ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.2, No.5

Publisher: ZAIN Publications

Publishing Date: 2013-05-15

  1. DETECTION OF MALICIOUS URL REDIRECTION AND DISTRIBUTION?

    Authors: T. Manjula Devi, R. Krishnaveni?

  2. PRAGMATIC APPROACH ON COST ESTIMATION TOOLS

    Authors: Gurpreet Singh, Shashi Kant Rathore, Ranjit Kaur?

  3. Optimal Node Selection Using Broadcasting Algorithm in Mobile Adhoc Network?

    Authors: K.B. Ravindranth, Dr. K.P. Kaliyamurthie

  4. Cloud on Linux Operating System

    Authors: Pritee Gavhane, Pratibha Kurumkar, Madhuri Jagtap, Dharti Mahajan?

  5. MULTIPLE FAULT DIAGNOSIS FOR HIGH SPEED HYBRID MEMORY ARCHITECTURE

    Authors: B. Kamala Soundari, M. Praveena

  6. An Evaluation of Different Routing Schemes in DTN?

    Authors: S. Anitha, G. Micheal?

  7. MONITORING LOCAL AREA NETWORK USING REMOTE METHOD INVOCATION?

    Authors: Harsh Mittal, Manoj Jain, Latha Banda

  8. Judging Relevance of Candidate Answers in Question Answering System

    Authors: Rawia Awadallah

  9. Software Risk Management?

    Authors: P. M. Chawan, Jijnasa Patil, Radhika Naik?

  10. Various Hierarchical Routing Protocols in Wireless Sensor Network: A Survey?

    Authors: Vandna Sharma, Payal Jain

  11. A Novel Approach of Energy Optimization in WSN?

    Authors: S. Geetha Priya, A.R. Arunachalam?

  12. Study on Various Glass Defect Using Glass Edge Detection Methods?

    Authors: Sumeet Singh Tiwana, Sukhpreet Kaur?

  13. Safekeeping of Network Executive for a Domestic Internet Service Provider?

    Authors: K.V.N.R. Sai Krishna?

  14. Effective Identification of the Intruders and Modifiers in Wireless Sensor Networks

    Authors: J. Vijayagajendiran, D. Udhayakumarapandian?

  15. An Efficient Approach to Improve Response Time in Multibiometric Patterns Retrieval from Large Database?

    Authors: S. Balgani, S. Sangeetha?

  16. Review Paper on Detection and Prevention Techniques of Gray-Hole Attack in Manet?

    Authors: Ashok Desai?

  17. ANALYSIS OF E-LEARNING IN BUSINESS AND TOOLS FOR IMPROVING THE EFFECTIVENESS OF THE EDUCATIONAL SYSTEM?

    Authors: S. Jayakumar, S. Manimaran, M. GopiAnand

  18. TALKING HANDHELD DEVICE FOR VISUALLY CHALLENGED PERSON

    Authors: M. Smitha, T. Ayesha Rumana?

  19. A Review: Image Extraction with Weighted Page Rank using Partial Tree Alignment Algorithm

    Authors: Gagan Preet Kaur, Usvir Kaur, Dheerendra Singh?

  20. SCOPE AND LIMITATION OF ELECTRONIC VOTING SYSTEM

    Authors: Atiya Parveen, Sobia Habib, Saoud Sarwar?

  21. Multi-Operating Environment System

    Authors: Aditya Thakare, Prachi Deshmukh, Shraddha Kawane, Yogesh Sarda?

  22. Decorate Ensemble of Artificial Neural Networks with High Diversity for Classification?

    Authors: Mittal C. Patel, Prof. Mahesh Panchal, Himani P. Bhavsar?

  23. GENETIC ALGORITM BASED HINDI WORD SENSE DISAMBIGAUTION

    Authors: Sabnam Kumari, Prof. (Dr.) Paramjit Singh?

  24. AN IMAGE ENCRYPTION USING BIT LEVEL PERMUTATION AND DEPENDENT DIFFUSION?

    Authors: G.S. Nandeesh, P.A. Vijaya, M.V. Sathyanarayana?

  25. Content Based Image Retrieval with Log Based Relevance Feedback Using Combination of Query Expansion and Query Point movement?

    Authors: Bhailal Limbasiya, Swati Patel?

  26. Hierarchical EAP Back-End Authenticator State Machine?

    Authors: Desai Malav, Kalpesh Patel?

  27. Improved Data Reduction Technique in Data Mining?

    Authors: Pritesh Vora, Bhavesh Oza

  28. Enhanced Multistage Content Based Image Retrieval?

    Authors: Nandish Chauhan, Mahesh Goyani?

  29. Cloud Computing: A Revolution in Communication?

    Authors: Rani Srivastava, Shekhar Gupta?

  30. DESIGNING A VIRTUAL MACHINE FOR IDENTIFICATION OF CARDIAC ARRHYTHMIAS USING LAB VIEW

    Authors: B. Subha, Subha.S.V, M.Anitha, M.Eniya, M.Gaayathri?

  31. PATIENT MONITORING SYSTEM USING ANDROID TECHNOLOGY

    Authors: Prema Sundaram

  32. New Applications of Soft Computing, Artificial Intelligence, Fuzzy Logic & Genetic Algorithm in Bioinformatics

    Authors: Dr. Tryambak A. Hiwarkar, R. Sridhar Iyer?

  33. Flexible Bloom for Searching Textual Content Based Retrieval System in an Unstructured P2P Overlay Networks?

    Authors: S. Uvaraj, S. Suresh, Dr. E. Mohan?

  34. Survey of Resource and Grouping Based Job Scheduling Algorithm in Grid Computing?

    Authors: Sandeep Kaur, Sukhpreet Kaur?

  35. Empowering Intrusion Detection Systems in Multitier Web Applications Using Clustering Algorithms?

    Authors: RANJITH SIVADASAN, P. MADHAVAN

  36. Implementation of Multicast Routing Using Genetic Algorithm?

    Authors: Priti Gaur?

  37. Literature Survey on Automated Person Identification Techniques?

    Authors: Sruthy Sebastian?

  38. THE CLOUD- CHANGING THE INDIAN HEALTHCARE SYSTEM?

    Authors: Atiya Parveen, Sobia Habib, Waseem Ahmad?

  39. IMAGE SEGMENTATION FOR TUMOR DETECTION USING FUZZY INFERENCE SYSTEM?

    Authors: V. Janani, P. Meena?

  40. SECURE COMMUNICATION OF SECRET DATA USING STEGNOGRAPHY?

    Authors: Sobia Habib, Atiya Parveen, Saoud Sarwar?

  41. Hybrid Compression Using DWT-DCT and Huffman Encoding Techniques for Biomedical Image and Video Applications?

    Authors: K.N. Bharath, G. Padmajadevi, Kiran?

  42. A Survey on Software Development Life Cycle Models?

    Authors: T Bhuvaneswari, S Prabaharan?

  43. Swarm Intelligence for Network Communication Routing

    Authors: Gauri Nagar, Arpit Sood, Monika Roopak?

  44. FACTS INCLUSION BIOINFORMATICS: MODERN EFFORTS AND DISPUTE?

    Authors: Dr. Tryambak A. Hiwarkar, R. Sridhar Iyer

  45. Multi-frequency Measurement of Electrical Bioimpedance of Bone to assess Bone Mineral Density?

    Authors: Mrs. S. Mythili, Dr. G. Athisha?

  46. DATA LEAKAGE DETECTION?

    Authors: N. Bangar Anjali, P. Rokade Geetanjali, Patil Shivlila, R. Shetkar Swati, Prof. N B Kadu?

  47. A Survey and Analysis of Media Keying Techniques in Session Initiation Protocol (SIP)?

    Authors: Rajesh Kumar, Sandip Chauhan?

  48. Vehicular Ad-Hoc Network a Comparative Study and Simulation?

    Authors: Niranjan Singh, Sunil Kumar, Rajdeep Singh, B S Rawat, Devendra Singh

  49. REVIEW OF ENSEMBLE CLASSIFICATION?

    Authors: V. Chitraa, Dr. Antony Selvadoss Thanamani?

  50. Research Analysis of Cloud Computing?

    Authors: G. Vijay Baskar, N. Sathees Kumar, N. Karthick?

  51. Analysis of Yslow Performance Test tool & Emergences on Web Page Data Extraction

    Authors: R. Mamatha, N. Indira Priyadarsini?

  52. Utilizing WM and GM for Finding Intelligence of Human Behavior?

    Authors: Mrs. Mary Cecil, Prof. Samir Kumar Bandyopadhyay?

  53. A Survey on Clustering Principles with K-means Clustering Algorithm Using Different Methods in Detail?

    Authors: Manpreet Kaur, Usvir Kaur?

  54. Genomic Signal Processing (GSP) Of Rheumatic Arthritis (RA) Using Different Indicator Sequences?

    Authors: K.B. Ramesh, Prabhu Shankar.K.S, B.P. Mallikarjunaswamy, E.T. Puttaiah?

  55. Mitigation of Blackhole for AODV (Ad hoc On Demand Distance Vector)?

    Authors: Ms. Bhumi Jani, Prof. Hitesh Patel?

  56. Performance Evaluation of Rayleigh Multipath Fading Channel using Rectangular QAM schemes?

    Authors: Mr. P. Sunil Kumar, Dr. M.G. Sumithra, Ms. M. Sarumathi?

  57. Applications of Swarm Intelligence?

    Authors: Amrit Saggu, Pallavi Yadav, Monika Roopak?

  58. ROUTING ATTACKS IN MOBILE AD HOC NETWORKS?

    Authors: P. Narendra Reddy, CH. Vishnuvardhan, V. Ramesh?

  59. An Overview on Reactive Protocols for Mobile Ad-Hoc Networks?

    Authors: P. Narendra Reddy, CH. Vishnuvardhan, V. Ramesh?

  60. An Efficient Pixel-shuffling Based Approach to Simultaneously Perform Image Compression, Encryption and Steganography?

    Authors: Navita Agarwal, Himanshu Sharma?

  61. An Efficient Back Propagation Neural Network Based Face Recognition System Using Haar Wavelet Transform and PCA?

    Authors: Prachi Agarwal, Naveen Prakash?

  62. A STUDY OF PRIVACY-PRESERVING WHILE SHARING SENSITIVE INFORMATION?

    Authors: K.V. Lakshmi Praveena?

  63. SPEAKER RECOGNITION AND AUTHENTICATION?

    Authors: Rakesh D R, JAYASIMHAN N K?

  64. Stimulus-Response Behavior of Moving Agents?

    Authors: Yuniel E. Proenza Arias, Martín E. Proenza Arias?

  65. Arduino Based Wireless Intrusion Detection Using IR Sensor and GSM?

    Authors: Prakash Kumar, Pradeep Kumar?

  66. Comparison and Simulation of POR and E-POR Routing Protocols in MANETs?

    Authors: M. Chandrika, N. Papanna?

  67. A Study on Multi Project Resource Constrained Project Scheduling using Metaheuristic Approach?

    Authors: S. Siva Vidya, M. Suguna, Dr. D. Sharmila?

  68. Improvement in Word Sense Disambiguation by Introducing Enhancements in English WordNet Structure?

    Authors: Swati Rastogi, Sanjeev Thakur?