American Journal of Networks and Communications

Volume 5, Issue 1, February 2016

  • Aloha Based Resource Allocation Scheme to Efficient Call Holding Times in Public Safety Network

    Tuyatsetseg Badarch, Otgonbayar Bataa, Bat-Enkh Oyunbileg

    Issue: Volume 5, Issue 1-1, February 2016
    Pages: 1-5
    Received: 30 March 2015
    Accepted: 31 March 2015
    Published: 10 June 2015
    DOI: 10.11648/j.sjbm.s.2016050101.11
    Downloads:
    Views:
    This article belongs to the Special Issue Traffic and Performance Engineering for Networks
    Abstract: The allocation of limited resources such as links, servers, and agents to support as many as emergency call responses as possible while maintaining reasonable quality of service is a principal requirement in public safety networks. It is difficult to handle the highest priority emergency call responses for a congested period with a limited number o... Show More
  • On Basic Frequency and Harmony Parameters with Different Frequencies of Mongolian Traditional Musical Instruments

    Bat-Enkh Oyunbileg, Baatarkhuu Tsagaan, Chuluuntsetseg Jamyaan, Tuyatsetseg Badarch, Battugs Oyunbileg

    Issue: Volume 5, Issue 1-1, February 2016
    Pages: 6-9
    Received: 27 April 2015
    Accepted: 29 April 2015
    Published: 10 June 2015
    DOI: 10.11648/j.sjbm.s.2016050101.12
    Downloads:
    Views:
    This article belongs to the Special Issue Traffic and Performance Engineering for Networks
    Abstract: An instrument is a device that measures and/or regulates physical quantity/ process variables as flow, temperature, level, or pressure. Instruments include many varied contrivance that can be as simple as valves and transmitters, and as complex as analyzers. We are determining Mongolian basic five instruments’ electrical parameters, such as frequen... Show More
  • Results of Simulation Program for Pathological Index relating the Climate Factors

    Javzmaa Tsend, Bat-Enkh Oyunbileg, Ajnai Luvsan, S. Battulga

    Issue: Volume 5, Issue 1-1, February 2016
    Pages: 10-13
    Received: 28 April 2015
    Accepted: 29 April 2015
    Published: 18 June 2015
    DOI: 10.11648/j.sjbm.s.2016050101.13
    Downloads:
    Views:
    This article belongs to the Special Issue Traffic and Performance Engineering for Networks
    Abstract: To protect and prevent human health, this study calculated pathological index using weather factors such as air average temperature, average wind speed, average relative humidity and air pressure at days between 2004 and 2014 in Ulaanbaatar city of Mongolia. Then, we developed software program that calculates above mentioned pathology index, statis... Show More
  • Optimization Algorithm of Resource Allocation IEEE802.16m for Mobile WiMAX

    Bat-Enkh Oyunbileg, Otgonbayar Bataa, Tuyatsetseg Badarch, Baatarkhuu Tsagaan

    Issue: Volume 5, Issue 1-1, February 2016
    Pages: 14-19
    Received: 27 April 2015
    Accepted: 29 April 2015
    Published: 30 June 2015
    DOI: 10.11648/j.sjbm.s.2016050101.14
    Downloads:
    Views:
    This article belongs to the Special Issue Traffic and Performance Engineering for Networks
    Abstract: Multi user resource allocation is one of the key features towards high speed wireless network based on Orthogonal Frequency Division Multiplexing Access (OFDMA). According to IEEE802.16m (Mobile WiMAX) standard resource allocation problem has to be performed on a frequency and time two-dimensional space with the Physical and logical resource units ... Show More
  • A Malware Analysis Using Static and Dynamic Techniques

    Bymbadorj Dondogmegd, Usukhbayr B., Nyamjav J.

    Issue: Volume 5, Issue 1-1, February 2016
    Pages: 20-22
    Received: 6 July 2015
    Accepted: 8 July 2015
    Published: 7 August 2015
    DOI: 10.11648/j.sjbm.s.2016050101.15
    Downloads:
    Views:
    This article belongs to the Special Issue Traffic and Performance Engineering for Networks
    Abstract: In this survey work we analyze “win 32 malware gen” it’s genre, procedure, harm using static and dynamic techniques. Static and dynamic methods were used to analyze a software program for any threats to the system. Static analysis involves testing its own source code and analyzing the threat itself, dynamic analysis involves specific secure, keepin... Show More