ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.3, No.12

Publisher: IJCSMC Publishing Team

Publishing Date: 2014-12-30

  1. Research Paper on Text Data Compression Algorithm using Hybrid Approach?

    Authors: Amandeep Singh Sidhu; Er. Meenakshi Garg?

  2. Clustering Sentence-Level Text Using a Hierarchical Fuzzy Relational Clustering Algorithm?

    Authors: Deepika U. Shevatkar?; V.K.Bhusari?

  3. USABLE SECURITY AND PRIVACY IN SMART PHONES?

    Authors: Gousiya Begum; P Ram Mohan Rao; K Venkateswara Reddy?

  4. A Survey and Comparison Study of Localization in Underwater Sensor Networks?

    Authors: Anil C B; Sheena Mathew

  5. Optimizing Resource Allocation through Virtual Machines in Cloud Computing?

    Authors: Valli Kumar M; V.Santosh Kumar; Sirisha K L

  6. A Tool for Processing Spatial Queries with Multiple Keyword Support?

    Authors: Premkumar Reddy K; V.Santosh Kumar; Sirisha K L

  7. A Novel Framework for Preventing Inference Attacks in Collaborative Data Publishing?

    Authors: L. Ramesh Babu; M.Sandhya Rani; Shravya Channamadhavuni; Ramana Amrutha. M?

  8. A Framework for Mining High Dimensional Data for Feature Subset Selection?

    Authors: Venu Pullela; V.Santosh Kumar; Ch.Ravindranath Yadav?

  9. AN ENERGY EFFICIENT CACHE DESIGN TECHNIQUE FOR EMBEDDED PROCESSORS?

    Authors: R.Azhagarpandi; G Mohanbabu?

  10. A Survey on Cloud Security in DaaS with Encryption in Metadata?

    Authors: Swathi.C; Kavitha.S.M; Vishnupriya.S?

  11. COMPARATIVE STUDY OF POWER OPTIMIZATION USING LOOK AHEAD CLOCK GATING BASED ON AUTO GATED FLIPFLOPS?

    Authors: Manikandan.R?; Sasikala.C?

  12. Interactive Robust Multitudinous Visual Search on Mobile Devices?

    Authors: Roshani E. Bagul; K.P.Gaikwad?

  13. Knowledge Discovery in Social Networking for Future Filtering Purposes?

    Authors: Srikanth Raju T; V.Santosh Kumar; Ch.Ravindranath Yadav?

  14. An Efficient Cryptography Analysis of Propp Wilson Algorithm for Dynamic Resource Allocation in Cloud Computing?

    Authors: S.Natarajan; R.Pugazendi?

  15. Techniques of Image Mining: A Review?

    Authors: Shraddha D. Jumade?; Sheetal S. Dhande?

  16. Collaborative Data Mining using Incentives and Multi-Party Secure Communications

    Authors: PEETHALA ASHA; A.GANESH KUMAR?

  17. A Framework for Secure Sharing of Multi-Owner Data in Cloud Computing?

    Authors: GUTTAVALLI VIDHYA RATNA SAGAR; S.RAVI KUMAR?

  18. A Methodology for Assigning Access Control to Public Clouds?

    Authors: Prince Kumar Piyush; A.Ganesh Kumar?

  19. A SURVEY ON ENERGY EFFICIENT ROUTING PROTOCOLS IN MANET?

    Authors: Nandkishor M. Pawar?; Nandkishor P. Karlekar?

  20. Advance Reservation of Resources in Workflow System?

    Authors: Lalit?; Hardeep Singh?

  21. Mining Interaction Patterns among Brain Regions by Clustering Based Interaction K-means

    Authors: Amruta S. Chougule?; S.A.Bajpai?

  22. Sanitization Techniques against Personal Information Inference Attack on Social Network?

    Authors: Jyoti B.Mhaske?

  23. A Review on Improved Text Mining Approach for Conversion of Unstructured to Structured Text?

    Authors: Pranita Baitule; Vikrant Chole?

  24. Private Cloud Development to Improve Reliability and Security?

    Authors: Asmaa Qasim Shareef; Ayad A. Abdulsalam; Maha Abd ULatif Sayal

  25. Real-Time Automatic Web-Based Tool for Document Annotation?

    Authors: A. Mallareddy?; K.Jyothi?; Ch.Vasavi?

  26. TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL: A REVIEW?

    Authors: Sujeet D. Gawande; Amit M. Sahu?

  27. A Review on Rapidly Convergence Approach for Handling Class Imbalance Data Set?

    Authors: Barkha R. Hadke; Prof.Vikrant Chole?

  28. A Review on Classification of Multi-label Data in Data Mining?

    Authors: Pranali Dhongade; Rushi Longadge; Deepak Kapgate?

  29. Detection of Dead Tissues by Medical Image Using CLUSTERING?

    Authors: Pammi Kumari; Santosh Kumar; Hari Kumar Singh; Jeet Singh; Shiv Kumar?

  30. Privacy Preserving Repository for Social Networking Application across Cloud?

    Authors: Pritam V. Kilor; V. B. Bhagat?

  31. Cloud Partitioning Based Load Balancing Model for Cloud Service Optimization?

    Authors: PUVVALA SUPRIYA; K.VINAY KUMAR?

  32. A Novel Scheme for Detection and Elimination of Blackhole/Grayhole Attack in Manets?

    Authors: Swati Pokhariyal; Pradeep Kumar?

  33. Protecting Mobile Ad Hoc Networks from Black Hole Attacks?

    Authors: MARPU DEVADAS; K. VINAY KUMAR

  34. Enhancement of Network Security by Quantum Cryptography?

    Authors: P. B. Kalpande; J.S.Karnewar?

  35. Sanitization Techniques for Protecting Social Networks from Inference Attacks?

    Authors: JAYASREE DASARI; K.R.KOTESWARA RAO?

  36. Security Enforcement and Query Forwarding While Preserving System Wide Privacy?

    Authors: K.D.Yesugade; Pooja S. Bhosale; Sayali P. Gavhane?

  37. A Novel Kernel Based Fuzzy C Means Clustering With Cluster Validity Measures?

    Authors: D.Vanisri?

  38. Analyze the Performance of Divide and Conquer Scheme for Wireless Sensor Network?

    Authors: Gagandeep Kaur Kaleka; Harmanjot Singh?

  39. Energy Efficient RFID Technique for Wireless Sensor Network- A Review?

    Authors: Bhawna Mannan; Harmanjot Singh?

  40. A Survey Report on Video Encryption and Decryption Techniques?

    Authors: Saraswati Singh; Nilmani Verma; Vinay Kumar

  41. Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET?

    Authors: Mohit Ranjan Panda; Sukant Kishoro Bisoy; Debapriya Panda?

  42. ACCESS TO HIDDEN TERMINAL PROBLEM USING CHANNEL TONE MULTIPLE ACCESS?

    Authors: Javed Hussain; Ilyas Khan?

  43. A Survey on Secure Cloud Computing using AES Algorithm?

    Authors: Roshani Raghatate; Sneha Humne; Roshna Wadhwe?

  44. PSR: Methodology and Comparative Study along with Different Routing Protocol in Manet?

    Authors: Shriganesh S Mane?

  45. ARBITARY DISTRIBUTED SHADOWING FOR IMPROVING QUALITY OF REAL TIME STREAMING IN WIRELESS CELLULAR NETWORKS?

    Authors: V.V.G.S RAJENDRA PRASAD?; R.RANJIT KUMAR?; L.VISHNU VARDHANM

  46. A Review Paper for Mapping of XML Data to Relational Table?

    Authors: Saurabh Vyas; Shruti Kolte?

  47. THEORETICAL STUDY TO HIGHLIGHT THE SMART GOVERNMENT COMPONENTS IN 21st CENTURY

    Authors: Iman Mohsin Hassan; Alia Ahmed Mahdi; Nassir Jabir Al-Khafaji?

  48. Performance Analysis of Efficient Interference Avoidance Approaches for WPAN and WLAN Devices?

    Authors: R.Saranya; R.Pugazendi?

  49. 32-Bit RISC and DSP System Design in an FPGA?

    Authors: S.Muthukrishnan; R.Priyadharsini?

  50. Comparative Analysis and Performance Evaluation of MANET Routing Protocols?

    Authors: Amit D. Chavhan?; S.S.Asole?

  51. Knowledge Building for Home Energy Saving Domain?

    Authors: Ivaylo Atanasov?

  52. Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud?

    Authors: Gajanan Ganorkar; Anand Deshmukh

  53. DEFECT REPORT FOCUSED AROUND COMBINATORIAL INTERACTION TESTING?

    Authors: G. Vadivel; T.LathaMaheswari?

  54. Portable Fingerprint-Based Attendance Recording & Monitoring System?

    Authors: M. S. I. M. Zin; A. A. M. Isa; M. S. M. Isa?

  55. Symmetric Key Cryptography: Current Trends?

    Authors: Preeti Singh; Praveen Shende?

  56. A Survey on Efficient Intrusion Detection in Vehicular Ad-hoc Network?

    Authors: Ashish B. Raut; Nandkishor P. Karlekar?

  57. Enhancing Security and Performance of Mobile Ad-Hoc Network (MANET) using Joint Authentication and Topology Control Scheme?

    Authors: Y.Gowsika; R.Pugazendi?

  58. ENHANCING SECURITY WITH LOW COMMUNICATION AND PROCESSING OVERHEAD FOR MULTI-HOP WIRELESS NETWORKS?

    Authors: N.Sathya; R.Pugazendi?

  59. Performance Evaluation of An Efficient Routing Optimization and Bio-Authentication Scheme for Seamless Handover in Proxy Mobile ipv6 Networks?

    Authors: V.Anitha; R.Pugazendi?

  60. ENHANCEMENT IN LICENSE NUMBER PLATE SYSTEM USING K-NEIGHBOR NEAREST ALGORTHM?

    Authors: Reetu Narang; Parminder Singh?

  61. Image Retrieval Based on Quad Chain Code and Standard Deviation?

    Authors: Tawfiq A. Al-assadi; Israa Hadi Ali; Abdul kadhem Abdul Kareem Abdul kadhem?

  62. A Survey On Bluetooth Scatternet Scheduling Research Trends?

    Authors: Suganya.K; A.Nirmala?

  63. Cartoon Image Object Extraction?

    Authors: Mustafa M. Abd Zaid; Loay E. George; Ghadah Al-Khafaji?

  64. A CLOUD BASED FRAMEWORK OF SCALABLE AND ADAPTIVE VIDEO STREAMING AND SHARING FOR THE MOBILE USERS?

    Authors: M SANTHOSH; CH RAJA JACOB?

  65. IMPLEMENT A TOOL TO EXTRACT AND ANALYSE PATTERNS FROM WEB DATA?

    Authors: Ashima Miglani?

  66. CHILD CENTRIC FOOD ADVISORY ENABLED SMART SYSTEM FOR REFRIGERATORS?

    Authors: Preeti Mulay; Meeta Kumar; Shruti Patil?

  67. IMAGE ENHANCEMENT USING DWT?

    Authors: Neeraj Varma?; Shital Gupta?; Anshuman Sharma?

  68. Study of Deadline Sensitive Resource Allocation Scheduling Policy in Cloud Computing?

    Authors: Sasmita Parida; Suvendu Chandan Nayak?

  69. STUDY OF LOCALIZATION SCHEME WITH SINGLE MOBILE ANCHOR NODE?

    Authors: Atul D.Atalkar; Prashant S.Wankhade?

  70. A Review on Data Back-up Techniques for Cloud Computing?

    Authors: Somesh P. Badhel; Vikrant Chole?

  71. A Survey on Load Balancing in Heterogeneous Distributed Computing Environment?

    Authors: Javed Hussain?

  72. Distributed File Storage and Sharing using P2P Network in Cloud?

    Authors: Sapana V. Kapadnis?

  73. The MULTITENANT APPLICATION BASED on SALESFORCE.COM?

    Authors: Juee Daryapurkar; Anjali Raut?

  74. Analysis on: Intrusions Detection Based On Support Vector Machine Optimized with Swarm Intelligence?

    Authors: Pankaj Shinde; Thaksen Parvat?

  75. A Comparative Study and Survey on Broadcasting Multimedia Streaming Data Congestion Control Mechanisms?

    Authors: Ashish Parejiya; Vinod Desai?

  76. Improvisation of Incremental Computing In Hadoop Architecture- A Literature?

    Authors: Alhad V. Alsi; A P.Bodkhe?

  77. TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS?

    Authors: Kiran J Patil; A.M.Kanthe?

  78. WHO ARE the LIKELIEST SURVIVORS of BREAST CANCER- An ANALYSIS by K NEAREST NEIGHBORS ALGORITHM?

    Authors: Ahasan Uddin Harun?

  79. An Analysis of Image Denoising and Restoration of Handwritten Degraded Document Images?

    Authors: Sarika Jain; Pankaj Parihar?

  80. Energy Efficient Approach for Solar Energy Harvesting in Wireless Sensor Network?

    Authors: Ramandeep Kaur?

  81. Exploring Mobile Analytics for Business Intelligence?

    Authors: Monika R. Astonkar; Amar Buchade?

  82. Photo Privacy and Rule Based Access Control for Social Networks?

    Authors: I.Satyanarayana; A.Mallareddy; Punna Mahesh Kumar?

  83. A Robust Key Pre-Distribution for Wireless Sensor Networks?

    Authors: I.Satyanarayana; A.Mallareddy; P M Praveen Raj?

  84. Hide and Encryption Fingerprint Image by using LSB and Transposition Pixel by Spiral Method?

    Authors: Hyder Yahya Atown?