingertips  
 

International Journal of Networking and Virtual Organisations

2002 - 2025

From Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 20, issue 4, 2019

Stochastic demand side management in smart grid system pp. 319-339 Downloads
Manish Kumar and Cherian Samuel
PTRE: a probabilistic two-phase replication elimination policy in large-scale distributed storage platforms pp. 340-355 Downloads
Ning Han and Dongbo Liu
Topology-aware approach for reducing power consumption in backbone networks pp. 356-376 Downloads
Mohammed Hussein and Abdallatif Abu-Issa
(De)Mystifying the information and communication technology business model concept pp. 377-399 Downloads
Trevor Clohessy, Thomas Acton and Lorraine Morgan
Mobile learning adoption in Jordan: technology influencing factors pp. 400-417 Downloads
Mohammad K. Al-Nawayseh, Aladdin Hussein Baarah, Sultan A. Al-Masaeed and Mohammad M. Alnabhan

Volume 20, issue 3, 2019

Driving factors of digital strategic actions in competitive dynamics pp. 195-214 Downloads
LeWei Hu, Jing Zhao, Jiao Huang and Yajing Li
Study on core essential elements for O2O business model with value net theory pp. 215-244 Downloads
Jiang Ping Wan, Ya Hui Zhu and Qiao Wen Jiang
Motivation, governance, efficacy and contribution: a social practice model of commons-based peer production pp. 245-264 Downloads
Rong Wang
A novel QoS negotiation model based on intelligent learning technique in clouds pp. 265-283 Downloads
Dongbo Liu and Yongjian Li
A novel scheduling algorithm for data-intensive workflow in virtualised clouds pp. 284-300 Downloads
Feng Li
An efficient replication scheme based on living-replicas estimation for distributed storage platforms pp. 301-317 Downloads
Ying Hu

Volume 20, issue 2, 2019

Privacy-invading mechanisms in e-commerce - a case study on German tourism websites pp. 105-126 Downloads
Tatiana Ermakova, Anke Hohensee, Ines Orlamünde and Benjamin Fabian
An efficient adaptive genetic algorithm technique to improve the neural network performance with aid of adaptive GA operators pp. 127-142 Downloads
Katha Kishor Kumar and Suresh Pabboju
A survey on data stream, big data and real-time pp. 143-167 Downloads
Eliza H.A. Gomes, Patrícia D.M. Plentz, Carlos R. De Rolt and Mario A.R. Dantas
An adaptive redundant reservation admission in virtual cloud environment pp. 168-183 Downloads
Dongbo Liu and Yongjian Li
Energy efficient-dynamic and self-optimised routing in wireless sensor network based on ant colony optimisation pp. 184-194 Downloads
Arindam Debnath and Mrinal Kanti Debbarma

Volume 20, issue 1, 2019

The measurement of gas solid two-phase flow parameters based on electrical capacitance tomography technology pp. 1-13 Downloads
Haijun Tian, Yunlong Zhou, Ting Yang and Yanghui Zhao
IT-enabled inter-organisational relationships and collaborative innovation: integration of IT design and relationships governance pp. 14-34 Downloads
Fei Wang, Jing Zhao and LeWei Hu
Construction of distance teaching platform based on mobile communication technology pp. 35-43 Downloads
Hongxia Li
Prediction in mobile ad hoc network based on fuzzy time series pp. 44-52 Downloads
Chunyu Yang
Priority-based bandwidth allocation and load balancing for multipath IP networks pp. 53-72 Downloads
V. Rekha and M. Indiramma
Adaptive priority-based fair-resource allocation for MIMO-OFDM multicast networks pp. 73-89 Downloads
Voruganti Hindumathi and Katta Rama Linga Reddy
A novel replication scheme based on prediction technology in virtual P2P storage platform pp. 90-103 Downloads
Peng Xiao and Tienan Zhang

Volume 19, issue 2/3/4, 2018

A full-featured efficient clustering mechanism for improving QoS in MANETs pp. 105-132 Downloads
Gatete Marcel and A. Kovalan
ASD: emotions and behavioural-based interventions through social sensor networks pp. 133-152 Downloads
Uwizeyimana Faustin, A. Kovalan and Rajkumar Kannan
Malicious node identification routing and protection mechanism for vehicular ad-hoc network against various attacks pp. 153-175 Downloads
Zaid A. Abdulkader, Azizol Abdullah, Mohd Taufik Abdullah and Zuriati Ahmad Zukarnain
Relay node selection with energy efficient routing using hidden Markov model in wireless sensor networks pp. 176-186 Downloads
J. Martin Sahayaraj and J.M. Ganaseakar
Network lifetime estimation of wireless sensor networks using communication protocols with non-parametric models pp. 187-195 Downloads
Govindarajan Saravanan and M.J.S. Rangachar
Combined vibration and RF harvester technique for energy management in sensor device pp. 196-208 Downloads
C. Padmavathy, L.S. Jayashree and A. Rosario
DTCF: deadline task consolidation first for energy minimisation in cloud data centres pp. 209-233 Downloads
P. Sanjeevi and P. Viswanathan
SIP-based VoIP anomaly detection engine using DTV and ONR pp. 234-256 Downloads
Saira Banu and K.M. Mehata
Classifying the malware application in the Android-based smart phones using ensemble-ANFIS algorithm pp. 257-269 Downloads
B.P. Sreejith Vignesh and M. Rajesh Babu
Hybrid model for enhancement of passenger information management system pp. 270-288 Downloads
Munir Kolapo Yahya-Imam, Sellappan Palaniappan and Seyed Mohammadreza Ghadiri
Energy-based efficient authenticated routing protocol for MANETs for DDOS attacks with minimised power consumption pp. 289-304 Downloads
M. Savithri and M. Rajesh Babu
Energy aware clustered load balancing in cloud computing environment pp. 305-320 Downloads
K.R. Remesh Babu and Philip Samuel
Semantic clustering approach for documents in distributed system framework with multi-node setup pp. 321-340 Downloads
R. Priyadarshini and Latha Tamilselvan
Research on the intellectual traffic flow control system based on multi-agent along with self-governing vehicle and system of wireless sensor network pp. 341-356 Downloads
Chengtao Cao
A novel framework for very high resolution remote sensing image change detection pp. 357-372 Downloads
Jie Li, Ning Sun and Jianlong Zhang
Certain investigations on effective rate adaptation in cognitive radio with channel characteristics pp. 373-384 Downloads
B. Suseela and D. Sivakumar
A secure communication over wireless sensor devices using intelligent arrival estimation algorithm pp. 385-394 Downloads
J. Vijitha Ananthi, H. James Deva Koresh, S. Vengatesan and Y. Blessina Anet Glorita

Volume 19, issue 1, 2018

Contemporary digital business model decision making: a cloud computing supply-side perspective pp. 1-20 Downloads
Trevor Clohessy, Thomas Acton and Lorraine Morgan
Smart phones and surgeons: privacy and legal issues in Australian healthcare pp. 21-33 Downloads
Victoria Garwood, Damian Claydon-Platt, Nilmini Wickramasinghe, John Mackay and Philip J. Smart
Location-based clustering and collaborative filtering for mobile learning pp. 34-49 Downloads
Mohammad M. Alnabhan
Cloud computing security: attacks, threats, risk and solutions pp. 50-71 Downloads
Shweta Kaushik and Charu Gandhi
Research on network design and analysis of TGO topology pp. 72-86 Downloads
Shanmuk Srinivas Amiripalli and Veeramallu Bobba
A multi-policy adaptive scheduling framework in virtual clouds pp. 87-102 Downloads
Changsong Liu

Volume 18, issue 4, 2018

Ant-based self-healing routing for enhancing lifetime of wireless sensor networks pp. 265-278 Downloads
Chaganti B.N. Lakshmi and S. Krishna Mohan Rao
A novel virtual machine scheduling policy based on performance prediction model pp. 279-293 Downloads
Dongbo Liu and Yongjian Li
An accuracy-enhanced cost model for virtual machine migration pp. 294-306 Downloads
Tienan Zhang
Improving scheduling efficiency by probabilistic execution time model in cloud environments pp. 307-322 Downloads
Peng Xiao, Dongbo Liu and Kaijian Liang
Fuzzy logic-based optimised algorithm for mobility robustness and load-balancing in LTE/4G networks pp. 323-337 Downloads
Tanu Goyal, Sakshi Kaushal and Arun Kumar Sangaiah
Optimal neural network to enhance classification accuracy for mining online reviews and opinions using improved PSO pp. 338-356 Downloads
B. Dhanalakshmi and Arumugam Chandra Sekar

Volume 18, issue 3, 2018

Mobility aware MAC protocol for providing energy efficiency and stability in mobile WSN pp. 183-195 Downloads
G. Lakshmi Vara Prasad, T. Nalini and Rajendran Sugumar
EVRC: an economic-based virtual resource co-allocation middleware for clouds pp. 196-210 Downloads
Tienan Zhang
Fuzzy-based trusted security for mobile grid systems pp. 211-226 Downloads
Kavitha Bharathi Shanmugam and S. Vengataasalam
Does social networking ultimately sustain organisational performance? pp. 227-245 Downloads
Lobel Trong-Thuy Tran and Wan-Tran Huang
Adaptive modulation and interference cancellation techniques for MIMO-OFDM wireless networks pp. 246-264 Downloads
Ali Mundeth Ahmed and Erakkath Abdu Jasmin

Volume 18, issue 2, 2018

A lightweight mutual authentication approach for RFID tags in IoT devices pp. 97-111 Downloads
Aakanksha Tewari and B.B. Gupta
Parallel AES algorithm for performance improvement in data analytics security for IoT pp. 112-129 Downloads
Narayanan Manikandan and Srinivasan Subha
Particle swarm optimisation-based DWT for symbol detection in MIMO-OFDM system pp. 130-143 Downloads
Asma Bouhlel, Anis Sakly and Mohamed Nejib Mansouri
Optimal cluster head selection framework to support energy aware routing protocols of wireless sensor network pp. 144-165 Downloads
Achyut Shankar and N. Jaisankar
An energy-efficient frequency scaling technique for virtualised memory in clouds pp. 166-181 Downloads
Peng Xiao and Yuan Tian

Volume 18, issue 1, 2018

The co-evolution of IT competence, organisational agility and entrepreneurial action: a case study of entrepreneurial e-tailers pp. 1-29 Downloads
Shan Wang, Youwei Wang and Norm Archer
Data analysis to uncover critical parameters for performance appraisal of students in higher education pp. 30-50 Downloads
Raju Ranjan and Jayanthi Ranjan
Examining users' switch from online banking to mobile banking pp. 51-66 Downloads
Tao Zhou
Virtual resource pricing scheme in cloud platforms pp. 67-79 Downloads
Ying Hu and Ze Xiao
The application of analytic hierarchy process and fuzzy comprehensive evaluation in the evaluation of ecological security in coal mine areas pp. 80-96 Downloads
Xiaoling Ke, Min Feng and Meng Xiang
Page updated 2025-04-16