Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.3, No.12
Publisher: ZAIN Publications
Publishing Date: 2014-12-30
- Research Paper on Text Data Compression Algorithm using Hybrid Approach?Authors: Amandeep Singh Sidhu; Er. Meenakshi Garg?
- Clustering Sentence-Level Text Using a Hierarchical Fuzzy Relational Clustering Algorithm?Authors: Deepika U. Shevatkar?; V.K.Bhusari?
- USABLE SECURITY AND PRIVACY IN SMART PHONES?Authors: Gousiya Begum; P Ram Mohan Rao; K Venkateswara Reddy?
- A Survey and Comparison Study of Localization in Underwater Sensor Networks?Authors: Anil C B; Sheena Mathew
- Optimizing Resource Allocation through Virtual Machines in Cloud Computing?Authors: Valli Kumar M; V.Santosh Kumar; Sirisha K L
- A Tool for Processing Spatial Queries with Multiple Keyword Support?Authors: Premkumar Reddy K; V.Santosh Kumar; Sirisha K L
- A Novel Framework for Preventing Inference Attacks in Collaborative Data Publishing?Authors: L. Ramesh Babu; M.Sandhya Rani; Shravya Channamadhavuni; Ramana Amrutha. M?
- A Framework for Mining High Dimensional Data for Feature Subset Selection?Authors: Venu Pullela; V.Santosh Kumar; Ch.Ravindranath Yadav?
- AN ENERGY EFFICIENT CACHE DESIGN TECHNIQUE FOR EMBEDDED PROCESSORS?Authors: R.Azhagarpandi; G Mohanbabu?
- A Survey on Cloud Security in DaaS with Encryption in Metadata?Authors: Swathi.C; Kavitha.S.M; Vishnupriya.S?
- COMPARATIVE STUDY OF POWER OPTIMIZATION USING LOOK AHEAD CLOCK GATING BASED ON AUTO GATED FLIPFLOPS?Authors: Manikandan.R?; Sasikala.C?
- Interactive Robust Multitudinous Visual Search on Mobile Devices?Authors: Roshani E. Bagul; K.P.Gaikwad?
- Knowledge Discovery in Social Networking for Future Filtering Purposes?Authors: Srikanth Raju T; V.Santosh Kumar; Ch.Ravindranath Yadav?
- An Efficient Cryptography Analysis of Propp Wilson Algorithm for Dynamic Resource Allocation in Cloud Computing?Authors: S.Natarajan; R.Pugazendi?
- Techniques of Image Mining: A Review?Authors: Shraddha D. Jumade?; Sheetal S. Dhande?
- Collaborative Data Mining using Incentives and Multi-Party Secure CommunicationsAuthors: PEETHALA ASHA; A.GANESH KUMAR?
- A Framework for Secure Sharing of Multi-Owner Data in Cloud Computing?Authors: GUTTAVALLI VIDHYA RATNA SAGAR; S.RAVI KUMAR?
- A Methodology for Assigning Access Control to Public Clouds?Authors: Prince Kumar Piyush; A.Ganesh Kumar?
- A SURVEY ON ENERGY EFFICIENT ROUTING PROTOCOLS IN MANET?Authors: Nandkishor M. Pawar?; Nandkishor P. Karlekar?
- Advance Reservation of Resources in Workflow System?Authors: Lalit?; Hardeep Singh?
- Mining Interaction Patterns among Brain Regions by Clustering Based Interaction K-meansAuthors: Amruta S. Chougule?; S.A.Bajpai?
- Sanitization Techniques against Personal Information Inference Attack on Social Network?Authors: Jyoti B.Mhaske?
- A Review on Improved Text Mining Approach for Conversion of Unstructured to Structured Text?Authors: Pranita Baitule; Vikrant Chole?
- Private Cloud Development to Improve Reliability and Security?Authors: Asmaa Qasim Shareef; Ayad A. Abdulsalam; Maha Abd ULatif Sayal
- Real-Time Automatic Web-Based Tool for Document Annotation?Authors: A. Mallareddy?; K.Jyothi?; Ch.Vasavi?
- TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL: A REVIEW?Authors: Sujeet D. Gawande; Amit M. Sahu?
- A Review on Rapidly Convergence Approach for Handling Class Imbalance Data Set?Authors: Barkha R. Hadke; Prof.Vikrant Chole?
- A Review on Classification of Multi-label Data in Data Mining?Authors: Pranali Dhongade; Rushi Longadge; Deepak Kapgate?
- Detection of Dead Tissues by Medical Image Using CLUSTERING?Authors: Pammi Kumari; Santosh Kumar; Hari Kumar Singh; Jeet Singh; Shiv Kumar?
- Privacy Preserving Repository for Social Networking Application across Cloud?Authors: Pritam V. Kilor; V. B. Bhagat?
- Cloud Partitioning Based Load Balancing Model for Cloud Service Optimization?Authors: PUVVALA SUPRIYA; K.VINAY KUMAR?
- A Novel Scheme for Detection and Elimination of Blackhole/Grayhole Attack in Manets?Authors: Swati Pokhariyal; Pradeep Kumar?
- Protecting Mobile Ad Hoc Networks from Black Hole Attacks?Authors: MARPU DEVADAS; K. VINAY KUMAR
- Enhancement of Network Security by Quantum Cryptography?Authors: P. B. Kalpande; J.S.Karnewar?
- Sanitization Techniques for Protecting Social Networks from Inference Attacks?Authors: JAYASREE DASARI; K.R.KOTESWARA RAO?
- Security Enforcement and Query Forwarding While Preserving System Wide Privacy?Authors: K.D.Yesugade; Pooja S. Bhosale; Sayali P. Gavhane?
- A Novel Kernel Based Fuzzy C Means Clustering With Cluster Validity Measures?Authors: D.Vanisri?
- Analyze the Performance of Divide and Conquer Scheme for Wireless Sensor Network?Authors: Gagandeep Kaur Kaleka; Harmanjot Singh?
- Energy Efficient RFID Technique for Wireless Sensor Network- A Review?Authors: Bhawna Mannan; Harmanjot Singh?
- A Survey Report on Video Encryption and Decryption Techniques?Authors: Saraswati Singh; Nilmani Verma; Vinay Kumar
- Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET?Authors: Mohit Ranjan Panda; Sukant Kishoro Bisoy; Debapriya Panda?
- ACCESS TO HIDDEN TERMINAL PROBLEM USING CHANNEL TONE MULTIPLE ACCESS?Authors: Javed Hussain; Ilyas Khan?
- A Survey on Secure Cloud Computing using AES Algorithm?Authors: Roshani Raghatate; Sneha Humne; Roshna Wadhwe?
- PSR: Methodology and Comparative Study along with Different Routing Protocol in Manet?Authors: Shriganesh S Mane?
- ARBITARY DISTRIBUTED SHADOWING FOR IMPROVING QUALITY OF REAL TIME STREAMING IN WIRELESS CELLULAR NETWORKS?Authors: V.V.G.S RAJENDRA PRASAD?; R.RANJIT KUMAR?; L.VISHNU VARDHANM
- A Review Paper for Mapping of XML Data to Relational Table?Authors: Saurabh Vyas; Shruti Kolte?
- THEORETICAL STUDY TO HIGHLIGHT THE SMART GOVERNMENT COMPONENTS IN 21st CENTURYAuthors: Iman Mohsin Hassan; Alia Ahmed Mahdi; Nassir Jabir Al-Khafaji?
- Performance Analysis of Efficient Interference Avoidance Approaches for WPAN and WLAN Devices?Authors: R.Saranya; R.Pugazendi?
- 32-Bit RISC and DSP System Design in an FPGA?Authors: S.Muthukrishnan; R.Priyadharsini?
- Comparative Analysis and Performance Evaluation of MANET Routing Protocols?Authors: Amit D. Chavhan?; S.S.Asole?
- Knowledge Building for Home Energy Saving Domain?Authors: Ivaylo Atanasov?
- Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud?Authors: Gajanan Ganorkar; Anand Deshmukh
- DEFECT REPORT FOCUSED AROUND COMBINATORIAL INTERACTION TESTING?Authors: G. Vadivel; T.LathaMaheswari?
- Portable Fingerprint-Based Attendance Recording & Monitoring System?Authors: M. S. I. M. Zin; A. A. M. Isa; M. S. M. Isa?
- Symmetric Key Cryptography: Current Trends?Authors: Preeti Singh; Praveen Shende?
- A Survey on Efficient Intrusion Detection in Vehicular Ad-hoc Network?Authors: Ashish B. Raut; Nandkishor P. Karlekar?
- Enhancing Security and Performance of Mobile Ad-Hoc Network (MANET) using Joint Authentication and Topology Control Scheme?Authors: Y.Gowsika; R.Pugazendi?
- ENHANCING SECURITY WITH LOW COMMUNICATION AND PROCESSING OVERHEAD FOR MULTI-HOP WIRELESS NETWORKS?Authors: N.Sathya; R.Pugazendi?
- Performance Evaluation of An Efficient Routing Optimization and Bio-Authentication Scheme for Seamless Handover in Proxy Mobile ipv6 Networks?Authors: V.Anitha; R.Pugazendi?
- ENHANCEMENT IN LICENSE NUMBER PLATE SYSTEM USING K-NEIGHBOR NEAREST ALGORTHM?Authors: Reetu Narang; Parminder Singh?
- Image Retrieval Based on Quad Chain Code and Standard Deviation?Authors: Tawfiq A. Al-assadi; Israa Hadi Ali; Abdul kadhem Abdul Kareem Abdul kadhem?
- A Survey On Bluetooth Scatternet Scheduling Research Trends?Authors: Suganya.K; A.Nirmala?
- Cartoon Image Object Extraction?Authors: Mustafa M. Abd Zaid; Loay E. George; Ghadah Al-Khafaji?
- A CLOUD BASED FRAMEWORK OF SCALABLE AND ADAPTIVE VIDEO STREAMING AND SHARING FOR THE MOBILE USERS?Authors: M SANTHOSH; CH RAJA JACOB?
- IMPLEMENT A TOOL TO EXTRACT AND ANALYSE PATTERNS FROM WEB DATA?Authors: Ashima Miglani?
- CHILD CENTRIC FOOD ADVISORY ENABLED SMART SYSTEM FOR REFRIGERATORS?Authors: Preeti Mulay; Meeta Kumar; Shruti Patil?
- IMAGE ENHANCEMENT USING DWT?Authors: Neeraj Varma?; Shital Gupta?; Anshuman Sharma?
- Study of Deadline Sensitive Resource Allocation Scheduling Policy in Cloud Computing?Authors: Sasmita Parida; Suvendu Chandan Nayak?
- STUDY OF LOCALIZATION SCHEME WITH SINGLE MOBILE ANCHOR NODE?Authors: Atul D.Atalkar; Prashant S.Wankhade?
- A Review on Data Back-up Techniques for Cloud Computing?Authors: Somesh P. Badhel; Vikrant Chole?
- A Survey on Load Balancing in Heterogeneous Distributed Computing Environment?Authors: Javed Hussain?
- Distributed File Storage and Sharing using P2P Network in Cloud?Authors: Sapana V. Kapadnis?
- The MULTITENANT APPLICATION BASED on SALESFORCE.COM?Authors: Juee Daryapurkar; Anjali Raut?
- Analysis on: Intrusions Detection Based On Support Vector Machine Optimized with Swarm Intelligence?Authors: Pankaj Shinde; Thaksen Parvat?
- A Comparative Study and Survey on Broadcasting Multimedia Streaming Data Congestion Control Mechanisms?Authors: Ashish Parejiya; Vinod Desai?
- Improvisation of Incremental Computing In Hadoop Architecture- A Literature?Authors: Alhad V. Alsi; A P.Bodkhe?
- TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS?Authors: Kiran J Patil; A.M.Kanthe?
- WHO ARE the LIKELIEST SURVIVORS of BREAST CANCER- An ANALYSIS by K NEAREST NEIGHBORS ALGORITHM?Authors: Ahasan Uddin Harun?
- An Analysis of Image Denoising and Restoration of Handwritten Degraded Document Images?Authors: Sarika Jain; Pankaj Parihar?
- Energy Efficient Approach for Solar Energy Harvesting in Wireless Sensor Network?Authors: Ramandeep Kaur?
- Exploring Mobile Analytics for Business Intelligence?Authors: Monika R. Astonkar; Amar Buchade?
- Photo Privacy and Rule Based Access Control for Social Networks?Authors: I.Satyanarayana; A.Mallareddy; Punna Mahesh Kumar?
- A Robust Key Pre-Distribution for Wireless Sensor Networks?Authors: I.Satyanarayana; A.Mallareddy; P M Praveen Raj?
- Hide and Encryption Fingerprint Image by using LSB and Transposition Pixel by Spiral Method?Authors: Hyder Yahya Atown?