Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.2, No.8
Publisher: ZAIN Publications
Publishing Date: 2013-08-30
- Policy Enforcing and Revoking Mechanism on Trusted Ad Hoc Networks?Authors: Sujatha J, Manoj Challa?
- Backfilling Strategies for Computational Grid System Load Balancing?Authors: Prakash Kumar, Pradeep Kumar, Vikas Kumar?
- ADOPTION OF AUTOMATED TELLER MACHINE IN NIGERIAN BANKS: USE ENHANCEMENTS AND LIMITATIONS?Authors: DAWODU BAMIDELE FRIDAY, OSONDU MARY C?
- SMART ASSOCIATION CONTROL IN WIRELESS FIDELITY USING FBAAuthors: Devipriya A, Prashanth M, Parameshachari B D, Muruganantham C, H S Divakara Murthy, Arun Jose?
- Low Complexity Multiple Active Transmit Antenna For High Transmit RateAuthors: Aparna S, Nithin S S, Parameshachari B D, Muruganatham C, Prof. H S DivakaraMurthy?
- Evolution of Mobile Wireless Communication Networks-1G to 5G as well as Future Prospective of Next Generation Communication Network?Authors: Pankaj Sharma
- Steganographic Method for Data Hiding In Audio Signals with LSB & DCT?Authors: Linu Babu, Jais John S, Parameshachari B D, Muruganantham C, H S DivakaraMurthy?
- Safety Dimensions of Session Initiation Protocol?Authors: K.V.N.R. Sai Krishna?
- AIM OF PROTECTED ROUTING MESSAGE AUTHENTICATION PROTOCOL FOR VEHICULAR AD HOC NETWORKSAuthors: R. UmaSaraswathi, N. Kavitha, G. KesavaRaj?
- ANOMALY INTRUSION DETECTION SYSTEM USING NEURAL NETWORK?Authors: Ms. Vrushali D Mane, Ms. Abhilasha Sayar, Prof. Sunil Pawar?
- Automated Libraries: What we expect from Digital LibrariesAuthors: Gulbasar?, Prof. Saoud Sarwar?
- Analysis of Attribute Association Rule from Large Medical Datasets towards Heart Disease Prediction?Authors: D. P. Shukla, Shamsher Bahadur Patel, Ashish Kumar Sen, Pramod Kumar Yadav?
- Depiction of Routing Protocols in Mobile Adhoc Networks: Behaviour AnalysisAuthors: Veeralakshmi M, Dr. R Pugazendi?
- Intelligent Heart Disease Prediction Model Using Classification AlgorithmsAuthors: Pramod Kumar Yadav, K.L.Jaiswal, Shamsher Bahadur Patel, D. P.Shukla?
- CCLAEEO: CLUSTERING BASED CROSSLAYER AIDED ENERGY-EFFICIENT OPPORTUNISTIC ROUTING SCHEME IN MOBILE AD HOC NETWORKSAuthors: M. Kalaivani, G. KesavaRaj?
- Parallel Encryption Technique Combined With Secure Single Sign-On Mechanism for Distributed Computer Networks?Authors: R. Suganya, A.K. Sathiya Bama
- Low Power Flip-Flop Design for Low Swing LC Resonant Clock Distribution Networks?Authors: Ms. Rihana P A, Mr. R Ramar Kalangiyam
- Virtual Remote Network Computing of User AppliancesAuthors: Kaja Masthan, K. Sharath Kumar, V. Hari Prasad?
- P-CHOKe: A Piggybacking-CHOKe AQM Congestion Control Method?Authors: G. Sasikala, E. George Dharma Prakash Raj?
- A Literature Survey of Image Enhancement of Human BiologyAuthors: Elisee Aniwanou KPONOU, Wang Zhengning?
- Study of Uncertainty Factors Influenced in Software Phases Effecting in Cost EstimationAuthors: G. Rajkumar, Dr. K. Alagarsamy
- Data Protection for Cloud Using Homomorphic Mechanism?Authors: T. Shashi Kumar, Mrs. J. Deepthi, Mr. V. Hariprasad
- Graphical Secure Password Method against Online Password Hackers (Guessing Attacks)?Authors: G. Sudheer Reddy, G. Venkata Prasad, V. Hari Prasad?
- Image Color Extraction and Retrieval Using Classification TechniquesAuthors: S.Kousalya, Dr. Antony Selvadoss Thanamani?
- OPass: Attractive Presentation of User Authentication Protocol with Resist to Password Reuse Attacks?Authors: S. Megala Devi, M. Geetha?
- Network Monitoring and ForensicsAuthors: Subhay Chandra, Rakesh Kumar Yadav?
- Study of Various Image Enhancement Techniques-A Review?Authors: Amandeep Singh, Manjeet Singh, Mandeep Kaur?
- A Review of ROQ Attacks in Internet?Authors: Shaina Pundir, Naveen Kumari?
- Relationship Between Students’ Performance and Class Attendance in a Programming Language Subject in a Computer CourseAuthors: Meenakshi Narula, Pankaj Nagar?
- Design and Implementation of Posture Identification System?Authors: Indu Mandwi, Sofia Pillai, Hemant Turkar, Yamini Bute?
- InKeSi-Increased Key Size Method in SRNN Public Key Cryptography AlgorithmAuthors: K. Sheela, E. George Dharma Prakash Raj?
- Privacy Control Methods for Anonymous & Confidential Database Using Advance Encryption StandardAuthors: Madhuri Patil, Sandip Ingale
- A Better Approach for Horizontal Aggregations in SQL Using Data Sets for Data Mining Analysis?Authors: Y. Chakravarthi, P. Vindhya
- Hierarchical Document Clustering Using Correlation Preserving IndexingAuthors: L. Prabhakar, Srikanth. B?
- Design of Improved Web Crawler By Analysing Irrelevant Result?Authors: Prashant Dahiwale, Dr. M.M. Raghuwanshi, Dr. Latesh Malik
- SECURITY TECHNIQUES FOR MULTI TENANCY APPLICATIONS IN CLOUDAuthors: C.C. Kalyan Srinivas?, S.Sajida?, Lokesh
- Privacy Protected Query Processing on Spatial NetworksAuthors: K. SASIKALA, REKA.R, SASIKALA.K?
- An Overview of Biometric Identifiers with Emphasis on the Concept and Applications of Finger Vein RecognitionAuthors: Babafemi.O.Samuel, Olalere.A.Abass