Special Issue - UGC Sponsored National Conference on Advanced Networking and Applications (NCANA'15) held at Government Arts College, Udumalpet
A Note On: Cognitive Radio and It Performance Tools Ms.L.Indhumathi, Dr.R.Vadivel |
1-7 |
A Secured Mobile Ad Hoc Network Using Certificateless Effective key Management CL-EKM)
Dr. M.Gobi, L.Moorthi |
8-13 |
Brain Tumor Detection and Identification Using K-Means Clustering Technique Malathi R, Dr. Nadirabanu Kamal A R |
14-18 |
Challenges of Wireless Sensor Networks and Issues associated with Time Synchronization
S. Karthik, Dr. A. Ashok Kumar |
19-23 |
Comparative Analysis and Implementation of Verifiable Secret Sharing Over a Single Path in VoIP Security with Reliable Time Delay
R. Shankar, Dr. E.Karthikeyan |
24-27 |
Decision Tree based Network Packet Classification Algorithms
T S Urmila, Dr R Balasubramanian |
28-34 |
Developing Multimedia Services in Mobile Social Networks from Security and Privacy Perspectives
D Murugeswari, B Thillaieswari |
35-39 |
Job Shop Scheduling Using Metaheurestic Search Technic – Tabu Search
K.Anandapadmanabhan |
40-43 |
An Overview of MANET Routing Protocols
Anto Ramya. S. I |
44-49 |
Mobile-Cloud: A Framework Of Cloud Computing For Mobile Applications
Dr. R. UMARANI, R. SUGUNA |
50-52 |
Performance Evaluation of Machine Learning Techniques for Text Classification
Dr.R.Manicka chezian, C.Kanakalakshmi |
53-57 |
SOP: An Approach to Minimize Path Discovery Delay and Find Shortest Optimum Path
V.Princy, Dr.P.Calduwel Newton |
58-61 |
Tools to Trace Path between Server and Web Applications over Internet
P Veeralakshmi, A Dhavapandiammal |
62-66 |
Wireless Sensor Networks: Application, Architecture, Design issues and Research Challenges
O.Deepa,, Dr. A. Senthilkumar |
67-70 |
A New Approach to Detect, Filter And Trace the DDoS Attack
S.Gomathi, Dr.E.Karthikeyan |
71-75 |
Review On Rushing Attack And Its Prevention Techniques In MANET
R.Thilagarasi, D.Geetha |
76-79 |
A Review on Spectrum Sensing Techniques in Cognitive Radio Network
A.Arthy, P.Periyasamy |
80-83 |
A Review on Types of Jamming Attack In Mobile Ad-Hoc Network
R.Maheswari, Ms.S.Rajeswari |
84-86 |
A Survey Of Neural Network In Heart Attack And Bloodcancer
Dr.S.Sujatha, Ms.D.Divya |
87-89 |
A Survey of Routing Attacks in Manet
R.Latha, S.Sasikala |
90-93 |
A Survey On Smoothing Quality And The Liveness Of The Stream By Increasing The Smoothing Window Size In Video Streaming
A.Jagadeeshwaran, Dr.E.Karthikeyan |
94-97 |
Content Based Image Retrieval “Public and Private Search Engines”
Dr T. Santha, M .Abhayadev |
98-102 |
Design Of Fast Clustering Based Feature Subset Selection Algorithm For High Dimensional Data
Mr. S.Sathish, Mrs. B.Hemalatha |
103-106 |
Green Computing Techniques to Power Management and Energy Efficiency
Bobby. S |
107-112 |
Internet Of Things: A Great Wonder
Mr. P. Ravi, Dr. A.Ashokkumar |
113-119 |
Iris Recognition Process
Sr.Sagaya Mary James |
120-122 |
Li- Fi Compete The Wi-Fi And Comparative Study Between Li- Fi Vs Wi-Fi
J Fathima Kaleema |
123-126 |
Message Authentication in Sensor Networks Using En-route Filtering
K.J. Sridevi |
127-131 |
Mobile Data Mining-Using Mobile Device Management System (Mdm)
Mrs.N.Kanchana, Ms.N.Abinaya |
132-134 |
RSA Algorithm and Signature in Cloud in Cloud - Review
Mrs. Dhina Suresh, Dr. M. Lilly Florence |
135-140 |
A Secured Cloud Security Using Elliptic Curve Cryptography
Dr.M.Gobi, Karthik Sundararaj |
141-144 |
A Security Analysis In Voip Using Hierarchical Threshold Secret Sharing
E.S. Thirunavukkarasu, E. Karthikeyan |
145-149 |
A Study on Mining Lung Cancer Data for Increasing or Decreasing Disease Prediction Value by Using Ant Colony Optimization Techniques
Dr.T.Christopher, J.Jamera banu |
150-153 |
Energy-Efficient Routing Protocols in Mobile Ad Hoc Networks: A Survey
M. Kokilamani, Dr. E. Karthikeyan |
154-162 |
Comparative Analysis of Internet Traffic Identification Methods
Kokila S, Sathish A, Shankar R |
163-167 |
A Comparative Study on the Performance and the Security of RSA and ECC Algorithm
Dr.M.Gobi, R.Sridevi, R.Rahini priyadharshini |
168-171 |
Real Time Activity based Pre-key Distribution in three tier security schemes in Wireless Sensor Networks
B.Sangeetha, Radhimeenakshi |
172-174 |
Credit Card Fraud Detection using Hidden Morkov Model and Neural Networks
R.Rajamani, M.Rathika |
175-179 |
Trust and Cluster based Security architecture in MANET for a Collaborative Computing Environment
S.Sivagurunathan, K.Prathapchandran |
180-186 |
A Study on Congestion Control Algorithms in Computer Networks
K. Pavithra, Dr. E. Karthikeyan |
187-190 |
Analysis of Big Data Based On Ensemble Classification
Mrs. Marrynal .S. Eastaff, Mrs. Premalatha P |
191-193 |
A Study Of Clustering Based Algorithm For Outlier Detection In Data streams
Dr. T. Christopher, T. Divya |
194-197 |
A Comparative Study on Secured Image Transmission Using Steganography Techniques
R. BharathiPriya, Dr. E. Karthikeyan |
198-200 |
A Comparative Study on Various Routing Protocols of Wireless Sensor Network
P. Ramesh, S. Kruba |
201-205 |
A Study on Security Concepts In Mobile Ad Hoc Network
P.Ramesh, G.Ramya |
206-211 |
Diabetes Risk Factors Analysis Based on Genetic Factor Using Genetic-Pattern Matching Approach
K. Soundarrajan, L.Thenmozhi |
212-216 |
Evaluating the Performance of Routing Protocols In Mobile Ad-hoc Networks
K. Vijayalakshmi, Dr. R. Manicka Chezian |
217-221 |
Assignable Algorithms Available for Missing Data for Finding MV
P.Logeshwari, Dr.Antony Selvadoss Thanamani |
222-227 |
Routing Protocols in MANET
K. Maheshwari, M.Sahaya Agnel Rigana |
228-234 |
Copyright © All rights reserved | by IJANA - The International Journal of Advanced Networking and Applications, Published by Eswar Publications.