Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.3, No.2
Publisher: ZAIN Publications
Publishing Date: 2014-02-28
- Distributing, Ensuring and Recovery of Data Stored in Cloud?Authors: Dr. B. F. Momin, Mr. Girish Bamane?
- A Survey Conducted on E-Agriculture with Indian Farmers?Authors: Sumitha Thankachan, Dr. S. Kirubakaran?
- A Survey on Delegating Log Management to The CloudAuthors: Sinu P S, M.Ananthi?
- Survey on Clinical Decision Support System for Diagnosing Heart Disease?Authors: Suchithra, Dr. P. Uma Maheswari?
- Various Approaches to Detect Wormhole Attack in Wireless Sensor Networks?Authors: Nishant Sharma, Upinderpal Singh?
- Decision Support System for Precluding Coronary Heart Disease (CHD)?Authors: K. Cinetha, Dr. P. Uma Maheswari?
- A SURVEY ON WORKFLOW SCHEDULING IN CLOUD USING ANT COLONY OPTIMIZATION?Authors: J.Elayaraja, S.Dhanasekar?
- Integrated System for Reading Multiple FilesAuthors: Awanti Kamble, Anshoola Jaiswal, Nikita Dekate, Shama Haridas, Kalyani Pendke?
- ENHANCING SECURITY IN TWO-WAY RELAY NETWORK BY USING COOPERATION JAMMING AND RELAY SELECTION APPROACH?Authors: Ramya T V, M. Madan Mohan?
- Honey Trap Security Server: An Efficient Approach of Securing E-Banking Network?Authors: Ashwini Gabhane, Kiran Bansule, Pradnya Kedar, Lekha Gahukar, Swati Sahare, Ketki Bhakare
- Secure Hierarchical Temporal Access Control in Cloud Computing?Authors: Karthika.RN, Vijay Anand.P, M.Rajesh Khanna?
- Weighted Moving Average Forecast Model based Prediction Service Broker Algorithm for Cloud ComputingAuthors: Prof. Deepak Kapgate?
- A NOVEL ON FAST PARALLEL FILE TRANSFER USING REPLICATION?Authors: K.Sabarigirivason?, R. Giridharan
- Evaluating and Analyzing Clusters in Data Mining using Different Algorithms?Authors: N. Sunil Chowdary, D. Sri Lakshmi Prasanna, P. Sudhakar
- High Efficiency Data Access System Architecture for Deblocking Filter Supporting Multiple Video Coding StandardsAuthors: S.Karthikeyan, K.Saran?
- Literature Survey on Applications of Digital Signal Processing using Anti-Aliasing and Anti-Imaging Filters?Authors: S.Arun Kumar?
- An Investigation of Face Recognition Characteristics Using PCA and ICA?Authors: Yundi Fu, Yongli Cao, Arun Kumar Sangaiah?
- An Investigation of Dijkstra and Floyd Algorithms in National City Traffic Advisory Procedures?Authors: Arun Kumar Sangaiah, Minghao Han, Suzi Zhang?
- AN EFFICIENT LOCATION BASED ROUTING FOR MOBILE ADHOC NETWORKS?Authors: S.Saranya, D.Gokilapriya
- Porter Five Forces Analysis of the Leading Mobile Cellular Telephony Service Provider in India?Authors: Subhasish Majumdar, Partha Pratim Bhattacharya?
- Implementing & Developing Cloud Computing on Web ApplicationAuthors: Anisha Tandon?
- A ZIG-BEE BASED WEARABLE HEALTH MONITORING SYSTEM?Authors: M.Sherwin Nayanar, V.Pandimurugan, V.Gowri?
- Application of the Fuzzy Logic in Content Based Image Retrieval using Color Feature?Authors: Aqeel M. Humadi, Hameed A. Younis?
- VLSI Implementation and Analysis of Parallel Adders for Low Power Applications?Authors: Arunprasath S, Karthick A, Dhineshkumar D?
- Degraded Documents Recovering by Using Adaptive Binarizations and Convex Hull Concept?Authors: Mahendar.R, Navaneetha Krishnan.S, Roshini Ravinayagam, Prakash.P?
- A New Key Management Paradigm for Fast Transmission in Remote Co-operative Groups?Authors: M.VIJAYAKUMAR, V.PRIYA DHARSHINI, Dr.C.SELVAN?
- SECURE DATA TRANSMISSION OVER WIMAX NETWORKS USING VPN TECHNOLOGY IN REALTIME ENVIRONMENTS?Authors: J.BALU, DR.S.THIRUNIRAI SENTHIL
- On Generating Permutations under User Defined Constraints?Authors: Dhruvil Badani?
- ADVANCED WEB BROWSER WITH EFFECTIVE TOOLS?Authors: M.Loganathan, K.E.Dharani?
- EXTENDED AND EMBEDDED VISUAL CRYPTOGRAPHY?Authors: G.Tejeswar Reddy, N.Meenakshi?
- CONDITIONAL PRIVACY PRESERVING SECURITY PROTOCOL FOR NFC APPLICATIONAuthors: V.Gowri, F.W.JESUDAS, M.Sherwin Nayanar?
- Trust Based Voting Scheme and Optimal Multipath Routing for Intrusion Tolerance in Wireless Sensor Network?Authors: P.PRIYADHARSHINI, C.ANOOR SELVI?
- AN ANDROID APPLICATION FOR UNIVERSITY ONLINE COUNSELING?Authors: N. Banu Priya, I. Juvanna?
- XML Dissemination Scheme for Mobile Computing Based on Lineage Encoding?Authors: K. Anusree, Mrs. D. Usha, C. Shiny Jennifer
- APPLICATION OF CLOUD COMPUTING AS HPC PLATFORM FOR EMBEDDED SYSTEMS?Authors: N.S.Gawai, B.V.Chikte, V.R.Pandit, S.M.Ingale, M.S. Burle?
- PATH LOSS PREDICTION FOR GSM MOBILE NETWORKS FOR URBAN REGION OF ABA, SOUTH-EAST NIGERIA?Authors: NWALOZIE GERALD .C, UFOAROH S.U, EZEAGWU C.O, EJIOFOR A.C?
- Analysis of Lossy Hyperspectral Image Compression Techniques?Authors: Dr. S.M.Ramesh, P.Bharat, J.Anand, J.Anbu Selvan
- VLSI Architecture for Implementing Kaiser Bessel Window Function Using Expanded Hyperbolic CORDIC Algorithm?Authors: M.Mohana Arasi, J.Anand, P.Bharat, J.Anbu Selvan?
- Copyright Protection through Deep Packet Inspection- An Indian PerspectiveAuthors: Priyanka Jain, Jai Sachith Paul, Prof. K.Pradeep Kumar?
- FINITE?PRECISION ANALYSIS OF DEMAPPERS AND DECODERS FOR LDPC-CODED M-QAM SYSTEMS?Authors: Hoglah Leena Bollam?
- VAMPIRE ATTACKS: PROTOCOL ROUTING INFRASTRUCTURE IN WIRELESS SENSOR NETWORKSAuthors: T.Nivethitha, S.Muthukrishnan, S. Navaneethakrishnan?
- FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM?Authors: K.Senthamil Selvi, P.Chitrakala, A.Antony Jenitha?
- Monitoring Factory Machine Status from Remote Location using GSM Technologies?Authors: C. Shiny Jennifer, B.V. Baiju, K. Anusree?
- EFFICIENT GRIDDING AND SEGMENTATION FOR MICROARRAY IMAGES?Authors: P.Thamaraimanalan, D.Dhinesh kumar, K.Nirmalakumari?
- Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption TechniqueAuthors: A.Jeeva, Dr.C.Selvan, A.Anitha?
- DETECTING NODE REPLICATION ATTACKS IN STATIC AND MOBILE SENSOR NETWORKS USING SPRT?Authors: T.EZHILARASAN, R.BACKIYALAKSHMI
- A Supervised Method for Multi-keyword Web Crawling on Web Forums?Authors: A.Gowtham, Dr.K.Deepa
- Improvement of Email Summarization Using Statistical Based Method?Authors: Mithak I. Hashem
- Intrusion Detection, Secure Protocol & Network Creation for Spontaneous Wireless AD HOC Network?Authors: Nikhil Varghane, Prof. Bhakti Kurade, Prof. Chandradas Pote?
- DESIGN PATTERN BASED ANALYSIS IN MULTI-AGENT FRAMEWORK?Authors: A.Sindhuja, Rathi.P.R, Anis Fathima.A.R, A.P.Jeyasanthini?
- LARYNX DISEASE ANALYSIS USING DYNAMIC TIME WARPING ALGORITHM?Authors: K. Aiswarya Lakshmi, D. Karunanithi, G.Swetha?
- Traveler Guide using GPS?Authors: Prashant Beldar, Prashant Bansode, Rajendra Mane, Swapnil Gaikwad?
- TIMETABLE GENERATION SYSTEM?Authors: Anuja Chowdhary, Priyanka Kakde, Shruti Dhoke, Sonali Ingle, Rupal Rushiya, Dinesh Gawande?
- Smart Remote Health Care Data Collection ServerAuthors: Kalyani Bangale, Karishma Nadhe, Nivedita Gupta, Swati Singh Parihar, Gunjan Mankar?
- LABVIEW Based Module For Bio Signals MonitoringAuthors: Sabeetha Begum.M, Kumarnath.J?
- Review on MANET: Characteristics, Challenges, Imperatives and Routing Protocols?Authors: Mahima Chitkara, Mohd. Waseem Ahmad?
- Review of Techniques for Detecting Video Forgeries?Authors: Aniket Pathak, Dinesh Patil
- QUASI RESONANT BUCK CONVERTER FOR DUAL STRING BUCK LED DRIVER?Authors: Vijayadevi.A, Sneha Prem, Jikku Mathew, Manikandan.K, Sajla Rehman?
- Lossless Compression for Compound Documents Based on Block Classification?Authors: A.Thamarai Selvi, M.Sambath, S.Ravi?
- ADDRESSING BIG DATA WITH HADOOP?Authors: TWINKLE ANTONY?, SHAIJU PAUL?
- Privacy in Map Reduce Based Systems: A ReviewAuthors: Rosmy C Jose, Shaiju Paul?
- AN ELLIPTIC CURVE CRYPTOGRAPHY BASED ENHANCED ADAPTIVE ACKNOWLEDGMENT (ECC-EAACK) INTRUSION DETECTION SYSTEM?Authors: Deboral C, Sudhagar G?
- PRECIPITATE MESSAGE MANIFEST PROTOCOL FOR VEHICULAR AD HOC NETWORKS?Authors: Ramya. K, Nithya. N?
- JOINT VIDEO COMPRESSION AND ENCRYPTION USING SECURE WAVELET TRANSFORM AND ENTROPY CODING?Authors: E.Mallika, K.SivaKumar?
- Study of Security Risk and Vulnerabilities of Cloud ComputingAuthors: Dr.P.K.Rai, R.K.Bunkar
- Novel Techniques for Color and Texture Feature Extraction?Authors: Miss. Priyanka N.Munje?, Prof. Deepak Kapgate?, Prof. Snehal Golait
- Data Integration Models for Operational Data Warehousing?Authors: G. Swetha, D. Karunanithi, K. Aiswarya Lakshmi?
- REALIZATION OF VLSI ARCHITECTURE FOR DECISION TREE BASED DENOISING METHOD IN IMAGES?Authors: Gobu.CK, Priya.R?
- Providing Efficient Data management Services Using Cloud Cache?Authors: Swapnil L. Mahadeshwar, A.R.Surve
- GAPSS: GPS Aided Photo Search System?Authors: Amey Divekar, Pravin Khot, Gaurav Chaudhari, Vishal Shembekar?
- A Review on Privacy Problems in Distributed Information Brokering System and Solutions?Authors: Mr. Ashutosh Kamble, Prof. Deepak Kapgate, Prof. Prakash Prasad?
- SURVEY ON SECURE AUDIO ENCRYPTION USING SILENCE PART OF THE SPEECH?Authors: V. Anusuya Devi, Dr. V. Kalaivani, T. Sam Pradeep Raj?
- An Approach for Minimization of Power Consumption in Ad-Hoc Network?Authors: Abhiruchi Akre, Kimi Bhoyar, Ankita Malve, Avantika Kalbande, Pawan Khade?
- Outlier Mining for Removing the Anomalies in High Dimensional Data Using ARVDH AlgorithmAuthors: Krupa Mary Jacob, K.Sangeetha, S.Karthik?
- DETECTION OF MASQUERADERS USING TREE STRUCTURED SVM?Authors: P.Anishprabu, M.Sangeetha, M.Nagulanand?
- EduPad- “A Tablet Based Educational System for Improving Adult Literacy in Rural India”?Authors: Mayuri Tawri, Richa Sharma, Charandas Pote
- Solution to Data Sharing for Confidentiality between Service Provider and the Data Owner?Authors: Mr. Ajay Bhaisare, Prof. Prakash Prasad, Prof. Ashwini Meshram?
- TOWARDS SECURE PROCESSING PRIVATE QUERIES OVER ENCRYPTED CLOUD DATA?Authors: Sumathi Sivaraj, S. Yasotha?
- CYBER SECURITY -Trends and Challenges?Authors: Vidhya P.M?
- Gas Level Detection and Leakage Monitoring System using a Specific Technique?Authors: I. Juvanna, N. Meenakshi?
- Lane Detection Techniques - A Review?Authors: Anjali Goel?
- A Review on Image Dehazing Methods?Authors: Reshma Kurian, Namitha T.N??
- APPLICATION OF STATISTICAL MODELS TO THE COLLABORATIVE PUBLICATIONS IN BIOINFORMATICS?Authors: Dr. N. Amsaveni, M. Manjula??
- Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryption?Authors: Prof. Y.B.Gurav?, Manjiri Deshmukh
- EFFICIENT AND DISTRIBUTED NETWORK MODEL FOR P2P SYSTEMS?Authors: K.KAYALVIZHI, BHARATHI.R?
- Attendance Monitoring Using Face Recognition?Authors: Divya Singh, Ruhi Sunil Hadke, Shruti Sanjay Khonde, Valhavi Diwakar Patil, Monica Kamnani, Mitali R. Ingle?
- GEOGRAPHIC ROUTING SCHEME BASED ON DYNAMIC LOCATION UPDATE AND LOAD BALANCING MECHANISMAuthors: M.Rajalakshmi, K.Gowsic?
- SECURE NETWORK SHARING NEMO BASED AD-HOC?Authors: V.Pavithra, M.Mohankumar?
- A SECURITY ARCHITECTURE ACHIEVING ANONYMITY AND TRACEABILITY IN PAYMENT BASED SYSTEMAuthors: M.Sangeetha, S.Rajasulochana, S.Shanmathi?
- SAT4BSC: A Static Analysis Tool for BPEL Source Codes?Authors: Esubalew Alemneh, Abdul Azim Abd Ghani, Rodziah Atan?
- Improvising Authenticity and Security of Automated Teller Machine ServicesAuthors: Srivatsan Sridharan, Gorthy Ravi Kiran, Sridhar Jammalamadaka?
- A Survey on Privacy-Preserving Techniques for Secure Cloud Storage?Authors: Salve Bhagyashri, Prof. Y.B.Gurav?
- Cloud Removal from Satellite Images Using Information Cloning?Authors: Saranya M?
- Automatic Detection of Optic Disc for the Extraction of Ocular Structure?Authors: Nivedha S, Dinesh V?
- PHISHING WEBSITE DETECTION: A REVIEW?Authors: Feon Jaison, Seenia Francis?
- A Review of Intrusion Detection System in Computer Network?Authors: Abhilasha A Sayar, Sunil. N. Pawar, Vrushali Mane?
- MULTIMEDIA QA GENERATION BY USING SEARCH DIVERSIFICATION?Authors: Nandhini.N, Ramya.K, Sandeepa.P
- CPU Power Prediction on Modern Multicore Embedded Processor?Authors: Shuhaizar Daud, R. Badlishah Ahmad, Ong Bi Lynn?
- Vampire Attacks: Topology Discovery in Wireless Ad Hoc Sensor NetworksAuthors: P. Dhivya, P. Sathya Priya, M. Thenila?
- Integration of Touch Technology in Restaurants using Android?Authors: Sushmita Sarkar, Resham Shinde, Priyanka Thakare, Neha Dhomne, Ketki Bhakare?
- VIDEO MINING AND ANOMALY DETECTION ? SURVEY?Authors: Subashree.D, Sobitha Ahila.S
- Review on Authentication Mechanisms of Digital Signatures used for Certification?Authors: Shraddha Kulkarni, Prof. Vikrant Chole, Prof. P S Prasad?
- AN ANTI-PHISHING FRAMEWORK WITH NEW VALIDATION SCHEME USING VISUAL CRYPTOGRAPHY?Authors: Mr. Bhushan Yenurkar, Mr. Shrikant Zade?
- Advanced E-mail Spam Detection Methodology by the Neural Network ClassifierAuthors: V. BRINDHA, J. GEORGE CHRISTOBER, V.NANDHINI?
- Translation of English Algorithm in C Program using Syntax Directed Translation SchemaAuthors: Nisha N. Shirvi, Mahesh H. Panchal?
- One-Dimension Multi-Objective Bin Packing Problem using Memetic Algorithm?Authors: Khushbu Patel, Mahesh Panchal
- Filtered Wall: An Automated System to Filter Unwanted Messages from OSN User Walls?Authors: Ms. Pallavi Kalyane, Prof. Sachin Chavan, Prof. Pravin Rahate?
- Mining Multilevel Fuzzy Association Rule from Transaction Data?Authors: Urvi A. Chaudhary, Mahesh Panchal?
- Enhanced Live Migration of Virtual Machine Using Comparison of Modified and Unmodified Pages?Authors: Sushil Kumar Soni, Ravi Kant Kapoor?
- DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGINGAuthors: Mary Michael, J.Mary Metilda?
- A Wavelet Transform Based Secure Data Transfer Using Blowfish Algorithm?Authors: Rashmi.J, Bharathi.G?
- AN EFFICIENT METHOD TO AVOID FALSE VOTING USING SMS VOTING APPROACH?Authors: K.Mythili?, K.Kanagavalli,? B.Shibi?
- An Efficient Real Time Video Multicasting Protocol and WLANs Cross-Layer Optimization in IEEE 802.11N?Authors: Gopikrishnan.R, Ms. J.R.Thresphine??
- Implementation of Password Guessing Resistant Protocol (PGRP) to Prevent Online Attacks?Authors: M.YUVARAJ, A.R.BHARATHIDASAN, N.KUMAR?
- Selection of Most Relevant Features from High Dimensional Data using IG-GA Hybrid Approach?Authors: Ishani Mandli, Prof. Mahesh Panchal?
- WIRELESS MESH NETWORKS: ISSUES AND CHALLENGES?Authors: Jubil Jose, Rigi C.R?
- A TECHNIQUE FOR IMPROVING CAKEPHP WEB PAGE RESPONSE TIMEAuthors: Pharaoh Chaka, Hilton Chikwiriro?
- EXHAUSTING VERVE BY VAMPIRE’S IN WIRELESS AD HOC SENSOR NETWORKS?Authors: P. DivyaPrabha, R. Sundaram?
- Enhanced Privacy ID for Remote Authentication using Direct Anonymous Attestation Scheme?Authors: Uma.R, Aravind.P?
- Intrusion Detection in Mobile Adhoc Network?Authors: Mrs. Mugdha Kirkire, Prof. Poonam Gupta?
- ENTITY SEARCH ENGINES?Authors: Pinky Paul?, Mr. Thomas George?
- CONCEALED CLIENT DATA AGGREGATION FOR DATABASE-AS-SERVICE (DAS)?Authors: JEBARANJANI.B?, SANGEETHA.S?
- BUNDLE PROTOCOL ALONG WITH OLSR IN MANET?Authors: J. Vithya Roshni, J. Prabin Jose
- A Rendezvous Based Sensory Data Collection with Re-clustering Technique?Authors: D.Gokilapriya, N.Lokesh?
- Literature Survey on DWT Based Image Steganography?Authors: Mrs. Suvarna Patil; Mr. Gajendra Singh Chandel
- Detection of Fire Flow in Videos by SVM Classifier with EM-Segmentation Method?Authors: S.Shanthi; J.George Christober