Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.2, No.11
Publisher: ZAIN Publications
Publishing Date: 2013-11-30
- Prototype Implementation of Power Saver Street Lighting and Automatic Traffic Management SystemAuthors: Dr. D. Asha Devi, L. Prasad Naik?
- ITEM RESPONSE THEORY?Authors: Ayushi Pathak, Kaustubh Patro, Manoj Pathak, Mohit Valecha
- CONTRAST ENHANCEMENT USING DOMINANT BRIGHTNESS LEVEL ANALYSIS ADAPTIVE INTENSITY TRANSFORM?Authors: Ramesh E, Hemantha Reddy G.R.V
- Abstraction for Asymmetric Mobile Ad Hoc Network Using Bidirectional Routing ProtocolsAuthors: V. Vivekanandhan, M. Shenbagam?
- EDGE-BASED JUNCTION DETECTOR OPERATOR ON CIRCUMFERENTIAL ANCHORS FOR 3D RECONSTRUCTION?Authors: M. Shenbagam, V. Vivekanandhan?
- MULTI - CHANNEL ALLOCATION AND FAIR-PRIORITY MAC DESIGN FOR WIRELESS SENSOR NETWORKS?Authors: K. Ranjith Singh, S. Ranjani?
- Investigation on Mobile Phone Video StreamingAuthors: G. Sri Sanjeevini, B. Jayalakshmi, P.V.S. Srinivas
- Real time Background Suppression Technique for Detection of Moving Objects in Video Surveillance SystemAuthors: K. Swapna?
- A HYBRID APPROACH FOR HANDLING UNCERTAINTY - PROBABILISTIC THEORY, CERTAINTY FACTOR AND FUZZY LOGICAuthors: Sandhya Maitra, Nidhi Gupta
- An Overview of Lane Departure Warning System Based On DSP for Smart VehiclesAuthors: Rajashri Gulve, Anuja Diggikar?
- ANALYSIS OF ROUTING PROTOCOLS IN MANETsAuthors: Rajendran.P, Dr. V.N. Rajavarman?
- Survey of Spam Filtering Techniques and Tools, and MapReduce with SVM?Authors: Amol G. Kakade, Prashant K. Kharat, Anil Kumar Gupta?
- Review of Image Processing Technique for Glaucoma DetectionAuthors: Preeti, Jyotika Pruthi?
- CAN PROTOCOL IMPLEMENTATION FOR INDUSTRIAL PROCESSAuthors: Vemula Pallavi, N. Raju
- Scalable and Efficient Provable Automatic Blocker in CloudAuthors: D. Arjun Reddy, P.S. Murthy, D. Baswaraj?
- Review of Image Processing Techniques for Automatic Detection of Tumor in Human Brain?Authors: Poonam, Jyotika Pruthi?
- A Study on Association Rule Mining Using ACO Algorithm for Generating Optimized ResultSet?Authors: NN Das, Anjali Saini?
- Brief Survey on DNA Sequence MiningAuthors: NN Das, Poonam?
- Capacity-Optimized Topology Control in Wireless NetworksAuthors: R. Sriniketh, P.S. Murthy, D. Baswaraj?
- A Study and Analysis of DADCQ Protocol for VANETAuthors: S. Vijaya Kumar?, A. Noble Mary Juliet?
- Managing and Configuring Network through Software Defined Networking (SDN)Authors: K. Venkatraman, Dr. V. Parthasarathy?
- WIRELESS NETWORK MANAGED THROUGH SDNAuthors: K. Venkatraman, G. Ilakkia?
- PREDICTING MISSING ITEMS IN SHOPPING CART USING ASSOCIATIVE CLASSIFICATION MINING?Authors: K. Jagadish Kumar, Sahini Sairam
- Evolution of Authentication MechanismsAuthors: Ch. Krishna Prasad, A. Ramesh Babu?
- Container-Hiding Methods for Preventing Discriminating Blocking Attacks?Authors: R. SAILAJA, G. VENKATAPRASAD, E. HARI PRASAD
- Position Spatial Data by Eminence Preferences?Authors: SHAIKH ISULAL SULEMAN, M. YASEEN PASHA, K. SHARATH KUMAR?
- IMPLEMENTATION FOR 3-D DISCRETE WAVELET TRANSFORM BY USING EFFICIENT ARCHITECTURE?Authors: Ch. Madhuri, T. Guru Charan, Y. Shekar?
- An Effect and Analysis of Parameter on Ant Colony Optimization for Solving Travelling Salesman ProblemAuthors: Km. Shweta, Alka Singh
- AUTHORSHIP PATTERN AND COLLABORATIVE RESEARCH IN BIOINFORMATICS?Authors: Amsaveni.N, Manikandan.M, Manjula.M
- AN IMPROVEMENT IN BRAIN TUMOR DETECTION USING SEGMENTATION AND BOUNDING BOXAuthors: Priyanka, Balwinder Singh
- Multiple Description Coding Based on Hadamard Transform?Authors: S. Radhakrishnan, G.Jameena, M. Mohamed Sathik?
- Implementation of Image Processing Technique for Detecting Edges using abs-Laplacian kernel?Authors: V.SanthoshKumar, R.Alexgiftson, M.Kannukkiniyal
- Comparison Study of Segmentation Techniques for Brain Tumour Detection?Authors: D. Manju, Dr. M. Seetha, Dr. K. Venugopala Rao
- Evolution of Security Attacks and Security Technology?Authors: Ankalarao Konakalla, Bhavani Veeranki?
- Performance Evaluation of DSR and LAR Routing Protocols with MAC Layer in MANET’s?Authors: Venkataramana Attada, Pallam Shetty S
- Balance the Resource Consumption by using Head Selection Approach in ManetsAuthors: B. Vinodhini, S. Raja Ranganathan, Prabakar.D, Dr. M. Marikkannan?
- A Surveillance Robot with Climbing Capabilities for Home Security?Authors: Dipali Chavan, S.A. Annadate
- Wireless Sensor Network Using Flood MonitoringAuthors: Jaymala Patil, Anuja Kulkarni?
- Stack Based Implementation of Ordered Choice in Packrat ParsingAuthors: Manish M. Goswami, M.M. Raghuwanshi, Latesh Malik?
- Comparative Study of Different CPU Scheduling AlgorithmsAuthors: Miss. Jayashree S. Somani, Miss. Pooja K. Chhatwani?
- MANET Attacks and their Countermeasures: A Survey?Authors: Pankajini Panda, Khitish Ku. Gadnayak, Niranjan Panda?
- An Enhanced Security for TCP/IP Protocol SuiteAuthors: Dr. M. Anand Kumar, Dr. S. Karthikeyan
- Well-organized association Pattern Mining using Multi-relational Data Cubes?Authors: K.V.N.R.Sai Krishna, CH. Krishnamohan?
- COMPARATIVE STUDY OF NODE ENERGY CONSTRAINTS FOR MANET ROUTING PROTOCOLS?Authors: Soumya.C.P, Girija.G, Gowdhami.N