ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Engineering and Technology (IJCET) >>

Vol.5, No.12

Publisher: IAEME Publication

Publishing Date: 2014-12-29

  1. A SECURE ALERT MESSAGING FOR VEHICULAR AD HOC NETWORKS

    Authors: SHIKHA SAJU; SMITHA SURESH

  2. A SURVEY ON WEIGHTED CLUSTERING TECHNIQUES IN MANETS

    Authors: ASWATHY P SREEVATSAN; DIYA THOMAS

  3. INTEGRATED HONEYPOT

    Authors: ANSONA N; S.SASIDHAR BABU; SHEEMA M; P.JAYAKUMAR

  4. EXPOSING TRANSIENT SECRETS AND DETECTING MALWARE VARIANTS USING CONTROL AND DATA FLOW ANALYSIS

    Authors: ANJU S; SHEEMA M; P.JAYAKUMAR; S.SASIDHAR BABU

  5. SECUREDSMS: A PROTOCOL FOR SMS SECURITY

    Authors: DEEPTHI SUCHEENDRAN; ARUN R; S.SASIDHAR BABU; P.JAYAKUMAR

  6. ARCHITECTURAL STUDY OF LITTORAL ZONE SENSING USING UNDERWATER ACOUSTIC WIRELESS SENSOR NETWORK

    Authors: SREERANJINI NANDAKUMAR; P.KRISHNA KUMARAN THAMPI

  7. STUDY OF VARIOUS TECHNIQUES FOR DRIVER BEHAVIOR MONITORING AND RECOGNITION SYSTEM

    Authors: VIDHYA P M; AMBILY MOHAN

  8. INVESTIGATIVE ANALYSIS OF SECURITY ISSUES AND CHALLENGES IN CLOUD COMPUTING AND THEIR COUNTER MEASURES

    Authors: SAJAY K R; SUVANAM SASIDHAR BABU; VIJAYALAKSHMI Y.

  9. HUMAN ACTIVITY DETECTION BASED ON EDGE POINT MOVEMENTS AND SPATIO-TEMPORAL FEATURES IN INDOOR

    Authors: LAKSHMI PRIYA K M; SMITHA SURESH

  10. AN ENERGY EFFICIENT PROTOCOL BASED STUDY OF WSN TO INCREASE THE LIFETIME

    Authors: ANJUMOL O N; THAMPI P.K.K

  11. CONTROLLER AREA NETWORK AS THE SECURITY OF THE VEHICLES

    Authors: AROMAL C M; JINI KURIAKOSE; SUJITH KUMAR P S

  12. SECURITY IN MANET VIA DIFFERENT INTRUSION DETECTION TECHNIQUES

    Authors: JEENA KURIAKOSE; RESHMA RAJAN; GAYATHRY K. V

  13. USING METADATA IN FILTERED LOGS FOR PREVENTION OF DATABASE INTRUSION THROUGH OWNER LEVEL INTERACTION

    Authors: NAYANA SANTHOSH; SACHU.P.SAHI; ARUN R

  14. AN AUTOMATIC FILTERING TASK IN OSN USING CONTENT BASED APPROACH

    Authors: SACHU.P.SAHI; NAYANA SANTHOSH; SILPA KAMALAN

  15. WAY TO GREEN: INTELLIGENT TRAFFIC CONTROL WITH VANET

    Authors: JINI KURIAKOSE; AROMAL C M; GAYATHRY K. V

  16. PERFORMANCE BOOSTING OF DISCRETE COSINE TRANSFORM USING PARALLEL PROGRAMMING METHODOLOGY

    Authors: APARNA M.P; SMITHA SURESH; ANOOP M.P

  17. CONGESTION MANAGEMENT THROUGH MVCM AND CONGESTION CONTROL BASED ON MOBILE AGENTS

    Authors: RESHMA RAJAN; JEENA KURIAKOSE; VIDHYA PM

  18. A SURVEY ON VARIOUS TIME SYNCHRONIZATION TECHNIQUES IN UNDERWATER SENSOR NETWORKS

    Authors: ANIL C.B.; VANI SREEKUMAR; MANJARI JOSHI

  19. IMPACT OF ELECTRONIC COMMERCE IN MARKETING AND BRAND DEVELOPING

    Authors: DIJESH P; SUVANAM SASIDHAR BABU; VIJAYALAKSHMI Y

  20. NVRAM APPLICATIONS IN THE ARCHITECTURAL REVOLUTIONS OF MAIN MEMORY IMPLEMENTATION ? A MEMRISTOR WALKTHROUGH

    Authors: HITHA PAULSON; RAJESH R

  21. COLOR VS. TEXTURE FEATURE EXTRACTION AND MATCHING IN VISUAL CONTENT RETRIEVAL BY USING GLOBAL COLOR HISTOGRAM

    Authors: SHIMI P.S.

  22. EFFECTIVENESS OF VARIOUS USER AUTHENTICATION TECHNIQUES

    Authors: NIMISHA PAULOSE; SARIKA S

  23. SPACE EFFICIENT STRUCTURES FOR JSON DOCUMENTS

    Authors: RINCY T. A.; RAJESH R

  24. AUDIO - VIDEO STEGANOGRAPHY USING FORENSIC TECHNIQUEFOR DATA SECURITY

    Authors: ATHIRA MOHANAN; RESHMA REMANAN; SASIDHAR BABU SUVANAM; KALYANKAR N V

  25. DETECTION AND PREVENTION METHOD OF ROOTING ATTACK ON THE ANDROID PHONES

    Authors: LITTY ANTONY; HARLAY MARIA MATHEW; JAYAKUMAR.P