Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.3, No.10
Publisher: ZAIN Publications
Publishing Date: 2014-10-30
- Website Accessibility Design Issues with Indian E-Government SitesAuthors: Surendranath Reddy S?
- Validation of Artificial Neural Network Method for Action Potential Detection and Classification Based on Velocity Selective RecordingAuthors: A.I. Al-Shueli?
- Survey on Human Face Expression RecognitionAuthors: Atul Chinchamalatpure; Anurag Jain?
- PREVENTION OF SELECTIVE JAMMING ATTACKS USING PACKET HIDING METHODS IN WIRELESS NETWORKS?Authors: Rasamalla Naresh; K.Pranav Kumar?
- A Cloud Based Approach for Dynamic Resource Allocation using Virtual MachinesAuthors: B. Sowmya; S. Vijaya Laxmi; Mohammed Ali Shaik?
- Performance Analysis of Cloud Infrastructure Using Linpack Benchmark?Authors: Navdeep Kaur; Harinderpal Singh; Vikas Gupta?
- A Novel Routing STLCC Based Control of Packet Loss over Network EdgeAuthors: Sushmitha G; Mohammed Ali Shaik?
- An Advanced Text Encryption & Compression System Based on ASCII Values & Arithmetic Encoding to Improve Data Security?Authors: Amandeep Singh Sidhu; Er. Meenakshi Garg?
- A Novel Approach for Distributed Accountability of Data Sharing in a PHP CloudAuthors: B.Sumitha; V.Venkateshwarlu?
- Comparison of Basic Clustering AlgorithmsAuthors: Darshan Sonagara; Soham Badheka?
- HANDLING REAL TIME DATA SETS USING STREAM MINING TECHNIQUES?Authors: S.Ranjitha Kumari; P.Krishna Kumari; S.Shylaja
- The Implications of Switching Barriers on Subscriber Retention in Developing EconomiesAuthors: Ezer Osei Yeboah-Boateng; Luc Pascal Olou; Abel Yeboah-Ofori?
- Research Study on Importance of Usability Testing/ User Experience (UX) Testing?Authors: Niranjanamurthy M; Archikam Nagaraj; Himaja Gattu; Puneeth K Shetty?
- Rule Based Question Generation System from Punjabi Text Contain Historical InformationAuthors: Parshan Singh; Rajbhupinder Kaur?
- A Survey on Different Techniques for Message Security and Authentication in Offline Chatting?Authors: Neha Khodke; Shivangi Deshpande; Payal Tote; Trupti Ghumade?
- Video Forgery Detection Using Invariance of Color CorrelationAuthors: Sarah Joy; Lisha Kurian?
- SECURITY SURVEY OF FAMOUS OPERATING SYSTEMSAuthors: Muhammad Waqas; Maria Iram; Rehamat-E-Bari Wajeeha?
- Colluding Detection of Misbehaving Nodes in MANET?Authors: Kranthi Kumar.K?; Vasantha Laxmi.CH
- Research Study on Web Application Testing using Selenium Testing Framework?Authors: Niranjanamurthy M; Arun Kumar R; Sahana Srinivas; Manoj RK?
- Implementing Software IPTV with WOWZA Server?Authors: Jaykanth Sunny P; Venkata Rami Reddy G; Jagadeeswara Rao E?
- A Survey on Wireless Mesh Networks Performance, Routing Metrics and ProtocolsAuthors: Ravi Kiran D; E. Jagadeeswararao; G. Nagaraju?
- A Novel Secure System for a Knowledge Sharing Environment?Authors: Harshitaa.B; G.Praveen Babu?
- Detection of WML in MRI Brain Images using Neuro-Fuzzy Inference System?Authors: M.ISHWARYA NIRANJANA; R.GOWRIMANOHARI; E.ARUN KUMAR?
- Comparative Study on Software Testing Techniques?Authors: Niranjanamurthy M; Nitesh S N; Nagesh S N; Balaji Sriraman
- An Efficient Security Approach in Mobile Ad Hoc NetworksAuthors: Khalid Khanfar?
- Secure SMS Based on Internet Service?Authors: Saja T. Ahmed; Loay E. George?
- Lightweight IP - The Network Protocol Its Features and Applications?Authors: Akshay Arunpant Nakade?
- A Cloud Computing Survey with its Applications and Challenges?Authors: Pooja Namdeo Vilayatkar?
- COMPARATIVE STUDY ON DIFFERENT CLASSIFICATION TECHNIQUES FOR BREAST CANCER DATASET?Authors: Ahamed Lebbe Sayeth Saabith; Elankovan Sundararajan; Azuraliza Abu Bakar?
- Face Recognition Technology?Authors: Swati S. Bobde; Sumit V. Deshmukh?
- 5G WIRELESS TECHNOLOGY?Authors: Ganesh R. Patil; Prashant S.Wankhade?
- PERFORMANCE ANALYSIS OF RECONFIGURABLE CRYPTO PROCESSOR FOR SECURITY AND PRIVACY IN COMMUNICATION NETWORKSAuthors: A.Kaleel Rahuman; G.Athisha?
- Study of Flat - Reactive On-Demand Routing Protocol (DSR & AODV): A Review?Authors: Atul D.Atalkar?; Prashant S.Wankhade?
- Mobile Computing Equipping Different Network Scenario’s?Authors: Aniket Vinod Kene?
- DESIGNING RESOURCEFUL COUNTER FOR FIFO?Authors: S. Janani; S. Thillaikkarasi?
- Implementation of Public Auditing for Privacy Preserving in Secure Cloud StorageAuthors: Nusrath Banu; Mohammed Ali Shaik?
- 64 Bytes Cell Sized Distributed Packet Buffers for High-Bandwidth Routers?Authors: K Ascherya; Mohammed Ali Shaik?
- Bootstrapping & Symmetric Key Based Pre-Distribution Scheme for Wireless Sensor Networks?Authors: Himabindu Alladi; Mohammed Ali Shaik?
- Age Classification from Facial Images System?Authors: Zainab A. Othman; Dina A. Adnan?
- AN ENERGY EFFICIENT DATACACHE EMBEDDED PROCESSOR?Authors: B.BalaBhuvanapriya?; S.Udhayakumar?
- COMPARATIVE STUDY OF LOW POWER PULSE TRIGGERED FLIP-FLOP?Authors: S.PAVITHRA?; B. MENAKA DEVI?
- Automatic Summarization of Text Documents Written in Hindi Language?Authors: Dawinder Kaur; Rajbhupinder Kaur?
- A SINGLE ? STAGE SOLAR POWER CONVERTER FOR PV BATTERY SYSTEM?Authors: K Krishna Chaitanya?; Sri. Khaja Khader Mohiuddin?; Sri. T.V.V. Pavan Kumar?
- A Survey Paper on Multi-Homed Services Satisfying QoS in Heterogeneous Wireless Access Networks?Authors: Saravana Selvam.N; Subhashree.K?
- DYNAMIC NON-COOPERATIVE COMPUTATION FOR PRIVACY PRESERVING DATA ANALYSISAuthors: D. Saahas Reddy; V. Uma Rani; M. Sreenivasa Rao?
- Image Resolution Enhancement Based on DWT & SWTAuthors: S A Desai?; U S Bhadade?
- WEB APPLICATION SECURITY?Authors: RAVINDER YADAV; SURENDER KUMAR RAWAL; AAKASH GOYAL?
- CONTENT AND LEXICAL ANALYSIS: PRACTICAL APPLICATION?Authors: Aakash Goyal; Ravinder Yadav; Surender Kumar Rawal?
- Smartphone Application for Railway Ticket Reservation and Validation Using Mobile Network?Authors: Pranjali Kharwade; Vaibhavi Datey; Isha Gujarkar; Vidhi Sharma; Shweta Holey; Vivek Gupta?
- Greedy Based Single Path & Multi Path Protocol for Wireless Sensor Networks?Authors: V.Veeranna; S. Vijayalaxmi
- In & Out Degree Based Effective User Navigation through Website Structure ImprovementAuthors: K Kishan; K. Pranav Kumar?
- ESPOC: Framework for M-Healthcare Emergency?Authors: B. Veeranna; V. Gouthami?
- SECURED DATA TRANSMISSION USING CRYPTOGRAPHY?Authors: S.Suresh?; L.Gomathi?
- Effective Video Streaming Scheme in Online Social Networks?Authors: G. Srikanth; Yasin. S?
- Investigation about the Impact of Robots in Educational and Medical Field?Authors: Veena Vijayan V.?
- Optimizing the Performance of a Class of Distributed Systems over the Internet?Authors: P.SRINIVAS; K.Kishore Babu; B.Satish Kumar
- The Role of Data Warehousing Concept for Improved Organizations Performance and Decision Making?Authors: Nwakanma Ifeanyi; Egbivwie Oghenevwoke; Azike Uchenna; Nwaobilo Amarachi; Ibeji Chinedum; Ohia Nwabueze?
- Anonymous Profile Matching Protocols in Mobile Social Networks?Authors: Priti Chandrakant Kandewar; D. Manasa?
- A Novel Improvement in Wireless Networks by Using Wireless Push System through Smart Antennas?Authors: T V S Prasad Gupta; Albert Prasanna Kumar; V.Narahari?
- The Parallel Loaded Resonant Converter for the Application of DC to DC Energy Conversions?Authors: G. Surendra Babu?; A.Gopalakrushna?
- PHOTOVOLTAIC BASED HIGH-EFFICIENCY SINGLE-INPUT MULTIPLE-OUTPUT DC-DC CONVERTERAuthors: J.Kondalaiah?; I.Rahul?
- COMPARATIVE STUDY OF VARIOUS CLUSTERING TECHNIQUES?Authors: Akshay S. Agrawal; Sachin Bojewar?
- A NOVEL APPROACH FOR PREDICTING PHISHING WEBSITES USING THE MAPREDUCE FRAMEWORK?Authors: Hima Sampath Rao; SK Abdul Nabi?
- Defending against Flood Attacks in Disruption Tolerant NetworksAuthors: Gayatri Rani; K Santosh Kumar
- A Survey on Security Properties and Web Application Scanner?Authors: K.Naveen Durai; K.Priyadharsini?
- Automation of Testing Using a Microcontroller?Authors: Harman Malhotra?
- A Survey on 6LowPAN & its Future Research Challenges?Authors: Aiman J. Albarakati; Junaid Qayyum; Khalid A. Fakeeh?
- ENTERPRISE RESOURCE PLANNING ON CLOUD FOR SMALL AND MEDIUM SIZED BUSINESS, s?Authors: Khalid A. Fakeeh; Junaid Qayyum; Aiman J. Albarakati?
- ENHANCED ADAPTIVE SECURITY PROTOCOL IN LTE AKA?Authors: Uwaya Fidelis?; Madhavi Kumari?
- Unsupervised Learning on Cosmic Ray Daily Harmonic Variations?Authors: Roopesh K. Dwivedi; P.K. Rai?
- Simulation Based Performance Comparison of AODV, AOMDV, DSR and MDART Routing Protocols in MANETS?Authors: Mamta Samkaria; Anita Ganpati?
- Cache Replacement Algorithms for Coordinated Cooperative Social Wireless Networks?Authors: V.Ravi Kumar; M.Swati?
- STUDENT ACADEMIC PERFORMANCE USING DATA MINING TECHNIQUESAuthors: L.Pandeeswari; K.Rajeswari?
- Coal Mining Data for Data Mining Techniques?Authors: V.Renugadevi?; K.Rajeswari??
- Prognosticating Human Movement Based on Telecom’s Handoff in Mobile Networks Based on Little's Law?Authors: AKHILESH AKULA; G. VENKATA RAMI REDDY?
- An Online Intelligent System to Selecting the New Employees for Directorate of Education in Dhi-QarAuthors: Hayder Hussein Azeez?
- A Theoretical Approach to Improve the Performance in Cloud Environment?Authors: P.Naveen Kumar; R.SubaLakshmi?
- Implementation of Different Operations for Data Transfer for AMBA-Advanced High Performance Bus?Authors: Tadikonda Nagarjuna; B.Anil Kumar?
- Classification of Motion and Speech Based Brain EEG Signals using Bilayer Bayesian Classifier with Association Rule (BBC-AR)?Authors: Deepa.T.P.; Vinay.H.S?
- Data Aggregation to Improve Quality of Service in Wireless Sensor Network: Survey?Authors: Deepa.T.P.; Ujjwal Jain; Aishwarya N; Nischitha S?
- PRIVACY PRESERVING ASSOCIATION RULE MINING?Authors: V.Uma Rani; M.Srinivasa Rao; N.Nikhil Krishna?
- Prediction of Next Mobile Access Gateway (MAG) in Proxy Mobile Internet Protocol Version 6 (PMIPv6)?Authors: Nitesh M Tarbani; A.S.Alvi?
- A Review on Intrusion Detection Schemes in Wireless Sensor Network?Authors: Nidhi Aley; Shruti Kolte?
- Analysis of Heterogeneous Delay-Tolerant Networks with Non-Cooperative Nodes and Limited Message LifetimeAuthors: Naga Sujitha Vummaneni?
- A Review on Novel Technique to Filter Unwanted Messages from OSN?Authors: Janavee Jambhulkar; Deepak Kapgate?
- IMPLEMENTATION OF LOW POWER LOW NOISE PROBABILISTIC-BASED LOGIC DESIGNSAuthors: Dhanasekaran.S; Ragavi.N; Yamini.E?
- RISK MANAGEMENT in SOFTWARE PROJECTS?Authors: Nidhi Sehrawat; Neha Munsi; Mahak Jain
- COMPILER BASIC DESIGN AND CONSTRUCTION?Authors: Mahak Jain; Nidhi Sehrawat; Neha Munsi?
- Integration of Struts, Spring and Hibernate for an E-Commerce System?Authors: Neha Munsi; Nidhi Sehrawat; Mahak Jain?
- A REVIEW ARTICLE ON NAIVE BAYES CLASSIFIER WITH VARIOUS SMOOTHING TECHNIQUES?Authors: Gurneet Kaur; Er. Neelam Oberai?
- NAIVE BAYES CLASSIFIER WITH MODIFIED SMOOTHING TECHNIQUES FOR BETTER SPAM CLASSIFICATIONAuthors: Gurneet Kaur; Er. Neelam Oberai?
- Critical Scan Path Based Energy Efficient LDPC Decoder using DD-BMP?Authors: P.MARIAGLENNY; E.ARUN KUMAR; M.ISHWARYA NIRANJANA; R.GOWRIMANOHARI?
- A Multi View Face Recognizer for Authentication?Authors: C.Immaculate Mary; S.V.Rashyaa Verma; A.Jensila Smile?
- A Survey on Anomaly Detection for Discovering Emerging Topics?Authors: S.Saranya; R.Rajeshkumar; S.Shanthi?
- Improving Computer Inspection by Using Forensic Cluster Analysis to Develop the Document?Authors: K.ISRAIL; C.C.KALYAN SRINIVAS?
- A Survey on Optimized Structural Diversity?Authors: R.Rajeshkumar; S.Saranya; S.Shanthi?
- A NOVEL DESIGN OF CURRENT MODE MULTIPLIER/DIVIDER CIRCUITS FOR ANALOG SIGNAL PROCESSING?Authors: M.MOHANKUMAR; R.GOWRIMANOHARI; M.ISHWARYA NIRANJANA; E.ARUN KUMAR?
- A Review on Cryptography Using Armstrong Numbers and Colors?Authors: Mrunali Vaidya; Vaibhav Bansod; Mangesh Manwar?
- IMPROVISED CHANNEL ASSIGNMENT TECHNIQUE FOR WIRELESS NETWORK USING GENETIC ALGORITHMAuthors: Gunjan Lavaniya; Dheeraj Khatri?
- Automatic Clustering Old and Reverse Engineered Databases by Evolutional ProcessingAuthors: Hasan Asil?; Amir Asil?
- New Management Systems: A Revolution in Management and Production of Systems?Authors: Hasan Asil?
- Impact on the Performance of Operational Dashboards Production Managers in Small and Medium Enterprises?Authors: Kamaleddin Rahmani; Atefeh Asil; Naghmeh Khabazi Kenari?
- EAACK? A Secure Intrusion-Detection System for MANETs??Authors: Mohammad Mubasheer; Solasu Sharavani?
- Smart Card: Turning Point of Technology?Authors: Abhishek Mahajan; Akash Verma; Dhruv Pahuja?