ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.3, No.11

Publisher: IJCSMC Publishing Team

Publishing Date: 2014-11-30

  1. A Hybrid Approach used to Stem Punjabi Words?

    Authors: Puneet Thapar?

  2. SYNTHESIS THE OCULAR IMAGES ON IRIS RECOGNITION BY USING LDA TECHNIQUES

    Authors: T. UMMAL SARIBA BEGUM; C.REVATHI?

  3. A Polynomial Time Algorithm for Hamilton Cycle?

    Authors: Mamta; Siddhartha Sankar Biswas?

  4. Network Based Traffic Control?

    Authors: R.T.Udhayakumar; L.Gomathi?

  5. THE VIRTUAL TOUCH SCREEN IN COMPUTERS BY ACCELEROMETER SENSORS?

    Authors: NirmalaSandhya.D?; B. Venkateshwara Reddy?

  6. Identification of Best Algorithm in Association Rule Mining Based on Performance?

    Authors: Garima Sinha; S. M.Ghosh?

  7. A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks?

    Authors: E. Edwin Lawrence; Dr.R.Latha?

  8. A Detailed Study on Indian Languages Text Mining?

    Authors: M. Hanumanthappa; M. Narayana Swamy?

  9. Survey on Clustering Algorithm for Sentence Level Text?

    Authors: Snehal Raundal; C. R. Barde

  10. Survey on Architecture of Leading Hypervisors and Their Live Migration Techniques?

    Authors: Vikas Malik; C. R. Barde?

  11. Kernel Based Tagging Method Using Spatial Paradigm?

    Authors: S.Dinesh; K.S.Kannan?

  12. A HYBRID APPROACH FOR DATA CLUSTERING USING DATA MINING TECHNIQUES?

    Authors: K.PRABHA?; K.RAJESWARI?

  13. Cyclomatic Complexity Metrics for Software Architecture Maintenance Risk Assessment

    Authors: RONALD TOMBE; GEORGE OKEYO; STEPHEN KIMANI?

  14. Comparison of Classifiers in Data Mining?

    Authors: Gaurav Taneja; Ashwini Sethi?

  15. AN ANALYSIS AND SURVEY OF MOBILE LEARNING SYSTEMS

    Authors: M. Shobanarani?; A. Ushanandhini?; R. Umamaheswari?

  16. Review on Routing Stability in Wireless Sensor Network?

    Authors: ARUNKUMAR.C; CHITRA.C?

  17. A Quantitative Analysis and Behavioral Study of Routing Protocols in MANET?

    Authors: Gyanendra Kumar Pallai; S Meenakshi; Amiya Kumar Rath; Bansidhar Majhi?

  18. Study of Outpouring Power Diminution Technique in CMOS Circuits?

    Authors: VINOTHKUMAR.K; KARTHIKEYAN.P?

  19. A SURVEY ON DATA ANONYMIZATION TECHNIQUES FOR LARGE DATA SETS?

    Authors: Dhamodran.P; Priyadharsini.P; Kavitha.M.S?

  20. A SURVEY ON DE-DUPLICATION IN CLOUD COMPUTING?

    Authors: Priyadharsini.P; Dhamodran.P; Kavitha.M.S

  21. A Novel Technique for Privacy Preserving Data Publishing?

    Authors: Pargi Sridhar Reddy; Ch.Ravi?

  22. AUTOMATED CHARACTER ANIMATION TOOL

    Authors: Martin Bastian?

  23. Effective Test Case Prioritization Technique in Web Application for Regression Test Suite?

    Authors: Hari Sankar Chaini; Sateesh Kumar Pradhan?

  24. Best Partition Searching In Public Cloud?

    Authors: Siddani Murali; B.JayaLakshmi Reddy?

  25. Data Categorization for Detecting Posts in Social Network Using Sequential Tracking

    Authors: M.PRIYADHARSHINI; S.VAIRACHILAI?

  26. Borehole Robot for Rescue of a Child?

    Authors: Satyaprasad Tadavarthy; Tarun Chowdary; Naga Sushma Yalamanchali; Yammanuru Jahnavi Reddy?

  27. Reversible Records Whacking in Encrypted Images by Reserving Possibility before Encryption?

    Authors: S.Usha Rani; R.Jayamma?

  28. An Endowed Takagi-Sugeno-type Fuzzy Model for Classification Problems?

    Authors: S.Thenmozhi; G.Misal?

  29. Analysis and Design of a Three-Phase PLL Structure?

    Authors: Reza Sedaghati?

  30. Small Signal Stability Improvement by Power System Stabilizer (PSS)?

    Authors: Ali Vaseghi Ardekani; Alireza Toorani?

  31. Research Approaches in Examining M-Government Services: An Investigation?

    Authors: Noor Suriana Abu Bakar; Azizah Abdul Rahman; Haza Nuzly Abdul Hamid?

  32. IDENTIFYING AND REPLACING WEB SERVICE USING SERVICE COMPOSITION AND GENETIC TECHNIQUE

    Authors: K.MALINI; M.AKILA RANI?

  33. MINIMIZATION OF DELAY TIME IN DYNAMIC ENCRYPTION ALGORITHM FOR REAL-TIME APPLICATIONS (DEA-RTA)?

    Authors: Kuti Toyin Sadiq; Madhavi Kumari?

  34. A Comparative Study of Various Clustering Algorithms in Data Mining?

    Authors: S.Saraswathi; Mary Immaculate Sheela?

  35. A Survey of Regularization Methods for Deep Neural Network?

    Authors: Nishtha Tripathi; Avani Jadeja?

  36. Review on Methods of Selecting Number of Hidden Nodes in Artificial Neural Network?

    Authors: Foram S. Panchal; Mahesh Panchal?

  37. A Review on Secure System Implementation using Attribute Based Encryption?

    Authors: Apurva Gomase; Vikrant Chole?

  38. Study of Image Fusion- Techniques, Method and Applications?

    Authors: R.Johnson Suthakar; J.Monica Esther; D.Annapoorani; F.Richard Singh Samuel?

  39. AN EFFICIENT FIXED NOISE REMOVAL METHOD FROM IMAGES USING DUAL TREE COMPLEX WAVELET TRANSFORM?

    Authors: DHADBHANJAN REKHA; CH SRINIVASULU; P PRAKASH?

  40. A Review on Efficient Mining of High Utility Itemsets from Transactional Database?

    Authors: Pranoti Meshram; Vikrant Chole

  41. Simulative Investigation of Zigbee Network Coordinator Failure with Different QoS?

    Authors: Devender; Chirag; Kuldeep Vats; Deepika Madaan?

  42. WSN Based Performance Evaluation of Coordinator Fails in Different PAN Network using OPNET

    Authors: Devender; Chirag; Kuldeep Vats; Deepika Madaan

  43. Frequency Hopping Based Performance Evaluation of TORA and OLSR Routing Protocols Using OPNET?

    Authors: Jonish; Kapil Chawla; Kuldeep Vats?

  44. Different QoS Based Simulation Evaluation of TORA and GRP Routing Protocol Based on Frequency Hopping?

    Authors: Jonish; Kapil Chawla; Kuldeep Vats?

  45. Coverage Improvement by Using RNCHE Algorithm Based on LEACH Protocol for Wireless Sensor Network?

    Authors: Ali Hassan Muosa; Rana Hameed Hussain?

  46. A Survey on Trust Establishment in Delay Tolerant Networks?

    Authors: Vigneshkumar.P; Senthilnathan.K.R?

  47. A Survey on Weighted Clustering for Mobile Adhoc Networks?

    Authors: T.Venkaraiselvi; C.Selvan?

  48. A Survey on Auto Scaling of Internet Application in a Cloud Environment?

    Authors: Sasipriya.S; Kavitha?

  49. A Defense Model for Black hole and Gray hole attacks in MANET?

    Authors: S.V. Vasantha; A. Damodaram

  50. A Study of Security Structure System in Cloud Computing?

    Authors: P.K.Rai; Rajesh Kumar Bunkar?

  51. OO-Database to UML Conversion with Measuring Response Time?

    Authors: Malhar K.Kurhadkar; G.R.Gosavi?

  52. An Upgraded Approach for Robust Video Watermarking Technique Using Stephens Algorithm?

    Authors: Paramjit Kaur?; Vijay Laxmi?

  53. Improving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries?

    Authors: Trupti A.Khandat; K.P.Gaikwad?

  54. To Determine Document Clustering By using Centroid Ratio for Pair wise Random Swap Clustering Algorithm?

    Authors: R.B. RAMADEVI; S.SUBASHINI?

  55. Improved Space Time Block Coding Diversity Technique for Rayleigh Fading Channel in Wireless Systems

    Authors: Shifali Shoor?; Avtar Singh Buttar?

  56. Protected Data Transfer in Wireless Sensor Network Using Promiscuous Mode?

    Authors: K.Rashidha Begam; M.Savitha Devi?

  57. A Survey on Energy- Efficient Multi-Sink Clustering Based Weighted Rendezvous Planning Method (EE-MSCWRP) for Wireless Sensor Networks?

    Authors: Nivethitha.E; C.Selvan?

  58. A Survey on Energy Efficient AODV and DSR Routing Protocols?

    Authors: Shashank S. Tolye; Manohar S. Chaudhari?

  59. Adopting Number Sequences for Shielding Information?

    Authors: Sandhya Maitra; Manish Bansal; Preety Gupta?

  60. ENERGY AWARE SECURE MULTIPATH ROUTING IN WIRELESS SENSOR NETWORK?

    Authors: K.S. Sathyavani; P. Selvi?