Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.3, No.1
Publisher: ZAIN Publications
Publishing Date: 2014-01-30
- Reduce Energy Consumption by Improving the LEACH Protocol?Authors: Ali F. Marhoon, Mishall H. Awaad?
- Data Mining Techniques: To Predict and Resolve Breast Cancer SurvivabilityAuthors: Vikas Chaurasia, Saurabh Pal?
- Adaptive Pixel Pair Matching Technique for Data EmbeddingAuthors: Nalimela Mounika, T. Madhavi Kumari?
- DESIGN OF LOW POWER / HIGH SPEED MULTIPLIER USING SPURIOUS POWER SUPPRESSION TECHNIQUE (SPST)Authors: G. Sasi?
- Energy Efficient Mobile Relaying in Data Intensive Wireless Sensor Networks?Authors: Satish Chikkala, K. Sathi Reddy?
- Virtual Machine-Based Resource Management System for Cloud Computing Services?Authors: Sri hari Reddy Medapati?, K. Sathi Reddy
- A SURVEY OF WIRELESS NETWORK SECURITY?Authors: S. Gopalakrishnan
- WarningBird MailAlert Based Malicious URLs Blocker System in TwitterAuthors: MS. SARANYA.S, MR. UDHAYA KUMAR.V?
- Iris Recognition using Wavelet Transformation TechniquesAuthors: P.Thirumurugan, G.Mohanbabu?
- ARM MICRO-CONTROLLER BASED MULTI -FUNCTION SOLAR TRACKING SYSTEM?Authors: D.Rajendra Prasad, K.Sudhakar?
- Noise Suppression using Weighted Median Filter for Improved Edge Analysis in Ultrasound Kidney Images?Authors: K.Ramamoorthy, T.Chelladurai, P.N.Sundararajan, M.Krishnamurthy?
- An Efficient Methodology for Detecting Spam Using Spot SystemAuthors: MRS. SARANYA.S, MRS. R.BHARATHI?
- A Study of Electronic Document SecurityAuthors: Mr. Parag S.Deshmukh, Mr. Pratik Pande?
- Design and Implementation of Search Engine Using Vector Space Model for Personalized SearchAuthors: Mr. Ishwar.N.Bharambe, Prof. Richa.K.Makhijani?
- Mobile Web Services Invocation System Using SMAP?Authors: Prof. Deepak Kapgate?, Monali Khune?
- FPGA Implementation of Mutual Authentication Protocol Using Modular Arithmetic?Authors: T.Sadaiyappan, K.K.Manoj, S.A.Subhasakthe
- Automated Cryptanalysis of Transposition Ciphers Using Cuckoo Search Algorithm?Authors: Morteza Heydari, Mahdieh Nadi Senejani?
- The Survey of Techniques for Link Recovery & Admission Control in Wireless Mesh Network?Authors: Kalyani Pendke, Anup Dhamgaye?
- Application of Unified Network Management in LAN for Load Shedding?Authors: Ravi Prakash?
- Cued Click Point Technique for Graphical Password Authentication?Authors: Vaibhav Moraskar, Sagar Jaikalyani, Mujib Saiyyed, Jaykumar Gurnani, Kalyani Pendke
- Data Design and Analysis for Survey System Based on Statistical Functionality?Authors: Wessam Abbas Hamed, Atheer Yousif Oudah, Sarmad Kadhim Dhiab?
- Survey on Distributed Accountability for Data Sharing in the Cloud?Authors: K.S.Khadke, Prof. Umesh.B.Chavan
- Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud?Authors: Lokesh.P.Chaudhari, Prof. Umesh.B.Chavan?
- DESIGN AND IMPLEMENTATION OF MULTIPLE SENSOR INTERFACE USING ETHERNET?Authors: Bandi Praveen Kumar, Dr.R.V.Krishnaiah?
- Quality of Service Assessment of AOMDV for Random Waypoint and Random Walk Mobility Models?Authors: V B Kute, Dr. M U Kharat?
- An Optimized Solution to Map Web User Profile Based on Domain Ontology?Authors: Prof. Ratheesh Kumar A.M, Prof. Velusamy A, Prof. Shobana G?
- EFFICIENT DYNAMIC MULTILEVEL PRIORITY TASK SCHEDULING FOR WIRELESS SENSOR NETWORKSAuthors: Mrs. K.Indumathi, Mrs. M. Santhi?
- Evaluate the Performance of the Router Algorithms in Different Scenarios TCP Newreno and TCP Reno?Authors: Wessam Abbas Hamed?
- Segmentation of Nuclei in Cytological Images of Breast FNAC Sample: Case StudyAuthors: Aditya P. Pise, Rushi Longadge, L. G. Malik?
- A Review of Numerous Facial Recognition Techniques in Image ProcessingAuthors: A.Swaminathan, N.Kumar, M.Ramesh Kumar?
- Self-optimization and Self-Protection (Transactional Security) in AODV Based Wireless Sensor Network?Authors: Rajani Narayan, Dr. B.P. Mallikarjunaswamy, M.C. Supriya?
- Surveillance on Bigdata to Mine Pattern?Authors: N. Monica, Dr. K. Ramesh Kumar, T. Nelson Gnanaraj?
- Improved Human Identification using Finger Vein Images?Authors: Sameer Sharma, Mr. Shashi Bhushan, Ms. Jaspreet Kaur?
- An Image Fusion Method Using DT-CWT and Average Gradient?Authors: A. M. El Ejaily, F. Eltohamy, M. S. Hamid, G. Ismail?
- GAIT RECOGNITION OF HUMAN USING SVM AND BPNN CLASSIFIERS?Authors: Arun Joshi, Mr. Shashi Bhushan, Ms. Jaspreet Kaur?
- Wireless Mesh Networks: The Survey of Andover Continuum Wireless Technology and CyberStation Wireless Control?Authors: K.Sangeetha, P.Revathi, N.Kokhila, C.Theebendra?
- THE IMAGE STEGANOGRAPHY AND STEGANALYSIS BASED ON PEAK-SHAPED TECHNIQUE FOR MP3 AUDIO AND VIDEO?Authors: P.Manimegalai, K.S.Gomathi, D.Ponniselvi, M.Santha?
- Fuzzy Mining Approach for Gene Clustering and Gene Function PredictionAuthors: Akhil Kumar Das, Debasis Mandal, Mainak Adhikary, Amit Kumar Sen
- EFFICIENT CLASSIFICATION METHOD FOR LARGE DATASET BY ASSIGNING THE KEY VALUE IN CLUSTERING?Authors: Dr. B Rosiline Jeetha?
- IMPLEMENTATION OF SPEED UP ROBUST FEATURE FOR DETECTION AND TRACKING OF INANIMATE OBJECTSAuthors: Fari Muhammad Abubakar?
- An Analysis on Clustering Algorithms in Data Mining?Authors: Mythili S, Madhiya E?
- An Approach to an Emerging Classification Method for Large Dataset in ClusteringAuthors: Kathiresan V, Dr. P Sumathi?
- The Image Quality in Computer Tomography Using Curve-let TransformAuthors: M.Selvi, J.Vanitha, S.Yasotha?
- Efficient Service Broker Algorithm for Data Center Selection in Cloud ComputingAuthors: Prof. Deepak Kapgate
- DATA ENCRYPTION WITH FRIEND BASED ROUTING TO ESTABLISH SECURITY IN MANET?Authors: SHARMILA.G?, J.R.THRESPHINE?
- ENERGY EFFICIENT VOTING BASED INTRUSION DETECTION TECHNIQUES IN HETEROGENEOUS WIRELESS SENSOR NETWORK?Authors: Divya.B, Manju.R, Sathyabama.B?
- REVIEW PAPER ON RESPONSE BASED APPROACHES FOR DETECTION OF MISBEHAVING NODES IN MANETS?Authors: Swapna Taksande, Prof. Rajani Bhoomarker, Prof. Sameena Jafar
- Design and Implementation of Web Based Collaborative Learning Model for ICT Course of College Student in Bangladesh?Authors: Md. Tariqul Islam, S. M. J. Rahman, Syed Md. Galib, K. M. A. Uddin, G. M. M. Bashir
- AES and DES Using Secure and Dynamic Data Storage in CloudAuthors: Gowtham B, Prasanth SP?
- An Overview of MANET: Applications, Attacks and Challenges?Authors: Mr. L Raja, Capt. Dr. S Santhosh Baboo?
- Real Time HCI using Eye Blink Detection?Authors: R.T.Narmadha, T.Mythili, R.T.Nivetha?
- A Survey on Wireless Sensor Network Protocols?Authors: T.Mythili, R.T.Narmadha, R.T.Nivetha?
- Mining Association Rules to Improve Academic Performance?Authors: Rakesh Kumar Arora, Dr. Dharmendra Badal?
- Design & Implementation of Data Protection Server: Detect Guilty Agent & Protect Secure Data?Authors: Hema Donekar, Pratiksha Raut, Nita Janorkar, Shital Admane, Indu Mandwi?
- A Survey Paper on Image Segmentation with Thresholding?Authors: Prof. S. T. Khandare, Mr. Akshay D. Isalkar?
- SURVEY ON AN EFFICIENT APPROACH FOR MULTIMEDIA TRANSMISSION USING MULTIPATH ROUTING IN MANETAuthors: A.Sheganaz, P.D.R.Vijaya Kumar?
- SURVEY ON USER REVOCATION AND FINE GRAINED ACCESS CONTROL OF PHR IN CLOUD USING HASBEAuthors: T.Radhika, S.Vasumathi Kannagi?
- Memetic Algorithm with Hybrid Mutation Operator?Authors: Manju Sharma?
- A SURVEY OF QUESTION ANSWERING SYSTEM FOR COMPARABLE ENTITY MINING?Authors: S.Deepa, S.Vasumathi Kannagi?
- Code Birthmarks and Graph Isomorphism for Theft DetectionAuthors: Snehal N. Nayakoji, S. P. Sonavane?
- MULTI-WAVELET BASED ON NON-VISIBLE WATER MARKING?Authors: P.Venkatapathi, Suresh.N?
- Performance Analysis of Image Fusion Algorithms using HAAR Wavelet?Authors: Deepika.L, Mary Sindhuja.N.M?
- Survey on Quality Analysis of Cooperation Incentive Strategies in MANET?Authors: K Savitha Rohini, S Dhanasekar?
- Speech Recognition Using Backoff N-Gram Modelling in Android ApplicationAuthors: S.Aparna, V.Senthil Kumar?
- Design of Encounter-Based Social Network in Mobile ApplicationAuthors: S.Niranjani, A.Rathna?
- SEARCHING MOBILE NODES USING MODIFIED COLUMN MOBILITY MODEL?Authors: Dr. Tanweer Alam?, Dr. Parveen Kumar?, Prabhakar Singh
- Predictive Data Mining: A Generalized Approach?Authors: Meghana Deshmukh?, Prof. S. P. Akarte
- Automatic Detection and Restraining Mobile Virus Propagation using Android?Authors: S. Chandrasekar, Prof. V. Jayaprakasan
- PERFORMANCE EVALUATION FOR FEEDBACK ROTATE- QUASI- ORTHOGONAL SPACE-TIME BLOCK CODES IN MULTIPLE TRANSMIT ANTENNAS?Authors: K. Deepak Babu, Rajesh Durgam, P. Anil Kumar?
- An Improved IDS Detection with Protection of Agent Collude Attacks?Authors: L.Devi?, V.Santhiya?
- Denial of Service Attacks in Wireless Networks: The Case of JammersAuthors: L.Devi?, ?A.Suganthi?
- Fast IP Network Recovery Using MRC from Multiple FailuresAuthors: L.Devi?, ?M.Suganthi?
- Wireless Body Area Sensor System for Monitoring Physical Activities Using GUI?Authors: L.Devi?, ?R.Nithya?
- Sybil Attack Detection with Reduced Bandwidth Overhead in Urban Vehicular Networks?Authors: D. Balamahalakshmi, Mr. K.N. Vimal Shankar??
- AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA?Authors: Saranya.S, Mr. K.N. Vimal Shankar?
- Appraisal and Analysis on QoS Aware Secured Web Services over VANET Applications?Authors: M. Rajeswari, V. Mythili, S. Sridevi, V. Nishanthi?