Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Shamimul Qamar

In this March 2010 issue, we present selected publications from the active research area of core and applied computer science, networking, information retrieval, information systems, emerging communication technologies and information... more
In this March 2010 issue, we present selected publications from the active research area of core and applied computer science, networking, information retrieval, information systems, emerging communication technologies and
information security. The paper acceptance rate for this issue is 32%. The journal covers the state-of-art issues in the computer science and their applications in business, industry and other subjects. Printed copies of the journal are distributed to accredited universities and libraries. All the papers in IJCSIS are also available freely with online full-text content and permanent worldwide web link. The abstracts are indexed and available at major academic databases.

https://sites.google.com/site/ijcsis/Home
Research Interests:
International Journal of Computer Science and Information Security (IJCSIS – established in 2009), has been at the forefront of new knowledge dissemination in research areas of computer science and applications, and advances in... more
International Journal of Computer Science and Information Security (IJCSIS – established in 2009), has been at the forefront of new knowledge dissemination in research areas of computer science and applications, and advances in information security. The journal themes focus on innovative developments, research challenges/solutions in computer science and related technologies. IJCSIS aims to be a high quality publication platform and encourages young scholars and as well as senior academicians globally to share their research output and findings in the fields of computer science. IJCSIS archives all publications in major academic/scientific databases; abstracting/indexing, editorial board and other important information are available online on homepage. https://sites.google.com/site/ijcsis/Home
Research Interests:
Initially TCP was designed with the notion in mind that wired networks are generally reliable and any segment loss in a transmission is due to congestion in the network rather than an unreliable medium (The assumptions is that the packet... more
Initially TCP was designed with the notion in mind that wired networks are generally reliable and any segment loss in a transmission is due to congestion in the network rather than an unreliable medium (The assumptions is that the packet loss caused by damage is much less than 1 percent) . This notion doesnt hold in wireless parts of the
We know that the CDMA (code division multiple access) technique can provide efficient multiple access to a large number of users but has the disadvantage that it requires a high bandwidth. It is also known that CDMA as a multiple access... more
We know that the CDMA (code division multiple access) technique can provide efficient multiple access to a large number of users but has the disadvantage that it requires a high bandwidth. It is also known that CDMA as a multiple access method could be combined with any desired modulation technique. An interesting question is what would be the result of
Research Interests:
... Sugam Sharma1, SB Goyal2, and Shamimul Qamar3 Department of Computer Science, Iowa State University1, USA Department of Computer Science, Manav Rachna International University2, INDIA Department of Information Technology, SRM... more
... Sugam Sharma1, SB Goyal2, and Shamimul Qamar3 Department of Computer Science, Iowa State University1, USA Department of Computer Science, Manav Rachna International University2, INDIA Department of Information Technology, SRM University3, INDIA sugam.k ...