Table of Contents
Vol 6, No 4 (2015)
Articles
Exploring the Feasibility of Adopting Cloud Computing in Computer Center Taiz University | ||
Mohammed A. M. Ibrahim, Alsabry, Fatimah, Ameen | ||
Vol 6, No 4 (2015), Pagination: 2359-2366 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 344 | PDF Views: 0 |
An Approach for Customer Satisfaction:Evaluation, Validation and Modeling by a Markov Chain | ||
Amina El Kebbaj, Abdelwahed Namir | ||
Vol 6, No 4 (2015), Pagination: 2367-2371 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 328 | PDF Views: 0 |
Survey of Security and Privacy Issues of Internet of Things | ||
Tuhin Borgohain, Uday Kumar, Sugata Sanyal | ||
Vol 6, No 4 (2015), Pagination: 2372-2378 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 306 | PDF Views: 2 |
An Overview:Treatment of Lung Cancer on Researcher Point of View | ||
Javeria Amin | ||
Vol 6, No 4 (2015), Pagination: 2379-2385 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 315 | PDF Views: 4 |
Survey:Biological Inspired Computing in the Network Security | ||
V. Venkata Ramana, Y. Subba Reddy, G. Rama Subba Reddy, Pandurangan Ravi | ||
Vol 6, No 4 (2015), Pagination: 2386-2392 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 338 | PDF Views: 2 |
Face Recognition Techniques - An Evaluation Study | ||
Asmahan M. Altaher | ||
Vol 6, No 4 (2015), Pagination: 2393-2397 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 327 | PDF Views: 2 |
Mobile Web Browsing Based on Content Preserving with Reduced Cost | ||
N. Saravanaselvam, K. Rajangam, L. Dhanam, Anuradha Balasubramanian | ||
Vol 6, No 4 (2015), Pagination: 2398-2403 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 313 | PDF Views: 1 |
Nuzzer Algorithm Based Human Tracking and Security System for Device-Free Passive System in Smart Phones Environment | ||
R. Ranjani, R. Devi, M. Kalaimani | ||
Vol 6, No 4 (2015), Pagination: 2404-2408 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 314 | PDF Views: 3 |
Improved EPRCA Congestion Control Scheme for ATM Networks | ||
M. Sreenivasulu | ||
Vol 6, No 4 (2015), Pagination: 2409-2413 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 312 | PDF Views: 2 |
A Brief Study on Different Intrusions and Machine Learning-Based Anomaly Detection Methods in Wireless Sensor Networks | ||
J. Saranya, G. Padmavathi | ||
Vol 6, No 4 (2015), Pagination: 2414-2421 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 477 | PDF Views: 4 |
Authentication Systems in Internet of Things | ||
Tuhin Borgohain, Amardeep Borgohain, Uday Kumar, Sugata Sanyal | ||
Vol 6, No 4 (2015), Pagination: 2422-2426 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 311 | PDF Views: 5 |
Review of Considerations for Mobile Device Based Secure Access to Financial Services and Risk Handling Strategy for CIOs, CISOs and CTOs | ||
Amal Saha, Sugata Sanyal | ||
Vol 6, No 4 (2015), Pagination: 2427-2434 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 294 | PDF Views: 2 |