ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.2, No.4

Publisher: IJCSMC Publishing Team

Publishing Date: 2013-04-15

  1. Comparative Analysis and Implementation of Image Enhancement Techniques Using MATLAB?

    Authors: Er. Nancy, Er. Sumandeep Kaur?

  2. Using Some Data Mining Techniques to Predict the Survival Year of Lung Cancer Patient?

    Authors: Ada, Rajneet Kaur

  3. Inflection Rules for English to Marathi Translation

    Authors: Charugatra Tidke, Shital Binayakya, Shivani Patil, Rekha Sugandhi?

  4. A Cognitive Digital Home Framework using Admission Control and Resource Distribution?

    Authors: A. Sakira Parveen,? T. Muruga Jothi, R. Raja Kumari

  5. BIOCOMPUTATIONAL ANALYSIS OF GENE EXPRESSION FOR RHEUMATIC ARTHRITIS DISEASE?

    Authors: Dr. K.B.RAMESH, VIDYA M, Dr. B.P.Mallikarjunaswamy, Dr. E.T.Puttaiah

  6. A Study of Speech Emotion Recognition Methods

    Authors: Aastha Joshi, Rajneet Kaur?

  7. COMPREHENSIVE FRAMEWORK FOR PATTERN ANALYSIS THROUGH WEB LOGS USING WEB MINING: A REVIEW

    Authors: Bhaiyalal Birla, Sachin Patel, Hemlata Sunhare?

  8. Design and Analysis of Register Element for Low Power Clocking System?

    Authors: Nagarajan.P, Dr.Saravanan.R?

  9. Implementation of High-Performance Image Scaling Processor using VLSI?

    Authors: R.S. KARTHIC

  10. FPGA Design of Parallel Linear-Phase FIR Digital Filter Using Distributed Arithmetic Algorithm

    Authors: P. Karthikeyan, Dr. Saravanan.R

  11. Perceptual Video Quality Measurement Based on Generalized Priority Model?

    Authors: S. Bharath, S. Jaganath, J. Prakash?

  12. Enhanced Network Based Query Processing in Road networks?

    Authors: Rathinaeswari.S.P, R. Parvathi?

  13. Low-complexity Histogram Modification Algorithm for Contrast Enhancement?

    Authors: V. Magudeeswaran, M. Krishnamurthy

  14. A Review on Various Web mining Techniques with Purposed Algorithm of K-means Web Ranking

    Authors: Mohinder Singh, Navjot Kaur?

  15. Verifying Integrity and Availability in Multi-Cloud Using PDP?

    Authors: Chandrasekaran Anand, Prabu. P, Roopan Prasath. V, Sasikumar. P, Silambarasan. P, Mr. P. Sivakumar?

  16. Supervised Neural Network using Maximum-Margin (MM) Principle?

    Authors: Prakash J. Kulkarni, Somnath Kadam?

  17. Elliptical Iris Detection using Morphological Operations

    Authors: Prakash J. Kulkarni, Vidya H. Kopanar?

  18. A Survey of Transport Layer Protocols on Reliability in Wireless Sensor Networks

    Authors: Sambhaji Sarode, Kasturi Pansambal, Rupali Kshirsagar, Anubhooti Nayakawadi, Supriya Vedpathak?

  19. TRANSINFORMER ? An Integrated System for Health Monitoring of Power Transformers?

    Authors: K.Gowri, T.Thangam, Rajasaranya

  20. A Survey on k-Means Clustering Algorithm Using Different Ranking Methods in Data Mining?

    Authors: Amar Singh, Navjot Kaur?

  21. HDL IMPLEMENTATION OF ALGEBRAIC SOFT DECISION ALGORITHM FOR RS CODES?

    Authors: M. Revathy, R. Saravanan?

  22. Research in Retrieving Concrete Image from the Blurred Image?

    Authors: Ashutosh Singhal, Charu Jain?

  23. Detecting and Resolving Firewall Policy Anomalies Using Rule-Based Segmentation

    Authors: Anbarasan.A, Balasubramani.G, Madhan.C, Naveenkumar.P, Mrs. N.S.Nithya?

  24. Hardware-Optimized Lattice Reduction Algorithm for WiMax/LTE MIMO Detection using VLSI?

    Authors: R.Ragumadhavan?

  25. A Survey on Various Clustering Techniques with K-means Clustering Algorithm in Detail?

    Authors: Supreet Kaur, Usvir Kaur

  26. A Survey on Web Usage Mining with Fuzzy c-Means Clustering Algorithm

    Authors: Chhaman Lakheyan, Usvir kaur?

  27. Study on Various Web Mining Functionalities using Web Log Files?

    Authors: Supinder Singh, Sukhpreet Kaur?

  28. Comparative Analysis and Implementation of Image Encryption Algorithms?

    Authors: Rajinder Kaur, Er. Kanwalpreet Singh?

  29. Enhancing Interaction between Smartphones and Web Services on Cloud for Improved Bandwidth and Latency?

    Authors: Mandeep Singh, Kanwalvir Singh Dhindsa?

  30. DYNAMIC DATA GATHERING PROTOCOL IN WIRELESS SENSOR NETWORKS?

    Authors: Ms. S.SOBANA, M.KASTHURI, Mrs. S.KRISHNA PRABHA?

  31. Sharing File System for Campus Wide-Workgroups?

    Authors: Hangad Abdulkadar J, Avantkar Amol D, Chougule Amit B?

  32. AN ADAPTIVE PARTITIONAL CLUSTERING METHOD FOR CATEGORICAL ATTRIBUTE USING K-MEDOID?

    Authors: A. Selvakumar?

  33. SPOT PROTOCOL DETECTING OUTGOING SPAM MESSAGES

    Authors: Ansari.R, Dr. V.N Raja Varman

  34. SECURING CLOUD COMPUTING ENVIRONMENT USING TIME DELAY BASED ON SESSION?

    Authors: Koteswar rao.M, Mr. G. Sree Ram?

  35. Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points

    Authors: Karthhik.K, Keerthana.R, Porkodi.A, Udhayakumar.S, Kesavan.S, Mr.Balamurugan.P?

  36. Clustering for Collaborative Filtering Application in Web Recommendations

    Authors: M. Kanimozhi, K. Logeshwari, K. Saranya, D. Sowbha, Mr. R. Velumani?

  37. RELAY SELECTION FOR SECURE CO-OPERATIVE NETWORKS WITH JAMMING

    Authors: Lakshmipraba.K, Nithya Devi.S, Praveen.P, Suresh Kumar.M, Mrs.V.Vennila

  38. Analysis of Buffer Sizing in Core Routers and Investigating Its Impact on Flow of Files?

    Authors: Priyadarsini S, Sharmila S, SivaSankari B, Vijaya Kumar P, Vipin P, Mr.A.Mummoorthy?

  39. Character Identification Using Graph Matching Algorithm

    Authors: S. Bharathi, P. Manirathnam, K. Ramya, R. Ranjith Kumar, Mrs. M. Tamilarasi?

  40. Encryption of Data to Prevent Jamming Attacks?

    Authors: N. Abirami, R. Jeeva, L. Revathi, U. Safiya, Mrs. E. Baby Anitha?

  41. PACKET HANDLING SCHEDULING IN MULTIPLE ROUTING CONFIGURATIONS FOR FAST IP NETWORK RECOVERY?

    Authors: H.V. Laxman Vijay, K. Sudheer Kumar, R.V. Krishnaiah

  42. Historical Document Preservation using Image Processing Technique

    Authors: Prof. D.N. Satange, Ms. Swati S. Bobde, Ms. Snehal D. Chikate

  43. IBM I SERIES OVER IBM Z SERIES

    Authors: MUPPALLA PRUDHVI, KOLA SIVA THARUN, SATTI SWAMI REDDY

  44. An Implementation of a Novel Secret Image Sharing Algorithm?

    Authors: Shanu Sharma?

  45. A Novel Prediction on Breast Cancer from the Basis of Association rules and Neural Network?

    Authors: S. Palaniappan, T. Pushparaj?

  46. ROBUST WATERMARKING SCHEME AGAINST GEOMETERICAL ATTACKS

    Authors: Kiratpreet Singh, Rajneet Kaur

  47. Automatic Licenses Plate Recognition

    Authors: Ronak P Patel, Narendra M Patel, Keyur Brahmbhatt

  48. Hand Gesture Recognition Based Real-time Command System?

    Authors: P. Jenifer Martina, P. Nagarajan, P. Karthikeyan?

  49. IMPLEMENTATION OF NORMLIZED CUT ALGORITHAM FOR IMAGE SEGMENTATION?

    Authors: Hardik K Patel, Darshak G Thakore, Mahasweta Joshi?

  50. Exigent Vulnerability in Mobile Ad-hoc Network and Solutions in Context of Energy Optimization with Clustering Technique

    Authors: Keshav Kumar Tiwari, Prof. Sanjay Agrawal

  51. A Survey on Techniques and Challenges in Image Super Resolution Reconstruction?

    Authors: Pandya Hardeep, Prof. Prashant B. Swadas, Prof. Mahasweta Joshi?

  52. Moving Object Tracking Using Kalman Filter?

    Authors: Hitesh A Patel, Darshak G Thakore?

  53. The Amalgamation of Digital Watermarking & Cloud Watermarking for Security Enhancement in Cloud Computing?

    Authors: Navneet Singh, Prof. Shailendra Singh?

  54. ADVANTAGES OF WCF OVER WEB SERVICES?

    Authors: Kola Siva Tharun, Muppalla Prudhvi, Satti Swami Reddy?

  55. Design of Low Power Dual Trigger Sequential Circuit?

    Authors: R. Balakumaresan, A. Selvapandian, S. Krishnakumar?

  56. HIGH IMPERCEPTIBLE ENCODING FOR COMPUTER NETWORKS SECURITY?

    Authors: C. KAVITHA, ANTONY JUDICE A, S. PRATHIBA?

  57. IMPROVED IMAGE WATERMARKING WITH CURVELET WAVELET

    Authors: Mr. N. Suresh Kumar, Mr. B. Mathan Kumar?

  58. AUTHENTICATING MOBILE DEVICE USERS THROUGH IMAGE SELECTION?

    Authors: G. Vijay Baskar, N. Sangeetha?

  59. ROLE OF DATA MINING IN EDUCATION SECTOR

    Authors: Dr. Mohd Maqsood Ali?

  60. Enhanced Anomaly Detection IDS-Based Scheme for Dynamic MANET on-Demand (DYMO) Routing Protocol for MANETS?

    Authors: Anand Nayyar?

  61. An Analysis for Black Hole Attack in AODV Protocol and Its Solution

    Authors: Rahul Sharma, Naveen Dahiya, Divya Upadhyay?

  62. An Enhanced HASBE for Cloud Computing Environment?

    Authors: D. Hephzi Rachel, S. Prathiba?

  63. Modified Security Frame Work for PIR Cloud Computing Environment?

    Authors: J. Sinduja, S. Prathiba

  64. A Novel Network Interjection Avoidance for MANET?

    Authors: M. Sudharani, K.P. Kaliyamurthie

  65. Remote System Controller: An Implementation of a Secure Channel?

    Authors: Shanu Sharma?

  66. Adapted Encryption Algorithm with Multiple Skew Tent Map?

    Authors: Sarika Tyagi, Deepak chaudhary?

  67. IP Trace Back Scheme for Packet Marking and Packet Logging Using RIHT?

    Authors: C. VAIYAPURI, R. MOHANDAS?

  68. A Secure Decentralized Cloud Computing Environment over Peer to Peer?

    Authors: Tanupriya Choudhury, Vasudha Vashisht, Himanshu Srivastava

  69. TECHNOLOGY BOON: EEG BASED BRAIN COMPUTER INTERFACE - A SURVEY?

    Authors: Vasudha Vashisht, Dr. T. V. Prasad, Dr. S.V.A.V. Prasad?

  70. DESIGN AND ANALYSIS OF POWER EFFICIENT CLOCKED PAIR SHARED FLIPFLOP

    Authors: B. Ragavi, K. Rajesh, A. Selvapandian

  71. CANCER RESEARCH THROUGH THE HELP OF SOFT COMPUTING TECHNIQUES: A SURVEY?

    Authors: Mr. Tanupriya Choudhury, Dr. Vivek Kumar, Dr. Darshika Nigam?

  72. IMAGE COMPRESSION WITH SCALABLE ROI USING ADAPTIVE HUFFMAN CODING

    Authors: P. Sutha?

  73. Improve Query Performance Using Effective Materialized View Selection and Maintenance: A Survey?

    Authors: Ashish P. Mohod, Manoj S. Chaudhari?

  74. Coverage Analysis and Chinese Postman Algorithm for Efficient Model-Based Test Generation

    Authors: Parampreet Kaur, Gaurav Gupta

  75. Receiver Based Geographic Multicast Routing in Ad Hoc Networks

    Authors: Koteswararao Nuthalapati, Poornima Samamthula, Gunasekhar Bathina?

  76. Customer Security Issues in Cloud Computing?

    Authors: Nimmati Satheesh?

  77. SECURED SEARCHING OF VALUABLE DATA IN A METRIC SPACE BASED ON SIMILARITY MEASURE

    Authors: R. Rathika, Dr. K. Raja

  78. IMPLEMENTATION OF PARALLEL APRIORI ALGORITHM ON HADOOP CLUSTER

    Authors: A. Ezhilvathani, Dr. K. Raja?

  79. Deep Malicious Website Detection?

    Authors: Parvatam Sriram Rohit, R. Krishnaveni?

  80. Security Based Phishing Website Detection

    Authors: Yalavarthi Ravi Theja, R. Krishnaveni?

  81. Feature Extraction and Classification of Emotions in Wave Files Using Crossbreed Algorithm?

    Authors: Aastha Joshi, Rajneet Kaur?

  82. A Robust DR Classification from Blood Vessel Features?

    Authors: Alka Vijayan, Antony Judice.A?

  83. Methodologies for Trend Detection Based on Temporal Text Mining?

    Authors: M. BANU PRIYA, Dr. A. KUMARAVEL?

  84. Modified Approach of User Profiling from Search Engine Logs

    Authors: C. DEEPA, S. PRATHIBA?

  85. Optimized Rapid Data Collection in Tree Based WSN

    Authors: DEVASAHAYAM, K.P. KALIYAMURTHIE?

  86. A Novel Approach of Detecting the Camouflaging Worm?

    Authors: HEMALATHA R, S. PRATHIBA?

  87. Information Extraction by Mining the Semantic Web?

    Authors: R. PREETHI, C. ANURADHA?

  88. A Review on Data Leakage Detection?

    Authors: SHAJ.V, K.P. KALIYAMURTHIE?

  89. Privacy-Preserving Updates to Anonymous Databases?

    Authors: SIVASUBRAMANIAN.R, K.P. KALIYAMURTHIE?

  90. An Evaluation of Location Privacy in Wireless Sensor Networks?

    Authors: R. SUGANYA SUBATHRA, A.R. ARUNACHALAM?

  91. Detection of Mobile Replica Nodes in Wireless Sensor Networks?

    Authors: KARTHIK.S, K.P. KALIYAMURTHIE?

  92. Implementation of Cryptographic Algorithm on FPGA

    Authors: Prof. S. Venkateswarlu, Deepa G.M, G. Sriteja?

  93. New Data Mining Algorithm for Intrusion Detection in Networks

    Authors: M. Penchala Praveen, M. Sambath, S. Ravi?

  94. A Novel Security Technique in Message Passing Interface Systems?

    Authors: UDHAYASHANKAR.S, Dr. K.P. KALIYAMURTHIE, MATHIVILASINI.S

  95. A Novel Resource Distributed Discovery and Management in Grid Computing

    Authors: M. Brinda Kumar, Dr. K.P. Kaliyamurthie?

  96. Normalized graph-cut based Necrotic Image Segmentation of Brain Tumours

    Authors: J.S. JUFIN, D. JEBA DERWIN?

  97. Modified Approaches on Face Recognition By using Multisensory Image

    Authors: S. Dhanarajan, G. Michael?