ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.3, No.1

Publisher: IJCSMC Publishing Team

Publishing Date: 2014-01-30

  1. Reduce Energy Consumption by Improving the LEACH Protocol?

    Authors: Ali F. Marhoon, Mishall H. Awaad?

  2. Data Mining Techniques: To Predict and Resolve Breast Cancer Survivability

    Authors: Vikas Chaurasia, Saurabh Pal?

  3. Adaptive Pixel Pair Matching Technique for Data Embedding

    Authors: Nalimela Mounika, T. Madhavi Kumari?

  4. DESIGN OF LOW POWER / HIGH SPEED MULTIPLIER USING SPURIOUS POWER SUPPRESSION TECHNIQUE (SPST)

    Authors: G. Sasi?

  5. Energy Efficient Mobile Relaying in Data Intensive Wireless Sensor Networks?

    Authors: Satish Chikkala, K. Sathi Reddy?

  6. Virtual Machine-Based Resource Management System for Cloud Computing Services?

    Authors: Sri hari Reddy Medapati?, K. Sathi Reddy

  7. A SURVEY OF WIRELESS NETWORK SECURITY?

    Authors: S. Gopalakrishnan

  8. WarningBird MailAlert Based Malicious URLs Blocker System in Twitter

    Authors: MS. SARANYA.S, MR. UDHAYA KUMAR.V?

  9. Iris Recognition using Wavelet Transformation Techniques

    Authors: P.Thirumurugan, G.Mohanbabu?

  10. ARM MICRO-CONTROLLER BASED MULTI -FUNCTION SOLAR TRACKING SYSTEM?

    Authors: D.Rajendra Prasad, K.Sudhakar?

  11. Noise Suppression using Weighted Median Filter for Improved Edge Analysis in Ultrasound Kidney Images?

    Authors: K.Ramamoorthy, T.Chelladurai, P.N.Sundararajan, M.Krishnamurthy?

  12. An Efficient Methodology for Detecting Spam Using Spot System

    Authors: MRS. SARANYA.S, MRS. R.BHARATHI?

  13. A Study of Electronic Document Security

    Authors: Mr. Parag S.Deshmukh, Mr. Pratik Pande?

  14. Design and Implementation of Search Engine Using Vector Space Model for Personalized Search

    Authors: Mr. Ishwar.N.Bharambe, Prof. Richa.K.Makhijani?

  15. Mobile Web Services Invocation System Using SMAP?

    Authors: Prof. Deepak Kapgate?, Monali Khune?

  16. FPGA Implementation of Mutual Authentication Protocol Using Modular Arithmetic?

    Authors: T.Sadaiyappan, K.K.Manoj, S.A.Subhasakthe

  17. Automated Cryptanalysis of Transposition Ciphers Using Cuckoo Search Algorithm?

    Authors: Morteza Heydari, Mahdieh Nadi Senejani?

  18. The Survey of Techniques for Link Recovery & Admission Control in Wireless Mesh Network?

    Authors: Kalyani Pendke, Anup Dhamgaye?

  19. Application of Unified Network Management in LAN for Load Shedding?

    Authors: Ravi Prakash?

  20. Cued Click Point Technique for Graphical Password Authentication?

    Authors: Vaibhav Moraskar, Sagar Jaikalyani, Mujib Saiyyed, Jaykumar Gurnani, Kalyani Pendke

  21. Data Design and Analysis for Survey System Based on Statistical Functionality?

    Authors: Wessam Abbas Hamed, Atheer Yousif Oudah, Sarmad Kadhim Dhiab?

  22. Survey on Distributed Accountability for Data Sharing in the Cloud?

    Authors: K.S.Khadke, Prof. Umesh.B.Chavan

  23. Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud?

    Authors: Lokesh.P.Chaudhari, Prof. Umesh.B.Chavan?

  24. DESIGN AND IMPLEMENTATION OF MULTIPLE SENSOR INTERFACE USING ETHERNET?

    Authors: Bandi Praveen Kumar, Dr.R.V.Krishnaiah?

  25. Quality of Service Assessment of AOMDV for Random Waypoint and Random Walk Mobility Models?

    Authors: V B Kute, Dr. M U Kharat?

  26. An Optimized Solution to Map Web User Profile Based on Domain Ontology?

    Authors: Prof. Ratheesh Kumar A.M, Prof. Velusamy A, Prof. Shobana G?

  27. EFFICIENT DYNAMIC MULTILEVEL PRIORITY TASK SCHEDULING FOR WIRELESS SENSOR NETWORKS

    Authors: Mrs. K.Indumathi, Mrs. M. Santhi?

  28. Evaluate the Performance of the Router Algorithms in Different Scenarios TCP Newreno and TCP Reno?

    Authors: Wessam Abbas Hamed?

  29. Segmentation of Nuclei in Cytological Images of Breast FNAC Sample: Case Study

    Authors: Aditya P. Pise, Rushi Longadge, L. G. Malik?

  30. A Review of Numerous Facial Recognition Techniques in Image Processing

    Authors: A.Swaminathan, N.Kumar, M.Ramesh Kumar?

  31. Self-optimization and Self-Protection (Transactional Security) in AODV Based Wireless Sensor Network?

    Authors: Rajani Narayan, Dr. B.P. Mallikarjunaswamy, M.C. Supriya?

  32. Surveillance on Bigdata to Mine Pattern?

    Authors: N. Monica, Dr. K. Ramesh Kumar, T. Nelson Gnanaraj?

  33. Improved Human Identification using Finger Vein Images?

    Authors: Sameer Sharma, Mr. Shashi Bhushan, Ms. Jaspreet Kaur?

  34. An Image Fusion Method Using DT-CWT and Average Gradient?

    Authors: A. M. El Ejaily, F. Eltohamy, M. S. Hamid, G. Ismail?

  35. GAIT RECOGNITION OF HUMAN USING SVM AND BPNN CLASSIFIERS?

    Authors: Arun Joshi, Mr. Shashi Bhushan, Ms. Jaspreet Kaur?

  36. Wireless Mesh Networks: The Survey of Andover Continuum Wireless Technology and CyberStation Wireless Control?

    Authors: K.Sangeetha, P.Revathi, N.Kokhila, C.Theebendra?

  37. THE IMAGE STEGANOGRAPHY AND STEGANALYSIS BASED ON PEAK-SHAPED TECHNIQUE FOR MP3 AUDIO AND VIDEO?

    Authors: P.Manimegalai, K.S.Gomathi, D.Ponniselvi, M.Santha?

  38. Fuzzy Mining Approach for Gene Clustering and Gene Function Prediction

    Authors: Akhil Kumar Das, Debasis Mandal, Mainak Adhikary, Amit Kumar Sen

  39. EFFICIENT CLASSIFICATION METHOD FOR LARGE DATASET BY ASSIGNING THE KEY VALUE IN CLUSTERING?

    Authors: Dr. B Rosiline Jeetha?

  40. IMPLEMENTATION OF SPEED UP ROBUST FEATURE FOR DETECTION AND TRACKING OF INANIMATE OBJECTS

    Authors: Fari Muhammad Abubakar?

  41. An Analysis on Clustering Algorithms in Data Mining?

    Authors: Mythili S, Madhiya E?

  42. An Approach to an Emerging Classification Method for Large Dataset in Clustering

    Authors: Kathiresan V, Dr. P Sumathi?

  43. The Image Quality in Computer Tomography Using Curve-let Transform

    Authors: M.Selvi, J.Vanitha, S.Yasotha?

  44. Efficient Service Broker Algorithm for Data Center Selection in Cloud Computing

    Authors: Prof. Deepak Kapgate

  45. DATA ENCRYPTION WITH FRIEND BASED ROUTING TO ESTABLISH SECURITY IN MANET?

    Authors: SHARMILA.G?, J.R.THRESPHINE?

  46. ENERGY EFFICIENT VOTING BASED INTRUSION DETECTION TECHNIQUES IN HETEROGENEOUS WIRELESS SENSOR NETWORK?

    Authors: Divya.B, Manju.R, Sathyabama.B?

  47. REVIEW PAPER ON RESPONSE BASED APPROACHES FOR DETECTION OF MISBEHAVING NODES IN MANETS?

    Authors: Swapna Taksande, Prof. Rajani Bhoomarker, Prof. Sameena Jafar

  48. Design and Implementation of Web Based Collaborative Learning Model for ICT Course of College Student in Bangladesh?

    Authors: Md. Tariqul Islam, S. M. J. Rahman, Syed Md. Galib, K. M. A. Uddin, G. M. M. Bashir

  49. AES and DES Using Secure and Dynamic Data Storage in Cloud

    Authors: Gowtham B, Prasanth SP?

  50. An Overview of MANET: Applications, Attacks and Challenges?

    Authors: Mr. L Raja, Capt. Dr. S Santhosh Baboo?

  51. Real Time HCI using Eye Blink Detection?

    Authors: R.T.Narmadha, T.Mythili, R.T.Nivetha?

  52. A Survey on Wireless Sensor Network Protocols?

    Authors: T.Mythili, R.T.Narmadha, R.T.Nivetha?

  53. Mining Association Rules to Improve Academic Performance?

    Authors: Rakesh Kumar Arora, Dr. Dharmendra Badal?

  54. Design & Implementation of Data Protection Server: Detect Guilty Agent & Protect Secure Data?

    Authors: Hema Donekar, Pratiksha Raut, Nita Janorkar, Shital Admane, Indu Mandwi?

  55. A Survey Paper on Image Segmentation with Thresholding?

    Authors: Prof. S. T. Khandare, Mr. Akshay D. Isalkar?

  56. SURVEY ON AN EFFICIENT APPROACH FOR MULTIMEDIA TRANSMISSION USING MULTIPATH ROUTING IN MANET

    Authors: A.Sheganaz, P.D.R.Vijaya Kumar?

  57. SURVEY ON USER REVOCATION AND FINE GRAINED ACCESS CONTROL OF PHR IN CLOUD USING HASBE

    Authors: T.Radhika, S.Vasumathi Kannagi?

  58. Memetic Algorithm with Hybrid Mutation Operator?

    Authors: Manju Sharma?

  59. A SURVEY OF QUESTION ANSWERING SYSTEM FOR COMPARABLE ENTITY MINING?

    Authors: S.Deepa, S.Vasumathi Kannagi?

  60. Code Birthmarks and Graph Isomorphism for Theft Detection

    Authors: Snehal N. Nayakoji, S. P. Sonavane?

  61. MULTI-WAVELET BASED ON NON-VISIBLE WATER MARKING?

    Authors: P.Venkatapathi, Suresh.N?

  62. Performance Analysis of Image Fusion Algorithms using HAAR Wavelet?

    Authors: Deepika.L, Mary Sindhuja.N.M?

  63. Survey on Quality Analysis of Cooperation Incentive Strategies in MANET?

    Authors: K Savitha Rohini, S Dhanasekar?

  64. Speech Recognition Using Backoff N-Gram Modelling in Android Application

    Authors: S.Aparna, V.Senthil Kumar?

  65. Design of Encounter-Based Social Network in Mobile Application

    Authors: S.Niranjani, A.Rathna?

  66. SEARCHING MOBILE NODES USING MODIFIED COLUMN MOBILITY MODEL?

    Authors: Dr. Tanweer Alam?, Dr. Parveen Kumar?, Prabhakar Singh

  67. Predictive Data Mining: A Generalized Approach?

    Authors: Meghana Deshmukh?, Prof. S. P. Akarte

  68. Automatic Detection and Restraining Mobile Virus Propagation using Android?

    Authors: S. Chandrasekar, Prof. V. Jayaprakasan

  69. PERFORMANCE EVALUATION FOR FEEDBACK ROTATE- QUASI- ORTHOGONAL SPACE-TIME BLOCK CODES IN MULTIPLE TRANSMIT ANTENNAS?

    Authors: K. Deepak Babu, Rajesh Durgam, P. Anil Kumar?

  70. An Improved IDS Detection with Protection of Agent Collude Attacks?

    Authors: L.Devi?, V.Santhiya?

  71. Denial of Service Attacks in Wireless Networks: The Case of Jammers

    Authors: L.Devi?, ?A.Suganthi?

  72. Fast IP Network Recovery Using MRC from Multiple Failures

    Authors: L.Devi?, ?M.Suganthi?

  73. Wireless Body Area Sensor System for Monitoring Physical Activities Using GUI?

    Authors: L.Devi?, ?R.Nithya?

  74. Sybil Attack Detection with Reduced Bandwidth Overhead in Urban Vehicular Networks?

    Authors: D. Balamahalakshmi, Mr. K.N. Vimal Shankar??

  75. AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA?

    Authors: Saranya.S, Mr. K.N. Vimal Shankar?

  76. Appraisal and Analysis on QoS Aware Secured Web Services over VANET Applications?

    Authors: M. Rajeswari, V. Mythili, S. Sridevi, V. Nishanthi?