Table of Contents
Vol 6, No 5 (2015)
Articles
Node Legitimacy Based False Data Filtering Scheme in Wireless Sensor Networks | ||
YaFang Liu, HaiPeng Qu | ||
Vol 6, No 5 (2015), Pagination: 2435-2439 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 261 | PDF Views: 0 |
Application Security framework for Mobile App Development in Enterprise Setup | ||
Subhamoy Chakraborti, D. P. Acharjya, Sugata Sanyal | ||
Vol 6, No 5 (2015), Pagination: 2440-2445 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 263 | PDF Views: 0 |
Energy Optimized Link Selection Algorithm for Mobile Cloud Computing | ||
K. Ravindranath, K. Rajasekhara Rao | ||
Vol 6, No 5 (2015), Pagination: 2446-2451 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 267 | PDF Views: 0 |
An Introduction of E-Learning based on Social Networks | ||
K. M. Aslam Uddin, Moha. Yusuf Harun Khan | ||
Vol 6, No 5 (2015), Pagination: 2452-2454 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 267 | PDF Views: 4 |
Detection of Malicious Attacks by Meta Classification Algorithms | ||
G. Michael, A. Kumaravel, A. Chandrasekar | ||
Vol 6, No 5 (2015), Pagination: 2455-2459 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 269 | PDF Views: 2 |
Heuristic Algorithm Using Internet of Things and Mobility for Solving Demographic Issues in Financial Inclusion Projects | ||
Subhamoy Chakraborti, Sugata Sanyal | ||
Vol 6, No 5 (2015), Pagination: 2460-2463 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 251 | PDF Views: 1 |
An Adaptive Data Hiding Scheme for Domain Based Secret Data in Random Order to Increase Steganography Using IWT | ||
R. Indra Gandhi, K. P. Kaliyamurthie | ||
Vol 6, No 5 (2015), Pagination: 2464-2467 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 252 | PDF Views: 0 |
Comparison and Security App of ANDROID OS using Different Versions:An Overview | ||
Javeria Amin | ||
Vol 6, No 5 (2015), Pagination: 2468-2474 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 254 | PDF Views: 2 |
Two Factor Authentications Using One Time Random Password for Secure Online Transaction | ||
G. Umamaheswari, A. Kangaiammal, K. K. Kavitha | ||
Vol 6, No 5 (2015), Pagination: 2475-2478 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 260 | PDF Views: 0 |
Survey of Operating Systems for the IoT Environment | ||
Tuhin Borgohain, Uday Kumar, Sugata Sanyal | ||
Vol 6, No 5 (2015), Pagination: 2479-2483 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 253 | PDF Views: 3 |
Internet of Things (IoT) Applicability in a Metropolitan City | ||
D. Mohammed | ||
Vol 6, No 5 (2015), Pagination: 2484-2486 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 260 | PDF Views: 2 |
Evaluation and Trends of Surveillance System Network in Ubiquitous Computing Environment | ||
Sunil Kr. Singh, Anuj Aggarwal, Kavneet Kaur | ||
Vol 6, No 5 (2015), Pagination: 2487-2494 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 256 | PDF Views: 1 |
Applications of Pattern Recognition Algorithms in Agriculture:A Review | ||
M. P. Raj, P. R. Swaminarayan, J. R. Saini, D. K. Parmar | ||
Vol 6, No 5 (2015), Pagination: 2495-2502 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 267 | PDF Views: 3 |