ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.3, No.2

Publisher: ZAIN Publications

Publishing Date: 2014-02-28

  1. Distributing, Ensuring and Recovery of Data Stored in Cloud?

    Authors: Dr. B. F. Momin, Mr. Girish Bamane?

  2. A Survey Conducted on E-Agriculture with Indian Farmers?

    Authors: Sumitha Thankachan, Dr. S. Kirubakaran?

  3. A Survey on Delegating Log Management to The Cloud

    Authors: Sinu P S, M.Ananthi?

  4. Survey on Clinical Decision Support System for Diagnosing Heart Disease?

    Authors: Suchithra, Dr. P. Uma Maheswari?

  5. Various Approaches to Detect Wormhole Attack in Wireless Sensor Networks?

    Authors: Nishant Sharma, Upinderpal Singh?

  6. Decision Support System for Precluding Coronary Heart Disease (CHD)?

    Authors: K. Cinetha, Dr. P. Uma Maheswari?

  7. A SURVEY ON WORKFLOW SCHEDULING IN CLOUD USING ANT COLONY OPTIMIZATION?

    Authors: J.Elayaraja, S.Dhanasekar?

  8. Integrated System for Reading Multiple Files

    Authors: Awanti Kamble, Anshoola Jaiswal, Nikita Dekate, Shama Haridas, Kalyani Pendke?

  9. ENHANCING SECURITY IN TWO-WAY RELAY NETWORK BY USING COOPERATION JAMMING AND RELAY SELECTION APPROACH?

    Authors: Ramya T V, M. Madan Mohan?

  10. Honey Trap Security Server: An Efficient Approach of Securing E-Banking Network?

    Authors: Ashwini Gabhane, Kiran Bansule, Pradnya Kedar, Lekha Gahukar, Swati Sahare, Ketki Bhakare

  11. Secure Hierarchical Temporal Access Control in Cloud Computing?

    Authors: Karthika.RN, Vijay Anand.P, M.Rajesh Khanna?

  12. Weighted Moving Average Forecast Model based Prediction Service Broker Algorithm for Cloud Computing

    Authors: Prof. Deepak Kapgate?

  13. A NOVEL ON FAST PARALLEL FILE TRANSFER USING REPLICATION?

    Authors: K.Sabarigirivason?, R. Giridharan

  14. Evaluating and Analyzing Clusters in Data Mining using Different Algorithms?

    Authors: N. Sunil Chowdary, D. Sri Lakshmi Prasanna, P. Sudhakar

  15. High Efficiency Data Access System Architecture for Deblocking Filter Supporting Multiple Video Coding Standards

    Authors: S.Karthikeyan, K.Saran?

  16. Literature Survey on Applications of Digital Signal Processing using Anti-Aliasing and Anti-Imaging Filters?

    Authors: S.Arun Kumar?

  17. An Investigation of Face Recognition Characteristics Using PCA and ICA?

    Authors: Yundi Fu, Yongli Cao, Arun Kumar Sangaiah?

  18. An Investigation of Dijkstra and Floyd Algorithms in National City Traffic Advisory Procedures?

    Authors: Arun Kumar Sangaiah, Minghao Han, Suzi Zhang?

  19. AN EFFICIENT LOCATION BASED ROUTING FOR MOBILE ADHOC NETWORKS?

    Authors: S.Saranya, D.Gokilapriya

  20. Porter Five Forces Analysis of the Leading Mobile Cellular Telephony Service Provider in India?

    Authors: Subhasish Majumdar, Partha Pratim Bhattacharya?

  21. Implementing & Developing Cloud Computing on Web Application

    Authors: Anisha Tandon?

  22. A ZIG-BEE BASED WEARABLE HEALTH MONITORING SYSTEM?

    Authors: M.Sherwin Nayanar, V.Pandimurugan, V.Gowri?

  23. Application of the Fuzzy Logic in Content Based Image Retrieval using Color Feature?

    Authors: Aqeel M. Humadi, Hameed A. Younis?

  24. VLSI Implementation and Analysis of Parallel Adders for Low Power Applications?

    Authors: Arunprasath S, Karthick A, Dhineshkumar D?

  25. Degraded Documents Recovering by Using Adaptive Binarizations and Convex Hull Concept?

    Authors: Mahendar.R, Navaneetha Krishnan.S, Roshini Ravinayagam, Prakash.P?

  26. A New Key Management Paradigm for Fast Transmission in Remote Co-operative Groups?

    Authors: M.VIJAYAKUMAR, V.PRIYA DHARSHINI, Dr.C.SELVAN?

  27. SECURE DATA TRANSMISSION OVER WIMAX NETWORKS USING VPN TECHNOLOGY IN REALTIME ENVIRONMENTS?

    Authors: J.BALU, DR.S.THIRUNIRAI SENTHIL

  28. On Generating Permutations under User Defined Constraints?

    Authors: Dhruvil Badani?

  29. ADVANCED WEB BROWSER WITH EFFECTIVE TOOLS?

    Authors: M.Loganathan, K.E.Dharani?

  30. EXTENDED AND EMBEDDED VISUAL CRYPTOGRAPHY?

    Authors: G.Tejeswar Reddy, N.Meenakshi?

  31. CONDITIONAL PRIVACY PRESERVING SECURITY PROTOCOL FOR NFC APPLICATION

    Authors: V.Gowri, F.W.JESUDAS, M.Sherwin Nayanar?

  32. Trust Based Voting Scheme and Optimal Multipath Routing for Intrusion Tolerance in Wireless Sensor Network?

    Authors: P.PRIYADHARSHINI, C.ANOOR SELVI?

  33. AN ANDROID APPLICATION FOR UNIVERSITY ONLINE COUNSELING?

    Authors: N. Banu Priya, I. Juvanna?

  34. XML Dissemination Scheme for Mobile Computing Based on Lineage Encoding?

    Authors: K. Anusree, Mrs. D. Usha, C. Shiny Jennifer

  35. APPLICATION OF CLOUD COMPUTING AS HPC PLATFORM FOR EMBEDDED SYSTEMS?

    Authors: N.S.Gawai, B.V.Chikte, V.R.Pandit, S.M.Ingale, M.S. Burle?

  36. PATH LOSS PREDICTION FOR GSM MOBILE NETWORKS FOR URBAN REGION OF ABA, SOUTH-EAST NIGERIA?

    Authors: NWALOZIE GERALD .C, UFOAROH S.U, EZEAGWU C.O, EJIOFOR A.C?

  37. Analysis of Lossy Hyperspectral Image Compression Techniques?

    Authors: Dr. S.M.Ramesh, P.Bharat, J.Anand, J.Anbu Selvan

  38. VLSI Architecture for Implementing Kaiser Bessel Window Function Using Expanded Hyperbolic CORDIC Algorithm?

    Authors: M.Mohana Arasi, J.Anand, P.Bharat, J.Anbu Selvan?

  39. Copyright Protection through Deep Packet Inspection- An Indian Perspective

    Authors: Priyanka Jain, Jai Sachith Paul, Prof. K.Pradeep Kumar?

  40. FINITE?PRECISION ANALYSIS OF DEMAPPERS AND DECODERS FOR LDPC-CODED M-QAM SYSTEMS?

    Authors: Hoglah Leena Bollam?

  41. VAMPIRE ATTACKS: PROTOCOL ROUTING INFRASTRUCTURE IN WIRELESS SENSOR NETWORKS

    Authors: T.Nivethitha, S.Muthukrishnan, S. Navaneethakrishnan?

  42. FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM?

    Authors: K.Senthamil Selvi, P.Chitrakala, A.Antony Jenitha?

  43. Monitoring Factory Machine Status from Remote Location using GSM Technologies?

    Authors: C. Shiny Jennifer, B.V. Baiju, K. Anusree?

  44. EFFICIENT GRIDDING AND SEGMENTATION FOR MICROARRAY IMAGES?

    Authors: P.Thamaraimanalan, D.Dhinesh kumar, K.Nirmalakumari?

  45. Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique

    Authors: A.Jeeva, Dr.C.Selvan, A.Anitha?

  46. DETECTING NODE REPLICATION ATTACKS IN STATIC AND MOBILE SENSOR NETWORKS USING SPRT?

    Authors: T.EZHILARASAN, R.BACKIYALAKSHMI

  47. A Supervised Method for Multi-keyword Web Crawling on Web Forums?

    Authors: A.Gowtham, Dr.K.Deepa

  48. Improvement of Email Summarization Using Statistical Based Method?

    Authors: Mithak I. Hashem

  49. Intrusion Detection, Secure Protocol & Network Creation for Spontaneous Wireless AD HOC Network?

    Authors: Nikhil Varghane, Prof. Bhakti Kurade, Prof. Chandradas Pote?

  50. DESIGN PATTERN BASED ANALYSIS IN MULTI-AGENT FRAMEWORK?

    Authors: A.Sindhuja, Rathi.P.R, Anis Fathima.A.R, A.P.Jeyasanthini?

  51. LARYNX DISEASE ANALYSIS USING DYNAMIC TIME WARPING ALGORITHM?

    Authors: K. Aiswarya Lakshmi, D. Karunanithi, G.Swetha?

  52. Traveler Guide using GPS?

    Authors: Prashant Beldar, Prashant Bansode, Rajendra Mane, Swapnil Gaikwad?

  53. TIMETABLE GENERATION SYSTEM?

    Authors: Anuja Chowdhary, Priyanka Kakde, Shruti Dhoke, Sonali Ingle, Rupal Rushiya, Dinesh Gawande?

  54. Smart Remote Health Care Data Collection Server

    Authors: Kalyani Bangale, Karishma Nadhe, Nivedita Gupta, Swati Singh Parihar, Gunjan Mankar?

  55. LABVIEW Based Module For Bio Signals Monitoring

    Authors: Sabeetha Begum.M, Kumarnath.J?

  56. Review on MANET: Characteristics, Challenges, Imperatives and Routing Protocols?

    Authors: Mahima Chitkara, Mohd. Waseem Ahmad?

  57. Review of Techniques for Detecting Video Forgeries?

    Authors: Aniket Pathak, Dinesh Patil

  58. QUASI RESONANT BUCK CONVERTER FOR DUAL STRING BUCK LED DRIVER?

    Authors: Vijayadevi.A, Sneha Prem, Jikku Mathew, Manikandan.K, Sajla Rehman?

  59. Lossless Compression for Compound Documents Based on Block Classification?

    Authors: A.Thamarai Selvi, M.Sambath, S.Ravi?

  60. ADDRESSING BIG DATA WITH HADOOP?

    Authors: TWINKLE ANTONY?, SHAIJU PAUL?

  61. Privacy in Map Reduce Based Systems: A Review

    Authors: Rosmy C Jose, Shaiju Paul?

  62. AN ELLIPTIC CURVE CRYPTOGRAPHY BASED ENHANCED ADAPTIVE ACKNOWLEDGMENT (ECC-EAACK) INTRUSION DETECTION SYSTEM?

    Authors: Deboral C, Sudhagar G?

  63. PRECIPITATE MESSAGE MANIFEST PROTOCOL FOR VEHICULAR AD HOC NETWORKS?

    Authors: Ramya. K, Nithya. N?

  64. JOINT VIDEO COMPRESSION AND ENCRYPTION USING SECURE WAVELET TRANSFORM AND ENTROPY CODING?

    Authors: E.Mallika, K.SivaKumar?

  65. Study of Security Risk and Vulnerabilities of Cloud Computing

    Authors: Dr.P.K.Rai, R.K.Bunkar

  66. Novel Techniques for Color and Texture Feature Extraction?

    Authors: Miss. Priyanka N.Munje?, Prof. Deepak Kapgate?, Prof. Snehal Golait

  67. Data Integration Models for Operational Data Warehousing?

    Authors: G. Swetha, D. Karunanithi, K. Aiswarya Lakshmi?

  68. REALIZATION OF VLSI ARCHITECTURE FOR DECISION TREE BASED DENOISING METHOD IN IMAGES?

    Authors: Gobu.CK, Priya.R?

  69. Providing Efficient Data management Services Using Cloud Cache?

    Authors: Swapnil L. Mahadeshwar, A.R.Surve

  70. GAPSS: GPS Aided Photo Search System?

    Authors: Amey Divekar, Pravin Khot, Gaurav Chaudhari, Vishal Shembekar?

  71. A Review on Privacy Problems in Distributed Information Brokering System and Solutions?

    Authors: Mr. Ashutosh Kamble, Prof. Deepak Kapgate, Prof. Prakash Prasad?

  72. SURVEY ON SECURE AUDIO ENCRYPTION USING SILENCE PART OF THE SPEECH?

    Authors: V. Anusuya Devi, Dr. V. Kalaivani, T. Sam Pradeep Raj?

  73. An Approach for Minimization of Power Consumption in Ad-Hoc Network?

    Authors: Abhiruchi Akre, Kimi Bhoyar, Ankita Malve, Avantika Kalbande, Pawan Khade?

  74. Outlier Mining for Removing the Anomalies in High Dimensional Data Using ARVDH Algorithm

    Authors: Krupa Mary Jacob, K.Sangeetha, S.Karthik?

  75. DETECTION OF MASQUERADERS USING TREE STRUCTURED SVM?

    Authors: P.Anishprabu, M.Sangeetha, M.Nagulanand?

  76. EduPad- “A Tablet Based Educational System for Improving Adult Literacy in Rural India”?

    Authors: Mayuri Tawri, Richa Sharma, Charandas Pote

  77. Solution to Data Sharing for Confidentiality between Service Provider and the Data Owner?

    Authors: Mr. Ajay Bhaisare, Prof. Prakash Prasad, Prof. Ashwini Meshram?

  78. TOWARDS SECURE PROCESSING PRIVATE QUERIES OVER ENCRYPTED CLOUD DATA?

    Authors: Sumathi Sivaraj, S. Yasotha?

  79. CYBER SECURITY -Trends and Challenges?

    Authors: Vidhya P.M?

  80. Gas Level Detection and Leakage Monitoring System using a Specific Technique?

    Authors: I. Juvanna, N. Meenakshi?

  81. Lane Detection Techniques - A Review?

    Authors: Anjali Goel?

  82. A Review on Image Dehazing Methods?

    Authors: Reshma Kurian, Namitha T.N??

  83. APPLICATION OF STATISTICAL MODELS TO THE COLLABORATIVE PUBLICATIONS IN BIOINFORMATICS?

    Authors: Dr. N. Amsaveni, M. Manjula??

  84. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryption?

    Authors: Prof. Y.B.Gurav?, Manjiri Deshmukh

  85. EFFICIENT AND DISTRIBUTED NETWORK MODEL FOR P2P SYSTEMS?

    Authors: K.KAYALVIZHI, BHARATHI.R?

  86. Attendance Monitoring Using Face Recognition?

    Authors: Divya Singh, Ruhi Sunil Hadke, Shruti Sanjay Khonde, Valhavi Diwakar Patil, Monica Kamnani, Mitali R. Ingle?

  87. GEOGRAPHIC ROUTING SCHEME BASED ON DYNAMIC LOCATION UPDATE AND LOAD BALANCING MECHANISM

    Authors: M.Rajalakshmi, K.Gowsic?

  88. SECURE NETWORK SHARING NEMO BASED AD-HOC?

    Authors: V.Pavithra, M.Mohankumar?

  89. A SECURITY ARCHITECTURE ACHIEVING ANONYMITY AND TRACEABILITY IN PAYMENT BASED SYSTEM

    Authors: M.Sangeetha, S.Rajasulochana, S.Shanmathi?

  90. SAT4BSC: A Static Analysis Tool for BPEL Source Codes?

    Authors: Esubalew Alemneh, Abdul Azim Abd Ghani, Rodziah Atan?

  91. Improvising Authenticity and Security of Automated Teller Machine Services

    Authors: Srivatsan Sridharan, Gorthy Ravi Kiran, Sridhar Jammalamadaka?

  92. A Survey on Privacy-Preserving Techniques for Secure Cloud Storage?

    Authors: Salve Bhagyashri, Prof. Y.B.Gurav?

  93. Cloud Removal from Satellite Images Using Information Cloning?

    Authors: Saranya M?

  94. Automatic Detection of Optic Disc for the Extraction of Ocular Structure?

    Authors: Nivedha S, Dinesh V?

  95. PHISHING WEBSITE DETECTION: A REVIEW?

    Authors: Feon Jaison, Seenia Francis?

  96. A Review of Intrusion Detection System in Computer Network?

    Authors: Abhilasha A Sayar, Sunil. N. Pawar, Vrushali Mane?

  97. MULTIMEDIA QA GENERATION BY USING SEARCH DIVERSIFICATION?

    Authors: Nandhini.N, Ramya.K, Sandeepa.P

  98. CPU Power Prediction on Modern Multicore Embedded Processor?

    Authors: Shuhaizar Daud, R. Badlishah Ahmad, Ong Bi Lynn?

  99. Vampire Attacks: Topology Discovery in Wireless Ad Hoc Sensor Networks

    Authors: P. Dhivya, P. Sathya Priya, M. Thenila?

  100. Integration of Touch Technology in Restaurants using Android?

    Authors: Sushmita Sarkar, Resham Shinde, Priyanka Thakare, Neha Dhomne, Ketki Bhakare?

  101. VIDEO MINING AND ANOMALY DETECTION ? SURVEY?

    Authors: Subashree.D, Sobitha Ahila.S

  102. Review on Authentication Mechanisms of Digital Signatures used for Certification?

    Authors: Shraddha Kulkarni, Prof. Vikrant Chole, Prof. P S Prasad?

  103. AN ANTI-PHISHING FRAMEWORK WITH NEW VALIDATION SCHEME USING VISUAL CRYPTOGRAPHY?

    Authors: Mr. Bhushan Yenurkar, Mr. Shrikant Zade?

  104. Advanced E-mail Spam Detection Methodology by the Neural Network Classifier

    Authors: V. BRINDHA, J. GEORGE CHRISTOBER, V.NANDHINI?

  105. Translation of English Algorithm in C Program using Syntax Directed Translation Schema

    Authors: Nisha N. Shirvi, Mahesh H. Panchal?

  106. One-Dimension Multi-Objective Bin Packing Problem using Memetic Algorithm?

    Authors: Khushbu Patel, Mahesh Panchal

  107. Filtered Wall: An Automated System to Filter Unwanted Messages from OSN User Walls?

    Authors: Ms. Pallavi Kalyane, Prof. Sachin Chavan, Prof. Pravin Rahate?

  108. Mining Multilevel Fuzzy Association Rule from Transaction Data?

    Authors: Urvi A. Chaudhary, Mahesh Panchal?

  109. Enhanced Live Migration of Virtual Machine Using Comparison of Modified and Unmodified Pages?

    Authors: Sushil Kumar Soni, Ravi Kant Kapoor?

  110. DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

    Authors: Mary Michael, J.Mary Metilda?

  111. A Wavelet Transform Based Secure Data Transfer Using Blowfish Algorithm?

    Authors: Rashmi.J, Bharathi.G?

  112. AN EFFICIENT METHOD TO AVOID FALSE VOTING USING SMS VOTING APPROACH?

    Authors: K.Mythili?, K.Kanagavalli,? B.Shibi?

  113. An Efficient Real Time Video Multicasting Protocol and WLANs Cross-Layer Optimization in IEEE 802.11N?

    Authors: Gopikrishnan.R, Ms. J.R.Thresphine??

  114. Implementation of Password Guessing Resistant Protocol (PGRP) to Prevent Online Attacks?

    Authors: M.YUVARAJ, A.R.BHARATHIDASAN, N.KUMAR?

  115. Selection of Most Relevant Features from High Dimensional Data using IG-GA Hybrid Approach?

    Authors: Ishani Mandli, Prof. Mahesh Panchal?

  116. WIRELESS MESH NETWORKS: ISSUES AND CHALLENGES?

    Authors: Jubil Jose, Rigi C.R?

  117. A TECHNIQUE FOR IMPROVING CAKEPHP WEB PAGE RESPONSE TIME

    Authors: Pharaoh Chaka, Hilton Chikwiriro?

  118. EXHAUSTING VERVE BY VAMPIRE’S IN WIRELESS AD HOC SENSOR NETWORKS?

    Authors: P. DivyaPrabha, R. Sundaram?

  119. Enhanced Privacy ID for Remote Authentication using Direct Anonymous Attestation Scheme?

    Authors: Uma.R, Aravind.P?

  120. Intrusion Detection in Mobile Adhoc Network?

    Authors: Mrs. Mugdha Kirkire, Prof. Poonam Gupta?

  121. ENTITY SEARCH ENGINES?

    Authors: Pinky Paul?, Mr. Thomas George?

  122. CONCEALED CLIENT DATA AGGREGATION FOR DATABASE-AS-SERVICE (DAS)?

    Authors: JEBARANJANI.B?, SANGEETHA.S?

  123. BUNDLE PROTOCOL ALONG WITH OLSR IN MANET?

    Authors: J. Vithya Roshni, J. Prabin Jose

  124. A Rendezvous Based Sensory Data Collection with Re-clustering Technique?

    Authors: D.Gokilapriya, N.Lokesh?

  125. Literature Survey on DWT Based Image Steganography?

    Authors: Mrs. Suvarna Patil; Mr. Gajendra Singh Chandel

  126. Detection of Fire Flow in Videos by SVM Classifier with EM-Segmentation Method?

    Authors: S.Shanthi; J.George Christober