Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Issues

Prohominum
Journal of World's Poultry Research
Journal of Baltic Science Education
International Journal of Ayurveda and Pharmaceutical Chemistry



Register Journal



Visitors Counter

TodayToday
1617
YesterdayYesterday
1659
This weekThis week
3276
Last WeekLast week
9202
This monthThis month
24168
Last monthLast month
43360
All daysAll days
5800454

International Journal of Advanced Networking and Applications

Number Vol7(3), 2015

  • 2719-2723
    Exploring Web of Things with Embedded Devices
    Authors: Tanmoy Sarkar, Niva Das
    Number of views: 345
  • 2724-2735
    Content Based Image Retrieval Based on Color: A Survey
    Authors: Mussarat Yasmin, Muhammad Sharif, Muhammad Alyas Shahid
    Number of views: 331
  • 2736-2740
    Pervasive Computing Based Intelligent Energy Conservation System
    Authors: Dr. A.Kanagaraj, Ms S.Sharmila
    Number of views: 317
  • 2741-2751
    QoS-Aware Data Replication in Hadoop Distributed File System
    Authors: Dr. Sunita Varma, Ms. Gopi Khatri,
    Number of views: 370
  • 2752-2755
    Disseminating Traffic Information in Vehicular Networks
    Authors: Muhammad Alyas Shahid, Aisha Azeem
    Number of views: 370
  • 2756-2760
    An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3
    Authors: Dr. P. Sumathi, Dr. Saroj Patel, Prabhakaran
    Number of views: 307
  • 2761-2770
    A Survey on Spectrum-Map Based on Normal Opportunistic Routing Methods for Cognitive Radio Ad Hoc Networks
    Authors: Hesham Mohammed Ali Abdullah, Dr.A.V.Senthil Kumar
    Number of views: 308
  • 2771-2778
    Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2NI) in Mobile Ad Hoc Networks
    Authors: Dr. Anuradha Banerjee, Dr. Paramartha Dutta
    Number of views: 298
  • 2779-2783
    Effects of Security and Privacy Concerns on using of Cloud Services in Energy Industry, an Oil and Gas Company: A Case Study
    Authors: Alireza Poorebrahimi, Fatemeh SoleimaniRoozbahani
    Number of views: 309
  • 2784-2789
    An Elitist Simulated Annealing Algorithm for Solving Multi Objective Optimization Problems in Internet of Things Design
    Authors: Subhamoy Chakraborti, Sugata Sanyal
    Number of views: 321

Number Vol7(2) , 2015

  • 2640-2649
    The Role of E-Payment Tools and E-Banking in Customer Satisfaction Case Study: Pasargad Bank E-Payment Company
    Authors: Fatemeh Soleimani Roozbahani, Sanaz Nikghadam Hojjati, Reihaneh Azad
    Number of views: 361
  • 2650-2657
    Comparative Study of Spatial Domain Image Steganography Techniques
    Authors: Rejani. R, Dr. D. Murugan, Deepu.V.Krishnan
    Number of views: 352
  • 2658-2665
    The Concept of Authenticity in Philosophy of Sartre and Implications for Using Internet as Educational Technology
    Authors: Dr. Roohollah Mozaffaripour, Dr. Saeid Zarghami Hamrah
    Number of views: 1621
  • 2666-2673
    Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad Hoc Networks: DSR, AODV, AOMDV, TORA
    Authors: S.Nagalakshmi, Dr.Rakesh Poonia, Shilpa Biradar
    Number of views: 309
  • 2674-2681
    Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless Sensor Network
    Authors: S.Sumitha Pandit, Dr.B.Kalpana
    Number of views: 303
  • 2682-2689
    A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed System
    Authors: Sudha, Nisha
    Number of views: 287
  • 2690-2693
    SDN and Mininet: Some Basic Concepts
    Authors: Pooja, Manu Sood
    Number of views: 353
  • 2694-2699
    MULTI-STAGE ENCRYPTION USING SEEDED SDES
    Authors: Dr.S.Kiran, R. Pradeep Kumar Reddy, J.Venkata Sivajaya Sree, D.Naga Sravanthi
    Number of views: 312
  • 2700-2704
    Effective Access Point Selection for improving Throughput in Wireless LAN
    Authors: K.Sireesha, C. Shoba Bindu
    Number of views: 279
  • 2705-2718
    Glaucoma Detection in Retinal Images Using Image Processing Techniques: A Survey
    Authors: Imran Qureshi
    Number of views: 527

Number Vol7 (1 ), 2015

  • 2576-2581
    Security Solutions against Computer Networks Threats
    Authors: Fatemeh Soleimani Roozbahani, Reihaneh Azad
    Number of views: 324
  • 2582-2592
    Routing Optimization with Load Balancing: an Energy Efficient Approach
    Authors: S. Prabhavathi, Dr. A. Subramanyam, Dr. A. Ananda Rao
    Number of views: 295
  • 2593-2605
    Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication Networks
    Authors: Vikas Solanki, M. Qasim Rafiq
    Number of views: 321
  • 2606-2610
    Significant Data Hiding through Discrete Wavelet Transformation Approach
    Authors: Premal B. Nirpal, Ganesh M. Magar
    Number of views: 316
  • 2611-2615
    An Adaptive Cluster Based Routing Protocol for WSN
    Authors: Raghunandan G H, Navyashree R, Jagadish S , Arshiya Farheen
    Number of views: 308
  • 2616-2621
    The use of Monte Carlo simulation in quantitative risk assessment of IT projects
    Authors: Sanaz Nikghadam Hojjati, Nasibeh Rahbar Noudehi
    Number of views: 328
  • 2622-2625
    Monitoring in IOT enabled devices
    Authors: Udit Gupta
    Number of views: 304
  • 2626-2629
    Classification of cloud types for rainfall forecasting
    Authors: Niyati Salot, Dr. Priya R. Swaminarayan
    Number of views: 335
  • 2630-2635
    Distributed Computing: An Overview
    Authors: Md. Firoj Ali, Rafiqul Zaman Khan
    Number of views: 610
  • 2636-2639
    Secure management of logs in internet of things
    Authors: Udit Gupta
    Number of views: 303

Number V6-I6,May, 2015

  • 2503-2519
    Evaluation of Factors Influencing Internet Banking Acceptance by Internet Users in Iran
    Authors: Sanaz Nikghadam Hojjati, Abbas Monavvarian, Fatemeh Soleimani Roozbahani
    Number of views: 367
  • 2520-2528
    Fuzzy System Model for Management of Driver Distractions in Motor Vehicles
    Authors: Adnan Shaout and Dominic Colella
    Number of views: 292
  • 2529-2532
    Performance Evaluation of Source Routing over MPLS Networks for Failure Detection and Recovery
    Authors: AamaniNemtur, Mohamed El-Sharkawy and Maher Rizkalla
    Number of views: 336
  • 2533-2541
    Cooperative Spatial Decision Support System for Controlling Animal Diseases Outbreaks in Egypt
    Authors: Mahmoud Bakr, Mona Nasr, Maryam Hazman
    Number of views: 269
  • 2542-2548
    Review of Some Checkpointing Schemes for Distributed and Mobile Computing Environments
    Authors: Mr Raman Kumar, Dr Parveen Kumar
    Number of views: 300
  • 2549-2555
    SAFETY: A Framework for Secure IaaS Clouds
    Authors: Vivek Shrivastava, D. S. Bhilare
    Number of views: 319
  • 2556-2558
    A Review on Speech Corpus Development for Automatic Speech Recognition in Indian Languages
    Authors: Cini kurian
    Number of views: 465
  • 2559-2562
    An Efficient and Secure ID Based Group Signature Scheme from Bilinear Pairings
    Authors: Pankaj Sarde, Amitabh Banerjee
    Number of views: 311
  • 2563-2572
    Software Project Documentation - An Essence of Software Development
    Authors: Vikas S. Choma, Dr. Jatinderkumar R. Saini
    Number of views: 812
  • 2573-2575
    Image Fusion with Contrast Enhancement Using DWT & SVD
    Authors: ASHISHGOUD PURUSHOTHAM (M.Tech.), G.USHA RANI (M.Tech.) , SAMIHA NAIK
    Number of views: 279

Number V6-I5, Mar, 2015

  • 2435-2439
    Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
    Authors: YaFang Liu, HaiPeng Qu
    Number of views: 341
  • 2440-2445
    Application Security framework for Mobile App Development in Enterprise Setup
    Authors: Subhamoy Chakraborti, D. P. Acharjya, Sugata Sanyal
    Number of views: 321
  • 2446-2451
    Energy Optimized Link Selection Algorithm for Mobile Cloud Computing
    Authors: K.Ravindranath, Dr. K.Rajasekhara Rao
    Number of views: 303
  • 2452-2454
    An Introduction of E-learning based on Social Networks
    Authors: K.M. Aslam Uddin, Moha. Yusuf harun Khan
    Number of views: 290
  • 2455-2459
    Detection of malicious attacks by Meta classification algorithms
    Authors: G.Michael, A.Kumaravel, A.Chandrasekar
    Number of views: 323
  • 2460-2463
    Heuristic Algorithm using Internet of Things and Mobility for solving demographic issues in Financial Inclusion projects
    Authors: Subhamoy Chakraborti, Sugata Sanyal
    Number of views: 341
  • 2464-2467
    An Adaptive Data Hiding Scheme for Domain Based Secret Data in Random Order to Increase Steganography Using IWT
    Authors: R. Indra Gandhi, Dr. K. P. Kaliyamurthie
    Number of views: 306
  • 2468-2474
    Comparison and Security App of ANDROID OS using different versions: an Overview
    Authors: Javeria Amin
    Number of views: 358
  • 2475-2478
    Two Factor Authentications Using One Time Random Password for Secure Online Transaction
    Authors: G.Umamaheswari, Dr.A.Kangaiammal, K.K.Kavitha
    Number of views: 307
  • 2479-2483
    Survey of Operating Systems for the IoT Environment
    Authors: Tuhin Borgohain, Uday Kumar, Sugata Sanyal
    Number of views: 352
  • 2484-2486
    Internet of Things (IoT) Applicability in a Metropolitan City
    Authors: Dr. D Mohammed
    Number of views: 345
  • 2487-2494
    EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING ENVIRONMENT
    Authors: Sunil Kr Singh, Anuj Aggarwal, Kavneet Kaur
    Number of views: 359
  • 2495-2502
    Applications of Pattern Recognition Algorithms in Agriculture: A Review
    Authors: M. P. Raj, P. R. Swaminarayan, J. R. Saini, D. K. Parmar
    Number of views: 407


1 2  Следующая страница  В конец
© 2013-2024, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us