Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.3, No.3
Publisher: ZAIN Publications
Publishing Date: 2014-03-30
- IDENTIFICATION OF THE DEGREE OF PARTICIPATION BASED ON HMM?Authors: S.Chidambaranathan?
- The Role of Web Content Mining and Web Usage Mining in Improving Search Result Delivery?Authors: Ms. Shital C. Patil, Prof. R. R. Keole?
- Security Issues in SaaS Delivery Model of Cloud ComputingAuthors: Aized Amin Soofi, M. Irfan Khan, Ramzan Talib, Umer Sarwar?
- DATA MINING TECHNIQUES FOR PREDICTING SCHOOL FAILURES AND DROPOUTAuthors: Mrs.KALPANA.N, Dr.K.DAVID?
- Depth Video Compression Using Weighted Mode Filtering?Authors: Ms. MAANVIZHI.J, Mr. K.SIVAKUMAR?
- Data Services For E-Tailers Leveraging Web Search Engine Assets- A Review?Authors: Shaleena K.P, Thomas George?
- TRUSTED ATOMIC WEB SERVICE TRANSACTION IN CLOUDAuthors: K. LOHESWARAN, S.BAGYASHREE, K.KAVIYA?
- A Mechanism to Adjust the Updated Data and Recovery for School?Authors: Hussain Abdulkareem Younis, Hassen Mohssen Audafa, Dr. Hameed A. Younis
- MOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS?Authors: Prinslin.L, V.Janani?
- A NEW IP TRACEBACK SCHEME TO AVOID LAUNCH ATTACKS?Authors: E.JANSI?, BHARATHI.R?, E.PUSHPARAJ?
- A Survey on Quality of Service for Optimized Linked State Routing protocol in Mobile Ad hoc Network?Authors: Jalpesh D. Ghumaliya, Sandip Chauhan?
- A Secure Protocol for Spontaneous Wireless Ad Hoc Network Creation?Authors: L.Dhanam, M.S Vinu?
- OSN User Filtered Walls for Unwanted Messages Using Content Mining?Authors: Ms. Shruti C. Belsare, Prof. R.R. Keole?
- REVIEW: DETECTION OF TYPES OF ACUTE LEUKEMIA?Authors: SHRUTIKA MAHAJAN, SNEHAL S. GOLAIT, ASHWINI MESHRAM, NILIMA JICHLKAN
- QOS ORIENTED NODE SELECTION APPROACH IN AD-HOC ROUTING IN VANETAuthors: VIGNESHKANNA.B, M.MANIKANDAN?
- Critical Analysis of Cloud Computing Using OpenStack?Authors: Paramjot Singh, Vishal Pratap Singh, Gaurav Pachauri?
- Polarity Classification Using Twitter Data?Authors: Paramjot Singh?
- Defending Against Attack in Heterogeneous Networks?Authors: M. Mukesh Krishnan, R. Ravi?
- A HETEROGENEOUS WIRELESS NETWORK FOR 5G MOBILE?Authors: Renuka S. Durge, Vaishali B. Bhagat?
- MOBILE CLOUD COMPUTING AN EFFICIENT TECHNIQUE FOR MOBILE USERSAuthors: Shraddha A. Jalan, Vaishali B.Bhagat?
- Source Anonymous Message Authentication Based On ECC in Wireless Sensor Networks?Authors: B.Renugadevi, T.John Peter
- A NOVEL DESIGN OF REVERSIBLE FLOATING POINT ADDER ARCHITECTURE?Authors: N. Keerthika, Mr. M.Rajmohan?
- Analysis of Data Confidentiality Techniques in Cloud Computing?Authors: Ms. Mayuri R. Gawande, Mr. Arvind S. Kapse?
- Towards Smartphone Based Computing: A Case Study of Kashmir Valley?Authors: Junaid Latief Shah, Muneer Ahmad Dar?
- A Survey on Privacy Preservation in Data Publishing?Authors: V. Shyamala Susan, Dr. T. Christopher?
- Error Detection in Decoding of Euclidean Geometry Low Density Parity Check (EG-LDPC) CodesAuthors: K. ADINARAYANA, J. RAVI?
- A NEW APPROACH TO IMPROVE BUSINESS USING SEO TECHNIQUES?Authors: Sreeharsha Muram, VenkataRamana.K, Rajasekhar Kunisetty
- Security for Privileged Accounts Using Break-Glass TechniqueAuthors: Arun.S, Mohanasundarm.A, Bhoopathi Siva.K?
- Alleviating Internal Data Theft Attacks by Decoy Technology in Cloud?Authors: I.Sudha, A.Kannaki, S.Jeevidha?
- Dynamic Data Aggregation Prediction Based Clustering to Mobile Sink in Wireless Sensor Networks?Authors: M.Suganthi, Mrs. Susmita Mishra?
- Enhancing Search Engine Optimization using Web Content Mining?Authors: Mr. S.Balamurugan, Dr. S.Thirunirai Senthil?
- A Survey on Wavelet Domain Techniques for Image Super Resolution?Authors: Saranya P, Fatimakani K, Kanchanadevi P, Venkatesan S, Govindaraju S?
- Special Scheme of Hidden Data Procession for Several Applications in Wireless Sensor NetworksAuthors: Janarish Saju C, Sharon Nisha M
- A WIRELESS MESH NETWORKS WITH RELIABLE AND RESILIENT ROUTING BY CROSS-LAYER METRICS?Authors: M.Ranjith Priyanka, J.Mary Metilda?
- An Assess Android Antimalware that Detects Malicious Dynamic Code in AppsAuthors: Miss. Srushti Hatwar, Prof. Chetan Shelke?
- Field Oriented Control of Permanent Magnet Synchronous Motor?Authors: P.Ramesh, RachaPrathyusha?
- DESIGN AND IMPLEMENTATION OF BALLOT MALFUNCTIONING AVOIDANCE SYSTEM SECURITY OPTIMIZATION?Authors: Srikeerthi Godena, P. Kumara guru Diderot?
- DESIGN OF HIGH-ACCURACY FIXED-WIDTH MODIFIED BOOTH MULTIPLIERAuthors: Ms. Jeena Maria Cherian, B.Sireesha?
- Clustering with Efficient Web Usage Mining?Authors: MS. RASIKA KALBENDE, MR. AMIT SAHU?
- Secure Crypto System for Image Encryption and Data Embedding using Chaos and BB Equation Algorithm?Authors: S.Revathy?
- FPGA Implementation of Wu-Manber Algorithm for BLASTN DNA Sequence MatchingAuthors: Anitha Ranganathan?
- Logical Fault Detection Based on Conservative QCA for Ultra Low Power Devices?Authors: Yamuna S?
- Design of Power Gated ML Sensing Low Power CAM?Authors: Neelam Sharma S?
- A Survey on Text Based ClusteringAuthors: S.Chidambaranathan
- GENERATION OF SECURITY TEST TO FIND INJECTION ATTACKS BY CODE REVIEWAuthors: N. Parthiban, R. Ravi, Dr. Beulah Shekhar?
- An Android Based Medicine Reminder System Using External Storage?Authors: Prabhukannan.G, Liza M. Kunjachen, Dr. J. Jegadeesan?
- REAL-TIME COMPRESSION STRATEGY ON VARIOUS POINT CLOUD STREAMSAuthors: Miss. R.SARANYA, DR. S.THIRUNIRAI SENTHIL?
- Watermarking Scheme for Colour Images Using Hidden Markov Model?Authors: Mr. Kanchan Mahajan, Prof. Mahendrakumar Rai?
- SECURITY ANALYSIS OF DYNAMIC GROUPS IN CLOUD?Authors: Ms. Shrayu P. Pachgade, Prof .K.G. Bagde?
- Review of Image Processing Techniques for Automatic Detection of Tumor in Human LiverAuthors: Vinita Dixit, Jyotika Pruthi
- Comparative Analysis of Routing Protocols AODV DSDV and DSR in MANET?Authors: Yassine MALEH?, DR. Abdellah Ezzati?
- DATA SECURITY BASED ON LAN USING DISTRIBUTED FIREWALL?Authors: Jayshri V.Gaud, Mahip M.Bartere?
- INTRUSION DETECTION AND PREVENTION BY USING LIGHT WEIGHT VIRTUALIZATION IN WEB APPLICATIONS?Authors: J.Angeline Linora, M.Nava Barathy?
- Wireless Black Box Using MEMS Accelerometer and GPS Tracking for Accidental Monitoring of Vehicles?Authors: Pallakila Sai Avinash, K.ThenKumari?
- BRAIN TISSUE SEGMENTATION FROM MAGNETIC RESONANCE IMAGE USING PARTICLE SWARM OPTIMIZATION ALGORITHM?Authors: Abinaya.K.S, Pandiselvi.T?
- An Analysis on the Performance Evaluation of Routing Protocols in Wi-Fi/802.11b Network?Authors: Merin Skariah, Prof. Dr. Suriyakala C D?
- SECURITY ISSUES: THE BIG CHALLENGE IN MANET?Authors: Sneha U. Agalawe, Nitin R.Chopde?
- Selecting Best Features Using Combined Approach in POS Tagging for Sentiment Analysis?Authors: Nikita D. Patel, Chetana Chand?
- A SURVEY ON CONTENT RETRIEVAL SCHEMES FOR MEDICAL IMAGES?Authors: Meeshika Arora?
- DESIGN OF MULTIPLE CONSTANT MULTIPLICATION ALGORITHM FOR FIR FILTER?Authors: T. Sandhya Pridhini, Diana Aloshius, Aarthi Avanthiga, Rubesh Anand?
- Categorization of Data Mining Tools Based on Their Types?Authors: J.Mary Dallfin Bruxella, S.Sadhana, S.Geetha
- Enhanced Data Transmission for Cluster-Based Wireless Sensor Networks?Authors: Miss. Vaishali M.Sawale, Prof. Arvind.S.Kapse?
- QoS Enhanced Architecture for Cloud Computing Environment?Authors: ANBUMOZHI ANBUKKARASAN, LIZA M KUNJACHEN?
- Design of Router Micro Architecture Based on Runtime Adaptive Selection Strategies for On-Chip Communication Interconnection Network?Authors: Ms. Aryadevi S, Mr. T Shanmuganathan?
- FAULT TOLERANT DEFLECTING ROUTER WITH HIGH FAULT COVERAGE FOR ON-CHIP NETWORKAuthors: Mr. Vishnu K P, Mr. T Shanmuganathan?
- A Survey on Android’s Location Content Search Engine?Authors: Kanchan B. Budhakar, Amruta T. Kashid, Rutuja N. Pathare?, Sharmila Chopade
- Remote Administrative Trojan/Tool (RAT)Authors: Manjeri N. Kondalwar, Prof. C.J. Shelke?
- A SECURE AND TRUSTED ROUTING SCHEME FOR WIRELESS MESH NETWORKSAuthors: Pushpender Sarao, Prof.(Dr.) Sohan Garg?
- A MODEL FOR EVALUATING AND MAINTAINING LOAD BALANCING IN CLOUD COMPUTING?Authors: Pushpendra Verma, Dr. Jayant Shekhar, Amit Asthana?
- A High Speed and Area Efficient Wallace Tree Multiplier with Booth Recoded Technique?Authors: B. Venkata Sateesh, Shiju C Chacko?
- Agile Programming and Design Patterns on Web Applications Using J2EE and Ruby on Rails ?A Case Study?Authors: Vedavyas J, Kumarswamy Y?
- A Novel Design of Reversible Universal Shift RegisterAuthors: Rashid Anwar, Jobbin Abraham Ben?
- Android Based Meter Reading Using OCR?Authors: Rohit Dayama, Anil Chatla, Heena Shaikh, Medha Kulkarni?
- DooDB: A Graphical Password Database Consist of Doodles and Pseudo Signature Based User Authentication?Authors: Miss. Yugandhara A.Thakare, Prof.A.S.Kapse?
- Secure Key Exchange over Internet?Authors: Miss. Pooja P. Taral, Prof. Vijay B. Gadicha?
- AN EXPLORATORY STUDY OF DUPLICATE BUG REPORTS IN OSS PROJECTSAuthors: Swati Sen, Anita Ganpati, Aman Kumar Sharma?
- WIFI MIMO EMERGING TREND IN WIRELESS TECHNOLOGY?Authors: Sneha A. Jaswante, Mahip M.Bartere?
- A Comparative Study on Performance Evalution of Eager versus Lazy Learning Methods?Authors: Solomon Getahun Fentie, Abebe Demessie Alemu, Bhabani Shankar D. M.?
- Congestion Detection & Minimization in Wireless Sensor Network By Using Multipath Rate Organization Technique?Authors: Prof. Sachin Patel, Prof. Rakesh Pandit, Mr.Abhijeet Rathod
- Performance Analysis of two Anaphora Resolution System for Hindi LanguageAuthors: Priya Lakhmani, Smita Singh, Sudha Morwal?
- Secure Data Sharing in the Cloud by Maintaining Integrity using Logging MechanismAuthors: K.Velammal, Mrs.L.Sheela?
- Design of Power and Rate Adaptation with Scheduling In Wireless Networks Based On SIC?Authors: M.Vinodhini, R.Uthira Devi?
- New Touch Screen Application to Retrieve Speech Information?Authors: J.Rajeswari, E.Thanga Selvi?
- SMART BATTERY CHARGER FOR SOLAR-POWERED LINE FOLLOWER ROBOTIC VEHICLEAuthors: S.Anusuya, Mrs.M.Thiruveni?
- Estimation and Detection of Blood Pressure Using Smart Phones without Using Cuff?Authors: V.Sathya, R.Mohan Raj?
- Fingerprint Authentication System Using Minutiae Matching and Application?Authors: M.Sathiya Moorthy, R.Jayaraj, Dr. J. Jagadeesan
- A HYBRID APPROACH OF QUERY EXPANSION FOR VIETNAMESE QUERY?Authors: Tuan, Tran Anh?
- AN IMPROVED GGP BASED CLUSTER HEAD ROUTING FOR RECOVERING AND SENSING DATA AGGREGATION INTEGRITY IN WIRELESS SENSOR NETWORKS?Authors: K.Sujana Banu; S.Vignesh; K.Banazeer?
- Characteristic Evaluation of Distributed QoS RoutingAuthors: Shuchita Upadhyaya, Gaytri Devi?
- Infrastructure as a Service: Security Issues in Cloud Computing?Authors: P. R. Jaiswal, A. W. Rohankar?
- Design of Chatting Application Based on Android BluetoothAuthors: Nikita Mahajan, Garima Verma, Gayatri Erale, Sneha Bonde, Divya Arya?
- DESIGN OF FIFTH ORDER CONTINUOUS TIME-DELTA SIGMA ADC USING SIMSIDESAuthors: Bedva Tushar, Jai Sachith Paul, Latha R?
- Upgrade PIFS to Patterns Recognition?Authors: Firas Sabar Miften?
- Smartphone Based Controlling and Pit Detection System?Authors: R. Ranjith, K. ThenKumari, P. Pandiaraj?
- HIGH SPEED AND LOWER HARDWARE COMPLEXITY VLSI ARCHITECTURE FOR LIFTING BASED DISCRETE WAVELET TRANSFORM?Authors: K.Kokulavani, M.Mohankumar?
- IMPROVING THE LIFETIME OF THE WIRELESS SENSOR NODES USING PPSS PROTOCOL?Authors: Mahalakshmi R M, Wisy Shantha A, Xavier Mary A?
- A Second-Order Linear Ordinary Differential Equation (ODE)?Authors: Mohammed Mousa Mohsin?
- SUSTENTATION OF USER INFORMATION RETRIEVAL WITH PRIVATE GRID USING LOCATION BASED SERVICES?Authors: P.Adorin Rini, B.Dwarakanath?
- DESIGN AND IMPLEMENTATION OF HIGH EFFICIENCY REMOTE CONTROL SYSTEM FOR INTELLIGENT STREET LIGHTINGAuthors: Porchezhiyan, Aarthi Avanthiga, Diana Aloshius, Rubesh Anand?
- A NOVEL APPROACH TO ENHANCE THE MAINTAINABILITY OF OBJECT ORIENTED SOFTWARE ENGINEERING DURING COMPONENT BASED SOFTWARE ENGINEERINGAuthors: Hardeep Singh, Aseem Kumar?
- A NOVEL APPROACH TO ENHANCE THE PERFORMANCE OF VANET BY REDUCING DELAY IN COLLISION WARNING SYSTEMS?Authors: Kanu, Parveen Kumar?
- Analysis of Speech Signals?Authors: Komal Jindal?
- Insertion Sort with its Enhancement?Authors: Miss. Pooja K. Chhatwani?
- A Fuzzy Based Model for Software Quality Estimation Using Risk Parameter Assessment?Authors: Anjali Kinra?
- A Semantic Ontology based Concept for Measuring Security Compliance of Cloud Service Providers?Authors: Mustafa Nouman Murad Al-Hassan?
- A SECURE AND CONFIDENTIALITY STRATEGIC COMPUTING ORGANIZATION FOR MOBILE-HEALTHCARE EMERGENCY?Authors: Abarna Devi P, Praveena.V?
- Review on Design and Implementation of DSSS-CDMA Transmitter using HDL with Raised Cosine Filter to Minimize ISI?Authors: Md. Sohrab Ansari, Mathew Oommen, Velmurugan.S?
- A FRAMEWORK FOR HOSTING IMAGE COMPRESSION IN CLOUD?Authors: S. Girija Lakshmi, N.R. Gayathiri?
- Design of Power Efficient Low-Cost Embedded Control Systems for Domestic Induction Heating Appliances?Authors: S.Shanthi, S.Muthukrishnan, G.Mohanambal?
- Encryption of JPEG2000 Images using Watermarking?Authors: Renuga Devi.J, Priyadharshini.K, Umamaheswari.V
- IMPLEMENTING JOINT IDLE QUEUE ALGORITHM IN CLOUD ENVIRONMENT?Authors: S.P. Dhayalini, S. Saranya Devi?
- Secured Energy Optimization for Wireless Multimedia Sensor Networks using Fuzzy logic?Authors: Sindhu Duraisamy, R. Priya, Vinu Raja VijayaKumar?
- Analysis of Integer Transformation and Quantization Blocks using H.264 Standard and the Conventional DCT Techniques?Authors: Priyanka P James, Chirappanath B Albert, Inbanila.K?
- LOW POWER QVCO USING ADIABATIC LOGIC?Authors: Vergin Jeyaseeli.F, Udhaya Kumar.S?
- Identity Management System to Ensure Cloud Security?Authors: Miss. Priyanka S. Rathod, Prof. Mr. R.R. Keole?
- FUFM-High Utility Itemsets in Transactional DatabaseAuthors: S.Priya, E.Thenmozhi, Mrs. D.Shiny Irene?
- Importance of Virtual Reality in Current World?Authors: Shiny Mathew?
- A Study of Web Traffic AnalysisAuthors: Mr. Pratik V. Pande, Mr. N.M. Tarbani, Mr. Pavan V. Ingalkar?
- Energy Saving in Wireless Sensor Network using Attribute Based Dynamic Routing?Authors: G.Subha, M.Nava Bharathy?
- THE DOORWAY OF SECURE DATA SHARING SCHEME FOR CONFEDERACY CLOUDSAuthors: K.ISRAIL, Y.SURESH?
- RELIABLE AND SECURE AUDITING IN CLOUD DATA STORAGEAuthors: Mr.K.LOHESWARAN, Ms.S.JAYABHARATHI, Ms.V.K.DEEPIKA?
- Implementation of Multibiometric System Using Iris and Thumb RecognitionAuthors: Ashish Naghate, Mayur Sahu, Pranju Bhange, Swati Lonkar, Pallavi Wankhede, Yamini Bute?
- Software Quality Assessment in Object Based Architecture?Authors: N.Jayalakshmi, Nimmati Satheesh?
- SECURE AND EFFICIENT ROLLBACK RECOVERY IN GRID ENVIRONMENT?Authors: Ms. A. Wisy Shantha, Prof. S. Subashini?
- A SECURED PERVASIVE HEALTH SYSTEM FOR MOBILE HEALTHCARE EMERGENCY?Authors: Ms. SENBAGAVALLI.S, Mr. K.DAVID?
- Performance Analysis of Topology based Routing Protocols in VANETAuthors: M. Chitra, S. Sivasathya, B. Muthamizh
- SECURED PASSWORD MANAGEMENT TECHNIQUE USING ONE-TIME PASSWORD PROTOCOL IN SMARTPHONEAuthors: R.Selva Bhuvaneshwari, P.Anuja?
- Intelligent Monitoring of Patients in Hospitals Using CAN Protocols and ARM7TDMI Processor?Authors: Dr. C. Gurudas Nayak?, Siddu S Kadiwal?, Shobha Kadiwal?, Aruna Kumar Angadi?
- Cloud Security Tracking, Log Maintenance and Notification System for Net Banking Cloud Applications?Authors: Miss. Bhagyashree A. Dhamande, Mr. Amit Sahu?
- Design of Power Optimization using C2H Hardware Accelerator and NIOS II Processor?Authors: Mr. Sufiyan B. Mukadam, Prof. Abhijit S. Titarmare?
- Density-Based Spatial Clustering with Noise ? A Survey?Authors: Naveen Kumar, S.Sivasathya?
- Application for Intra-College Communication Based on Cloud Computing?Authors: Neethuanna Mathew, Namrata Salgar, Pretty Varghese, Mr. Yogesh Pawar?
- A NOVEL APPROACH TO ENHANCE OBJECT DETECTION USING INTEGRATED DETECTION ALGORITHMS?Authors: Swati Gossain, Jagbir Gill?
- Security against DDoS Attacks in MANETs?Authors: Kulbir Kaur Waraich, Ranjeet Kaur?
- ADVANCED DIGITAL SIGNAL PROCESSING TECHNIQUE TO REDUCE SYSTEM COMPLEXITY USING DHT ALGORITHMAuthors: S.Madhan, Ms.V.Saranya?
- SATELLITE IMAGE PROCESSING ON A GRID BASED COMPUTING ENVIRONMENT?Authors: P.DEVABALAN?
- Digital Watermarking of Wavelet Transforms Based on Coding and Decoding Techniques?Authors: Mrs. Rashmi Soni, Prof. M.K.Gupta?
- TO ENHANCE THE LIFETIME OF WIRELESS SENSOR NETWORK USING A NOVEL APPROACH BASED ON CLUSTERING?Authors: Kriti Thakur, Ravikant Sahu?
- TO ENHANCE THE LIFETIME OF WIRELESS SENSOR NETWORK USING A NOVEL APPROACH BASED ON NEURAL NETWORK?Authors: Parminder Kaur, Ravikant Sahu?
- TO ENHANCE THE SECURITY IN DBMS USING INTEGRATED CRYPTOGRAPHIC ALGORITHMS?Authors: Davinderpal Kaur, Kewal Krishn?
- Watermarking of Dataset with Usability Constraints Model?Authors: R. Shankari, V. Sindhiya, D. Vidhya, Mrs.D.Shiny Irene, Mrs.M.Arshiya Mobeen
- 5G Technology-Evolution and Revolution?Authors: Meenal G. Kachhavay?, Ajay P.Thakare?
- Anonymously Share Data on Group Signature in the Large Groups of Cloud?Authors: Rengasamy.R, Guru Rani.G?
- IMPROVING THE WINDOWS PASSWORD POLICIES USING MOBILE BLUETOOTH AND RIJNDAEL ENCRYPTION?Authors: Pharaoh Chaka, Hilton Chikwiriro, Clive Nyasondo?
- A Review on Novel Approach for MRI Image Detection using Kochanek-Bartels Splines with Masking Algorithm?Authors: Sukhjit Kaur, Pooja Sharma?
- A Review on Novel Approach of Boundary Detection and Image Segmentation using Brightness Gradient and Cardinal Splines?Authors: Pooja Sharma, Sukhjit Kaur?
- A New Approach for Key Forwarding Scheme in WSN Using Mobile Sink?Authors: E.Revathi, C.Darwin, G.Vivitha?
- Defending against Flood Attacks in Disruption Tolerant Networks using Blowfish AlgorithmAuthors: S. Pushpa, B. Mani Megalai, A. Wisy Shantha?
- Approaches for Web Service SelectionAuthors: Vijayalaxmi S Jeure, Y.C.Kulkarni?
- Secure Platform for Wireless Sensor Network?Authors: Mohamed Otmani, Abdellah Ezzati?
- Mobile Database Review and Security Aspects?Authors: Bhagat.A.R, Prof. Bhagat.V.B
- MULTIHOMING AND MULTISTREAM PROTOCOL IN COMPUTER NETWORKSAuthors: Syed Yasmeen Shahdad; Gulshan Amin; Pushpender Sarao?
- Client-Server Version of Energy Management through the Computational Outsourcing?Authors: Sridevi.K; George Christober.J?
- Multi-View Face Detection: A Comprehensive SurveyAuthors: Shivkaran Ravidas; M. A. Ansari; Jagdish Kukreja?