Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Issues

Animal Research International
Perspectiva Teológica
Revista dos Estudantes de Direito da UnB
Journal of Entrepreneurship, Business and Economics



Register Journal



Visitors Counter

TodayToday
996
YesterdayYesterday
2118
This weekThis week
10522
Last WeekLast week
13850
This monthThis month
7017
Last monthLast month
50787
All daysAll days
5834090

International Journal of Advanced Networking and Applications

Number Vol7 (1 ), 2015

  • 2576-2581
    Security Solutions against Computer Networks Threats
    Authors: Fatemeh Soleimani Roozbahani, Reihaneh Azad
    Number of views: 327
  • 2582-2592
    Routing Optimization with Load Balancing: an Energy Efficient Approach
    Authors: S. Prabhavathi, Dr. A. Subramanyam, Dr. A. Ananda Rao
    Number of views: 298
  • 2593-2605
    Managing Instantly Dense Hot Spot Regions in Wireless Cellular Communication Networks
    Authors: Vikas Solanki, M. Qasim Rafiq
    Number of views: 325
  • 2606-2610
    Significant Data Hiding through Discrete Wavelet Transformation Approach
    Authors: Premal B. Nirpal, Ganesh M. Magar
    Number of views: 319
  • 2611-2615
    An Adaptive Cluster Based Routing Protocol for WSN
    Authors: Raghunandan G H, Navyashree R, Jagadish S , Arshiya Farheen
    Number of views: 311
  • 2616-2621
    The use of Monte Carlo simulation in quantitative risk assessment of IT projects
    Authors: Sanaz Nikghadam Hojjati, Nasibeh Rahbar Noudehi
    Number of views: 331
  • 2622-2625
    Monitoring in IOT enabled devices
    Authors: Udit Gupta
    Number of views: 307
  • 2626-2629
    Classification of cloud types for rainfall forecasting
    Authors: Niyati Salot, Dr. Priya R. Swaminarayan
    Number of views: 339
  • 2630-2635
    Distributed Computing: An Overview
    Authors: Md. Firoj Ali, Rafiqul Zaman Khan
    Number of views: 616
  • 2636-2639
    Secure management of logs in internet of things
    Authors: Udit Gupta
    Number of views: 306

Number V6-I6,May, 2015

  • 2503-2519
    Evaluation of Factors Influencing Internet Banking Acceptance by Internet Users in Iran
    Authors: Sanaz Nikghadam Hojjati, Abbas Monavvarian, Fatemeh Soleimani Roozbahani
    Number of views: 371
  • 2520-2528
    Fuzzy System Model for Management of Driver Distractions in Motor Vehicles
    Authors: Adnan Shaout and Dominic Colella
    Number of views: 296
  • 2529-2532
    Performance Evaluation of Source Routing over MPLS Networks for Failure Detection and Recovery
    Authors: AamaniNemtur, Mohamed El-Sharkawy and Maher Rizkalla
    Number of views: 338
  • 2533-2541
    Cooperative Spatial Decision Support System for Controlling Animal Diseases Outbreaks in Egypt
    Authors: Mahmoud Bakr, Mona Nasr, Maryam Hazman
    Number of views: 271
  • 2542-2548
    Review of Some Checkpointing Schemes for Distributed and Mobile Computing Environments
    Authors: Mr Raman Kumar, Dr Parveen Kumar
    Number of views: 305
  • 2549-2555
    SAFETY: A Framework for Secure IaaS Clouds
    Authors: Vivek Shrivastava, D. S. Bhilare
    Number of views: 326
  • 2556-2558
    A Review on Speech Corpus Development for Automatic Speech Recognition in Indian Languages
    Authors: Cini kurian
    Number of views: 470
  • 2559-2562
    An Efficient and Secure ID Based Group Signature Scheme from Bilinear Pairings
    Authors: Pankaj Sarde, Amitabh Banerjee
    Number of views: 316
  • 2563-2572
    Software Project Documentation - An Essence of Software Development
    Authors: Vikas S. Choma, Dr. Jatinderkumar R. Saini
    Number of views: 816
  • 2573-2575
    Image Fusion with Contrast Enhancement Using DWT & SVD
    Authors: ASHISHGOUD PURUSHOTHAM (M.Tech.), G.USHA RANI (M.Tech.) , SAMIHA NAIK
    Number of views: 282

Number V6-I5, Mar, 2015

  • 2435-2439
    Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks
    Authors: YaFang Liu, HaiPeng Qu
    Number of views: 345
  • 2440-2445
    Application Security framework for Mobile App Development in Enterprise Setup
    Authors: Subhamoy Chakraborti, D. P. Acharjya, Sugata Sanyal
    Number of views: 324
  • 2446-2451
    Energy Optimized Link Selection Algorithm for Mobile Cloud Computing
    Authors: K.Ravindranath, Dr. K.Rajasekhara Rao
    Number of views: 307
  • 2452-2454
    An Introduction of E-learning based on Social Networks
    Authors: K.M. Aslam Uddin, Moha. Yusuf harun Khan
    Number of views: 294
  • 2455-2459
    Detection of malicious attacks by Meta classification algorithms
    Authors: G.Michael, A.Kumaravel, A.Chandrasekar
    Number of views: 328
  • 2460-2463
    Heuristic Algorithm using Internet of Things and Mobility for solving demographic issues in Financial Inclusion projects
    Authors: Subhamoy Chakraborti, Sugata Sanyal
    Number of views: 349
  • 2464-2467
    An Adaptive Data Hiding Scheme for Domain Based Secret Data in Random Order to Increase Steganography Using IWT
    Authors: R. Indra Gandhi, Dr. K. P. Kaliyamurthie
    Number of views: 309
  • 2468-2474
    Comparison and Security App of ANDROID OS using different versions: an Overview
    Authors: Javeria Amin
    Number of views: 363
  • 2475-2478
    Two Factor Authentications Using One Time Random Password for Secure Online Transaction
    Authors: G.Umamaheswari, Dr.A.Kangaiammal, K.K.Kavitha
    Number of views: 310
  • 2479-2483
    Survey of Operating Systems for the IoT Environment
    Authors: Tuhin Borgohain, Uday Kumar, Sugata Sanyal
    Number of views: 358
  • 2484-2486
    Internet of Things (IoT) Applicability in a Metropolitan City
    Authors: Dr. D Mohammed
    Number of views: 349
  • 2487-2494
    EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING ENVIRONMENT
    Authors: Sunil Kr Singh, Anuj Aggarwal, Kavneet Kaur
    Number of views: 364
  • 2495-2502
    Applications of Pattern Recognition Algorithms in Agriculture: A Review
    Authors: M. P. Raj, P. R. Swaminarayan, J. R. Saini, D. K. Parmar
    Number of views: 412

Number V6-I4, Jan, 2015

  • 2359-2366
    Exploring the Feasibility of Adopting Cloud Computing in Computer Center Taiz University
    Authors: Mohammed A.M. Ibrahim, Alsabry, Fatimah, Ameen
    Number of views: 390
  • 2367-2371
    An Approach for Customer Satisfaction: Evaluation, Validation and Modeling By A Markov Chain
    Authors: Amina EL KEBBAJ, Abdelwahed NAMIR
    Number of views: 323
  • 2372-2378
    Survey of Security and Privacy Issues of Internet of Things
    Authors: TuhinBorgohain, Uday Kumar, Sugata Sanyal
    Number of views: 324
  • 2379-2385
    An Overview: Treatment of Lung Cancer on Researcher Point of View
    Authors: Javeria Amin
    Number of views: 326
  • 2386-2392
    Survey: Biological Inspired Computing in the Network Security
    Authors: V Venkata Ramana, Y.Subba Reddy, G.Rama Subba Reddy, Dr.Pandurangan Ravi
    Number of views: 299
  • 2393-2397
    Face Recognition Techniques - An evaluation Study
    Authors: Dr.Asmahan M Altaher
    Number of views: 317
  • 2398-2403
    Mobile Web Browsing Based On Content Preserving With Reduced Cost
    Authors: Dr.N.Saravanaselvam, Dr.K.Rajangam, Ms.L.Dhanam, Ms.Anuradha Balasubramanian
    Number of views: 295
  • 2404-2408
    Nuzzer algorithm based Human Tracking and Security System for Device-Free Passive System in Smart Phones Environment
    Authors: R.Ranjani, R.Devi, M.Kalaimani
    Number of views: 295
  • 2409-2413
    Improved EPRCA Congestion Control Scheme for ATM Networks
    Authors: Dr. M.Sreenivasulu
    Number of views: 327
  • 2414-2421
    A Brief Study on Different Intrusions and Machine Learning-based Anomaly Detection Methods in Wireless Sensor Networks
    Authors: J. Saranya, Dr.G.Padmavathi
    Number of views: 328
  • 2422-2426
    Authentication Systems in Internet of Things
    Authors: Tuhin Borgohain, Amardeep Borgohain, Uday Kumar, Sugata Sanyal
    Number of views: 287
  • 2427-2434
    Review of Considerations for Mobile Device based Secure Access to Financial Services and Risk Handling Strategy for CIOs, CISOs and CTOs
    Authors: Amal Saha, Amal Saha
    Number of views: 311

Number Vol06-2Sep, 2014

  • 2202-2208
    Application Layer Intrusion Detection with Combination of Explicit-Rule-Based and Machine Learning Algorithms and Deployment in Cyber- Defence Program
    Authors: Amal Saha, Sugata Sanyal
    Number of views: 334
  • 2209-2213
    Investigation and application of Personalizing Recommender Systems based on ALIDATA DISCOVERY
    Authors: Tang Zhi-hang
    Number of views: 347
  • 2214-2221
    Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms and Messenger Environments
    Authors: Dr. Jatinderkumar R. Saini
    Number of views: 387
  • 2222-2232
    Applying Content-Based Image Retrieval Techniques to Provide New Services for Tourism Industry
    Authors: Zobeir Raisi, Farahnaz Mohanna, Mehdi Rezaei
    Number of views: 276
  • 2233-2239
    Software Defined Networking: A Concept and Related Issues
    Authors: Deepak Kumar, Manu Sood
    Number of views: 301
  • 2240-2243
    Security Issues in Cloud Computing - A Review
    Authors: Irfan Hussain, Imran Ashraf
    Number of views: 284
  • 2253-2261
    Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
    Authors: P.V. Siva Kumar, Dr. Rajasekhara Rao Kurra, Appala Naidu Tentu and G.Padmavathi
    Number of views: 316
  • 2262-2265
    Securing Cloud from Cloud Drain
    Authors: Niva Das, Tanmoy Sarkar
    Number of views: 329
  • 2266-2269
    Survey on Host and Network Based Intrusion Detection System
    Authors: Niva Das, Tanmoy Sarkar
    Number of views: 418
  • 2285-2290
    Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop Mobile Payment Systems
    Authors: Amal Saha, Sugata Sanyal
    Number of views: 282


 В начало  Предыдущая страница  5 6 7 8 9 10  Следующая страница  В конец
© 2013-2024, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us