IJANA ARTICLES
![]() |
Issue 1 |
![]() |
Issue 2 |
![]() |
Issue 3 |
![]() |
Issue 4 |
![]() |
Issue 5 |
![]() |
Issue 6 |
Volume 7 | Issue:06 | May-June 2016 |
Investigating the Barriers of Application of Cloud Computing in the Smart Schools of Iran Fardin Amirian, Sanaz Nikghadam Hojjati, Fatemeh Soleimani Roozbahani |
2904-2914 | ![]() |
![]() |
Analysis of Multi Level Feedback Queue Scheduling Using Markov Chain Model with Data Model Approach Shweta Jain, Dr. Saurabh Jain |
2915-2924 | ![]() |
![]() |
Securing Mobile Data using Cryptography Shikhar Bhagoliwal, Jyotirmoy Karjee |
2925-2930 | ![]() |
![]() |
Assessment of KQML Improved Ankit Jagga, Aarti Singh |
2931-2935 | ![]() |
![]() |
Evaluation of Factors Affecting the Adoption of Smart Buildings Using the Technology Acceptance Model Sanaz Nikghadam Hojjati, Masoumeh Khodakarami |
2936-2943 | ![]() |
![]() |
Nearest Prime Cipher for Data Confidentiality and Integrity
Dr. S. Kiran, N. Subramanyan, Y. Suma, K. Haripriya |
2944-2948 | ![]() |
![]() |
Lean as Agile methodology – A Study T. Hari Kumar, Prof. C. Uma Shankar |
2949-2952 | ![]() |
![]() |
Improved Cell Coverage in Hilly Areas using Cellular Antennas Mridul Mohan Bharadwaj, Jyotirmoy Karjee |
2953-2957 | ![]() |
![]() |
Secure Authorised De-duplication using Convergent Encryption Technique Sangeetha. B, Mr.E.S.K.Vijay Anand |
2958-2962 | ![]() |
![]() |
Message Authentication Protocol for Lifetime Proficient Hash Based Algorithm in Wireless Sensor Networks Mallikarjunaswamy N J1 , Latha Yadav T R2, Dr. Keshava Prasanna3 |
2963-2966 | ![]() |