Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Issues

Revista de Letras (UFC)
Pamukkale University Journal of Engineering Sciences
INMATEH - Agricultural Engineering
Animal Research International



Register Journal



Visitors Counter

TodayToday
525
YesterdayYesterday
2099
This weekThis week
9460
Last WeekLast week
9202
This monthThis month
30352
Last monthLast month
43360
All daysAll days
5806638

International Journal of Computer Networks and Applications

Number V-2-I-4, 2015

  • 158-164
    Dynamic Node Recovery in MANET for High Recovery Probability
    Authors: Ravneet Kaur, Dr. Neeraj Sharma
    Number of views: 329
  • 165-172
    Prioritized and Secured Data Dissemination Technique in VANET Based on Optimal Blowfish Algorithm and Signcryption Method
    Authors: M. Selvi, Dr. B. Ramakrishnan
    Number of views: 362
  • 173-178
    Adaptive Routing Protocol based on Cuckoo Search algorithm (ARP-CS) for secured Vehicular Ad hoc network (VANET)
    Authors: Dr. B. Ramakrishnan, S. R. Sreedivya, M. Selvi
    Number of views: 354
  • 179-187
    Security and Fraud Issues of E-banking
    Authors: Emad Abu-Shanab, Salam Matalqa
    Number of views: 393
  • 188-195
    The Provision of Information Technology Security Considerations by Legal Prescripts: South African Case
    Authors: Ntjatji Gosebo, Sipho Seepe
    Number of views: 319
  • 196-202
    Machine-to-Machine Communications for Smart Homes
    Authors: Resul Daş, Gurkan Tuna
    Number of views: 360

Number V-2-I-3, 2015

  • 114 - 123
    Abstracts Evaluation for Quality Assurance in Scientific Journal
    Authors: Eric Opoku Osei
    Number of views: 364
  • 124 - 134
    Design and Develop an Approach for Integrating Compression and Encryption on Textual Data
    Authors: Amit Jain, Avinash Panwar, Divya Bhatnagar
    Number of views: 459
  • 135 - 143
    Design and Simulation of Wireless Sensor Network Topologies Using the ZigBee Standard
    Authors: Sercan VANÇİN, Ebubekir ERDEM
    Number of views: 466
  • 144 - 150
    Task scheduling in Cloud Using Hybrid Cuckoo Algorithm
    Authors: Sumandeep Aujla, Amandeep Ummat
    Number of views: 410
  • 151 - 157
    Improved Signcryption Algorithm for Information Security in Networks
    Authors: R. Bhagavath Nishanth, Dr. B. Ramakrishnan, M. Selvi
    Number of views: 377

Number V-2-I-2, 2015

  • 41 - 45
    Security Concerns at Various Levels of Cloud Computing Paradigm: A Review
    Authors: Aarti Singh, Manisha Malhotra
    Number of views: 351
  • 52 - 56
    The Influence of Smart Phones on Human Health and Behavior: Jordanians’ Perceptions
    Authors: Emad Abu-Shanab, Eman Haddad
    Number of views: 444
  • 57 - 63
    Dynamic Transition of Bandwidth and Power Saving Mechanism to Support Multimedia Streaming Using H.264/SVC over the Wireless Networks
    Authors: G.Rohini, Dr. A.Srinivasan
    Number of views: 340
  • 64 - 75
    Public-Key Cryptography Techniques Evaluation
    Authors: Reham M. Abobeah, Mohamed M. Ezz, Hany M. Harb
    Number of views: 362
  • 76 - 83
    A Probabilistic Key Management Protocol based on Kryptograph for WSN
    Authors: Prachi
    Number of views: 329
  • 92 - 98
    Effect of Quarantine & Vaccination on Infectious Nodes in Computer Network
    Authors: Munna Kumar, Bimal Kumar Mishra, T. C. Panda
    Number of views: 442
  • 99 - 105
    Implementation of a Novel Protocol for Coordination of Nodes in Manet
    Authors: Poonam Mittal, Sanjay Batra, Dr. C.K.Nagpal
    Number of views: 351
  • 106 - 112
    A Study on 5G Evolution and Revolution
    Authors: Priya Goyal, Avtar Singh Buttar
    Number of views: 397
  • 113
    Editorial Offer Supportive Review to Fresh Authors
    Authors: Eric Opoku Osei
    Number of views: 331

Number V-2,I-6, 2015

  • 242-246
    Design and Implementation of a Smart Home for the Elderly and Disabled
    Authors: Resul Das, Gurkan Tuna, Ayse Tuna
    Number of views: 360
  • 247-253
    Wireless Sensor Network-Based Health Monitoring System for the Elderly and Disabled
    Authors: Gurkan Tuna, Resul Das, Ayse Tuna
    Number of views: 299
  • 254-260
    Comparative Study of Adaptive Filter Algorithm of a QO-STBC Encoded MIMO CDMA System
    Authors: Md. Shohidul Islam, Husnul Ajra
    Number of views: 328
  • 261-266
    Design and Implementation for SIP-based Push-to-Talk Services over 802.11 Networks
    Authors: Wen-Shiung Chen, Lili Hsieh, Ying-Neng Hsieh
    Number of views: 355
  • 267-273
    Time Based Fault Detection and Isolation In Wireless Sensors Network
    Authors: Imane Merzougui, Youssef Benabbassi
    Number of views: 348

Number V-2,I-5, 2015

  • 203-211
    A Survey on Potential Applications of Honeypot Technology in Intrusion Detection Systems
    Authors: Muhammet Baykara, Resul Daş
    Number of views: 309
  • 212-221
    A Fine-Grained Spatial Cloaking With Query Probability Levels for Privacy in LBS
    Authors: Albelaihy Abdullah, Jonathan Cazalas
    Number of views: 290
  • 222-231
    Efficient Collaborative Technique using Intrusion Detection System for Preserving Privacy in Location-based Services
    Authors: Muhammad Jawad Ikram, Jonathan Cazalas
    Number of views: 309
  • 232-241
    Application of Modified ACO Meta heuristic in Spray and Wait Routing
    Authors: Vinuraj.R, Sweta Jain
    Number of views: 295


1 2  Следующая страница  В конец
© 2013-2024, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us