<?xml version="1.0" encoding="utf-8"?>
<!--  RSS generated by phpcms.cn RSS Builder [2026-04-29 11:31:01]  --> 
<rss version="2.0" xmlns:im="http://purl.org/rss/1.0/item-images/" xmlns:dc="http://purl.org/dc/elements/1.1/" >
<channel>
<pubDate>Wed, 29 Apr 2026 11:31:01 +0800</pubDate>
<lastBuildDate>Wed, 29 Apr 2026 11:31:01 +0800</lastBuildDate>
<docs>http://www.lnit.org</docs>
<link>http://www.lnit.org</link>
<title>Volume 1, No. 2, June 2013</title>
<image>
<title>Volume 1, No. 2, June 2013</title>
<url><![CDATA[http://www.lnit.org/uploadfile/2013/0510/20130510025104378.pdf]]></url>
<link>http://www.lnit.org</link>
</image>
<webMaster>http://www.lnit.org</webMaster>
<generator>http://www.lnit.org</generator>
<ttl>60</ttl>
<dc:creator>http://www.lnit.org</dc:creator>
<dc:date>Wed, 29 Apr 2026 11:31:01 +0800</dc:date>
<item>
<title><![CDATA[Current Trends, Characteristics, Challenges and Future of P2P]]></title>
<link><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=31&id=33]]></link>
<description><![CDATA[Abstract&mdash;Peer to peer (P2P) network is an approach of connecting computers in such a way that all connected com   ]]></description>
<pubDate>2013-05-10 18:05:56</pubDate>
<guid><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=31&id=33]]></guid>
<author>http://www.lnit.org</author>
</item>
<item>
<title><![CDATA[Vehicle Adhoc Sensor Network Framework to Provide Green Communication for Urban Operation Rescue]]></title>
<link><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=31&id=32]]></link>
<description><![CDATA[Abstract&mdash;The use of wireless technology based on vehicle ad hoc network and wireless sensor network may give opp   ]]></description>
<pubDate>2013-05-10 18:02:26</pubDate>
<guid><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=31&id=32]]></guid>
<author>http://www.lnit.org</author>
</item>
<item>
<title><![CDATA[High Dimension Space Time Adaptive Processing Based on FFT]]></title>
<link><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=31&id=31]]></link>
<description><![CDATA[Abstract&mdash;One of the advantages of the joint space time adaptive processing technique is that the freedom degree    ]]></description>
<pubDate>2013-05-10 17:55:59</pubDate>
<guid><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=31&id=31]]></guid>
<author>http://www.lnit.org</author>
</item>
<item>
<title><![CDATA[Multi-Pattern Boyer-Moore - Horspool Algorithm based Hashing Function for Intrusion Detection System]]></title>
<link><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=31&id=30]]></link>
<description><![CDATA[Abstract&mdash;Every day the networks are expanding in very large scale and running in very high speed  The Intrusion   ]]></description>
<pubDate>2013-05-10 15:26:56</pubDate>
<guid><![CDATA[http://www.lnit.org/index.php?m=content&c=index&a=show&catid=31&id=30]]></guid>
<author>http://www.lnit.org</author>
</item>
</channel>
</rss>
