ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.3, No.3

Publisher: ZAIN Publications

Publishing Date: 2014-03-30

  1. IDENTIFICATION OF THE DEGREE OF PARTICIPATION BASED ON HMM?

    Authors: S.Chidambaranathan?

  2. The Role of Web Content Mining and Web Usage Mining in Improving Search Result Delivery?

    Authors: Ms. Shital C. Patil, Prof. R. R. Keole?

  3. Security Issues in SaaS Delivery Model of Cloud Computing

    Authors: Aized Amin Soofi, M. Irfan Khan, Ramzan Talib, Umer Sarwar?

  4. DATA MINING TECHNIQUES FOR PREDICTING SCHOOL FAILURES AND DROPOUT

    Authors: Mrs.KALPANA.N, Dr.K.DAVID?

  5. Depth Video Compression Using Weighted Mode Filtering?

    Authors: Ms. MAANVIZHI.J, Mr. K.SIVAKUMAR?

  6. Data Services For E-Tailers Leveraging Web Search Engine Assets- A Review?

    Authors: Shaleena K.P, Thomas George?

  7. TRUSTED ATOMIC WEB SERVICE TRANSACTION IN CLOUD

    Authors: K. LOHESWARAN, S.BAGYASHREE, K.KAVIYA?

  8. A Mechanism to Adjust the Updated Data and Recovery for School?

    Authors: Hussain Abdulkareem Younis, Hassen Mohssen Audafa, Dr. Hameed A. Younis

  9. MOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS?

    Authors: Prinslin.L, V.Janani?

  10. A NEW IP TRACEBACK SCHEME TO AVOID LAUNCH ATTACKS?

    Authors: E.JANSI?, BHARATHI.R?, E.PUSHPARAJ?

  11. A Survey on Quality of Service for Optimized Linked State Routing protocol in Mobile Ad hoc Network?

    Authors: Jalpesh D. Ghumaliya, Sandip Chauhan?

  12. A Secure Protocol for Spontaneous Wireless Ad Hoc Network Creation?

    Authors: L.Dhanam, M.S Vinu?

  13. OSN User Filtered Walls for Unwanted Messages Using Content Mining?

    Authors: Ms. Shruti C. Belsare, Prof. R.R. Keole?

  14. REVIEW: DETECTION OF TYPES OF ACUTE LEUKEMIA?

    Authors: SHRUTIKA MAHAJAN, SNEHAL S. GOLAIT, ASHWINI MESHRAM, NILIMA JICHLKAN

  15. QOS ORIENTED NODE SELECTION APPROACH IN AD-HOC ROUTING IN VANET

    Authors: VIGNESHKANNA.B, M.MANIKANDAN?

  16. Critical Analysis of Cloud Computing Using OpenStack?

    Authors: Paramjot Singh, Vishal Pratap Singh, Gaurav Pachauri?

  17. Polarity Classification Using Twitter Data?

    Authors: Paramjot Singh?

  18. Defending Against Attack in Heterogeneous Networks?

    Authors: M. Mukesh Krishnan, R. Ravi?

  19. A HETEROGENEOUS WIRELESS NETWORK FOR 5G MOBILE?

    Authors: Renuka S. Durge, Vaishali B. Bhagat?

  20. MOBILE CLOUD COMPUTING AN EFFICIENT TECHNIQUE FOR MOBILE USERS

    Authors: Shraddha A. Jalan, Vaishali B.Bhagat?

  21. Source Anonymous Message Authentication Based On ECC in Wireless Sensor Networks?

    Authors: B.Renugadevi, T.John Peter

  22. A NOVEL DESIGN OF REVERSIBLE FLOATING POINT ADDER ARCHITECTURE?

    Authors: N. Keerthika, Mr. M.Rajmohan?

  23. Analysis of Data Confidentiality Techniques in Cloud Computing?

    Authors: Ms. Mayuri R. Gawande, Mr. Arvind S. Kapse?

  24. Towards Smartphone Based Computing: A Case Study of Kashmir Valley?

    Authors: Junaid Latief Shah, Muneer Ahmad Dar?

  25. A Survey on Privacy Preservation in Data Publishing?

    Authors: V. Shyamala Susan, Dr. T. Christopher?

  26. Error Detection in Decoding of Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes

    Authors: K. ADINARAYANA, J. RAVI?

  27. A NEW APPROACH TO IMPROVE BUSINESS USING SEO TECHNIQUES?

    Authors: Sreeharsha Muram, VenkataRamana.K, Rajasekhar Kunisetty

  28. Security for Privileged Accounts Using Break-Glass Technique

    Authors: Arun.S, Mohanasundarm.A, Bhoopathi Siva.K?

  29. Alleviating Internal Data Theft Attacks by Decoy Technology in Cloud?

    Authors: I.Sudha, A.Kannaki, S.Jeevidha?

  30. Dynamic Data Aggregation Prediction Based Clustering to Mobile Sink in Wireless Sensor Networks?

    Authors: M.Suganthi, Mrs. Susmita Mishra?

  31. Enhancing Search Engine Optimization using Web Content Mining?

    Authors: Mr. S.Balamurugan, Dr. S.Thirunirai Senthil?

  32. A Survey on Wavelet Domain Techniques for Image Super Resolution?

    Authors: Saranya P, Fatimakani K, Kanchanadevi P, Venkatesan S, Govindaraju S?

  33. Special Scheme of Hidden Data Procession for Several Applications in Wireless Sensor Networks

    Authors: Janarish Saju C, Sharon Nisha M

  34. A WIRELESS MESH NETWORKS WITH RELIABLE AND RESILIENT ROUTING BY CROSS-LAYER METRICS?

    Authors: M.Ranjith Priyanka, J.Mary Metilda?

  35. An Assess Android Antimalware that Detects Malicious Dynamic Code in Apps

    Authors: Miss. Srushti Hatwar, Prof. Chetan Shelke?

  36. Field Oriented Control of Permanent Magnet Synchronous Motor?

    Authors: P.Ramesh, RachaPrathyusha?

  37. DESIGN AND IMPLEMENTATION OF BALLOT MALFUNCTIONING AVOIDANCE SYSTEM SECURITY OPTIMIZATION?

    Authors: Srikeerthi Godena, P. Kumara guru Diderot?

  38. DESIGN OF HIGH-ACCURACY FIXED-WIDTH MODIFIED BOOTH MULTIPLIER

    Authors: Ms. Jeena Maria Cherian, B.Sireesha?

  39. Clustering with Efficient Web Usage Mining?

    Authors: MS. RASIKA KALBENDE, MR. AMIT SAHU?

  40. Secure Crypto System for Image Encryption and Data Embedding using Chaos and BB Equation Algorithm?

    Authors: S.Revathy?

  41. FPGA Implementation of Wu-Manber Algorithm for BLASTN DNA Sequence Matching

    Authors: Anitha Ranganathan?

  42. Logical Fault Detection Based on Conservative QCA for Ultra Low Power Devices?

    Authors: Yamuna S?

  43. Design of Power Gated ML Sensing Low Power CAM?

    Authors: Neelam Sharma S?

  44. A Survey on Text Based Clustering

    Authors: S.Chidambaranathan

  45. GENERATION OF SECURITY TEST TO FIND INJECTION ATTACKS BY CODE REVIEW

    Authors: N. Parthiban, R. Ravi, Dr. Beulah Shekhar?

  46. An Android Based Medicine Reminder System Using External Storage?

    Authors: Prabhukannan.G, Liza M. Kunjachen, Dr. J. Jegadeesan?

  47. REAL-TIME COMPRESSION STRATEGY ON VARIOUS POINT CLOUD STREAMS

    Authors: Miss. R.SARANYA, DR. S.THIRUNIRAI SENTHIL?

  48. Watermarking Scheme for Colour Images Using Hidden Markov Model?

    Authors: Mr. Kanchan Mahajan, Prof. Mahendrakumar Rai?

  49. SECURITY ANALYSIS OF DYNAMIC GROUPS IN CLOUD?

    Authors: Ms. Shrayu P. Pachgade, Prof .K.G. Bagde?

  50. Review of Image Processing Techniques for Automatic Detection of Tumor in Human Liver

    Authors: Vinita Dixit, Jyotika Pruthi

  51. Comparative Analysis of Routing Protocols AODV DSDV and DSR in MANET?

    Authors: Yassine MALEH?, DR. Abdellah Ezzati?

  52. DATA SECURITY BASED ON LAN USING DISTRIBUTED FIREWALL?

    Authors: Jayshri V.Gaud, Mahip M.Bartere?

  53. INTRUSION DETECTION AND PREVENTION BY USING LIGHT WEIGHT VIRTUALIZATION IN WEB APPLICATIONS?

    Authors: J.Angeline Linora, M.Nava Barathy?

  54. Wireless Black Box Using MEMS Accelerometer and GPS Tracking for Accidental Monitoring of Vehicles?

    Authors: Pallakila Sai Avinash, K.ThenKumari?

  55. BRAIN TISSUE SEGMENTATION FROM MAGNETIC RESONANCE IMAGE USING PARTICLE SWARM OPTIMIZATION ALGORITHM?

    Authors: Abinaya.K.S, Pandiselvi.T?

  56. An Analysis on the Performance Evaluation of Routing Protocols in Wi-Fi/802.11b Network?

    Authors: Merin Skariah, Prof. Dr. Suriyakala C D?

  57. SECURITY ISSUES: THE BIG CHALLENGE IN MANET?

    Authors: Sneha U. Agalawe, Nitin R.Chopde?

  58. Selecting Best Features Using Combined Approach in POS Tagging for Sentiment Analysis?

    Authors: Nikita D. Patel, Chetana Chand?

  59. A SURVEY ON CONTENT RETRIEVAL SCHEMES FOR MEDICAL IMAGES?

    Authors: Meeshika Arora?

  60. DESIGN OF MULTIPLE CONSTANT MULTIPLICATION ALGORITHM FOR FIR FILTER?

    Authors: T. Sandhya Pridhini, Diana Aloshius, Aarthi Avanthiga, Rubesh Anand?

  61. Categorization of Data Mining Tools Based on Their Types?

    Authors: J.Mary Dallfin Bruxella, S.Sadhana, S.Geetha

  62. Enhanced Data Transmission for Cluster-Based Wireless Sensor Networks?

    Authors: Miss. Vaishali M.Sawale, Prof. Arvind.S.Kapse?

  63. QoS Enhanced Architecture for Cloud Computing Environment?

    Authors: ANBUMOZHI ANBUKKARASAN, LIZA M KUNJACHEN?

  64. Design of Router Micro Architecture Based on Runtime Adaptive Selection Strategies for On-Chip Communication Interconnection Network?

    Authors: Ms. Aryadevi S, Mr. T Shanmuganathan?

  65. FAULT TOLERANT DEFLECTING ROUTER WITH HIGH FAULT COVERAGE FOR ON-CHIP NETWORK

    Authors: Mr. Vishnu K P, Mr. T Shanmuganathan?

  66. A Survey on Android’s Location Content Search Engine?

    Authors: Kanchan B. Budhakar, Amruta T. Kashid, Rutuja N. Pathare?, Sharmila Chopade

  67. Remote Administrative Trojan/Tool (RAT)

    Authors: Manjeri N. Kondalwar, Prof. C.J. Shelke?

  68. A SECURE AND TRUSTED ROUTING SCHEME FOR WIRELESS MESH NETWORKS

    Authors: Pushpender Sarao, Prof.(Dr.) Sohan Garg?

  69. A MODEL FOR EVALUATING AND MAINTAINING LOAD BALANCING IN CLOUD COMPUTING?

    Authors: Pushpendra Verma, Dr. Jayant Shekhar, Amit Asthana?

  70. A High Speed and Area Efficient Wallace Tree Multiplier with Booth Recoded Technique?

    Authors: B. Venkata Sateesh, Shiju C Chacko?

  71. Agile Programming and Design Patterns on Web Applications Using J2EE and Ruby on Rails ?A Case Study?

    Authors: Vedavyas J, Kumarswamy Y?

  72. A Novel Design of Reversible Universal Shift Register

    Authors: Rashid Anwar, Jobbin Abraham Ben?

  73. Android Based Meter Reading Using OCR?

    Authors: Rohit Dayama, Anil Chatla, Heena Shaikh, Medha Kulkarni?

  74. DooDB: A Graphical Password Database Consist of Doodles and Pseudo Signature Based User Authentication?

    Authors: Miss. Yugandhara A.Thakare, Prof.A.S.Kapse?

  75. Secure Key Exchange over Internet?

    Authors: Miss. Pooja P. Taral, Prof. Vijay B. Gadicha?

  76. AN EXPLORATORY STUDY OF DUPLICATE BUG REPORTS IN OSS PROJECTS

    Authors: Swati Sen, Anita Ganpati, Aman Kumar Sharma?

  77. WIFI MIMO EMERGING TREND IN WIRELESS TECHNOLOGY?

    Authors: Sneha A. Jaswante, Mahip M.Bartere?

  78. A Comparative Study on Performance Evalution of Eager versus Lazy Learning Methods?

    Authors: Solomon Getahun Fentie, Abebe Demessie Alemu, Bhabani Shankar D. M.?

  79. Congestion Detection & Minimization in Wireless Sensor Network By Using Multipath Rate Organization Technique?

    Authors: Prof. Sachin Patel, Prof. Rakesh Pandit, Mr.Abhijeet Rathod

  80. Performance Analysis of two Anaphora Resolution System for Hindi Language

    Authors: Priya Lakhmani, Smita Singh, Sudha Morwal?

  81. Secure Data Sharing in the Cloud by Maintaining Integrity using Logging Mechanism

    Authors: K.Velammal, Mrs.L.Sheela?

  82. Design of Power and Rate Adaptation with Scheduling In Wireless Networks Based On SIC?

    Authors: M.Vinodhini, R.Uthira Devi?

  83. New Touch Screen Application to Retrieve Speech Information?

    Authors: J.Rajeswari, E.Thanga Selvi?

  84. SMART BATTERY CHARGER FOR SOLAR-POWERED LINE FOLLOWER ROBOTIC VEHICLE

    Authors: S.Anusuya, Mrs.M.Thiruveni?

  85. Estimation and Detection of Blood Pressure Using Smart Phones without Using Cuff?

    Authors: V.Sathya, R.Mohan Raj?

  86. Fingerprint Authentication System Using Minutiae Matching and Application?

    Authors: M.Sathiya Moorthy, R.Jayaraj, Dr. J. Jagadeesan

  87. A HYBRID APPROACH OF QUERY EXPANSION FOR VIETNAMESE QUERY?

    Authors: Tuan, Tran Anh?

  88. AN IMPROVED GGP BASED CLUSTER HEAD ROUTING FOR RECOVERING AND SENSING DATA AGGREGATION INTEGRITY IN WIRELESS SENSOR NETWORKS?

    Authors: K.Sujana Banu; S.Vignesh; K.Banazeer?

  89. Characteristic Evaluation of Distributed QoS Routing

    Authors: Shuchita Upadhyaya, Gaytri Devi?

  90. Infrastructure as a Service: Security Issues in Cloud Computing?

    Authors: P. R. Jaiswal, A. W. Rohankar?

  91. Design of Chatting Application Based on Android Bluetooth

    Authors: Nikita Mahajan, Garima Verma, Gayatri Erale, Sneha Bonde, Divya Arya?

  92. DESIGN OF FIFTH ORDER CONTINUOUS TIME-DELTA SIGMA ADC USING SIMSIDES

    Authors: Bedva Tushar, Jai Sachith Paul, Latha R?

  93. Upgrade PIFS to Patterns Recognition?

    Authors: Firas Sabar Miften?

  94. Smartphone Based Controlling and Pit Detection System?

    Authors: R. Ranjith, K. ThenKumari, P. Pandiaraj?

  95. HIGH SPEED AND LOWER HARDWARE COMPLEXITY VLSI ARCHITECTURE FOR LIFTING BASED DISCRETE WAVELET TRANSFORM?

    Authors: K.Kokulavani, M.Mohankumar?

  96. IMPROVING THE LIFETIME OF THE WIRELESS SENSOR NODES USING PPSS PROTOCOL?

    Authors: Mahalakshmi R M, Wisy Shantha A, Xavier Mary A?

  97. A Second-Order Linear Ordinary Differential Equation (ODE)?

    Authors: Mohammed Mousa Mohsin?

  98. SUSTENTATION OF USER INFORMATION RETRIEVAL WITH PRIVATE GRID USING LOCATION BASED SERVICES?

    Authors: P.Adorin Rini, B.Dwarakanath?

  99. DESIGN AND IMPLEMENTATION OF HIGH EFFICIENCY REMOTE CONTROL SYSTEM FOR INTELLIGENT STREET LIGHTING

    Authors: Porchezhiyan, Aarthi Avanthiga, Diana Aloshius, Rubesh Anand?

  100. A NOVEL APPROACH TO ENHANCE THE MAINTAINABILITY OF OBJECT ORIENTED SOFTWARE ENGINEERING DURING COMPONENT BASED SOFTWARE ENGINEERING

    Authors: Hardeep Singh, Aseem Kumar?

  101. A NOVEL APPROACH TO ENHANCE THE PERFORMANCE OF VANET BY REDUCING DELAY IN COLLISION WARNING SYSTEMS?

    Authors: Kanu, Parveen Kumar?

  102. Analysis of Speech Signals?

    Authors: Komal Jindal?

  103. Insertion Sort with its Enhancement?

    Authors: Miss. Pooja K. Chhatwani?

  104. A Fuzzy Based Model for Software Quality Estimation Using Risk Parameter Assessment?

    Authors: Anjali Kinra?

  105. A Semantic Ontology based Concept for Measuring Security Compliance of Cloud Service Providers?

    Authors: Mustafa Nouman Murad Al-Hassan?

  106. A SECURE AND CONFIDENTIALITY STRATEGIC COMPUTING ORGANIZATION FOR MOBILE-HEALTHCARE EMERGENCY?

    Authors: Abarna Devi P, Praveena.V?

  107. Review on Design and Implementation of DSSS-CDMA Transmitter using HDL with Raised Cosine Filter to Minimize ISI?

    Authors: Md. Sohrab Ansari, Mathew Oommen, Velmurugan.S?

  108. A FRAMEWORK FOR HOSTING IMAGE COMPRESSION IN CLOUD?

    Authors: S. Girija Lakshmi, N.R. Gayathiri?

  109. Design of Power Efficient Low-Cost Embedded Control Systems for Domestic Induction Heating Appliances?

    Authors: S.Shanthi, S.Muthukrishnan, G.Mohanambal?

  110. Encryption of JPEG2000 Images using Watermarking?

    Authors: Renuga Devi.J, Priyadharshini.K, Umamaheswari.V

  111. IMPLEMENTING JOINT IDLE QUEUE ALGORITHM IN CLOUD ENVIRONMENT?

    Authors: S.P. Dhayalini, S. Saranya Devi?

  112. Secured Energy Optimization for Wireless Multimedia Sensor Networks using Fuzzy logic?

    Authors: Sindhu Duraisamy, R. Priya, Vinu Raja VijayaKumar?

  113. Analysis of Integer Transformation and Quantization Blocks using H.264 Standard and the Conventional DCT Techniques?

    Authors: Priyanka P James, Chirappanath B Albert, Inbanila.K?

  114. LOW POWER QVCO USING ADIABATIC LOGIC?

    Authors: Vergin Jeyaseeli.F, Udhaya Kumar.S?

  115. Identity Management System to Ensure Cloud Security?

    Authors: Miss. Priyanka S. Rathod, Prof. Mr. R.R. Keole?

  116. FUFM-High Utility Itemsets in Transactional Database

    Authors: S.Priya, E.Thenmozhi, Mrs. D.Shiny Irene?

  117. Importance of Virtual Reality in Current World?

    Authors: Shiny Mathew?

  118. A Study of Web Traffic Analysis

    Authors: Mr. Pratik V. Pande, Mr. N.M. Tarbani, Mr. Pavan V. Ingalkar?

  119. Energy Saving in Wireless Sensor Network using Attribute Based Dynamic Routing?

    Authors: G.Subha, M.Nava Bharathy?

  120. THE DOORWAY OF SECURE DATA SHARING SCHEME FOR CONFEDERACY CLOUDS

    Authors: K.ISRAIL, Y.SURESH?

  121. RELIABLE AND SECURE AUDITING IN CLOUD DATA STORAGE

    Authors: Mr.K.LOHESWARAN, Ms.S.JAYABHARATHI, Ms.V.K.DEEPIKA?

  122. Implementation of Multibiometric System Using Iris and Thumb Recognition

    Authors: Ashish Naghate, Mayur Sahu, Pranju Bhange, Swati Lonkar, Pallavi Wankhede, Yamini Bute?

  123. Software Quality Assessment in Object Based Architecture?

    Authors: N.Jayalakshmi, Nimmati Satheesh?

  124. SECURE AND EFFICIENT ROLLBACK RECOVERY IN GRID ENVIRONMENT?

    Authors: Ms. A. Wisy Shantha, Prof. S. Subashini?

  125. A SECURED PERVASIVE HEALTH SYSTEM FOR MOBILE HEALTHCARE EMERGENCY?

    Authors: Ms. SENBAGAVALLI.S, Mr. K.DAVID?

  126. Performance Analysis of Topology based Routing Protocols in VANET

    Authors: M. Chitra, S. Sivasathya, B. Muthamizh

  127. SECURED PASSWORD MANAGEMENT TECHNIQUE USING ONE-TIME PASSWORD PROTOCOL IN SMARTPHONE

    Authors: R.Selva Bhuvaneshwari, P.Anuja?

  128. Intelligent Monitoring of Patients in Hospitals Using CAN Protocols and ARM7TDMI Processor?

    Authors: Dr. C. Gurudas Nayak?, Siddu S Kadiwal?, Shobha Kadiwal?, Aruna Kumar Angadi?

  129. Cloud Security Tracking, Log Maintenance and Notification System for Net Banking Cloud Applications?

    Authors: Miss. Bhagyashree A. Dhamande, Mr. Amit Sahu?

  130. Design of Power Optimization using C2H Hardware Accelerator and NIOS II Processor?

    Authors: Mr. Sufiyan B. Mukadam, Prof. Abhijit S. Titarmare?

  131. Density-Based Spatial Clustering with Noise ? A Survey?

    Authors: Naveen Kumar, S.Sivasathya?

  132. Application for Intra-College Communication Based on Cloud Computing?

    Authors: Neethuanna Mathew, Namrata Salgar, Pretty Varghese, Mr. Yogesh Pawar?

  133. A NOVEL APPROACH TO ENHANCE OBJECT DETECTION USING INTEGRATED DETECTION ALGORITHMS?

    Authors: Swati Gossain, Jagbir Gill?

  134. Security against DDoS Attacks in MANETs?

    Authors: Kulbir Kaur Waraich, Ranjeet Kaur?

  135. ADVANCED DIGITAL SIGNAL PROCESSING TECHNIQUE TO REDUCE SYSTEM COMPLEXITY USING DHT ALGORITHM

    Authors: S.Madhan, Ms.V.Saranya?

  136. SATELLITE IMAGE PROCESSING ON A GRID BASED COMPUTING ENVIRONMENT?

    Authors: P.DEVABALAN?

  137. Digital Watermarking of Wavelet Transforms Based on Coding and Decoding Techniques?

    Authors: Mrs. Rashmi Soni, Prof. M.K.Gupta?

  138. TO ENHANCE THE LIFETIME OF WIRELESS SENSOR NETWORK USING A NOVEL APPROACH BASED ON CLUSTERING?

    Authors: Kriti Thakur, Ravikant Sahu?

  139. TO ENHANCE THE LIFETIME OF WIRELESS SENSOR NETWORK USING A NOVEL APPROACH BASED ON NEURAL NETWORK?

    Authors: Parminder Kaur, Ravikant Sahu?

  140. TO ENHANCE THE SECURITY IN DBMS USING INTEGRATED CRYPTOGRAPHIC ALGORITHMS?

    Authors: Davinderpal Kaur, Kewal Krishn?

  141. Watermarking of Dataset with Usability Constraints Model?

    Authors: R. Shankari, V. Sindhiya, D. Vidhya, Mrs.D.Shiny Irene, Mrs.M.Arshiya Mobeen

  142. 5G Technology-Evolution and Revolution?

    Authors: Meenal G. Kachhavay?, Ajay P.Thakare?

  143. Anonymously Share Data on Group Signature in the Large Groups of Cloud?

    Authors: Rengasamy.R, Guru Rani.G?

  144. IMPROVING THE WINDOWS PASSWORD POLICIES USING MOBILE BLUETOOTH AND RIJNDAEL ENCRYPTION?

    Authors: Pharaoh Chaka, Hilton Chikwiriro, Clive Nyasondo?

  145. A Review on Novel Approach for MRI Image Detection using Kochanek-Bartels Splines with Masking Algorithm?

    Authors: Sukhjit Kaur, Pooja Sharma?

  146. A Review on Novel Approach of Boundary Detection and Image Segmentation using Brightness Gradient and Cardinal Splines?

    Authors: Pooja Sharma, Sukhjit Kaur?

  147. A New Approach for Key Forwarding Scheme in WSN Using Mobile Sink?

    Authors: E.Revathi, C.Darwin, G.Vivitha?

  148. Defending against Flood Attacks in Disruption Tolerant Networks using Blowfish Algorithm

    Authors: S. Pushpa, B. Mani Megalai, A. Wisy Shantha?

  149. Approaches for Web Service Selection

    Authors: Vijayalaxmi S Jeure, Y.C.Kulkarni?

  150. Secure Platform for Wireless Sensor Network?

    Authors: Mohamed Otmani, Abdellah Ezzati?

  151. Mobile Database Review and Security Aspects?

    Authors: Bhagat.A.R, Prof. Bhagat.V.B

  152. MULTIHOMING AND MULTISTREAM PROTOCOL IN COMPUTER NETWORKS

    Authors: Syed Yasmeen Shahdad; Gulshan Amin; Pushpender Sarao?

  153. Client-Server Version of Energy Management through the Computational Outsourcing?

    Authors: Sridevi.K; George Christober.J?

  154. Multi-View Face Detection: A Comprehensive Survey

    Authors: Shivkaran Ravidas; M. A. Ansari; Jagdish Kukreja?