Table of Contents
Vol 7, No 6 (2016)
Articles
Investigating the Barriers of Application of Cloud Computing in the Smart Schools of Iran | ||
Fardin Amirian, Sanaz Nikghadam Hojjati, Fatemeh Soleimani Roozbahani | ||
Vol 7, No 6 (2016), Pagination: 2904-2914 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 296 | PDF Views: 0 |
Analysis of Multi Level Feedback Queue Scheduling Using Markov Chain Model with Data Model Approach | ||
Shweta Jain, Saurabh Jain | ||
Vol 7, No 6 (2016), Pagination: 2915-2924 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 298 | PDF Views: 4 |
Securing Mobile Data using Cryptography | ||
Shikhar Bhagoliwal, Jyotirmoy Karjee | ||
Vol 7, No 6 (2016), Pagination: 2925-2930 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 275 | PDF Views: 0 |
Assessment of KQML Improved | ||
Ankit Jagga, Aarti Singh | ||
Vol 7, No 6 (2016), Pagination: 2931-2935 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 308 | PDF Views: 2 |
Evaluation of Factors Affecting the Adoption of Smart Buildings Using the Technology Acceptance Model | ||
Sanaz Nikghadam Hojjati, Masoumeh Khodakarami | ||
Vol 7, No 6 (2016), Pagination: 2936-2943 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 301 | PDF Views: 2 |
Nearest Prime Cipher for Data Confidentiality and Integrity | ||
S. Kiran, N. Subramanyan, Y. Suma, K. Haripriya | ||
Vol 7, No 6 (2016), Pagination: 2944-2948 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 286 | PDF Views: 5 |
Lean as Agile methodology – A Study | ||
T. Hari Kumar, C. Uma Shankar | ||
Vol 7, No 6 (2016), Pagination: 2949-2952 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 291 | PDF Views: 1 |
Improved Cell Coverage in Hilly Areas using Cellular Antennas | ||
Mridul Mohan Bharadwaj, Jyotirmoy Karjee | ||
Vol 7, No 6 (2016), Pagination: 2953-2957 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 297 | PDF Views: 1 |
Secure Authorised De-Duplication using Convergent Encryption Technique | ||
B. Sangeetha, E. S. K. Vijay Anand | ||
Vol 7, No 6 (2016), Pagination: 2958-2962 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 284 | PDF Views: 4 |
Message Authentication Protocol for Lifetime Proficient Hash Based Algorithm in Wireless Sensor Networks | ||
N. J. Mallikarjunaswamy, T. R. Latha Yadav, Keshava Prasanna | ||
Vol 7, No 6 (2016), Pagination: 2963-2966 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 271 | PDF Views: 1 |