Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.2, No.5
Publisher: ZAIN Publications
Publishing Date: 2013-05-15
- DETECTION OF MALICIOUS URL REDIRECTION AND DISTRIBUTION?Authors: T. Manjula Devi, R. Krishnaveni?
- PRAGMATIC APPROACH ON COST ESTIMATION TOOLSAuthors: Gurpreet Singh, Shashi Kant Rathore, Ranjit Kaur?
- Optimal Node Selection Using Broadcasting Algorithm in Mobile Adhoc Network?Authors: K.B. Ravindranth, Dr. K.P. Kaliyamurthie
- Cloud on Linux Operating SystemAuthors: Pritee Gavhane, Pratibha Kurumkar, Madhuri Jagtap, Dharti Mahajan?
- MULTIPLE FAULT DIAGNOSIS FOR HIGH SPEED HYBRID MEMORY ARCHITECTUREAuthors: B. Kamala Soundari, M. Praveena
- An Evaluation of Different Routing Schemes in DTN?Authors: S. Anitha, G. Micheal?
- MONITORING LOCAL AREA NETWORK USING REMOTE METHOD INVOCATION?Authors: Harsh Mittal, Manoj Jain, Latha Banda
- Judging Relevance of Candidate Answers in Question Answering SystemAuthors: Rawia Awadallah
- Software Risk Management?Authors: P. M. Chawan, Jijnasa Patil, Radhika Naik?
- Various Hierarchical Routing Protocols in Wireless Sensor Network: A Survey?Authors: Vandna Sharma, Payal Jain
- A Novel Approach of Energy Optimization in WSN?Authors: S. Geetha Priya, A.R. Arunachalam?
- Study on Various Glass Defect Using Glass Edge Detection Methods?Authors: Sumeet Singh Tiwana, Sukhpreet Kaur?
- Safekeeping of Network Executive for a Domestic Internet Service Provider?Authors: K.V.N.R. Sai Krishna?
- Effective Identification of the Intruders and Modifiers in Wireless Sensor NetworksAuthors: J. Vijayagajendiran, D. Udhayakumarapandian?
- An Efficient Approach to Improve Response Time in Multibiometric Patterns Retrieval from Large Database?Authors: S. Balgani, S. Sangeetha?
- Review Paper on Detection and Prevention Techniques of Gray-Hole Attack in Manet?Authors: Ashok Desai?
- ANALYSIS OF E-LEARNING IN BUSINESS AND TOOLS FOR IMPROVING THE EFFECTIVENESS OF THE EDUCATIONAL SYSTEM?Authors: S. Jayakumar, S. Manimaran, M. GopiAnand
- TALKING HANDHELD DEVICE FOR VISUALLY CHALLENGED PERSONAuthors: M. Smitha, T. Ayesha Rumana?
- A Review: Image Extraction with Weighted Page Rank using Partial Tree Alignment AlgorithmAuthors: Gagan Preet Kaur, Usvir Kaur, Dheerendra Singh?
- SCOPE AND LIMITATION OF ELECTRONIC VOTING SYSTEMAuthors: Atiya Parveen, Sobia Habib, Saoud Sarwar?
- Multi-Operating Environment SystemAuthors: Aditya Thakare, Prachi Deshmukh, Shraddha Kawane, Yogesh Sarda?
- Decorate Ensemble of Artificial Neural Networks with High Diversity for Classification?Authors: Mittal C. Patel, Prof. Mahesh Panchal, Himani P. Bhavsar?
- GENETIC ALGORITM BASED HINDI WORD SENSE DISAMBIGAUTIONAuthors: Sabnam Kumari, Prof. (Dr.) Paramjit Singh?
- AN IMAGE ENCRYPTION USING BIT LEVEL PERMUTATION AND DEPENDENT DIFFUSION?Authors: G.S. Nandeesh, P.A. Vijaya, M.V. Sathyanarayana?
- Content Based Image Retrieval with Log Based Relevance Feedback Using Combination of Query Expansion and Query Point movement?Authors: Bhailal Limbasiya, Swati Patel?
- Hierarchical EAP Back-End Authenticator State Machine?Authors: Desai Malav, Kalpesh Patel?
- Improved Data Reduction Technique in Data Mining?Authors: Pritesh Vora, Bhavesh Oza
- Enhanced Multistage Content Based Image Retrieval?Authors: Nandish Chauhan, Mahesh Goyani?
- Cloud Computing: A Revolution in Communication?Authors: Rani Srivastava, Shekhar Gupta?
- DESIGNING A VIRTUAL MACHINE FOR IDENTIFICATION OF CARDIAC ARRHYTHMIAS USING LAB VIEWAuthors: B. Subha, Subha.S.V, M.Anitha, M.Eniya, M.Gaayathri?
- PATIENT MONITORING SYSTEM USING ANDROID TECHNOLOGYAuthors: Prema Sundaram
- New Applications of Soft Computing, Artificial Intelligence, Fuzzy Logic & Genetic Algorithm in BioinformaticsAuthors: Dr. Tryambak A. Hiwarkar, R. Sridhar Iyer?
- Flexible Bloom for Searching Textual Content Based Retrieval System in an Unstructured P2P Overlay Networks?Authors: S. Uvaraj, S. Suresh, Dr. E. Mohan?
- Survey of Resource and Grouping Based Job Scheduling Algorithm in Grid Computing?Authors: Sandeep Kaur, Sukhpreet Kaur?
- Empowering Intrusion Detection Systems in Multitier Web Applications Using Clustering Algorithms?Authors: RANJITH SIVADASAN, P. MADHAVAN
- Implementation of Multicast Routing Using Genetic Algorithm?Authors: Priti Gaur?
- Literature Survey on Automated Person Identification Techniques?Authors: Sruthy Sebastian?
- THE CLOUD- CHANGING THE INDIAN HEALTHCARE SYSTEM?Authors: Atiya Parveen, Sobia Habib, Waseem Ahmad?
- IMAGE SEGMENTATION FOR TUMOR DETECTION USING FUZZY INFERENCE SYSTEM?Authors: V. Janani, P. Meena?
- SECURE COMMUNICATION OF SECRET DATA USING STEGNOGRAPHY?Authors: Sobia Habib, Atiya Parveen, Saoud Sarwar?
- Hybrid Compression Using DWT-DCT and Huffman Encoding Techniques for Biomedical Image and Video Applications?Authors: K.N. Bharath, G. Padmajadevi, Kiran?
- A Survey on Software Development Life Cycle Models?Authors: T Bhuvaneswari, S Prabaharan?
- Swarm Intelligence for Network Communication RoutingAuthors: Gauri Nagar, Arpit Sood, Monika Roopak?
- FACTS INCLUSION BIOINFORMATICS: MODERN EFFORTS AND DISPUTE?Authors: Dr. Tryambak A. Hiwarkar, R. Sridhar Iyer
- Multi-frequency Measurement of Electrical Bioimpedance of Bone to assess Bone Mineral Density?Authors: Mrs. S. Mythili, Dr. G. Athisha?
- DATA LEAKAGE DETECTION?Authors: N. Bangar Anjali, P. Rokade Geetanjali, Patil Shivlila, R. Shetkar Swati, Prof. N B Kadu?
- A Survey and Analysis of Media Keying Techniques in Session Initiation Protocol (SIP)?Authors: Rajesh Kumar, Sandip Chauhan?
- Vehicular Ad-Hoc Network a Comparative Study and Simulation?Authors: Niranjan Singh, Sunil Kumar, Rajdeep Singh, B S Rawat, Devendra Singh
- REVIEW OF ENSEMBLE CLASSIFICATION?Authors: V. Chitraa, Dr. Antony Selvadoss Thanamani?
- Research Analysis of Cloud Computing?Authors: G. Vijay Baskar, N. Sathees Kumar, N. Karthick?
- Analysis of Yslow Performance Test tool & Emergences on Web Page Data ExtractionAuthors: R. Mamatha, N. Indira Priyadarsini?
- Utilizing WM and GM for Finding Intelligence of Human Behavior?Authors: Mrs. Mary Cecil, Prof. Samir Kumar Bandyopadhyay?
- A Survey on Clustering Principles with K-means Clustering Algorithm Using Different Methods in Detail?Authors: Manpreet Kaur, Usvir Kaur?
- Genomic Signal Processing (GSP) Of Rheumatic Arthritis (RA) Using Different Indicator Sequences?Authors: K.B. Ramesh, Prabhu Shankar.K.S, B.P. Mallikarjunaswamy, E.T. Puttaiah?
- Mitigation of Blackhole for AODV (Ad hoc On Demand Distance Vector)?Authors: Ms. Bhumi Jani, Prof. Hitesh Patel?
- Performance Evaluation of Rayleigh Multipath Fading Channel using Rectangular QAM schemes?Authors: Mr. P. Sunil Kumar, Dr. M.G. Sumithra, Ms. M. Sarumathi?
- Applications of Swarm Intelligence?Authors: Amrit Saggu, Pallavi Yadav, Monika Roopak?
- ROUTING ATTACKS IN MOBILE AD HOC NETWORKS?Authors: P. Narendra Reddy, CH. Vishnuvardhan, V. Ramesh?
- An Overview on Reactive Protocols for Mobile Ad-Hoc Networks?Authors: P. Narendra Reddy, CH. Vishnuvardhan, V. Ramesh?
- An Efficient Pixel-shuffling Based Approach to Simultaneously Perform Image Compression, Encryption and Steganography?Authors: Navita Agarwal, Himanshu Sharma?
- An Efficient Back Propagation Neural Network Based Face Recognition System Using Haar Wavelet Transform and PCA?Authors: Prachi Agarwal, Naveen Prakash?
- A STUDY OF PRIVACY-PRESERVING WHILE SHARING SENSITIVE INFORMATION?Authors: K.V. Lakshmi Praveena?
- SPEAKER RECOGNITION AND AUTHENTICATION?Authors: Rakesh D R, JAYASIMHAN N K?
- Stimulus-Response Behavior of Moving Agents?Authors: Yuniel E. Proenza Arias, Martín E. Proenza Arias?
- Arduino Based Wireless Intrusion Detection Using IR Sensor and GSM?Authors: Prakash Kumar, Pradeep Kumar?
- Comparison and Simulation of POR and E-POR Routing Protocols in MANETs?Authors: M. Chandrika, N. Papanna?
- A Study on Multi Project Resource Constrained Project Scheduling using Metaheuristic Approach?Authors: S. Siva Vidya, M. Suguna, Dr. D. Sharmila?
- Improvement in Word Sense Disambiguation by Introducing Enhancements in English WordNet Structure?Authors: Swati Rastogi, Sanjeev Thakur?