International Journal
of Advanced Networking and Applications - IJANA


Submit your paper


DOI: 10.35444/IJANA


ISSN - 0975 0282(online)
ISSN - 0975 0290(print)

Call fo Paper - Authors can submit their unpublished paper for the Upcoming issue to editor.ijana@gmail.com

Special Issue - UGC Sponsored National Conference on Advanced Networking and Applications (NCANA'15) held at Government Arts College, Udumalpet


A Note On: Cognitive Radio and It Performance Tools
Ms.L.Indhumathi, Dr.R.Vadivel
1-7
A Secured Mobile Ad Hoc Network Using Certificateless Effective key Management CL-EKM)
Dr. M.Gobi, L.Moorthi
8-13
Brain Tumor Detection and Identification Using K-Means Clustering Technique
Malathi R, Dr. Nadirabanu Kamal A R
14-18
Challenges of Wireless Sensor Networks and Issues associated with Time Synchronization
S. Karthik, Dr. A. Ashok Kumar
19-23
Comparative Analysis and Implementation of Verifiable Secret Sharing Over a Single Path in VoIP Security with Reliable Time Delay
R. Shankar, Dr. E.Karthikeyan
24-27
Decision Tree based Network Packet Classification Algorithms
T S Urmila, Dr R Balasubramanian
28-34
Developing Multimedia Services in Mobile Social Networks from Security and Privacy Perspectives
D Murugeswari, B Thillaieswari
35-39
Job Shop Scheduling Using Metaheurestic Search Technic – Tabu Search
K.Anandapadmanabhan
40-43
An Overview of MANET Routing Protocols
Anto Ramya. S. I
44-49
Mobile-Cloud: A Framework Of Cloud Computing For Mobile Applications
Dr. R. UMARANI, R. SUGUNA
50-52
Performance Evaluation of Machine Learning Techniques for Text Classification
Dr.R.Manicka chezian, C.Kanakalakshmi
53-57
SOP: An Approach to Minimize Path Discovery Delay and Find Shortest Optimum Path
V.Princy, Dr.P.Calduwel Newton
58-61
Tools to Trace Path between Server and Web Applications over Internet
P Veeralakshmi, A Dhavapandiammal
62-66
Wireless Sensor Networks: Application, Architecture, Design issues and Research Challenges
O.Deepa,, Dr. A. Senthilkumar
67-70
A New Approach to Detect, Filter And Trace the DDoS Attack
S.Gomathi, Dr.E.Karthikeyan
71-75
Review On Rushing Attack And Its Prevention Techniques In MANET
R.Thilagarasi, D.Geetha
76-79
A Review on Spectrum Sensing Techniques in Cognitive Radio Network
A.Arthy, P.Periyasamy
80-83
A Review on Types of Jamming Attack In Mobile Ad-Hoc Network
R.Maheswari, Ms.S.Rajeswari
84-86
A Survey Of Neural Network In Heart Attack And Bloodcancer
Dr.S.Sujatha, Ms.D.Divya
87-89
A Survey of Routing Attacks in Manet
R.Latha, S.Sasikala
90-93
A Survey On Smoothing Quality And The Liveness Of The Stream By Increasing The Smoothing Window Size In Video Streaming
A.Jagadeeshwaran, Dr.E.Karthikeyan
94-97
Content Based Image Retrieval “Public and Private Search Engines”
Dr T. Santha, M .Abhayadev
98-102
Design Of Fast Clustering Based Feature Subset Selection Algorithm For High Dimensional Data
Mr. S.Sathish, Mrs. B.Hemalatha
103-106
Green Computing Techniques to Power Management and Energy Efficiency
Bobby. S
107-112
Internet Of Things: A Great Wonder
Mr. P. Ravi, Dr. A.Ashokkumar
113-119
Iris Recognition Process
Sr.Sagaya Mary James
120-122
Li- Fi Compete The Wi-Fi And Comparative Study Between Li- Fi Vs Wi-Fi
J Fathima Kaleema
123-126
Message Authentication in Sensor Networks Using En-route Filtering
K.J. Sridevi
127-131
Mobile Data Mining-Using Mobile Device Management System (Mdm)
Mrs.N.Kanchana, Ms.N.Abinaya
132-134
RSA Algorithm and Signature in Cloud in Cloud - Review
Mrs. Dhina Suresh, Dr. M. Lilly Florence
135-140
A Secured Cloud Security Using Elliptic Curve Cryptography
Dr.M.Gobi, Karthik Sundararaj
141-144
A Security Analysis In Voip Using Hierarchical Threshold Secret Sharing
E.S. Thirunavukkarasu, E. Karthikeyan
145-149
A Study on Mining Lung Cancer Data for Increasing or Decreasing Disease Prediction Value by Using Ant Colony Optimization Techniques
Dr.T.Christopher, J.Jamera banu
150-153
Energy-Efficient Routing Protocols in Mobile Ad Hoc Networks: A Survey
M. Kokilamani, Dr. E. Karthikeyan
154-162
Comparative Analysis of Internet Traffic Identification Methods
Kokila S, Sathish A, Shankar R
163-167
A Comparative Study on the Performance and the Security of RSA and ECC Algorithm
Dr.M.Gobi, R.Sridevi, R.Rahini priyadharshini
168-171
Real Time Activity based Pre-key Distribution in three tier security schemes in Wireless Sensor Networks
B.Sangeetha, Radhimeenakshi
172-174
Credit Card Fraud Detection using Hidden Morkov Model and Neural Networks
R.Rajamani, M.Rathika
175-179
Trust and Cluster based Security architecture in MANET for a Collaborative Computing Environment
S.Sivagurunathan, K.Prathapchandran
180-186
A Study on Congestion Control Algorithms in Computer Networks
K. Pavithra, Dr. E. Karthikeyan
187-190
Analysis of Big Data Based On Ensemble Classification
Mrs. Marrynal .S. Eastaff, Mrs. Premalatha P
191-193
A Study Of Clustering Based Algorithm For Outlier Detection In Data streams
Dr. T. Christopher, T. Divya
194-197
A Comparative Study on Secured Image Transmission Using Steganography Techniques
R. BharathiPriya, Dr. E. Karthikeyan
198-200
A Comparative Study on Various Routing Protocols of Wireless Sensor Network
P. Ramesh, S. Kruba
201-205
A Study on Security Concepts In Mobile Ad Hoc Network
P.Ramesh, G.Ramya
206-211
Diabetes Risk Factors Analysis Based on Genetic Factor Using Genetic-Pattern Matching Approach
K. Soundarrajan, L.Thenmozhi
212-216
Evaluating the Performance of Routing Protocols In Mobile Ad-hoc Networks
K. Vijayalakshmi, Dr. R. Manicka Chezian
217-221
Assignable Algorithms Available for Missing Data for Finding MV
P.Logeshwari, Dr.Antony Selvadoss Thanamani
222-227
Routing Protocols in MANET
K. Maheshwari, M.Sahaya Agnel Rigana
228-234




RECENT VOLUMES

Advanced Networking and Applications

IJANA accepts an unpublished papers or extended and enhanced versions of papers presented at conferences may be submitted

Continue Reading »

Cellular and Wireless Communication

The journal is already included in CNKI Scholar, i-Scholar, EBSCO, OAJI.net, Open J Gate, CORR, Google Scholar, Microsoft Academic, ProQuest etc.

Continue Reading »

Disclaimer

Authors should note that only original and previously unpublished manuscripts will be considered and the simultaneous submissions is not acceptable.

Continue Reading »

Copyright © All rights reserved | by IJANA - The International Journal of Advanced Networking and Applications, Published by Eswar Publications.