Journal Publications

International Journal of Advances in Computer Networks and Its Security

(29) Papers Found

A review: an improved k-means clustering Technique in wsn

Author(s) : NAVJOT KAUR JASSI, SANDEEP SINGH WRAICH

No of Author(s) : 2
Page(s) : 1 -5
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 473   |   Download(s) : 192

Efficient method for cloud data storage and Security based on third party auditor

Author(s) : CHADCHANKAR AMARNATH S.

No of Author(s) : 1
Page(s) : 6 - 10
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 516   |   Download(s) : 187

Facial recognition based on back propagation Technique

Author(s) : MOHAMMAD KAISB AL-HASNAWI , NASSIR JABIR AL-KHAFAJI, TAREQ ALI AL-SAADI, ZAID ABASS FADAHL

No of Author(s) : 4
Page(s) : 11 - 17
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 466   |   Download(s) : 156

Wavelet transform based effective energy Utilisation approaches of data transfer in Wireless sensor networks: a survey

Author(s) : JYOTI SAXENA, SHABIR AHMAD SOFI, UMAR FAROOQ

No of Author(s) : 3
Page(s) : 18 - 23
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 475   |   Download(s) : 132

Constraint Based Qos Routing In Manet

Author(s) : M.K. PANDEY, SONIKA KANDARI

No of Author(s) : 2
Page(s) : 24 -29
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 516   |   Download(s) : 150

Technique for detection of cooperative black Hole attack in mobile ad-hoc networks-survey

Author(s) : ASHOK M. KANTHE, DINA SIMUNIC , GAYATRI WAHANE

No of Author(s) : 3
Page(s) : 30 - 33
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 513   |   Download(s) : 146

Manage clipboard to prevent copying Important files

Author(s) : NATAASHA RAUL , NEHA LOKHANDE, PRIYANK CHHEDA , SIDDHESH KARODE

No of Author(s) : 4
Page(s) : 34 -38
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 452   |   Download(s) : 188

Internet safe browsing awareness to prevent Cyber attacks

Author(s) : RADHA ADHIKARI, R.H.GOUDAR, VANIKA MAKHIJA

No of Author(s) : 3
Page(s) : 39 - 48
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 519   |   Download(s) : 125

Cloud Computing For Mobile Application

Author(s) : MANDAR K KEKADE

No of Author(s) : 1
Page(s) : 49 - 52
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 463   |   Download(s) : 108

Performance comparison of different routing Protocols over wireless sensor network

Author(s) : C.R.TRIPATHY , SANTOSHINEE MOHAPATRA

No of Author(s) : 2
Page(s) : 53 - 56
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 588   |   Download(s) : 129

A hybrid approach for enhancing data security by Combining encryption and steganography

Author(s) : ASHWINI B, PUSHPALATHA S, R H GOUDAR

No of Author(s) : 3
Page(s) : 57 - 61
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 597   |   Download(s) : 175

Distributed privacy preserving data mining: a Framework for k-anonymity based on feature set Partitioning approach of vertically fragmented Databases

Author(s) : JALPA PATEL, KEYUR RANA

No of Author(s) : 2
Page(s) : 62 - 66
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 595   |   Download(s) : 171

Synopsis Of Cloud Broker Models

Author(s) : BHARTI SURI, DEEPIKA RAWAT

No of Author(s) : 2
Page(s) : 67 - 71
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 549   |   Download(s) : 118

Software deployment using infrastructure as a Service (iaas) in cloud: a review

Author(s) : ANUSUYA G , DURAIRAJ M

No of Author(s) : 2
Page(s) : 72 - 76
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 535   |   Download(s) : 129

Optimizing Spanning Tree Protocol using Port Channel For Greener Switching

Author(s) : APARAJIT P UTPAT, CHANDAN N BHAGWAT, SHOBHA G, Y.NAVANEETH KRISHNAN

No of Author(s) : 4
Page(s) : 77 -80
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 550   |   Download(s) : 203

Big data analytics on cloud-technical, non- Technical and security issues

Author(s) : ALHAJI IDI BABATE , ALI GARBA JAKWA, WADA ABDULLAHI

No of Author(s) : 3
Page(s) : 81 - 88
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 502   |   Download(s) : 122

Design and evaluation of bandwidthperformance in a cooperate Network

Author(s) : S. K. SINGH

No of Author(s) : 1
Page(s) : 89 - 93
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 573   |   Download(s) : 111

Readiness Factors On Migrating To Ipv6

Author(s) : ASPALILLA MAIN, NIN HAYATI MOHD YUSOFF, NURUL AZMA ZAKARIA, ROBIAH YUSOF

No of Author(s) : 4
Page(s) : 94 - 97
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 516   |   Download(s) : 147

Encryption On Data In Cloud Environment

Author(s) : CHENGLIANG WANG, MUHAMMAD SAJID KHAN

No of Author(s) : 2
Page(s) : 98 - 100
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 550   |   Download(s) : 176

Predictive modeling of data delay in a corporate Network based on input characteristics by Applying simulation model

Author(s) : ALI DANLADI , V. V. GNATUSHENKO

No of Author(s) : 2
Page(s) : 101 - 107
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 517   |   Download(s) : 172

Reactive Protocol In Vanet

Author(s) : P.GEETHARANI

No of Author(s) : 1
Page(s) : 108 - 111
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 488   |   Download(s) : 151

Energy-efficient method for cooperative Spectrum sensing in cognitive radio networks

Author(s) : GHEORGHE FLOREA, RADU DOBRESCU

No of Author(s) : 2
Page(s) : 112 - 116
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 507   |   Download(s) : 149

Mobile device usability: towards achieving Usability excellence

Author(s) : AHMED S. ALAWAJI, FANG-FANG CHUA, MOHAMMED I. ALOWAIS

No of Author(s) : 3
Page(s) : 117 - 122
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 562   |   Download(s) : 193

Analysis Of Routing Protocols Over Vanet Through The Using Matlab Simulator

Author(s) : EZZATI ABDELLAH, FIHRI MOHAMMED, OTMANI MOHAMED

No of Author(s) : 3
Page(s) : 123 - 127
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 611   |   Download(s) : 135

Pass-coob a new graphical password based on Colors and objects

Author(s) : AHMAD Z. EL-RUFAI   , ARASH HABIBI LASHKARI   

No of Author(s) : 2
Page(s) : 128 - 132
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 498   |   Download(s) : 104

A developed shadow agent based on ad-hoc routing Used to optimize the performance of dsr in different Network environments

Author(s) : MOHAMED A. ABDELHADI

No of Author(s) : 1
Page(s) : 133 - 138
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 562   |   Download(s) : 110

An Algorithm To Detect Inconsistencies In Access Control Policies

Author(s) : MUHAMMAD AQIB, RIAZ AHMED SHAIKH

No of Author(s) : 2
Page(s) : 139 - 143
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 499   |   Download(s) : 173

Semantically Enhanced Cyber Security Over Clouds: Methodological Approach

Author(s) : IVANA OGNJANOVIC    , RAMO SENDELJ

No of Author(s) : 2
Page(s) : 144 - 149
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 509   |   Download(s) : 206

Investigations On Routing Protocols In Mobile Grid Environment

Author(s) : L.NIRMALA DEVI

No of Author(s) : 1
Page(s) : 150 - 154
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 3
Views : 547   |   Download(s) : 123