Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.2, No.9
Publisher: ZAIN Publications
Publishing Date: 2013-09-30
- INTRUSION DETECTION ON CLOUD APPLICATIONSAuthors: A. Venkat Reddy, K. Sharath Kumar, V. Hari Prasad?
- VEHICLE DETECTION AND TRAFFIC ASSESSMENT USING IMAGES?Authors: Pushpalata Patil, Prof. Suvarna Nandyal?
- An Analysis on Objectives, Importance and Types of Software TestingAuthors: Gaurav Saini, Kestina Rai?
- Cloud Security for Computing Secure Cloud Bursting, Brokerage and Aggregation Using Cryptography?Authors: Neeraj Shrivastava, Rahul Yadav
- Performance Evaluation of AODV and DSR Routing Protocols with PCM and GSM Voice Encoding Schemes?Authors: Osamah Yaseen Fadhil?
- Comparison of Previous Result with New Model for the Improvement of Gain in Raman Amplifier?Authors: Jyoti Dhir, Vivek Gupta?
- NEXT GENERATION MOBILE COMPUTING?Authors: N. LAKSHMI PRASANNA, DR. R. V. KRISHNAIAH?
- FACIAL IDENTIFICATION SYSTEM USING MATRIX SPACEAuthors: Saurabh Mitra, Dr. Moushmi Kar, Shikha Mishra?
- Zforce Touchscreen Technology?Authors: A. ANUSHA REDDY, DR. R. V. KRISHNAIAH?
- Analysis of Attribute Set-Based Encryption Solution for Access Control in Cloud Computing?Authors: P. Sravanthi, N. Uday Bhaskar, P. Swapna, Nagaraju?
- Safety Measures in Wireless Information Networks?Authors: K.V.N.R. Sai Krishna, CH. Krishnamohan?
- Real-Time Iterated Shrinkage Deconvolution for Artifacts Images?Authors: M. Sravanthi, V. Swathanthra
- Home Electrical Appliances Smart SystemAuthors: S. H. Husin, A. A. Ngahdiman, N. M. Z. Hashim, Y. Yusop, A.S Ja’afar?
- A Survey of Time Synchronization Protocols for Wireless Sensor Networks?Authors: Baljinder Kaur, Amandeep Kaur?
- A New Technique for Test Case PrioritizationAuthors: Amandeep Kaur, Sheena Singh
- Lifetime Maximization in Sensor Networks for Rare-Event Detection using Optimal Sleep Scheduling?Authors: M. Sindhuja, N. Kokila?
- Design and Implementation of Rijndael Encryption Algorithm Based on FPGA?Authors: K. Soumya, G. Shyam Kishore
- Design and Performance Analysis of Various Adders using Verilog?Authors: Maroju SaiKumar, Dr. P. Samundiswary?
- Impact of Uncertainty Factors in Cost Estimation ? Substantiation through Normal Distribution CurveAuthors: G. Rajkumar, Dr. K. Alagarsamy?
- A Comprehensive Study on Fast Image Dehazing Techniques?Authors: Elisée A KPONOU, Zhengning Wang, Liping Li?
- HYBRID ENSEMBLE GENE SELECTION ALGORITHM FOR IDENTIFYING BIOMARKERS FROM BREAST CANCER GENE EXPRESSION PROFILES?Authors: DR. S. ARUNA, DR. L.V. NANDAKISHORE
- Prototype of Vehicle Security Alert System on Proton Iswara 1.3?Authors: N. A. Ali, A. S. Ja’afar, A. Salleh, M. A. M. Razali, M.Z.A.A Aziz, N. M. Z. Hashim
- Mobility and Distance Based Geographic Routing in MANET with Minimal Location Update?Authors: S. Joshna, J. Vijay Daniel, P. Manjula?
- A New Color-Texture Approach for Products Inspection using WaveletsAuthors: G. Vikranth Kumar, Y. Durga Prasad, Dr. Y. Venkateswarulu?
- Simulation of WiMAX System Based on OFDM Model with Difference Adaptive Modulation Techniques?Authors: A.Salleh, N.R. Mohamad, M.Z.A. Abd Aziz, M.H. Misran, M.A. Othman, N.M.Z. Hashim?
- A Framework Based Integrated Dynamic Data Storage Scheme Based on Network Coding and Homomorphic Fingerprinting?Authors: K. Jothimani, N.Hema?
- Buffer Cluster Scheduling Scheme for Smart Grid Advanced Metering Applications?Authors: A.C.Dhivya, N.Hema
- Performing the Data Reliability Estimation in a Data Warehouse Opened on the Web Enable Data Warehouse?Authors: K.Valarmathi, T.Selvakannan?
- Well-organized Estimation of Range Aggregates against Uncertain Location-Based Queries?Authors: G.Nithya, M.Chinnusamy?
- Continuous Aggregation Queries Based on Clustering Based Penalty Adaptive Query Planning?Authors: T.Keerthana, T.selvakannan?
- A Link-Based Cluster Collection Approach Combined Contagious Cluster With For Categorical Data ClusteringAuthors: N.Premalatha, M.Chinnusamy?
- SMELL-O-VISION-THE FUTURE DIGITAL DISPLAY DEVICEAuthors: CH.ARAVINDA, DR. R.V.KRISHNAIAH?
- Performance Base Static Analysis of Malware on Android?Authors: Khyati Rami, Vinod Desai?
- DELAY ? Disruption Tolerant Network (DTN), its Network Characteristics and Core Applications?Authors: Vaishali.S.Raj, Dr. R. Manicka Chezian
- CONTRAIL ? ARCHITECTURE FOR MOBILE DATA SHARING APPLICATIONS?Authors: Lavanya.K, Devipriya.C, Saradha.S, Sangeetha Priya.M?
- Power Efficient Design of Sequential Circuits using OBSC and RTPG IntegrationAuthors: Rampriya.R, Marutharaj.T?
- NOISE ALIASING TECHNIQUE FOR SOFTWARE DEFINED RADIO: A REVIEWAuthors: Shyam Mohan Dubey, Saurabh Mitra, Dr. Moushmi Kar?
- A Random Mechanism to Measure and Predict Changes in DDos AttacksAuthors: Hemanth Siramdasu, Premnath G, Karthick M
- TRACKING AND ACTIVITY RECOGNITION THROUGH CAMERA NETWORKSAuthors: P. Ravali?, D. Sampath Kumar?
- A Review of the Vulnerabilities of Web Applications?Authors: Ravneet Kaur Sidhu?