ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.2, No.6

Publisher: IJCSMC Publishing Team

Publishing Date: 2013-06-30

  1. A Review of Geometry Based Symmetric Key Encryption Using Ellipse?

    Authors: Prerna Gaur, Dr. Paramjit Singh?

  2. A Review of Wormhole Detection Using HMM Approach?

    Authors: Himani Deswal, Rahul Yadav?

  3. A Survey on Brain?Machine Interface used in VLSI Field-Programmable Mixed-Signal Array?

    Authors: Umayal.S?

  4. A Novel Positioning Technique for 3D Underwater Sensor Networks?

    Authors: Aditya Tandon, Kamal Kant?

  5. RECOGNITION AND PREPROCESSING OF INTRUSION DATA IN WIRELESS SENSOR NETWORK?

    Authors: Manjot Singh, Himanshu Sharma?

  6. Remote Temperature Monitoring Using LM35 sensor and Intimate Android user via C2DM Service?

    Authors: Poonam, Prof. (Dr.) Yusuf Mulge?

  7. Ethics and Impacts of Information and Communication Technology in E-Commerce?

    Authors: Tryambak Hiwarkar, Dr. P.G Khot?

  8. Architecture of Discrete Wavelet Transform Processor for Image Compression?

    Authors: Ms. Yamini S.Bute, Ms. Indu Mandawi, Ms. Sarita Sakure?

  9. Android Optimization: A Survey?

    Authors: Ms. Debosmita Sen Purkayastha, Mr. Nitin Singhla?

  10. A Lookup Table Based Secure Cryptographic SMS Communication on Android Environment?

    Authors: Nishika, Rahul Kumar Yadav?

  11. WIRELESS SENSOR NETWORK AND ITS ROUTING PROTOCOL: A SURVEY PAPER

    Authors: Reena, Sunil Phulre, Rekha Pandit?

  12. Study on growth of Online Shopping in India?

    Authors: Deepali?

  13. Wormhole Detection Using Hidden Markov Model Approach?

    Authors: Himani Deswal, Rahul Kumar Yadav?

  14. Developing Web Based Model (Disblogwik) in Informal eLearning?

    Authors: Triveni Dixit, Dinesh Gill?

  15. CNX PSU Bank Index Prediction Using Soft Computing - A Study?

    Authors: J. Mary Dallfin Bruxella, S. Arun Joe Babulo?

  16. Path Loss Estimation for a Wireless Sensor Network for Application in Ship

    Authors: Ananya Sarkar, Subhasish Majumdar, Partha Pratim Bhattacharya?

  17. Performance Analysis of Cloud Computing for Distributed Client?

    Authors: Dr. Neeraj Bhargava, Dr. Ritu Bhargava, Manish Mathuria, Ravi Daima?

  18. A Fuzzy Improved Association Mining Approach to Estimate Software Quality?

    Authors: Sonakshi Rana, Rahul Kumar Yadav?

  19. Analysis of Android Applications & Missed Call Alerts to Registered Email Address

    Authors: A. Maharaju?

  20. A Novel Fuzzy Logic Analysis & Study on Intrusion Detection System?

    Authors: G. Shilpa, N. Anjaneyulu

  21. Security and Privacy in Cloud Computing: A Survey?

    Authors: Shachindra Kumar Dubey, Prof. Ashok Verma?

  22. A STUDY AND PERFORMANCE ANALYSIS OF RSA ALGORITHM?

    Authors: M. Preetha, M. Nithya?

  23. A REPLACEMENT POLICY FOR BUFFER MANAGEMENT IN IPTV SERVICES

    Authors: K.B. Dinesh Babu, M. Somu, N. Rengarajan?

  24. AN IMPLEMENTATION OF WEB PERSONALIZATION USING WEB MINING TECHNIQUES

    Authors: V. Shanmuga Priya, S. Sakthivel?

  25. Performance Analysis of Routing Protocols in MANETs?

    Authors: Manoj Kumar, Devendra Singh?

  26. GREEN: The New Color in Computer Technology?

    Authors: Navdeep Kaur Maan, Navdeep Kaur Dhillon?

  27. A Novel Steganographic Approach to enhance the Performance of Security System in a Smarter Way?

    Authors: Parveen Mor, Tanupriya Choudhury, Vasudha Vashisht?

  28. Monitoring and Its Impacts over Distributed Systems and Possible Solutions?

    Authors: Manjunath Kotari, Dr. Niranjan N. Chiplunkar, Dr. Nagesh H R?

  29. Content Management System (CMS) for Web-Based MIS Application

    Authors: P. Divya?

  30. A Novel Approach of Handwritten Character Recognition using Positional Feature Extraction?

    Authors: Swapnil A. Vaidya, Balaji R. Bombade

  31. Protein Structure Prediction using Genetic Algorithm?

    Authors: Subhendu Bhusan Rout, Satchidananda Dehury, Bhabani Sankar Prasad Mishra

  32. Security Refinement in Nymble System?

    Authors: Maheshkumar S. Kamble, Hatkar S. S.?

  33. Rule-Based and Cluster-Based Intrusion Detection Technique for Wireless Sensor Network?

    Authors: Ms. Rachana Deshmukh, Ms. Rashmi Deshmukh, Prof. Manoj Sharma?

  34. A Novel Steganographic Approach for Enhancing the Security of Images

    Authors: Priya Thomas, Avanish Kumar Singh

  35. Comparison of ANNs, Fuzzy Logic and Neuro-Fuzzy Integrated Approach for Diagnosis of Coronary Heart Disease: A Survey

    Authors: Nitin Kumari, Sunita, Smita?

  36. Using Maple to Evaluate the Partial Derivatives of Two-Variables Functions?

    Authors: Chii-Huei Yu?

  37. An Overview of Speech Recognition Using HMM?

    Authors: Ms. Rupali S Chavan, Dr. Ganesh. S Sable?

  38. Avoiding Pollution Attacks in Network Coding using Authentication Code?

    Authors: Mangesh N. Bhandare, Ravindra C. Thool, Gurdeep Singh Wahi?

  39. A Novel Architecture of Mercator: A Scalable, Extensible Web Crawler with Focused Web Crawler?

    Authors: Sarnam Singh, Nidhi Tyagi?

  40. A Proposed YANG Validator?

    Authors: Jisha S Manjaly?

  41. Data Protection for Clients in Private Network through Virus-Protection as a Service?

    Authors: Manivannan Palanivel, Murali Prasath?

  42. A REVIEW ON EFFICIENT RESOURCE BLOCK ALLOCATION IN LTE SYSTEM

    Authors: Rupinder Kaur, Manoj Kumar?

  43. NODE AND SINK MOBILITY SUPPORTED ROUTING PROTOCOL IN WIRELESS SENSOR NETWORK WITH IMPROVED ENERGY EFFICIENCY?

    Authors: Neha Upadhyay, Vikram Jain

  44. Dynamic Round Robin for Load Balancing in a Cloud Computing?

    Authors: Ajay Gulati, Ranjeev.K.Chopra?

  45. INTERACTIVE IMAGE SEGMENTATION BASED ON HARMONIC FUNCTIONS & RECONSTRUCTIONS?

    Authors: Alisha Abraham

  46. Multioriented and Curved Text Lines Extraction from Documents?

    Authors: Vaibhav Gavali, B. R. Bombade?

  47. A Survey on Web Page Change Detection System Using Different Approaches?

    Authors: Shobhna, Manoj Chaudhary?

  48. Performance Comparison of an Effectual Approach with K-Means Clustering Algorithm for the Recognition of Facial Expressions

    Authors: Tanvi Sheikh, Shikha Agrawal?

  49. A SECURE CLOUD WITH ADDITIONAL LAYER OF PROTECTION AND USER AUTHENTICATION?

    Authors: Mr. Iranna Telasang, Mr. Manjunatha S?

  50. Distributed Auditing for user data in the Cloud?

    Authors: Ms. Indushree T G, Mr. Anand R?

  51. An Improved Method in Peer-To-Peer System?

    Authors: Neetha Thomas?

  52. Fast and Efficient Automated Iris Segmentation by Region Growing

    Authors: Ms. Sruthi.T.K?

  53. Management Decisions against Functional Violations of Web Services?

    Authors: M. Mohemmed Sha, K. Vivekanandan?

  54. A Combined Protection for Entire Network Based On Immune Inspired Theories

    Authors: P.S. ThumilVannan, S. Hirutiha?

  55. Comparative Study of Different Application of OFDM in FPGA Implementation?

    Authors: Ashwin Thakur

  56. Improving the Congestion Control over Stateless Wireless Ad Hoc Network Systems?

    Authors: Shrikant Pujar, Prof. Vasudev K Parvati?

  57. PERFORMANCE ANALYSIS OF AODV, OLSR, DSR AND GRP ROUTING PROTOCOL OF MOBILE ADHOC NETWORK ? A REVIEW?

    Authors: Suchita Baxla, Prof. Rajesh Nema?

  58. Facial Expression Recognition Using SVM Classification in Perceptual Color Space

    Authors: Ms. Aswathy.R?

  59. Detection of an Individual after Piercing Using Ear Biometric?

    Authors: Sushreeti Bandyopadhyay, Devesh Narayan?

  60. Key Generation Using Genetic Algorithm for Image Encryption?

    Authors: Aarti Soni, Suyash Agrawal?

  61. Intraoperative Organ Deformation and 3D Visualization during MIS Using Spherical Harmonics

    Authors: Ms. Greeshma Jacob, Ms. Reshma V.K?

  62. Solving Improper Integrals with Maple?

    Authors: Chii-Huei Yu?

  63. A New Approach for Retrieving Unconstrained Blurred Images?

    Authors: Minu Poulose

  64. A New Cluster Based Broadcast Protocol for Delay Tolerant Mobile Networks?

    Authors: Mr. Harish Kumar T.R, Dr. Dinesh K. Anvekar, Mr. K. Sundeep Kumar, Mr. Manoj Challa?

  65. Mitigating Risk Using Puzzle-Based Defense Technique to Improve Confidentiality?

    Authors: Ms. Sapna S. Khapre, Prof. Shrikant Ardhapurkar?

  66. A Study of Manet and Wormhole Attack in Mobile Adhoc Network

    Authors: Ranjeeta Siwach, Vanditaa Kaul?

  67. Design & Analysis of Computational Features Prediction Model for Heart Disease Diagnosis

    Authors: Atul Kumar Pandey?, Prabhat Pandey?, K.L. Jaiswal?

  68. Various Edge Detection Methods for Foreground Detection?

    Authors: Gurjeet kaur Seerha, Rajneet Kaur

  69. POWER AND AREA EFFICIENT DESIGN OF COUNTER FOR LOW POWER VLSI SYSTEM

    Authors: SURESH KUMAR.R?

  70. REMOVAL OF NOISE IN PPG SIGNALS USING WAVELETS

    Authors: YADHURAJ S.R, HARSHA.H, Dr. PADMAJA K.V