ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.2, No.8

Publisher: IJCSMC Publishing Team

Publishing Date: 2013-08-30

  1. Policy Enforcing and Revoking Mechanism on Trusted Ad Hoc Networks?

    Authors: Sujatha J, Manoj Challa?

  2. Backfilling Strategies for Computational Grid System Load Balancing?

    Authors: Prakash Kumar, Pradeep Kumar, Vikas Kumar?

  3. ADOPTION OF AUTOMATED TELLER MACHINE IN NIGERIAN BANKS: USE ENHANCEMENTS AND LIMITATIONS?

    Authors: DAWODU BAMIDELE FRIDAY, OSONDU MARY C?

  4. SMART ASSOCIATION CONTROL IN WIRELESS FIDELITY USING FBA

    Authors: Devipriya A, Prashanth M, Parameshachari B D, Muruganantham C, H S Divakara Murthy, Arun Jose?

  5. Low Complexity Multiple Active Transmit Antenna For High Transmit Rate

    Authors: Aparna S, Nithin S S, Parameshachari B D, Muruganatham C, Prof. H S DivakaraMurthy?

  6. Evolution of Mobile Wireless Communication Networks-1G to 5G as well as Future Prospective of Next Generation Communication Network?

    Authors: Pankaj Sharma

  7. Steganographic Method for Data Hiding In Audio Signals with LSB & DCT?

    Authors: Linu Babu, Jais John S, Parameshachari B D, Muruganantham C, H S DivakaraMurthy?

  8. Safety Dimensions of Session Initiation Protocol?

    Authors: K.V.N.R. Sai Krishna?

  9. AIM OF PROTECTED ROUTING MESSAGE AUTHENTICATION PROTOCOL FOR VEHICULAR AD HOC NETWORKS

    Authors: R. UmaSaraswathi, N. Kavitha, G. KesavaRaj?

  10. ANOMALY INTRUSION DETECTION SYSTEM USING NEURAL NETWORK?

    Authors: Ms. Vrushali D Mane, Ms. Abhilasha Sayar, Prof. Sunil Pawar?

  11. Automated Libraries: What we expect from Digital Libraries

    Authors: Gulbasar?, Prof. Saoud Sarwar?

  12. Analysis of Attribute Association Rule from Large Medical Datasets towards Heart Disease Prediction?

    Authors: D. P. Shukla, Shamsher Bahadur Patel, Ashish Kumar Sen, Pramod Kumar Yadav?

  13. Depiction of Routing Protocols in Mobile Adhoc Networks: Behaviour Analysis

    Authors: Veeralakshmi M, Dr. R Pugazendi?

  14. Intelligent Heart Disease Prediction Model Using Classification Algorithms

    Authors: Pramod Kumar Yadav, K.L.Jaiswal, Shamsher Bahadur Patel, D. P.Shukla?

  15. CCLAEEO: CLUSTERING BASED CROSSLAYER AIDED ENERGY-EFFICIENT OPPORTUNISTIC ROUTING SCHEME IN MOBILE AD HOC NETWORKS

    Authors: M. Kalaivani, G. KesavaRaj?

  16. Parallel Encryption Technique Combined With Secure Single Sign-On Mechanism for Distributed Computer Networks?

    Authors: R. Suganya, A.K. Sathiya Bama

  17. Low Power Flip-Flop Design for Low Swing LC Resonant Clock Distribution Networks?

    Authors: Ms. Rihana P A, Mr. R Ramar Kalangiyam

  18. Virtual Remote Network Computing of User Appliances

    Authors: Kaja Masthan, K. Sharath Kumar, V. Hari Prasad?

  19. P-CHOKe: A Piggybacking-CHOKe AQM Congestion Control Method?

    Authors: G. Sasikala, E. George Dharma Prakash Raj?

  20. A Literature Survey of Image Enhancement of Human Biology

    Authors: Elisee Aniwanou KPONOU, Wang Zhengning?

  21. Study of Uncertainty Factors Influenced in Software Phases Effecting in Cost Estimation

    Authors: G. Rajkumar, Dr. K. Alagarsamy

  22. Data Protection for Cloud Using Homomorphic Mechanism?

    Authors: T. Shashi Kumar, Mrs. J. Deepthi, Mr. V. Hariprasad

  23. Graphical Secure Password Method against Online Password Hackers (Guessing Attacks)?

    Authors: G. Sudheer Reddy, G. Venkata Prasad, V. Hari Prasad?

  24. Image Color Extraction and Retrieval Using Classification Techniques

    Authors: S.Kousalya, Dr. Antony Selvadoss Thanamani?

  25. OPass: Attractive Presentation of User Authentication Protocol with Resist to Password Reuse Attacks?

    Authors: S. Megala Devi, M. Geetha?

  26. Network Monitoring and Forensics

    Authors: Subhay Chandra, Rakesh Kumar Yadav?

  27. Study of Various Image Enhancement Techniques-A Review?

    Authors: Amandeep Singh, Manjeet Singh, Mandeep Kaur?

  28. A Review of ROQ Attacks in Internet?

    Authors: Shaina Pundir, Naveen Kumari?

  29. Relationship Between Students’ Performance and Class Attendance in a Programming Language Subject in a Computer Course

    Authors: Meenakshi Narula, Pankaj Nagar?

  30. Design and Implementation of Posture Identification System?

    Authors: Indu Mandwi, Sofia Pillai, Hemant Turkar, Yamini Bute?

  31. InKeSi-Increased Key Size Method in SRNN Public Key Cryptography Algorithm

    Authors: K. Sheela, E. George Dharma Prakash Raj?

  32. Privacy Control Methods for Anonymous & Confidential Database Using Advance Encryption Standard

    Authors: Madhuri Patil, Sandip Ingale

  33. A Better Approach for Horizontal Aggregations in SQL Using Data Sets for Data Mining Analysis?

    Authors: Y. Chakravarthi, P. Vindhya

  34. Hierarchical Document Clustering Using Correlation Preserving Indexing

    Authors: L. Prabhakar, Srikanth. B?

  35. Design of Improved Web Crawler By Analysing Irrelevant Result?

    Authors: Prashant Dahiwale, Dr. M.M. Raghuwanshi, Dr. Latesh Malik

  36. SECURITY TECHNIQUES FOR MULTI TENANCY APPLICATIONS IN CLOUD

    Authors: C.C. Kalyan Srinivas?, S.Sajida?, Lokesh

  37. Privacy Protected Query Processing on Spatial Networks

    Authors: K. SASIKALA, REKA.R, SASIKALA.K?

  38. An Overview of Biometric Identifiers with Emphasis on the Concept and Applications of Finger Vein Recognition

    Authors: Babafemi.O.Samuel, Olalere.A.Abass