Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.2, No.6
Publisher: ZAIN Publications
Publishing Date: 2013-06-30
- A Review of Geometry Based Symmetric Key Encryption Using Ellipse?Authors: Prerna Gaur, Dr. Paramjit Singh?
- A Review of Wormhole Detection Using HMM Approach?Authors: Himani Deswal, Rahul Yadav?
- A Survey on Brain?Machine Interface used in VLSI Field-Programmable Mixed-Signal Array?Authors: Umayal.S?
- A Novel Positioning Technique for 3D Underwater Sensor Networks?Authors: Aditya Tandon, Kamal Kant?
- RECOGNITION AND PREPROCESSING OF INTRUSION DATA IN WIRELESS SENSOR NETWORK?Authors: Manjot Singh, Himanshu Sharma?
- Remote Temperature Monitoring Using LM35 sensor and Intimate Android user via C2DM Service?Authors: Poonam, Prof. (Dr.) Yusuf Mulge?
- Ethics and Impacts of Information and Communication Technology in E-Commerce?Authors: Tryambak Hiwarkar, Dr. P.G Khot?
- Architecture of Discrete Wavelet Transform Processor for Image Compression?Authors: Ms. Yamini S.Bute, Ms. Indu Mandawi, Ms. Sarita Sakure?
- Android Optimization: A Survey?Authors: Ms. Debosmita Sen Purkayastha, Mr. Nitin Singhla?
- A Lookup Table Based Secure Cryptographic SMS Communication on Android Environment?Authors: Nishika, Rahul Kumar Yadav?
- WIRELESS SENSOR NETWORK AND ITS ROUTING PROTOCOL: A SURVEY PAPERAuthors: Reena, Sunil Phulre, Rekha Pandit?
- Study on growth of Online Shopping in India?Authors: Deepali?
- Wormhole Detection Using Hidden Markov Model Approach?Authors: Himani Deswal, Rahul Kumar Yadav?
- Developing Web Based Model (Disblogwik) in Informal eLearning?Authors: Triveni Dixit, Dinesh Gill?
- CNX PSU Bank Index Prediction Using Soft Computing - A Study?Authors: J. Mary Dallfin Bruxella, S. Arun Joe Babulo?
- Path Loss Estimation for a Wireless Sensor Network for Application in ShipAuthors: Ananya Sarkar, Subhasish Majumdar, Partha Pratim Bhattacharya?
- Performance Analysis of Cloud Computing for Distributed Client?Authors: Dr. Neeraj Bhargava, Dr. Ritu Bhargava, Manish Mathuria, Ravi Daima?
- A Fuzzy Improved Association Mining Approach to Estimate Software Quality?Authors: Sonakshi Rana, Rahul Kumar Yadav?
- Analysis of Android Applications & Missed Call Alerts to Registered Email AddressAuthors: A. Maharaju?
- A Novel Fuzzy Logic Analysis & Study on Intrusion Detection System?Authors: G. Shilpa, N. Anjaneyulu
- Security and Privacy in Cloud Computing: A Survey?Authors: Shachindra Kumar Dubey, Prof. Ashok Verma?
- A STUDY AND PERFORMANCE ANALYSIS OF RSA ALGORITHM?Authors: M. Preetha, M. Nithya?
- A REPLACEMENT POLICY FOR BUFFER MANAGEMENT IN IPTV SERVICESAuthors: K.B. Dinesh Babu, M. Somu, N. Rengarajan?
- AN IMPLEMENTATION OF WEB PERSONALIZATION USING WEB MINING TECHNIQUESAuthors: V. Shanmuga Priya, S. Sakthivel?
- Performance Analysis of Routing Protocols in MANETs?Authors: Manoj Kumar, Devendra Singh?
- GREEN: The New Color in Computer Technology?Authors: Navdeep Kaur Maan, Navdeep Kaur Dhillon?
- A Novel Steganographic Approach to enhance the Performance of Security System in a Smarter Way?Authors: Parveen Mor, Tanupriya Choudhury, Vasudha Vashisht?
- Monitoring and Its Impacts over Distributed Systems and Possible Solutions?Authors: Manjunath Kotari, Dr. Niranjan N. Chiplunkar, Dr. Nagesh H R?
- Content Management System (CMS) for Web-Based MIS ApplicationAuthors: P. Divya?
- A Novel Approach of Handwritten Character Recognition using Positional Feature Extraction?Authors: Swapnil A. Vaidya, Balaji R. Bombade
- Protein Structure Prediction using Genetic Algorithm?Authors: Subhendu Bhusan Rout, Satchidananda Dehury, Bhabani Sankar Prasad Mishra
- Security Refinement in Nymble System?Authors: Maheshkumar S. Kamble, Hatkar S. S.?
- Rule-Based and Cluster-Based Intrusion Detection Technique for Wireless Sensor Network?Authors: Ms. Rachana Deshmukh, Ms. Rashmi Deshmukh, Prof. Manoj Sharma?
- A Novel Steganographic Approach for Enhancing the Security of ImagesAuthors: Priya Thomas, Avanish Kumar Singh
- Comparison of ANNs, Fuzzy Logic and Neuro-Fuzzy Integrated Approach for Diagnosis of Coronary Heart Disease: A SurveyAuthors: Nitin Kumari, Sunita, Smita?
- Using Maple to Evaluate the Partial Derivatives of Two-Variables Functions?Authors: Chii-Huei Yu?
- An Overview of Speech Recognition Using HMM?Authors: Ms. Rupali S Chavan, Dr. Ganesh. S Sable?
- Avoiding Pollution Attacks in Network Coding using Authentication Code?Authors: Mangesh N. Bhandare, Ravindra C. Thool, Gurdeep Singh Wahi?
- A Novel Architecture of Mercator: A Scalable, Extensible Web Crawler with Focused Web Crawler?Authors: Sarnam Singh, Nidhi Tyagi?
- A Proposed YANG Validator?Authors: Jisha S Manjaly?
- Data Protection for Clients in Private Network through Virus-Protection as a Service?Authors: Manivannan Palanivel, Murali Prasath?
- A REVIEW ON EFFICIENT RESOURCE BLOCK ALLOCATION IN LTE SYSTEMAuthors: Rupinder Kaur, Manoj Kumar?
- NODE AND SINK MOBILITY SUPPORTED ROUTING PROTOCOL IN WIRELESS SENSOR NETWORK WITH IMPROVED ENERGY EFFICIENCY?Authors: Neha Upadhyay, Vikram Jain
- Dynamic Round Robin for Load Balancing in a Cloud Computing?Authors: Ajay Gulati, Ranjeev.K.Chopra?
- INTERACTIVE IMAGE SEGMENTATION BASED ON HARMONIC FUNCTIONS & RECONSTRUCTIONS?Authors: Alisha Abraham
- Multioriented and Curved Text Lines Extraction from Documents?Authors: Vaibhav Gavali, B. R. Bombade?
- A Survey on Web Page Change Detection System Using Different Approaches?Authors: Shobhna, Manoj Chaudhary?
- Performance Comparison of an Effectual Approach with K-Means Clustering Algorithm for the Recognition of Facial ExpressionsAuthors: Tanvi Sheikh, Shikha Agrawal?
- A SECURE CLOUD WITH ADDITIONAL LAYER OF PROTECTION AND USER AUTHENTICATION?Authors: Mr. Iranna Telasang, Mr. Manjunatha S?
- Distributed Auditing for user data in the Cloud?Authors: Ms. Indushree T G, Mr. Anand R?
- An Improved Method in Peer-To-Peer System?Authors: Neetha Thomas?
- Fast and Efficient Automated Iris Segmentation by Region GrowingAuthors: Ms. Sruthi.T.K?
- Management Decisions against Functional Violations of Web Services?Authors: M. Mohemmed Sha, K. Vivekanandan?
- A Combined Protection for Entire Network Based On Immune Inspired TheoriesAuthors: P.S. ThumilVannan, S. Hirutiha?
- Comparative Study of Different Application of OFDM in FPGA Implementation?Authors: Ashwin Thakur
- Improving the Congestion Control over Stateless Wireless Ad Hoc Network Systems?Authors: Shrikant Pujar, Prof. Vasudev K Parvati?
- PERFORMANCE ANALYSIS OF AODV, OLSR, DSR AND GRP ROUTING PROTOCOL OF MOBILE ADHOC NETWORK ? A REVIEW?Authors: Suchita Baxla, Prof. Rajesh Nema?
- Facial Expression Recognition Using SVM Classification in Perceptual Color SpaceAuthors: Ms. Aswathy.R?
- Detection of an Individual after Piercing Using Ear Biometric?Authors: Sushreeti Bandyopadhyay, Devesh Narayan?
- Key Generation Using Genetic Algorithm for Image Encryption?Authors: Aarti Soni, Suyash Agrawal?
- Intraoperative Organ Deformation and 3D Visualization during MIS Using Spherical HarmonicsAuthors: Ms. Greeshma Jacob, Ms. Reshma V.K?
- Solving Improper Integrals with Maple?Authors: Chii-Huei Yu?
- A New Approach for Retrieving Unconstrained Blurred Images?Authors: Minu Poulose
- A New Cluster Based Broadcast Protocol for Delay Tolerant Mobile Networks?Authors: Mr. Harish Kumar T.R, Dr. Dinesh K. Anvekar, Mr. K. Sundeep Kumar, Mr. Manoj Challa?
- Mitigating Risk Using Puzzle-Based Defense Technique to Improve Confidentiality?Authors: Ms. Sapna S. Khapre, Prof. Shrikant Ardhapurkar?
- A Study of Manet and Wormhole Attack in Mobile Adhoc NetworkAuthors: Ranjeeta Siwach, Vanditaa Kaul?
- Design & Analysis of Computational Features Prediction Model for Heart Disease DiagnosisAuthors: Atul Kumar Pandey?, Prabhat Pandey?, K.L. Jaiswal?
- Various Edge Detection Methods for Foreground Detection?Authors: Gurjeet kaur Seerha, Rajneet Kaur
- POWER AND AREA EFFICIENT DESIGN OF COUNTER FOR LOW POWER VLSI SYSTEMAuthors: SURESH KUMAR.R?
- REMOVAL OF NOISE IN PPG SIGNALS USING WAVELETSAuthors: YADHURAJ S.R, HARSHA.H, Dr. PADMAJA K.V