Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.2, No.4
Publisher: ZAIN Publications
Publishing Date: 2013-04-15
- Comparative Analysis and Implementation of Image Enhancement Techniques Using MATLAB?Authors: Er. Nancy, Er. Sumandeep Kaur?
- Using Some Data Mining Techniques to Predict the Survival Year of Lung Cancer Patient?Authors: Ada, Rajneet Kaur
- Inflection Rules for English to Marathi TranslationAuthors: Charugatra Tidke, Shital Binayakya, Shivani Patil, Rekha Sugandhi?
- A Cognitive Digital Home Framework using Admission Control and Resource Distribution?Authors: A. Sakira Parveen,? T. Muruga Jothi, R. Raja Kumari
- BIOCOMPUTATIONAL ANALYSIS OF GENE EXPRESSION FOR RHEUMATIC ARTHRITIS DISEASE?Authors: Dr. K.B.RAMESH, VIDYA M, Dr. B.P.Mallikarjunaswamy, Dr. E.T.Puttaiah
- A Study of Speech Emotion Recognition MethodsAuthors: Aastha Joshi, Rajneet Kaur?
- COMPREHENSIVE FRAMEWORK FOR PATTERN ANALYSIS THROUGH WEB LOGS USING WEB MINING: A REVIEWAuthors: Bhaiyalal Birla, Sachin Patel, Hemlata Sunhare?
- Design and Analysis of Register Element for Low Power Clocking System?Authors: Nagarajan.P, Dr.Saravanan.R?
- Implementation of High-Performance Image Scaling Processor using VLSI?Authors: R.S. KARTHIC
- FPGA Design of Parallel Linear-Phase FIR Digital Filter Using Distributed Arithmetic AlgorithmAuthors: P. Karthikeyan, Dr. Saravanan.R
- Perceptual Video Quality Measurement Based on Generalized Priority Model?Authors: S. Bharath, S. Jaganath, J. Prakash?
- Enhanced Network Based Query Processing in Road networks?Authors: Rathinaeswari.S.P, R. Parvathi?
- Low-complexity Histogram Modification Algorithm for Contrast Enhancement?Authors: V. Magudeeswaran, M. Krishnamurthy
- A Review on Various Web mining Techniques with Purposed Algorithm of K-means Web RankingAuthors: Mohinder Singh, Navjot Kaur?
- Verifying Integrity and Availability in Multi-Cloud Using PDP?Authors: Chandrasekaran Anand, Prabu. P, Roopan Prasath. V, Sasikumar. P, Silambarasan. P, Mr. P. Sivakumar?
- Supervised Neural Network using Maximum-Margin (MM) Principle?Authors: Prakash J. Kulkarni, Somnath Kadam?
- Elliptical Iris Detection using Morphological OperationsAuthors: Prakash J. Kulkarni, Vidya H. Kopanar?
- A Survey of Transport Layer Protocols on Reliability in Wireless Sensor NetworksAuthors: Sambhaji Sarode, Kasturi Pansambal, Rupali Kshirsagar, Anubhooti Nayakawadi, Supriya Vedpathak?
- TRANSINFORMER ? An Integrated System for Health Monitoring of Power Transformers?Authors: K.Gowri, T.Thangam, Rajasaranya
- A Survey on k-Means Clustering Algorithm Using Different Ranking Methods in Data Mining?Authors: Amar Singh, Navjot Kaur?
- HDL IMPLEMENTATION OF ALGEBRAIC SOFT DECISION ALGORITHM FOR RS CODES?Authors: M. Revathy, R. Saravanan?
- Research in Retrieving Concrete Image from the Blurred Image?Authors: Ashutosh Singhal, Charu Jain?
- Detecting and Resolving Firewall Policy Anomalies Using Rule-Based SegmentationAuthors: Anbarasan.A, Balasubramani.G, Madhan.C, Naveenkumar.P, Mrs. N.S.Nithya?
- Hardware-Optimized Lattice Reduction Algorithm for WiMax/LTE MIMO Detection using VLSI?Authors: R.Ragumadhavan?
- A Survey on Various Clustering Techniques with K-means Clustering Algorithm in Detail?Authors: Supreet Kaur, Usvir Kaur
- A Survey on Web Usage Mining with Fuzzy c-Means Clustering AlgorithmAuthors: Chhaman Lakheyan, Usvir kaur?
- Study on Various Web Mining Functionalities using Web Log Files?Authors: Supinder Singh, Sukhpreet Kaur?
- Comparative Analysis and Implementation of Image Encryption Algorithms?Authors: Rajinder Kaur, Er. Kanwalpreet Singh?
- Enhancing Interaction between Smartphones and Web Services on Cloud for Improved Bandwidth and Latency?Authors: Mandeep Singh, Kanwalvir Singh Dhindsa?
- DYNAMIC DATA GATHERING PROTOCOL IN WIRELESS SENSOR NETWORKS?Authors: Ms. S.SOBANA, M.KASTHURI, Mrs. S.KRISHNA PRABHA?
- Sharing File System for Campus Wide-Workgroups?Authors: Hangad Abdulkadar J, Avantkar Amol D, Chougule Amit B?
- AN ADAPTIVE PARTITIONAL CLUSTERING METHOD FOR CATEGORICAL ATTRIBUTE USING K-MEDOID?Authors: A. Selvakumar?
- SPOT PROTOCOL DETECTING OUTGOING SPAM MESSAGESAuthors: Ansari.R, Dr. V.N Raja Varman
- SECURING CLOUD COMPUTING ENVIRONMENT USING TIME DELAY BASED ON SESSION?Authors: Koteswar rao.M, Mr. G. Sree Ram?
- Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click PointsAuthors: Karthhik.K, Keerthana.R, Porkodi.A, Udhayakumar.S, Kesavan.S, Mr.Balamurugan.P?
- Clustering for Collaborative Filtering Application in Web RecommendationsAuthors: M. Kanimozhi, K. Logeshwari, K. Saranya, D. Sowbha, Mr. R. Velumani?
- RELAY SELECTION FOR SECURE CO-OPERATIVE NETWORKS WITH JAMMINGAuthors: Lakshmipraba.K, Nithya Devi.S, Praveen.P, Suresh Kumar.M, Mrs.V.Vennila
- Analysis of Buffer Sizing in Core Routers and Investigating Its Impact on Flow of Files?Authors: Priyadarsini S, Sharmila S, SivaSankari B, Vijaya Kumar P, Vipin P, Mr.A.Mummoorthy?
- Character Identification Using Graph Matching AlgorithmAuthors: S. Bharathi, P. Manirathnam, K. Ramya, R. Ranjith Kumar, Mrs. M. Tamilarasi?
- Encryption of Data to Prevent Jamming Attacks?Authors: N. Abirami, R. Jeeva, L. Revathi, U. Safiya, Mrs. E. Baby Anitha?
- PACKET HANDLING SCHEDULING IN MULTIPLE ROUTING CONFIGURATIONS FOR FAST IP NETWORK RECOVERY?Authors: H.V. Laxman Vijay, K. Sudheer Kumar, R.V. Krishnaiah
- Historical Document Preservation using Image Processing TechniqueAuthors: Prof. D.N. Satange, Ms. Swati S. Bobde, Ms. Snehal D. Chikate
- IBM I SERIES OVER IBM Z SERIESAuthors: MUPPALLA PRUDHVI, KOLA SIVA THARUN, SATTI SWAMI REDDY
- An Implementation of a Novel Secret Image Sharing Algorithm?Authors: Shanu Sharma?
- A Novel Prediction on Breast Cancer from the Basis of Association rules and Neural Network?Authors: S. Palaniappan, T. Pushparaj?
- ROBUST WATERMARKING SCHEME AGAINST GEOMETERICAL ATTACKSAuthors: Kiratpreet Singh, Rajneet Kaur
- Automatic Licenses Plate RecognitionAuthors: Ronak P Patel, Narendra M Patel, Keyur Brahmbhatt
- Hand Gesture Recognition Based Real-time Command System?Authors: P. Jenifer Martina, P. Nagarajan, P. Karthikeyan?
- IMPLEMENTATION OF NORMLIZED CUT ALGORITHAM FOR IMAGE SEGMENTATION?Authors: Hardik K Patel, Darshak G Thakore, Mahasweta Joshi?
- Exigent Vulnerability in Mobile Ad-hoc Network and Solutions in Context of Energy Optimization with Clustering TechniqueAuthors: Keshav Kumar Tiwari, Prof. Sanjay Agrawal
- A Survey on Techniques and Challenges in Image Super Resolution Reconstruction?Authors: Pandya Hardeep, Prof. Prashant B. Swadas, Prof. Mahasweta Joshi?
- Moving Object Tracking Using Kalman Filter?Authors: Hitesh A Patel, Darshak G Thakore?
- The Amalgamation of Digital Watermarking & Cloud Watermarking for Security Enhancement in Cloud Computing?Authors: Navneet Singh, Prof. Shailendra Singh?
- ADVANTAGES OF WCF OVER WEB SERVICES?Authors: Kola Siva Tharun, Muppalla Prudhvi, Satti Swami Reddy?
- Design of Low Power Dual Trigger Sequential Circuit?Authors: R. Balakumaresan, A. Selvapandian, S. Krishnakumar?
- HIGH IMPERCEPTIBLE ENCODING FOR COMPUTER NETWORKS SECURITY?Authors: C. KAVITHA, ANTONY JUDICE A, S. PRATHIBA?
- IMPROVED IMAGE WATERMARKING WITH CURVELET WAVELETAuthors: Mr. N. Suresh Kumar, Mr. B. Mathan Kumar?
- AUTHENTICATING MOBILE DEVICE USERS THROUGH IMAGE SELECTION?Authors: G. Vijay Baskar, N. Sangeetha?
- ROLE OF DATA MINING IN EDUCATION SECTORAuthors: Dr. Mohd Maqsood Ali?
- Enhanced Anomaly Detection IDS-Based Scheme for Dynamic MANET on-Demand (DYMO) Routing Protocol for MANETS?Authors: Anand Nayyar?
- An Analysis for Black Hole Attack in AODV Protocol and Its SolutionAuthors: Rahul Sharma, Naveen Dahiya, Divya Upadhyay?
- An Enhanced HASBE for Cloud Computing Environment?Authors: D. Hephzi Rachel, S. Prathiba?
- Modified Security Frame Work for PIR Cloud Computing Environment?Authors: J. Sinduja, S. Prathiba
- A Novel Network Interjection Avoidance for MANET?Authors: M. Sudharani, K.P. Kaliyamurthie
- Remote System Controller: An Implementation of a Secure Channel?Authors: Shanu Sharma?
- Adapted Encryption Algorithm with Multiple Skew Tent Map?Authors: Sarika Tyagi, Deepak chaudhary?
- IP Trace Back Scheme for Packet Marking and Packet Logging Using RIHT?Authors: C. VAIYAPURI, R. MOHANDAS?
- A Secure Decentralized Cloud Computing Environment over Peer to Peer?Authors: Tanupriya Choudhury, Vasudha Vashisht, Himanshu Srivastava
- TECHNOLOGY BOON: EEG BASED BRAIN COMPUTER INTERFACE - A SURVEY?Authors: Vasudha Vashisht, Dr. T. V. Prasad, Dr. S.V.A.V. Prasad?
- DESIGN AND ANALYSIS OF POWER EFFICIENT CLOCKED PAIR SHARED FLIPFLOPAuthors: B. Ragavi, K. Rajesh, A. Selvapandian
- CANCER RESEARCH THROUGH THE HELP OF SOFT COMPUTING TECHNIQUES: A SURVEY?Authors: Mr. Tanupriya Choudhury, Dr. Vivek Kumar, Dr. Darshika Nigam?
- IMAGE COMPRESSION WITH SCALABLE ROI USING ADAPTIVE HUFFMAN CODINGAuthors: P. Sutha?
- Improve Query Performance Using Effective Materialized View Selection and Maintenance: A Survey?Authors: Ashish P. Mohod, Manoj S. Chaudhari?
- Coverage Analysis and Chinese Postman Algorithm for Efficient Model-Based Test GenerationAuthors: Parampreet Kaur, Gaurav Gupta
- Receiver Based Geographic Multicast Routing in Ad Hoc NetworksAuthors: Koteswararao Nuthalapati, Poornima Samamthula, Gunasekhar Bathina?
- Customer Security Issues in Cloud Computing?Authors: Nimmati Satheesh?
- SECURED SEARCHING OF VALUABLE DATA IN A METRIC SPACE BASED ON SIMILARITY MEASUREAuthors: R. Rathika, Dr. K. Raja
- IMPLEMENTATION OF PARALLEL APRIORI ALGORITHM ON HADOOP CLUSTERAuthors: A. Ezhilvathani, Dr. K. Raja?
- Deep Malicious Website Detection?Authors: Parvatam Sriram Rohit, R. Krishnaveni?
- Security Based Phishing Website DetectionAuthors: Yalavarthi Ravi Theja, R. Krishnaveni?
- Feature Extraction and Classification of Emotions in Wave Files Using Crossbreed Algorithm?Authors: Aastha Joshi, Rajneet Kaur?
- A Robust DR Classification from Blood Vessel Features?Authors: Alka Vijayan, Antony Judice.A?
- Methodologies for Trend Detection Based on Temporal Text Mining?Authors: M. BANU PRIYA, Dr. A. KUMARAVEL?
- Modified Approach of User Profiling from Search Engine LogsAuthors: C. DEEPA, S. PRATHIBA?
- Optimized Rapid Data Collection in Tree Based WSNAuthors: DEVASAHAYAM, K.P. KALIYAMURTHIE?
- A Novel Approach of Detecting the Camouflaging Worm?Authors: HEMALATHA R, S. PRATHIBA?
- Information Extraction by Mining the Semantic Web?Authors: R. PREETHI, C. ANURADHA?
- A Review on Data Leakage Detection?Authors: SHAJ.V, K.P. KALIYAMURTHIE?
- Privacy-Preserving Updates to Anonymous Databases?Authors: SIVASUBRAMANIAN.R, K.P. KALIYAMURTHIE?
- An Evaluation of Location Privacy in Wireless Sensor Networks?Authors: R. SUGANYA SUBATHRA, A.R. ARUNACHALAM?
- Detection of Mobile Replica Nodes in Wireless Sensor Networks?Authors: KARTHIK.S, K.P. KALIYAMURTHIE?
- Implementation of Cryptographic Algorithm on FPGAAuthors: Prof. S. Venkateswarlu, Deepa G.M, G. Sriteja?
- New Data Mining Algorithm for Intrusion Detection in NetworksAuthors: M. Penchala Praveen, M. Sambath, S. Ravi?
- A Novel Security Technique in Message Passing Interface Systems?Authors: UDHAYASHANKAR.S, Dr. K.P. KALIYAMURTHIE, MATHIVILASINI.S
- A Novel Resource Distributed Discovery and Management in Grid ComputingAuthors: M. Brinda Kumar, Dr. K.P. Kaliyamurthie?
- Normalized graph-cut based Necrotic Image Segmentation of Brain TumoursAuthors: J.S. JUFIN, D. JEBA DERWIN?
- Modified Approaches on Face Recognition By using Multisensory ImageAuthors: S. Dhanarajan, G. Michael?