IJANA ARTICLES
![]() |
Issue 1 |
![]() |
Issue 2 |
![]() |
Issue 3 |
![]() |
Issue 4 |
![]() |
Issue 5 |
![]() |
Issue 6 |
Volume 6 | Issue:03 | Nov-Dec 2014 |
An Exploration of Grid Computing to be Utilized in Teaching and Research at TU Dr. Mohammed A.M. Ibrahim |
2291-2299 | ![]() |
![]() |
Implementation of Remote Health Monitoring in Medical Rural Clinics for Web Telemedicine System Hafez Fouad |
2300-2307 | ![]() |
![]() |
Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs: A Review Sushant Patial, Jawahar Thakur |
2308-2313 | ![]() |
![]() |
The Study and Analysis of Effect of Multi-Antenna Techniques on LTE network with Different Bandwidth Configurations in the Downlink Mohana H K, Mohankumar N M , Swetha, Devaraju J T |
2314-2318 | ![]() |
![]() |
Information-Flow Analysis of Design Breaks up Rajendra kumar, Anil Kumar, Namrata Dhanda |
2319-2328 | ![]() |
![]() |
Diagnosis of Rectal Cancer through Images Dr.K.Sivakami Sundari, P.Vanaselvi, T.S.Vishakai |
2329-2333 | ![]() |
![]() |
String Identifier in Multiple Medical Databases Simona-Roxana Dumitrescu, Dan Popescu |
2334-2337 | ![]() |
![]() |
A Framework for Multicloud Environment Services
Dr. C S. Pillai |
2338-2341 | ![]() |
![]() |
Network Monitoring and Traffic Reduction using Multi-Agent Technology M.Subramanian |
2342-2346 | ![]() |
![]() |
OpenFlow Security Threat Detection and Defense Services Wanqing You, Kai Qian, Xi He, Ying Qian |
2347-2351 | ![]() |
![]() |
Performance Comparison of Cluster based and Threshold based Algorithms for Detection and Prevention of Cooperative Black Hole Attack in MANETs P. S. Hiremath, Anuradha T |
2352-2358 | ![]() |
![]() |