CATEGORIES
IJANA ARTICLES

VOLUME 6
Issue 1
Issue 2
Issue 3
Issue 4
Issue 5
Issue 6
Volume 6 Issue:04 Jan-Feb 2015
Exploring the Feasibility of Adopting Cloud Computing in Computer Center Taiz University

Mohammed A.M. Ibrahim, Alsabry, Fatimah, Ameen
2359-2366
An Approach for Customer Satisfaction: Evaluation, Validation and Modeling By A Markov Chain

Amina EL KEBBAJ, Abdelwahed NAMIR
2367-2371
Survey of Security and Privacy Issues of Internet of Things

TuhinBorgohain, Uday Kumar, Sugata Sanyal
2372-2378
An Overview: Treatment of Lung Cancer on Researcher Point of View

Javeria Amin
2379-2385
Survey: Biological Inspired Computing in the Network Security

V Venkata Ramana, Y.Subba Reddy, G.Rama Subba Reddy Dr.Pandurangan Ravir
2386-2392
Face Recognition Techniques- An evaluation study

Dr.Asmahan M Altaher
2393-2397
Mobile Web Browsing Based On Content Preserving With Reduced Cost

Dr.N.Saravanaselvam, Dr.K.Rajangam, Ms.L.Dhanam, Ms.Anuradha Balasubramanian
2398-2403
Nuzzer algorithm based Human Tracking and Security System for Device-Free Passive System in Smart Phones Environment

R.Ranjani, R.Devi, M.Kalaimani
2404-2408
Improved EPRCA Congestion Control Scheme for ATM Networks

Dr. M.Sreenivasulu
2409-2413
A Brief Study on Different Intrusions and Machine Learning-based Anomaly Detection Methods in Wireless Sensor Networks

J. Saranya, Dr.G.Padmavathi
2414-2421
Authentication Systems in Internet of Things

Tuhin Borgohain, Amardeep Borgohain, Uday Kumar, Sugata Sanyal
2422-2426
Review of Considerations for Mobile Device based Secure Access to Financial Services and Risk Handling Strategy for CIOs, CISOs and CTOs

Amal Saha, Sugata Sanyal
2427-2434
All Copyrights © 2017 , Eswar PublicationsDesigned by , klmn Software Solutions