Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.2, No.3
Publisher: ZAIN Publications
Publishing Date: 2013-03-15
- Various Approaches for Detecting Attacks in Intrusion Detection System??Authors: Purva Adlakha, Prof. Priti Subramanium
- Quality of Service Routing Protocol for Mobile Ad hoc Network?Authors: D. Annapurna, K B Raja, Venugopal K R, L M Patnaik?
- Iris Recognition Using Fuzzy System?Authors: Prof.D.D.Patil, Prof.N.A.Nemade, K.M.Attarde
- An Automated Biometric Attendance Management System with Dual Authentication Mechanism Based on Bluetooth and NFC Technologies?Authors: Samuel King Opoku?
- Effect of Twisted Pair Cable Arrangement on Manual Termination with RJ 45 and the Quality of Communication in Auto-Sensing Port DevicesAuthors: Samuel King Opoku, Malik Adams, Edward Akaadom
- Business Process Modeling Notation?Authors: Robert Flowers, Charles Edeki
- Signal Strength and System Operating Margin Estimation for Vehicular Ad-Hoc Networks in Rayleigh Fading Environment?Authors: Tilotma Yadav, Partha Pratim Bhattacharya
- Energy Awareness in HPC: A Survey?Authors: A. R. Surve, A. R. Khomane, S.D. Cheke
- Federated Network Security Administration Framework?Authors: Bhadreshsinh G. Gohil, Rishi K. Pathak, Axaykumar A. Patel
- Prolonged Network Lifetime and Data Wholeness by Clusters Using B-Ct Algorithm?Authors: P.Thiyagarajan, O.K.Gowrishankar, K.Sudhakar
- Design of Search Engine using Vector Space Model for Personalized SearchAuthors: R.K.Makhijani, I.N.Bharambe
- Mesh Technique for Nymble Architecture Sustaining - Secrecy and Security in Anonymizing Networks?Authors: J.Praveen Kumar, B.Shyam Kumar
- Energy Conscious Dynamic Provisioning of Virtual Machines using Adaptive Migration Thresholds in Cloud Data CenterAuthors: Khushbu Maurya, Richa Sinha?
- A Survey on Knowledge Based Classification of Different Routing Protocols in Delay Tolerant Networks?Authors: Chintan B. Desai, Vyomal N. Pandya, Prof. Sarman K. Hadia
- Grouping and Categorization of Documents in Relativity Measure?Authors: V. Asaithambi, D. John Aravindhar, V. Dheepa
- Signature Free Virus Blocking Method to Detect Software Code Security?Authors: N. Magarani, K. Devipriya, S. Madhan Kumar, T. Viknesh Kumar, K. Kumaresan?
- System Monitoring and Security Using Keylogger?Authors: Preeti Tuli, Priyanka Sahu
- A Collaborative Selfish Replica with Watchdog and Pathrater in MANETSAuthors: D. Anitha, Dr. M.Punithavalli
- Efficient Key Generation for Multimedia and Web Applications?Authors: S.Swamy Reddy, V.Ramana reddy, K.Praveen kumar
- Face detection using a hybrid approach that combines HSV and RGB?Authors: Mrs. Sunita Roy, Prof. Samir K. Bandyopadhyay
- Analysis of Robustness of Hybrid Digital Image Watermarking Technique under Various AttacksAuthors: Yashovardhan Kelkar?, Heena Shaikh, Mohd.Imran Khan