ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.2, No.7

Publisher: IJCSMC Publishing Team

Publishing Date: 2013-07-30

  1. ACTIVITY BASED PERSON IDENTIFICATION USING PARTICLE SWARM OPTIMIZATION ALGORITHM?

    Authors: Sruthy Sebastian

  2. A Study on the Differential Problems Using Maple?

    Authors: Chii-Huei Yu?

  3. A Review on Delay Optimization in Vehicular Ad Hoc Networks Using Ant Colony Optimization and WIMAX?

    Authors: Shikha Rani, Manoj Chaudhary?

  4. Intelligent Routing Protocol for Decentralized Cyber Physical System Using Smart Grid Applications

    Authors: P.S. THUMILVANNAN, S. AYYAPPAN?

  5. USER GUIDED WEB BASED INTERACTION IN MIXED SERVICE ORIENTED SYSTEM?

    Authors: S. TAMIL SELVAN, S. ARUN?

  6. Resource Allocation Based on Agreement with Data Security in Cloud Computing

    Authors: Miss. Aparna Deshmukh, Prof. Archana Nikose?

  7. ADCA: Advanced Density Based Clustering Algorithm for Spatial Database System

    Authors: Abhaya Kumar Sahoo?

  8. A REVIEW ON BRAIN TUMOR DETECTION USING SEGMENTATION?

    Authors: Priyanka, Balwinder Singh

  9. A Survey on Security Issues in Wireless Sensor Network

    Authors: H.N. Pratihari?

  10. An Integrated Approach to Detect and Limit IP Spoofing?

    Authors: Tanmay A. Abhang, Uday V. Kulkarni?

  11. Evaluating Some Integrals with Maple?

    Authors: Chii-Huei Yu?

  12. Towards Secure and Dependable Ticket Based Tracing System for Obtaining Forgery Attacks in WMN?

    Authors: Chandan Y.N, Manoj Challa, K. Sundeep Kumar?

  13. Enhancing Content Security using MD5 & UTF8 Encoding at Window Azure Cloud?

    Authors: Harjinder Kaur, Sarpreet Singh?

  14. A Review and Research of Edge Detection Techniques for Image Segmentation?

    Authors: Poonam Dhankhar, Neha Sahu?

  15. AUTOMATIC PUBLIC DISTRIBUTION SYSTEM

    Authors: PRASANNA BALAJI.R, MANIKANDAN.T?

  16. Evaluating the Derivatives of Two Types of Functions?

    Authors: Chii-Huei Yu

  17. FORECASTING IN SAP-SCM (SUPPLY CHAIN MANAGEMENT)?

    Authors: B. Vasumathi, S.P. Shanmuga Ranjani?

  18. A STUDY ON IRIS RECOGNITION SYSTEM

    Authors: S. RAJESH KUMAR, G.R. SUGANYA, X. NITHIYA, X. SHARMI?

  19. Automation of Mathematics Teaching ? Demonstration by Methods of Completing the Square in Solving a Quadratic Equation?

    Authors: Ching-Sung Kuo?

  20. The Differential Problem of Two Types of Functions

    Authors: Chii-Huei Yu?

  21. A Comparative Security Study Review on Symmetric Key Cryptosystem Based Algorithms?

    Authors: SSVR Kumar Addagarla, Babji Y?

  22. Technical Advances in Fall Detection System ? A Review

    Authors: Raveendra Hegde, Dr. B G Sudarshan, Dr. S C Prasanna Kumar, Dr. Hariprasad S A, Dr. B S Satyanarayana

  23. Selection of Initial Centroids for k-Means Algorithm?

    Authors: Anand M. Baswade, Prakash S. Nalwade?

  24. Online Optimization for Scheduling Preemptable Tasks on IaaS Cloud Systems

    Authors: S. Gandhimathi, M. Madhushudhanan, A. Srivishnu Paraneetharan?

  25. Pragmatic Reactive Programming on Helpless Records

    Authors: Kaja Masthan?

  26. Ensuring QOS in WiMAX Networks

    Authors: S. Gandhimathi, A. Srivishnuparaneetharan, M. Madhushudhanan?

  27. An Efficient Resource Management and Scheduling Technique for Fault Tolerance in Grid Computing?

    Authors: Deeptanoy Ghosh, Ramandeep Singh, Jimmy Laishram

  28. Energy Conservation in MANET Using Power Saving Protocol BECA/AFECA

    Authors: R. Suguna, P. Gomathi?

  29. A Survey of Image Segmentation Algorithms Based On Fuzzy Clustering?

    Authors: R. Ravindraiah, K. Tejaswini?

  30. OVERVIEW OF DDOS ALGORITHMS: A SURVEY?

    Authors: S. Chithra, Dr. E. George Dharma Prakash Raj?

  31. Efficient Routing Protocol for Highly Dynamic Mobile Ad Hoc Networks?

    Authors: RAMKUMAR. V.D

  32. Modified K-Means for Better Initial Cluster Centres?

    Authors: Kalpana D. Joshi, P.S. Nalwade?

  33. A Pervasive Data Analytic Web Service for Educational Data Mining

    Authors: Shana. J, T. Venkatachalam?

  34. Sentiment Analysis Based Approaches for Understanding User Context in Web Content?

    Authors: M. SAKTHIVEL, G. HEMA?

  35. CLUSTERING APPROACH FOR FAST ENERGY EFFICIENT DATA COLLECTION IN WIRELESS SENSOR NETWORK

    Authors: Mr. Sandeep.C, Mrs. Manimozhi I, Dr. Jitendranath Mungara?

  36. Secure Position-Based Routing Protocol for Mobile Ad hoc Networks?

    Authors: S. Sivakumar, S. Sagunthala

  37. An Efficient Routing Implementation Using Genetic Algorithm

    Authors: Priti Gaur

  38. A STUDY ON MANET INTEGRATION THROUGH INTERNET?

    Authors: A. Sharmila, R. Selvakumar, M. Preetha?

  39. Enhance Luhn Algorithm for Validation of Credit Cards Numbers?

    Authors: Khalid Waleed Hussein, Dr. Nor Fazlida Mohd. Sani, Professor Dr. Ramlan Mahmod, Dr. Mohd. Taufik Abdullah?

  40. Predicting Students Academic Performance Using Education Data Mining?

    Authors: Suchita Borkar, K. Rajeswari?

  41. RELATIVE INVESTIGATION OF OLSR, TORA AND GRP ROUTING PROTOCOL USING OPNET

    Authors: Jatin Gupta, Ritika Gupta

  42. INNOVATION OF IFGRP AND PERFORMANCE ASSESSMENT OF OLSR, GRP AND IFGRP?

    Authors: Jatin Gupta?

  43. ENERGY EFFICIENT ROUTING IN MANET WITH ZRP AND ANYCAST?

    Authors: Satya Bhushan Verma

  44. Automated Model-Based Test Path Generation from UML Diagrams via Graph Coverage Techniques?

    Authors: Parampreet Kaur, Gaurav Gupta

  45. FACS BASED AUTOMATIC HUMAN EMOTION RECOGNITION

    Authors: Prof. Anuradha Savadi, Chandrakala V Patil?

  46. ON-DEMAND ROUTING IN MULTI-HOP WIRELESS MOBILE AD HOC NETWORKS?

    Authors: P. Umamaheswari, K. Ranjith singh

  47. Anisotropic Morphological and LLSURE Based Edge Preserving Image Filtering?

    Authors: Ms. Jibi K George

  48. TPM as a Middleware for Enterprise Data Security?

    Authors: Abhishek Patel, Prabhat Dansena?

  49. Genetic Algorithm Assisted Preventive Maintenance Scheduling for Web Servers

    Authors: Ravi Sindal

  50. Accurate Forecasting Prediction of Foreign Exchange Rate Using Neural Network Algorithms: A STUDY?

    Authors: Divyapriya .R, Dr. R. Manicka Chezhian

  51. An Enhanced Authentication Scheme Using Kerberos with Hash-Based Message Authentication Code (HMAC)?

    Authors: R. Kogila?

  52. METHODS FOR SEGMENTATION OF IVUS ATHEROSCLEROSIS IMAGES

    Authors: R. Ravindraiah, K. Tejaswini?

  53. STUDY ON DECISION TREE COMPETENT DATA CLASSIFICATION

    Authors: A.Vanitha, S.Niraimathi

  54. On Some Aspects of Link Analysis and Informal Network in Social Network Platform

    Authors: Subrata Paul?

  55. AN INVESTICATION OF NOISE REMOVING TECHNIQUS USED IN SPATIAL DOMAIN IMAGE PROCESSING

    Authors: S. Shenbagavadivu, Dr. M. Renuka Devi

  56. Scalable Heat Routing Protocol for Wireless Mesh Networks?

    Authors: Srivani. P

  57. Energy Efficient Routing Protocols in Mobile Ad hoc Network Based on Enhanced AODV Protocol?

    Authors: R. Rajeshkanna, S. Poorana Senthilkumar, C. Kumuthini?

  58. A Novel Authentication Scheme to Increase Security for Non-Repudiation of Users

    Authors: Khalid Waleed Hussein, Dr. Nor Fazlida Mohd. Sani, Professor Dr. Ramlan Mahmod, Dr. Mohd. Taufik Abdullah

  59. Identifying Under Attack Hateful Email?

    Authors: M. Ramu, B. Triveni, L. Srinivasa Rao

  60. Performance Comparison of Routing Protocols for Remote Login in MANETs

    Authors: VIKAS GOYAL, SHAVETA RANI, PARAMJIT SINGH?

  61. Overview of Security Threats in WSN?

    Authors: Ms. Poonam Barua, Mr. Sanjeev Indora?

  62. Implementation of SAODV and TAODV Adhoc Secure Routing Protocols

    Authors: T Nagarjuna, C.C. Kalyan Srinivas, K R Arjun Reddy?