ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.3, No.4

Publisher: IJCSMC Publishing Team

Publishing Date: 2014-04-30

  1. Survey of the Green within Computing?

    Authors: Vishnu Kumar M, Ganapathy Sundaram V, Beulah Joice R

  2. An Advanced Security - A Two-Way Password Technique for Cloud Services?

    Authors: Yogesh Brar, Shobhit Krishan, Ankur Mehta, Vipul Talwar, Tanupriya Choudhury, Vasudha Vashisht?

  3. A COMPARATIVE STUDY OF VARIOUS IMAGE COMPRESSION TECHNIQUES?

    Authors: David.S?, Manikandan.R?

  4. Vehicle to Vehicle Communication using RFID along with GPS and WAP?

    Authors: A.Vanitha Katherine, R.Muthumeenakshi, N.Vallilekha?

  5. ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY?

    Authors: Ashish M. Jaiswal, Mahip Bartere

  6. Comparative Analysis of Various Underwater Image Enhancement Technique

    Authors: Shiwam S. Thakare, Amit Sahu?

  7. Using OLAP with Diseases Registry Warehouse for Clinical Decision Support?

    Authors: A. K. Hamoud, Dr. Taleb A.S. Obaid

  8. Performance Analysis of Classification Algorithms?

    Authors: Payal Pahwa, Manju Papreja, Renu Miglani?

  9. SECRET SPLITTING SCHEME: A REVIEW?

    Authors: Nikita Dhule, Mr. Amit Sahu?

  10. Multiclass Classification: A Review?

    Authors: Ruchida Sonar, Dr. P.R. Deshmukh?

  11. To Enhance Reliability of Dynamic Clustering Using Self Learning Technique: A Review

    Authors: Shivani Garg?

  12. Data Mart Designing and Integration Approaches?

    Authors: Rashmi Chhabra, Payal Pahwa?

  13. Intelligent System for Brain Diseases Diagnosis Using Neural Network and Bayesian Methods?

    Authors: Amir Y Mahdi, Shaker k Ali, Rabia R Mkamis?

  14. Review on Text Clustering Based on Frequent Itemset?

    Authors: Prajakta Jaswante, Dr. P.R. Deshmukh?

  15. Review on “Data Mining with Big Data”

    Authors: Vitthal Yenkar, Prof. Mahip Bartere

  16. Review on “Adaption of Ranking Model for Domain Specific Search”?

    Authors: Mr. Pratik R.Mantri, Prof. Mahip M.Bartere?

  17. Review on “An analysis of the Management Security and Security Algorithms in Cloud Computing”

    Authors: Nilesh N.Chawande, Prof. Jayant P.Mehare?

  18. Automatic Segmentation of Digital Images Applied in Cardiac Medical Images?

    Authors: Mukesh G. Mahore, Vrushali V. Dhanrale, Harshad R. Borde, Pooja G.Lahoti, Suraj B. Borge

  19. Mobile HealthCare Technology Based on Wireless Sensor?

    Authors: Pimpre.D.M, Bhagat.V.B?

  20. QADR with Energy Consumption for DIA in Cloud?

    Authors: Ms. S.Soundharya, Mr. R.Santhosh?

  21. Local Octal Pattern: A Proficient Feature Extraction for Face Recognition

    Authors: Nithya J, Suchitra S, Dr. S Chitrakala?

  22. The Impact of Social Network on Human Being

    Authors: G. M. M. Bashir, M. Fahad Farhan, Syed Md. Galib, Mohammad Jamal Hossain?

  23. SMART PHONE BASED SOCIAL NETWORKING FOR TEACHING & LEARNING?

    Authors: G. M. M. Bashir, Md. Atikqur Rahaman, Syed Md. Galib, M.M. Rahaman?

  24. HAPTIC SCIENCE AND TECHNOLOGY IN SURGICAL SIMULATION, MEDICAL TRAINING AND MILITARY APPLICATION?

    Authors: Miss. Snehal N. Meshram?, Prof. Amit M. Sahu?

  25. Forensic Imaging for Online Social Networks?

    Authors: Mr. Shrikant Kale, Prof. Amit Sahu?

  26. Network Assisted Mobile Computing with Efficient Cache Maintenance?

    Authors: K Komarasamy, Dr. L M Nithya

  27. Performance Analysis of Sequential Element for Low Power Clocking System?

    Authors: Umayal.S?

  28. Using Genetic Algorithm for Whole Test suite Generation of Object Oriented Programs?

    Authors: Mrs.R.Gowri, R.DhanBhagya Preety, B.Durga Devi, G.Aruna?

  29. Survey on Secure Updates using Over the Air Programming in Wireless Sensor Network

    Authors: Naresh M. Bhagat, S. P. Akarte?

  30. A Comprehensive Study of Jelly Fish Attack in Mobile Ad hoc Networks

    Authors: Manjot Kaur; Malti Rani; Anand Nayyar

  31. A Comprehensive Review of Distance and Density Based Cluster Head Selection Schemes

    Authors: Naveen Sharma; Malti Rani; Anand Nayyar?

  32. Design of Coarse Grain Architecture for DSP Application?

    Authors: Kushal R. Kalmegh?; Prof. Vaishali Tehre?

  33. Critical Success Factors for Agile Methodology Adaptation in Software Development Organizations?

    Authors: Vishvadeep Tripathi; Dr. Arvind Kumar Goyal?

  34. REVIEW ON STEGANOGRAPHY FOR HIDING DATA?

    Authors: Sagar S.Pawar; Prof. Vinit Kakde?

  35. DYNAMIC NUMBER PLATE RECOGNISATION USING GENETIC ALGORITHMS

    Authors: M.Sudha; E.Saranya; R.Karthika; R.Santhosh?

  36. Alienation of Melanocytes in Cancer Pretentious Cells using Level Set Segmentation Algorithm

    Authors: Narmadha.R; Ahalya Mary.J?

  37. OPTIMIZED KERNEL IMPLEMENTATION OF MANSOS?

    Authors: M.Prabhu; V.Rajaram

  38. A Review on Various Techniques for Image Debluring?

    Authors: Shital Hemant Umale; Prof. Amit M. Sahu

  39. Monitoring and Self-Transmitting Data Using Zone Routing Protocol in Ad-hoc Network towards Effective Mobility Management?

    Authors: S.Jayamoorthy; I.Varalakshmi; S.Kumarakrishnan?

  40. SAAS ? A Gateway to Cost Effective Secure Vehicular Clouds?

    Authors: M.R.Yasmeen?; M.Ramya Devi?

  41. Dynamic Bandwidth Allocation Scheme for Efficient Handover in IEEE 802.16e Networks

    Authors: M. Deva Priya; M.L. Valarmathi; R.K. Shanmugapriya; D. Prithviraj?

  42. Change Monitoring of Burphu Glacier from 1963 to 2011 using Remote Sensing?

    Authors: Rahul Singh; Dr. Renu Dhir?

  43. Designing a Web Based Module for SAR to Ensure Data Security Using JAVA

    Authors: Bhumi Aravind Kalaria; Dr. C Gurudas Nayak; Dr. N.K. Shrivastava?

  44. SEMANTIC WEBSERVICE DISCOVERY FOR WEBSERVICE COMPOSITION?

    Authors: M.Gopianand; S.Jayakumar?

  45. ISSUES IN KNOWLEDGE DISCOVERY FROM MEDICAL DATABASES?

    Authors: K.Kathirvel?

  46. PROTECTING PROXY BASED NETWORK FROM DDoS ATTACKERS WITH IP SPOOFING DETECTION?

    Authors: Yedu Krishnan.R; A.Anbumani??

  47. A CONVENTIONAL STUDY OF EDGE DETECTION TECHNIQUE IN DIGITAL IMAGE PROCESSING?

    Authors: Indrajeet Kumar; Jyoti Rawat; Dr. H.S. Bhadauria?

  48. Layered Mapping of Cloud Architecture with Grid Architecture?

    Authors: Pardeep Seelwal?

  49. On New Approach in Using 433MHz Radio Modules?

    Authors: Prithviraj Shetti; Prasad V. Sakharpe; Amrut Ubare?

  50. A SURVEY ON IMPROVING PERFORMANCE OF APRIORI ALGORITHM

    Authors: Er.Rajvir Kaur; Er.Nishi Madaan?

  51. Firewall and Its Policies Management?

    Authors: Er. Smriti Salaria; Er. Nishi Madaan?

  52. An Innovative Smart Soft Computing Methodology towards Disease (Cancer, Heart Disease, Arthritis) Detection in an Earlier Stage and in a Smarter Way?

    Authors: Mr. Tanupriya Choudhury; Prof. (Dr.) Vivek Kumar; Dr. Darshika Nigam; Vasudha Vashisht?

  53. COMPARISON OF DIFFERENT DATASETS USING VARIOUS CLASSIFICATION TECHNIQUES WITH WEKA?

    Authors: Deepali Kharche; K. Rajeswari; Deepa Abin?

  54. EXTRACT ASSOCIATION RULES TO MINIMIZE THE EFFECTS OF DENGUE BY USING A TEXT MINING TECHNIQUE?

    Authors: Atif Amin; Ramzan Talib; Salman Raza?; Saima Javed?

  55. Satellite Image Fusion Using Maximization of Non-Gaussianity?

    Authors: A. M. El Ejaily; F. Eltohamy; M. S. Hamid; G. Ismail?

  56. Design of Mobile Event Management and Broadcast System Using Rational Unified Process?

    Authors: Sonali Addetla; Mohini Gorde; Supriya Ghadge; Suvarna Kusal; Anupkumar M Bongale

  57. GRAPHICAL PASSWORD FOR EMAIL APPLICATION BY PERSUASIVE CLICK POINTS USING CENTERED DISCRETIZATION?

    Authors: Mr. Aniket G. Jadhav; Ms. Rajashri D. Dipak; Ms. Lavina P. Dadlani; Mr. Mangesh K. Manke?

  58. WIRELESS CHARGING OF MOBILE PHONE USING MICROWAVE?

    Authors: Priya A. Rewaskar; Prof. Dinesh Datar?

  59. Enhancing Security in Mobile Communication using a Unique Approach in Steganography?

    Authors: Prof. Sharmishta Desai; Sanaa Amreliwala; Vineet Kumar?

  60. Performance Improvement of Routing Protocol Using Two Different Mobility Models In Vehicular Adhoc Vehicular Network?

    Authors: Mr.Vaibhav D. Patil; Prof. Atul R. Deshmukh?

  61. A Review on the Role of Big Data in Business?

    Authors: Jafar Raza Alam; Asma Sajid; Ramzan Talib; Muneeb Niaz?

  62. Detection of Automobile Drivers Stress from Physiological Signals?

    Authors: Dayalin Subi J; Anuja H S

  63. Application Layer’s Approaches for TCP Incast Problem at Data Center Networks?

    Authors: Irfan Riaz Shohab; Muhammad Younas; Ramzan Talib; Umer Sarwar?

  64. Light Fidelity (LI-FI)-A Comprehensive Study?

    Authors: Ekta; Ranjeet Kaur?

  65. Oculus Wearable Technology -Vision for Blind?

    Authors: Anand Singh; Shalini Mishra; Prof. T. Venkat Narayana Rao?

  66. Encryption and Decryption of Data Using QR Authentication System

    Authors: Atul Hole; Mangesh Jadhav; Shivkant Kad; Swanand Shinde?; Prof. Pramod Patil?

  67. IDS: Survey on Intrusion Detection System in Cloud Computing?

    Authors: Mr. Ashish Kumbhare; Mr. Manoj Chaudhari?

  68. Improvement of Expectation Maximization Clustering using Select Attribute

    Authors: Rupali Bhondave; Madhura Kalbhor; Supriya Shinde; K. Rajeswari?

  69. A Survey on Security in Cloud Computing

    Authors: Varsha Yadav; Preeti Aggarwaal?

  70. Secure Sharing of Medical Records Using Cryptographic Methods in Cloud

    Authors: M.P. Radhini; P.Ananthaprabha; P.Parthasarathi?

  71. A Distributed Computer Machine Vision System for Automated Inspection and Grading of Fruits?

    Authors: Yogitha.S; Sakthivel.P?

  72. A Multi-Level Security Framework for Cloud Computing?

    Authors: Mr. Anup Date; Mr. Dinesh Datar?

  73. Predicting the Effect of Diabetes on Kidney using Classification in Tanagra?

    Authors: Divya Jain; Sumanlata Gautam

  74. Design of Moderate Speed and Moderate Resolution Successive Approximation Analog to Digital Converter?

    Authors: Mr. Jitendra Waghmare?; Prof. P.M. Ghutke?

  75. An Aggregate Key Based Cryptosystem for Secure Data Sharing in Cloud Computing?

    Authors: R. Vanitha; V. Elavarasi?

  76. Challenges and Security Issues in Cloud Computing?

    Authors: Joshna S; Manjula P?

  77. Multimodality Sensor System for Sleep- Quality Monitoring?

    Authors: Ms. Snehal R. Sawale; Vijay S. Gulhane

  78. Data Mining Technique its Needs and Using Applications?

    Authors: Anup Arvind Lahoti?; P. L. Ramteke?

  79. Advanced Hands Free Computing?

    Authors: S. T. Patil; Snehal M. Chavan; Nileshwari R. Chaudhari; Pranali J. Patil?

  80. Mosix the Operating System that Support Multiple Cluster Environment with its Advancements & Features?

    Authors: Rahul Rajkumar Pahlajani; G. R. Bamnote?

  81. MONITORING OF RAILWAY BOGIES AND PREVENTING ACCIDENTS USING ARM7TDMI AND CAN PROTOCOLS

    Authors: Siddu S Kadiwal?; C. Gurudas Nayak?; Shobha Kadiwal?; Gururaj Kadiwal?

  82. An Advanced Watermarking and Compression of Images using SPIHT Compression

    Authors: Shihas Abdul Razak J; Rekha Bhandarkar

  83. A Review: Grid Computing

    Authors: Ankit Punia; Ms. Pooja Mittal

  84. The Multitenant Cloud Architecture?

    Authors: JUEE DARYAPURKAR; KARUNA BAGDE

  85. ISONET: HARDWARE BASED JOB QUEUE MANAGEMENT FOR MANY CORE ARCHITECTURES

    Authors: Jeyanthi.S; M. Deivakani?

  86. Human Computer Interaction: Analysis and Journey through Eras?

    Authors: Pratibha T Jose; Surbhi Miglani; Sanjay Yadav?

  87. Survey on Network Based Intrusion Detection System in MANET?

    Authors: Nithya Karthika M; Raj Kumar?

  88. Social Authentication and Untrusted Clouds for Secure Location Sharing?

    Authors: Miss. Priyanka K. Shinde; Nitin R. Chopde

  89. Mobile Computing with WirelessLAN and its Modes Ad hoc Network with Challenges?

    Authors: Pallavi D. Dudhe; P. L. Ramteke?

  90. Different Genetic Operator Based Analysis and Exploration of TSP?

    Authors: Ashima Malik?

  91. To Avoid Unwanted Messages from User Wall: Content Based Filtering Approach

    Authors: Miss. Dipali D. Vidhate; Ajay P. Thakare?

  92. CLUSTER ENHANCED SECURE AUTHENTICATION SCHEME FOR DATA INTEGRITY IN MANET?

    Authors: A. Praveena; L.M. Nithya?

  93. SECURE DATA TRANSMISSION IN MANETS USING DSR, AODV, TRUST PROTOCOLS?

    Authors: K.Sangeetha; K.Rajakumari?

  94. Hybrid Approach for Optimizing the Search Engine Result?

    Authors: Ashish Kumar Kushwaha; Nitin Chopde?

  95. AN IMAGE FORENSICS ANALYSIS OF DECISION FUSION APPROACHES

    Authors: D.GOKILA BHARATHI; G.SELVAVINAYAGAM?

  96. Enhancement the Security of WSN using ALARM Protocol to Prevention from Reply Attack?

    Authors: Neelam Shekhawat; Moumita Ghosh

  97. Review on “Image Segmentation Methods”?

    Authors: Rita Harle; M. R. Joshi?

  98. ASSOCIATION RULE MINING IN DISTRIBUTED DATABASE SYSTEM?

    Authors: E.Deenadayalan; D.Kerana Hanirex; K.P.Kaliyamurthie?

  99. A Comprehensive Study on Cloud Computing?

    Authors: Suruchee V.Nandgaonkar; A. B. Raut?

  100. Optimization of Rule - Based Medication Delivery in Large scale Healthcare Framework

    Authors: G.Manikandan; S.Prabakaran?

  101. A GRAPHICAL PASSWORD BASED AUTHENTICATION BASED SYSTEM FOR MOBILE DEVICES?

    Authors: Er.Aman Kumar; Er.Naveen Bilandi?

  102. An Enhancement in Centroid Algorithm in Range-free Grid Based Environment for Wireless Sensor Networks?

    Authors: Gurleen Singh; Malti Rani?

  103. RFID Library Implementation

    Authors: Akansha Verma; Niharika Garg?

  104. MOVIE RECOMMENDATION SYSTEM BASED ON USERS’ SIMILARITY?

    Authors: Gaurav Arora; Ashish Kumar; Gitanjali Sanjay Devre; Amit Ghumare?

  105. A Comparative Analysis of OLSR, DSR and ZRP Routing Protocols in MANETs

    Authors: Er. Samiti Gupta; Er. Naveen Bilandi?

  106. A Revived Survey of Various Credit Card Fraud Detection Techniques?

    Authors: Neha Sethi; Anju Gera?

  107. Energy Efficient Data Gathering in Wireless Sensor Network?

    Authors: Bhavna G. Pise; Nikita Chavhan?

  108. Data Security using Hadoop on Cloud Computing

    Authors: Miss. Pooja.D.Bardiya; Miss. Rutuja.A.Gulhane; P.P.Karde?

  109. Efficient Data Storage and Searching for Location Based Services using Quadtrees and H-ordering?

    Authors: Capt. S. Santhosh Baboo; V.Narmadha

  110. Mail_Alert: Online Suspicious URL Detection of Tweets from Twitter Public Timeline

    Authors: SPOORTHI K; SARVAMANGALA D R?

  111. A Preliminary Review on Web Usage Mining: A Web Mining Technique?

    Authors: Snehal R. Kawalkar; Pravin P. Karde?

  112. Retrieving Information by Using Personalized Mobile Search Engine (PMSE)?

    Authors: D. D. SHIPNE; B. S. AHIRWADKAR?

  113. A NOVEL METHOD FOR SECURE ROUTING WITH EFFICIENT ENERGY RESOURCES IN WIRELESS NETWORK?

    Authors: Ms. G.Subbulakshmi @ Nithya; J.Priskilla Angel Rani?

  114. ANALYSIS OF FIREWALL TECHNOLOGY IN COMPUTER NETWORK SECURITY

    Authors: Miss. Shwetambari G. Pundkar; G. R. Bamnote?

  115. PEER-TO-PEER AD HOC NETWORK: AN OVERVIEW?

    Authors: Miss. Kalyani U. Sapre; G. R. Bamnote

  116. BIRCH and DB-scan Techniques in Phishing and Malware Detection?

    Authors: Shabin Blesson; R.Ravi; Beulah Shekar?

  117. Correlation Based Feature Selection with Irrelevant Feature Removal?

    Authors: P.Velavan; S.Subashini?

  118. IMAGE RECOGNITION BASED CROP DISEASE IDENTIFICATION SYSTEM: A SURVEY

    Authors: Nitin S. Tijare; Sagar S. Badnerkar?

  119. MULTI TARGET TRACKING USING IDOL IN SENSOR NETWORKS?

    Authors: M.Navanidha; V.Nirosha?

  120. Data Mining Techniques?

    Authors: Sayyed Muzammil Ali; Ms. R.R Tuteja?

  121. DETECTION AND RECOGNITION OF HUMAN FACE USING ANN TRAINED BY GENETICAL ALGORITHM?

    Authors: Vaibhav N. Dhage; P. L. Ramteke?

  122. ZigBee Wireless Sensor Network Technology?

    Authors: Miss. Pooja V. Ingalkar; A. B. Deshmukh?

  123. Enhancing Probabilistic Packet Marking by Integrating Dynamic Probability and Time to Live (TTL) Clustering?

    Authors: Souzan Asadollahi?

  124. DIAGNOSING SENSOR NODES AND DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS?

    Authors: R. Dhivya Subathra; M. Suguna; D. Sharmila?

  125. Design Augmented Embedded System for 2D-3D Visualization in Cardiac Surgery?

    Authors: Lokesh Zambare; S.V.Bhalerao?

  126. Analysis of Test Case Prioritization Techniques?

    Authors: Manisha Sahni; Isha Sharma; Jasleen Kaur?

  127. Quality-Based Image Communication for Wireless Sensor Networking?

    Authors: Ms. Sneha V.Kalbande; N.M.Tarbani?

  128. A Review on Virtual Machine Scheduling in Cloud Computing?

    Authors: Archana Pawar; Deepak Kapgate?

  129. Security Issues in MANET Routing Protocols and Their Solutions?

    Authors: Mahesh Kumar Kumawat; Jitendra Singh Yadav?

  130. V-ISA use in Transmeta Crusoe Processor?

    Authors: Dipali M. Dhaskat; P. P. Karde?

  131. A Modified Method for Multiple Description Coding using Quincunx Subsampling?

    Authors: S. Radhakrishnan; M. Mohamed Sathik?

  132. Development and Evaluation Mobile Multimedia Cloud Application?

    Authors: S.P.Warhekar; V.T.Gaikwad; H.N.Datir?

  133. EUCLIDEAN GEMETRY LDPC CODES FOR ERROR CORRECTION AND ERROR DETECTION IN MEMORY APPLICATION?

    Authors: P.Kannan; Ms. S.Karthiga?

  134. Design of ANFIS System for Efficient Throttle and Brake Control of Vehicles?

    Authors: Roby Siddharth Jangam; Manjurkha M. Pathan?

  135. Performance Analysis of Dual Tail Comparator for Low Power Applications?

    Authors: P. Raja Sekara Pandian; M. Krishnamurthy?

  136. A Survey on Advanced Page Ranking in Query Recommendation?

    Authors: Rinki Khanna; Asha Mishra?

  137. An Approach for Finding Frequent Item Set Done By Comparison Based Technique

    Authors: Ms. Ankita Parmar; Kamal Sutaria; Krutarth Joshi?

  138. AN APPROACH TO SECURE LOCATION OF USER IN PERVASIVE COMPUTING ENVIRONMENT?

    Authors: SUDHEER KUMAR SINGH; SHANSHANK SINGH; NITIN GOEL; RAHUL RANJAN

  139. Efficient Allocation of Resources in Cloud Server Using Lopsidedness?

    Authors: B. Selvi; C. Vinola; R. Ravi?

  140. Secure and Energy Efficient CDAMA Scheme in Wireless Sensor Network Using DAS Model?

    Authors: Nidhi Mouje; Nikita Chavhan

  141. Finding Correlated CCC-Biclusters from Gene Expression Data?

    Authors: Geethamani.S; Vijayalakshmi.S?

  142. A NOVEL STEGANOGRAPHIC APPROACH FOR IMAGE ENHANCEMENT USING LEAST SIGNIFICANT BIT

    Authors: Deepti Sharma; Anshu Sharma?

  143. Investigation of New Approach to the Design and Development for Clumping Algorithm in MANET?

    Authors: Sanjay Kumar; Sudhir Kumar Rathi?

  144. A Dynamic Approach to Extract Texts and Captions from Videos?

    Authors: R.Bhavadharani; P.M. Sowmya; A.Thilagavathy?

  145. AN EFFICIENT APPROACH TO AN IMAGE RETRIEVAL USING PARTICLE SWARM OPTIMIZATION

    Authors: G. Saranya; K. Anitha; A. Chilambuchelvan?

  146. DEFENDING STEALTHY MODE ATTACKS BY LIVE DETECTION AND ADOPTABLE LEARNING TECHNIQUE?

    Authors: G.Suganya; K.E Narayana

  147. Securing Data Stored in Clouds Using Privacy Preserving Authenticated Access Control?

    Authors: S Divya Bharathy; T Ramesh?

  148. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting

    Authors: KS.Karthik Kumar; R.Bhavani?

  149. Secure Mining of Association Rules in Horizontally Distributed Databases

    Authors: Chitteni Siva; Selvi?

  150. THE EFFECT OF VAMPIRE ATTACKS ON DISTANCE VECTOR ROUTING PROTOCOLS FOR WIRELESS AD HOC SENSOR NETWORKS

    Authors: Jagadeesh; Joseph William

  151. Interaction System with Smart Phones By Speech to Text and Accelerometer?

    Authors: Monali P. Admane?; Ratnaprabha Jasutkar

  152. Ancillary Multi Trust Virtual Dissemination for Capability Fortifying Systems?

    Authors: S. Sundar Raj; Ashish Chaturvedi?

  153. SURVEY ON TRIPLE SYSTEM SECURITY IN CLOUD COMPUTING?

    Authors: Parul Mukhi; Bhawna Chauhan

  154. A Review Paper on Effort Estimation and Model Based Regression Testing with SOA

    Authors: Yogesh Bhardwaj; Manju Kaushik?

  155. Efficient Semantic Information Retrieval System from Relational Database

    Authors: Rajeshkumar T; Ramathilagam C?

  156. A Survey on Spam Filtering for Online Social Networks

    Authors: Bhavish Santhosh Kumar M; G.Venkat Rami Reddy?

  157. A Process Scheduling Algorithm Based on Threshold for the Cloud Computing Environment?

    Authors: Kiran Kumar Shakya; D. Singh Karaulia?

  158. Eye Localization under Different Lighting Ambiance using ANFIS?

    Authors: Sarmila K. B.; Saranya R.?

  159. A Review of XML Parallel Parsing Techniques

    Authors: Ravi Varma; G. Venkata Rami Reddy?

  160. Opportunities and Challenges of Big Data in Economics Research and Enterprises

    Authors: Tushar M. Chavan; S. P. Akarte?

  161. Forbidden Twin Substantiate Consuming Hash Generation and SVM?

    Authors: Deepa R?; Noor Alleema N?

  162. SECURITY ISSUES IN WIRELESS BODY AREA NETWORK?

    Authors: Shikha Pathania; Naveen Bilandi?

  163. A NOVAL HINDI LANGUAGE INTERFACE FOR DATABASES?

    Authors: Mahesh Chauhan; Nikita Bhati?

  164. Comparison of Asymmetric Algorithms in Cryptography

    Authors: Neha Garg; Partibha Yadav?

  165. A Secure Routing Protocol under Eavesdropping using SPENA Scheme?

    Authors: Mohini Singhal; Kaushik Ghosh?

  166. Transfiguring of an Android App Using Reverse Engineering?

    Authors: Taranjeet Kaur Chawla; Aditi Kajala?

  167. An Effective Load Balancing Grouping Based Job & Resource Scheduling Algorithms for Fine Grained Jobs in Distributed Environment?

    Authors: Miss. Hemangi Joshi; Viraj Daxini?

  168. ENSURING THE NODE AUTOCONFIGURATION AND NODE PREVENTION FROM INTRUDERS USING SFAP

    Authors: Udaya.R?; Jenifer.P?

  169. Data Store and Multi-Keyword Search on Encrypted Cloud Data?

    Authors: Miss. Devika M. Shelke; Miss. Roshani S. Bhojane; Miss. Tina B. Madane; Pratik N. Gawande; D.J. Manowar; S.S. Dubey?

  170. EXTENDED STATE KALMAN FILTERING BASED FETAL ECG, MATERNAL ECG EXTRACTION & ESTIMATE THE MATERNAL BLOOD PRESSURE USING SINGLE CHANNEL RECORDINGS?

    Authors: Remi D; Jebila S?

  171. An Efficient Directional Multiresolution Image Representation using Contourlet Transform?

    Authors: Ankita Sharma; Abhay Kumar; Rahul Deshmukh?

  172. Integrating Static Analysis Tools for Improving Operating System Security

    Authors: Ashish Joshi; Kanak Tewari; Vivek Kumar; Dibyahash Bordoloi

  173. Brain Tumor Detection using Curvelet Transform and Support Vector Machine

    Authors: Bhawna Gupta; Shamik Tiwari?

  174. Utilizations of LSB Matching and Replacement for Efficiency Improvement in Digital Secret Communication

    Authors: Nisha.M.J; G.H.Asha; Anandh Kumar.V; Mahendar.R?

  175. MULTI LEVEL SECURITY ARCHITECTURE FOR NFC ENABLED CAR KEYS

    Authors: Suman Chaudhary; Niharika Garg

  176. Recognition of 2D Barcode Images Using Edge Detection and Morphological Operation

    Authors: Priyanka Gaur; Shamik Tiwari?

  177. Improve Performance by Task Scheduling Beneficial to Both User and Cloud Provider in Cloud Computing?

    Authors: Drashti P. Hirani; Altaf B. Mogal?

  178. Fingerprint Based Gender Classification Using Discrete Wavelet Transform & Artificial Neural Network?

    Authors: Samta Gupta; A. Prabhakar Rao?

  179. Analysis of Packet Filtering Technology in Computer Network Security?

    Authors: Rupali P. Hinglaspure; B. R. Burghate?

  180. Ongole Breed Cattle Health Expert Advisory System Using Parallel Particle Swarm Optimization Algorithm?

    Authors: B. Jogeswara Rao; M. S. Prasad Babu?

  181. MATCHING OF PROCESS DATA AND OPERATIONAL DATA FOR A DEEP BUSINESS ANALYSIS: CHECKING THE SUITABILITY OF PROCESS MANAGEMENT TOOLS AND DATABASE MANAGEMENT TOOLS?

    Authors: Salman Raza; Ramzan Talib; Atif Amin?

  182. RESOLUTION ENHANCEMENT OF SATELLITE IMAGES USING DUAL-TREE COMPLEX WAVELET AND CURVELET TRANSFORM?

    Authors: P.SUBBULAKSHMI; V.SHALINI?

  183. FPGA IMPLEMENTATION OF DIGITAL WATERMARKING SYSTEM?

    Authors: K.Tamilvanan; R.B.Selvakumar?

  184. Development of Mushroom Expert System Based on SVM Classifier and Naive Bayes Classifier?

    Authors: M.S. Prasad Babu?; Rajani Thommandru?; K.Swapna?; E.Nilima?

  185. AN EVALUATION OF METHODS TO PRIORITIZE REQUIREMENTS

    Authors: Prachi Bhandari; Rajni Sehgal?

  186. An Efficient Privacy Preserving Scheme for VANET?

    Authors: BUVANESWARI GANESAN; BENNET PRABHA; MOHANA SUNDARI G?

  187. Survey on Access Control Delegation to Protect and Maintain Privacy of Cloud Data

    Authors: Nicholaus Gati; Sudhakar G.?

  188. SURVEY ON PROTECTING PRIVACY AND SECURITY IN XML INFORMATION BROKERING?

    Authors: Noe Elisa; K. Suresh Babu?

  189. ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS

    Authors: A.Napolean; M.Kaushika?

  190. COMPARATIVE ANALYSIS OF SOFTWARE COST AND EFFORT ESTIMATION METHODS: A REVIEW

    Authors: OMPRAKASH TAILOR; JYOTI SAINI; POONAM RIJWANI?

  191. A Self Destructing Data System Based on Active Storage Framework for Protecting Data Privacy from attackers UN agency?

    Authors: R.Rengasamy; V.Kumaresan; G.Guru Rani?

  192. Implementation of Hash Function Based On Neural Cryptography?

    Authors: Vineeta Soni; Sarvesh Tanwar; Prema K.V.?

  193. Host Node Based Collision Free Address Assignment in Ad hoc Networks?

    Authors: Sumisha Samuel; Avanish Kumar Singh?

  194. EFFICIENT TECHNIQUES FOR PRESERVING MICRODATA USING SLICING?

    Authors: Neenu Varghese; Avanish Kumar Singh?