Vol 6, No 4 (2015)

Table of Contents

Vol 6, No 4 (2015)

Articles

Exploring the Feasibility of Adopting Cloud Computing in Computer Center Taiz University
Mohammed A. M. Ibrahim, Alsabry, Fatimah, Ameen
 Vol 6, No 4 (2015), Pagination: 2359-2366
ABSTRACT |  PDF Abstract Views: 235  |  PDF Views: 0
An Approach for Customer Satisfaction:Evaluation, Validation and Modeling by a Markov Chain
Amina El Kebbaj, Abdelwahed Namir
 Vol 6, No 4 (2015), Pagination: 2367-2371
ABSTRACT |  PDF Abstract Views: 250  |  PDF Views: 0
Survey of Security and Privacy Issues of Internet of Things
Tuhin Borgohain, Uday Kumar, Sugata Sanyal
 Vol 6, No 4 (2015), Pagination: 2372-2378
ABSTRACT |  PDF Abstract Views: 217  |  PDF Views: 2
An Overview:Treatment of Lung Cancer on Researcher Point of View
Javeria Amin
 Vol 6, No 4 (2015), Pagination: 2379-2385
ABSTRACT |  PDF Abstract Views: 220  |  PDF Views: 4
Survey:Biological Inspired Computing in the Network Security
V. Venkata Ramana, Y. Subba Reddy, G. Rama Subba Reddy, Pandurangan Ravi
 Vol 6, No 4 (2015), Pagination: 2386-2392
ABSTRACT |  PDF Abstract Views: 239  |  PDF Views: 2
Face Recognition Techniques - An Evaluation Study
Asmahan M. Altaher
 Vol 6, No 4 (2015), Pagination: 2393-2397
ABSTRACT |  PDF Abstract Views: 219  |  PDF Views: 2
Mobile Web Browsing Based on Content Preserving with Reduced Cost
N. Saravanaselvam, K. Rajangam, L. Dhanam, Anuradha Balasubramanian
 Vol 6, No 4 (2015), Pagination: 2398-2403
ABSTRACT |  PDF Abstract Views: 214  |  PDF Views: 1
Nuzzer Algorithm Based Human Tracking and Security System for Device-Free Passive System in Smart Phones Environment
R. Ranjani, R. Devi, M. Kalaimani
 Vol 6, No 4 (2015), Pagination: 2404-2408
ABSTRACT |  PDF Abstract Views: 219  |  PDF Views: 3
Improved EPRCA Congestion Control Scheme for ATM Networks
M. Sreenivasulu
 Vol 6, No 4 (2015), Pagination: 2409-2413
ABSTRACT |  PDF Abstract Views: 222  |  PDF Views: 2
A Brief Study on Different Intrusions and Machine Learning-Based Anomaly Detection Methods in Wireless Sensor Networks
J. Saranya, G. Padmavathi
 Vol 6, No 4 (2015), Pagination: 2414-2421
ABSTRACT |  PDF Abstract Views: 375  |  PDF Views: 4
Authentication Systems in Internet of Things
Tuhin Borgohain, Amardeep Borgohain, Uday Kumar, Sugata Sanyal
 Vol 6, No 4 (2015), Pagination: 2422-2426
ABSTRACT |  PDF Abstract Views: 215  |  PDF Views: 5
Review of Considerations for Mobile Device Based Secure Access to Financial Services and Risk Handling Strategy for CIOs, CISOs and CTOs
Amal Saha, Sugata Sanyal
 Vol 6, No 4 (2015), Pagination: 2427-2434
ABSTRACT |  PDF Abstract Views: 207  |  PDF Views: 2