Archived Papers for Journal    
       
        International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.3, No.4
Publisher: ZAIN Publications
Publishing Date: 2014-04-30
- Survey of the Green within Computing?Authors: Vishnu Kumar M, Ganapathy Sundaram V, Beulah Joice R
 - An Advanced Security - A Two-Way Password Technique for Cloud Services?Authors: Yogesh Brar, Shobhit Krishan, Ankur Mehta, Vipul Talwar, Tanupriya Choudhury, Vasudha Vashisht?
 - A COMPARATIVE STUDY OF VARIOUS IMAGE COMPRESSION TECHNIQUES?Authors: David.S?, Manikandan.R?
 - Vehicle to Vehicle Communication using RFID along with GPS and WAP?Authors: A.Vanitha Katherine, R.Muthumeenakshi, N.Vallilekha?
 - ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY?Authors: Ashish M. Jaiswal, Mahip Bartere
 - Comparative Analysis of Various Underwater Image Enhancement TechniqueAuthors: Shiwam S. Thakare, Amit Sahu?
 - Using OLAP with Diseases Registry Warehouse for Clinical Decision Support?Authors: A. K. Hamoud, Dr. Taleb A.S. Obaid
 - Performance Analysis of Classification Algorithms?Authors: Payal Pahwa, Manju Papreja, Renu Miglani?
 - SECRET SPLITTING SCHEME: A REVIEW?Authors: Nikita Dhule, Mr. Amit Sahu?
 - Multiclass Classification: A Review?Authors: Ruchida Sonar, Dr. P.R. Deshmukh?
 - To Enhance Reliability of Dynamic Clustering Using Self Learning Technique: A ReviewAuthors: Shivani Garg?
 - Data Mart Designing and Integration Approaches?Authors: Rashmi Chhabra, Payal Pahwa?
 - Intelligent System for Brain Diseases Diagnosis Using Neural Network and Bayesian Methods?Authors: Amir Y Mahdi, Shaker k Ali, Rabia R Mkamis?
 - Review on Text Clustering Based on Frequent Itemset?Authors: Prajakta Jaswante, Dr. P.R. Deshmukh?
 - Review on “Data Mining with Big Data”Authors: Vitthal Yenkar, Prof. Mahip Bartere
 - Review on “Adaption of Ranking Model for Domain Specific Search”?Authors: Mr. Pratik R.Mantri, Prof. Mahip M.Bartere?
 - Review on “An analysis of the Management Security and Security Algorithms in Cloud Computing”Authors: Nilesh N.Chawande, Prof. Jayant P.Mehare?
 - Automatic Segmentation of Digital Images Applied in Cardiac Medical Images?Authors: Mukesh G. Mahore, Vrushali V. Dhanrale, Harshad R. Borde, Pooja G.Lahoti, Suraj B. Borge
 - Mobile HealthCare Technology Based on Wireless Sensor?Authors: Pimpre.D.M, Bhagat.V.B?
 - QADR with Energy Consumption for DIA in Cloud?Authors: Ms. S.Soundharya, Mr. R.Santhosh?
 - Local Octal Pattern: A Proficient Feature Extraction for Face RecognitionAuthors: Nithya J, Suchitra S, Dr. S Chitrakala?
 - The Impact of Social Network on Human BeingAuthors: G. M. M. Bashir, M. Fahad Farhan, Syed Md. Galib, Mohammad Jamal Hossain?
 - SMART PHONE BASED SOCIAL NETWORKING FOR TEACHING & LEARNING?Authors: G. M. M. Bashir, Md. Atikqur Rahaman, Syed Md. Galib, M.M. Rahaman?
 - HAPTIC SCIENCE AND TECHNOLOGY IN SURGICAL SIMULATION, MEDICAL TRAINING AND MILITARY APPLICATION?Authors: Miss. Snehal N. Meshram?, Prof. Amit M. Sahu?
 - Forensic Imaging for Online Social Networks?Authors: Mr. Shrikant Kale, Prof. Amit Sahu?
 - Network Assisted Mobile Computing with Efficient Cache Maintenance?Authors: K Komarasamy, Dr. L M Nithya
 - Performance Analysis of Sequential Element for Low Power Clocking System?Authors: Umayal.S?
 - Using Genetic Algorithm for Whole Test suite Generation of Object Oriented Programs?Authors: Mrs.R.Gowri, R.DhanBhagya Preety, B.Durga Devi, G.Aruna?
 - Survey on Secure Updates using Over the Air Programming in Wireless Sensor NetworkAuthors: Naresh M. Bhagat, S. P. Akarte?
 - A Comprehensive Study of Jelly Fish Attack in Mobile Ad hoc NetworksAuthors: Manjot Kaur; Malti Rani; Anand Nayyar
 - A Comprehensive Review of Distance and Density Based Cluster Head Selection SchemesAuthors: Naveen Sharma; Malti Rani; Anand Nayyar?
 - Design of Coarse Grain Architecture for DSP Application?Authors: Kushal R. Kalmegh?; Prof. Vaishali Tehre?
 - Critical Success Factors for Agile Methodology Adaptation in Software Development Organizations?Authors: Vishvadeep Tripathi; Dr. Arvind Kumar Goyal?
 - REVIEW ON STEGANOGRAPHY FOR HIDING DATA?Authors: Sagar S.Pawar; Prof. Vinit Kakde?
 - DYNAMIC NUMBER PLATE RECOGNISATION USING GENETIC ALGORITHMSAuthors: M.Sudha; E.Saranya; R.Karthika; R.Santhosh?
 - Alienation of Melanocytes in Cancer Pretentious Cells using Level Set Segmentation AlgorithmAuthors: Narmadha.R; Ahalya Mary.J?
 - OPTIMIZED KERNEL IMPLEMENTATION OF MANSOS?Authors: M.Prabhu; V.Rajaram
 - A Review on Various Techniques for Image Debluring?Authors: Shital Hemant Umale; Prof. Amit M. Sahu
 - Monitoring and Self-Transmitting Data Using Zone Routing Protocol in Ad-hoc Network towards Effective Mobility Management?Authors: S.Jayamoorthy; I.Varalakshmi; S.Kumarakrishnan?
 - SAAS ? A Gateway to Cost Effective Secure Vehicular Clouds?Authors: M.R.Yasmeen?; M.Ramya Devi?
 - Dynamic Bandwidth Allocation Scheme for Efficient Handover in IEEE 802.16e NetworksAuthors: M. Deva Priya; M.L. Valarmathi; R.K. Shanmugapriya; D. Prithviraj?
 - Change Monitoring of Burphu Glacier from 1963 to 2011 using Remote Sensing?Authors: Rahul Singh; Dr. Renu Dhir?
 - Designing a Web Based Module for SAR to Ensure Data Security Using JAVAAuthors: Bhumi Aravind Kalaria; Dr. C Gurudas Nayak; Dr. N.K. Shrivastava?
 - SEMANTIC WEBSERVICE DISCOVERY FOR WEBSERVICE COMPOSITION?Authors: M.Gopianand; S.Jayakumar?
 - ISSUES IN KNOWLEDGE DISCOVERY FROM MEDICAL DATABASES?Authors: K.Kathirvel?
 - PROTECTING PROXY BASED NETWORK FROM DDoS ATTACKERS WITH IP SPOOFING DETECTION?Authors: Yedu Krishnan.R; A.Anbumani??
 - A CONVENTIONAL STUDY OF EDGE DETECTION TECHNIQUE IN DIGITAL IMAGE PROCESSING?Authors: Indrajeet Kumar; Jyoti Rawat; Dr. H.S. Bhadauria?
 - Layered Mapping of Cloud Architecture with Grid Architecture?Authors: Pardeep Seelwal?
 - On New Approach in Using 433MHz Radio Modules?Authors: Prithviraj Shetti; Prasad V. Sakharpe; Amrut Ubare?
 - A SURVEY ON IMPROVING PERFORMANCE OF APRIORI ALGORITHMAuthors: Er.Rajvir Kaur; Er.Nishi Madaan?
 - Firewall and Its Policies Management?Authors: Er. Smriti Salaria; Er. Nishi Madaan?
 - An Innovative Smart Soft Computing Methodology towards Disease (Cancer, Heart Disease, Arthritis) Detection in an Earlier Stage and in a Smarter Way?Authors: Mr. Tanupriya Choudhury; Prof. (Dr.) Vivek Kumar; Dr. Darshika Nigam; Vasudha Vashisht?
 - COMPARISON OF DIFFERENT DATASETS USING VARIOUS CLASSIFICATION TECHNIQUES WITH WEKA?Authors: Deepali Kharche; K. Rajeswari; Deepa Abin?
 - EXTRACT ASSOCIATION RULES TO MINIMIZE THE EFFECTS OF DENGUE BY USING A TEXT MINING TECHNIQUE?Authors: Atif Amin; Ramzan Talib; Salman Raza?; Saima Javed?
 - Satellite Image Fusion Using Maximization of Non-Gaussianity?Authors: A. M. El Ejaily; F. Eltohamy; M. S. Hamid; G. Ismail?
 - Design of Mobile Event Management and Broadcast System Using Rational Unified Process?Authors: Sonali Addetla; Mohini Gorde; Supriya Ghadge; Suvarna Kusal; Anupkumar M Bongale
 - GRAPHICAL PASSWORD FOR EMAIL APPLICATION BY PERSUASIVE CLICK POINTS USING CENTERED DISCRETIZATION?Authors: Mr. Aniket G. Jadhav; Ms. Rajashri D. Dipak; Ms. Lavina P. Dadlani; Mr. Mangesh K. Manke?
 - WIRELESS CHARGING OF MOBILE PHONE USING MICROWAVE?Authors: Priya A. Rewaskar; Prof. Dinesh Datar?
 - Enhancing Security in Mobile Communication using a Unique Approach in Steganography?Authors: Prof. Sharmishta Desai; Sanaa Amreliwala; Vineet Kumar?
 - Performance Improvement of Routing Protocol Using Two Different Mobility Models In Vehicular Adhoc Vehicular Network?Authors: Mr.Vaibhav D. Patil; Prof. Atul R. Deshmukh?
 - A Review on the Role of Big Data in Business?Authors: Jafar Raza Alam; Asma Sajid; Ramzan Talib; Muneeb Niaz?
 - Detection of Automobile Drivers Stress from Physiological Signals?Authors: Dayalin Subi J; Anuja H S
 - Application Layer’s Approaches for TCP Incast Problem at Data Center Networks?Authors: Irfan Riaz Shohab; Muhammad Younas; Ramzan Talib; Umer Sarwar?
 - Light Fidelity (LI-FI)-A Comprehensive Study?Authors: Ekta; Ranjeet Kaur?
 - Oculus Wearable Technology -Vision for Blind?Authors: Anand Singh; Shalini Mishra; Prof. T. Venkat Narayana Rao?
 - Encryption and Decryption of Data Using QR Authentication SystemAuthors: Atul Hole; Mangesh Jadhav; Shivkant Kad; Swanand Shinde?; Prof. Pramod Patil?
 - IDS: Survey on Intrusion Detection System in Cloud Computing?Authors: Mr. Ashish Kumbhare; Mr. Manoj Chaudhari?
 - Improvement of Expectation Maximization Clustering using Select AttributeAuthors: Rupali Bhondave; Madhura Kalbhor; Supriya Shinde; K. Rajeswari?
 - A Survey on Security in Cloud ComputingAuthors: Varsha Yadav; Preeti Aggarwaal?
 - Secure Sharing of Medical Records Using Cryptographic Methods in CloudAuthors: M.P. Radhini; P.Ananthaprabha; P.Parthasarathi?
 - A Distributed Computer Machine Vision System for Automated Inspection and Grading of Fruits?Authors: Yogitha.S; Sakthivel.P?
 - A Multi-Level Security Framework for Cloud Computing?Authors: Mr. Anup Date; Mr. Dinesh Datar?
 - Predicting the Effect of Diabetes on Kidney using Classification in Tanagra?Authors: Divya Jain; Sumanlata Gautam
 - Design of Moderate Speed and Moderate Resolution Successive Approximation Analog to Digital Converter?Authors: Mr. Jitendra Waghmare?; Prof. P.M. Ghutke?
 - An Aggregate Key Based Cryptosystem for Secure Data Sharing in Cloud Computing?Authors: R. Vanitha; V. Elavarasi?
 - Challenges and Security Issues in Cloud Computing?Authors: Joshna S; Manjula P?
 - Multimodality Sensor System for Sleep- Quality Monitoring?Authors: Ms. Snehal R. Sawale; Vijay S. Gulhane
 - Data Mining Technique its Needs and Using Applications?Authors: Anup Arvind Lahoti?; P. L. Ramteke?
 - Advanced Hands Free Computing?Authors: S. T. Patil; Snehal M. Chavan; Nileshwari R. Chaudhari; Pranali J. Patil?
 - Mosix the Operating System that Support Multiple Cluster Environment with its Advancements & Features?Authors: Rahul Rajkumar Pahlajani; G. R. Bamnote?
 - MONITORING OF RAILWAY BOGIES AND PREVENTING ACCIDENTS USING ARM7TDMI AND CAN PROTOCOLSAuthors: Siddu S Kadiwal?; C. Gurudas Nayak?; Shobha Kadiwal?; Gururaj Kadiwal?
 - An Advanced Watermarking and Compression of Images using SPIHT CompressionAuthors: Shihas Abdul Razak J; Rekha Bhandarkar
 - A Review: Grid ComputingAuthors: Ankit Punia; Ms. Pooja Mittal
 - The Multitenant Cloud Architecture?Authors: JUEE DARYAPURKAR; KARUNA BAGDE
 - ISONET: HARDWARE BASED JOB QUEUE MANAGEMENT FOR MANY CORE ARCHITECTURESAuthors: Jeyanthi.S; M. Deivakani?
 - Human Computer Interaction: Analysis and Journey through Eras?Authors: Pratibha T Jose; Surbhi Miglani; Sanjay Yadav?
 - Survey on Network Based Intrusion Detection System in MANET?Authors: Nithya Karthika M; Raj Kumar?
 - Social Authentication and Untrusted Clouds for Secure Location Sharing?Authors: Miss. Priyanka K. Shinde; Nitin R. Chopde
 - Mobile Computing with WirelessLAN and its Modes Ad hoc Network with Challenges?Authors: Pallavi D. Dudhe; P. L. Ramteke?
 - Different Genetic Operator Based Analysis and Exploration of TSP?Authors: Ashima Malik?
 - To Avoid Unwanted Messages from User Wall: Content Based Filtering ApproachAuthors: Miss. Dipali D. Vidhate; Ajay P. Thakare?
 - CLUSTER ENHANCED SECURE AUTHENTICATION SCHEME FOR DATA INTEGRITY IN MANET?Authors: A. Praveena; L.M. Nithya?
 - SECURE DATA TRANSMISSION IN MANETS USING DSR, AODV, TRUST PROTOCOLS?Authors: K.Sangeetha; K.Rajakumari?
 - Hybrid Approach for Optimizing the Search Engine Result?Authors: Ashish Kumar Kushwaha; Nitin Chopde?
 - AN IMAGE FORENSICS ANALYSIS OF DECISION FUSION APPROACHESAuthors: D.GOKILA BHARATHI; G.SELVAVINAYAGAM?
 - Enhancement the Security of WSN using ALARM Protocol to Prevention from Reply Attack?Authors: Neelam Shekhawat; Moumita Ghosh
 - Review on “Image Segmentation Methods”?Authors: Rita Harle; M. R. Joshi?
 - ASSOCIATION RULE MINING IN DISTRIBUTED DATABASE SYSTEM?Authors: E.Deenadayalan; D.Kerana Hanirex; K.P.Kaliyamurthie?
 - A Comprehensive Study on Cloud Computing?Authors: Suruchee V.Nandgaonkar; A. B. Raut?
 - Optimization of Rule - Based Medication Delivery in Large scale Healthcare FrameworkAuthors: G.Manikandan; S.Prabakaran?
 - A GRAPHICAL PASSWORD BASED AUTHENTICATION BASED SYSTEM FOR MOBILE DEVICES?Authors: Er.Aman Kumar; Er.Naveen Bilandi?
 - An Enhancement in Centroid Algorithm in Range-free Grid Based Environment for Wireless Sensor Networks?Authors: Gurleen Singh; Malti Rani?
 - RFID Library ImplementationAuthors: Akansha Verma; Niharika Garg?
 - MOVIE RECOMMENDATION SYSTEM BASED ON USERS’ SIMILARITY?Authors: Gaurav Arora; Ashish Kumar; Gitanjali Sanjay Devre; Amit Ghumare?
 - A Comparative Analysis of OLSR, DSR and ZRP Routing Protocols in MANETsAuthors: Er. Samiti Gupta; Er. Naveen Bilandi?
 - A Revived Survey of Various Credit Card Fraud Detection Techniques?Authors: Neha Sethi; Anju Gera?
 - Energy Efficient Data Gathering in Wireless Sensor Network?Authors: Bhavna G. Pise; Nikita Chavhan?
 - Data Security using Hadoop on Cloud ComputingAuthors: Miss. Pooja.D.Bardiya; Miss. Rutuja.A.Gulhane; P.P.Karde?
 - Efficient Data Storage and Searching for Location Based Services using Quadtrees and H-ordering?Authors: Capt. S. Santhosh Baboo; V.Narmadha
 - Mail_Alert: Online Suspicious URL Detection of Tweets from Twitter Public TimelineAuthors: SPOORTHI K; SARVAMANGALA D R?
 - A Preliminary Review on Web Usage Mining: A Web Mining Technique?Authors: Snehal R. Kawalkar; Pravin P. Karde?
 - Retrieving Information by Using Personalized Mobile Search Engine (PMSE)?Authors: D. D. SHIPNE; B. S. AHIRWADKAR?
 - A NOVEL METHOD FOR SECURE ROUTING WITH EFFICIENT ENERGY RESOURCES IN WIRELESS NETWORK?Authors: Ms. G.Subbulakshmi @ Nithya; J.Priskilla Angel Rani?
 - ANALYSIS OF FIREWALL TECHNOLOGY IN COMPUTER NETWORK SECURITYAuthors: Miss. Shwetambari G. Pundkar; G. R. Bamnote?
 - PEER-TO-PEER AD HOC NETWORK: AN OVERVIEW?Authors: Miss. Kalyani U. Sapre; G. R. Bamnote
 - BIRCH and DB-scan Techniques in Phishing and Malware Detection?Authors: Shabin Blesson; R.Ravi; Beulah Shekar?
 - Correlation Based Feature Selection with Irrelevant Feature Removal?Authors: P.Velavan; S.Subashini?
 - IMAGE RECOGNITION BASED CROP DISEASE IDENTIFICATION SYSTEM: A SURVEYAuthors: Nitin S. Tijare; Sagar S. Badnerkar?
 - MULTI TARGET TRACKING USING IDOL IN SENSOR NETWORKS?Authors: M.Navanidha; V.Nirosha?
 - Data Mining Techniques?Authors: Sayyed Muzammil Ali; Ms. R.R Tuteja?
 - DETECTION AND RECOGNITION OF HUMAN FACE USING ANN TRAINED BY GENETICAL ALGORITHM?Authors: Vaibhav N. Dhage; P. L. Ramteke?
 - ZigBee Wireless Sensor Network Technology?Authors: Miss. Pooja V. Ingalkar; A. B. Deshmukh?
 - Enhancing Probabilistic Packet Marking by Integrating Dynamic Probability and Time to Live (TTL) Clustering?Authors: Souzan Asadollahi?
 - DIAGNOSING SENSOR NODES AND DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS?Authors: R. Dhivya Subathra; M. Suguna; D. Sharmila?
 - Design Augmented Embedded System for 2D-3D Visualization in Cardiac Surgery?Authors: Lokesh Zambare; S.V.Bhalerao?
 - Analysis of Test Case Prioritization Techniques?Authors: Manisha Sahni; Isha Sharma; Jasleen Kaur?
 - Quality-Based Image Communication for Wireless Sensor Networking?Authors: Ms. Sneha V.Kalbande; N.M.Tarbani?
 - A Review on Virtual Machine Scheduling in Cloud Computing?Authors: Archana Pawar; Deepak Kapgate?
 - Security Issues in MANET Routing Protocols and Their Solutions?Authors: Mahesh Kumar Kumawat; Jitendra Singh Yadav?
 - V-ISA use in Transmeta Crusoe Processor?Authors: Dipali M. Dhaskat; P. P. Karde?
 - A Modified Method for Multiple Description Coding using Quincunx Subsampling?Authors: S. Radhakrishnan; M. Mohamed Sathik?
 - Development and Evaluation Mobile Multimedia Cloud Application?Authors: S.P.Warhekar; V.T.Gaikwad; H.N.Datir?
 - EUCLIDEAN GEMETRY LDPC CODES FOR ERROR CORRECTION AND ERROR DETECTION IN MEMORY APPLICATION?Authors: P.Kannan; Ms. S.Karthiga?
 - Design of ANFIS System for Efficient Throttle and Brake Control of Vehicles?Authors: Roby Siddharth Jangam; Manjurkha M. Pathan?
 - Performance Analysis of Dual Tail Comparator for Low Power Applications?Authors: P. Raja Sekara Pandian; M. Krishnamurthy?
 - A Survey on Advanced Page Ranking in Query Recommendation?Authors: Rinki Khanna; Asha Mishra?
 - An Approach for Finding Frequent Item Set Done By Comparison Based TechniqueAuthors: Ms. Ankita Parmar; Kamal Sutaria; Krutarth Joshi?
 - AN APPROACH TO SECURE LOCATION OF USER IN PERVASIVE COMPUTING ENVIRONMENT?Authors: SUDHEER KUMAR SINGH; SHANSHANK SINGH; NITIN GOEL; RAHUL RANJAN
 - Efficient Allocation of Resources in Cloud Server Using Lopsidedness?Authors: B. Selvi; C. Vinola; R. Ravi?
 - Secure and Energy Efficient CDAMA Scheme in Wireless Sensor Network Using DAS Model?Authors: Nidhi Mouje; Nikita Chavhan
 - Finding Correlated CCC-Biclusters from Gene Expression Data?Authors: Geethamani.S; Vijayalakshmi.S?
 - A NOVEL STEGANOGRAPHIC APPROACH FOR IMAGE ENHANCEMENT USING LEAST SIGNIFICANT BITAuthors: Deepti Sharma; Anshu Sharma?
 - Investigation of New Approach to the Design and Development for Clumping Algorithm in MANET?Authors: Sanjay Kumar; Sudhir Kumar Rathi?
 - A Dynamic Approach to Extract Texts and Captions from Videos?Authors: R.Bhavadharani; P.M. Sowmya; A.Thilagavathy?
 - AN EFFICIENT APPROACH TO AN IMAGE RETRIEVAL USING PARTICLE SWARM OPTIMIZATIONAuthors: G. Saranya; K. Anitha; A. Chilambuchelvan?
 - DEFENDING STEALTHY MODE ATTACKS BY LIVE DETECTION AND ADOPTABLE LEARNING TECHNIQUE?Authors: G.Suganya; K.E Narayana
 - Securing Data Stored in Clouds Using Privacy Preserving Authenticated Access Control?Authors: S Divya Bharathy; T Ramesh?
 - Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram ShiftingAuthors: KS.Karthik Kumar; R.Bhavani?
 - Secure Mining of Association Rules in Horizontally Distributed DatabasesAuthors: Chitteni Siva; Selvi?
 - THE EFFECT OF VAMPIRE ATTACKS ON DISTANCE VECTOR ROUTING PROTOCOLS FOR WIRELESS AD HOC SENSOR NETWORKSAuthors: Jagadeesh; Joseph William
 - Interaction System with Smart Phones By Speech to Text and Accelerometer?Authors: Monali P. Admane?; Ratnaprabha Jasutkar
 - Ancillary Multi Trust Virtual Dissemination for Capability Fortifying Systems?Authors: S. Sundar Raj; Ashish Chaturvedi?
 - SURVEY ON TRIPLE SYSTEM SECURITY IN CLOUD COMPUTING?Authors: Parul Mukhi; Bhawna Chauhan
 - A Review Paper on Effort Estimation and Model Based Regression Testing with SOAAuthors: Yogesh Bhardwaj; Manju Kaushik?
 - Efficient Semantic Information Retrieval System from Relational DatabaseAuthors: Rajeshkumar T; Ramathilagam C?
 - A Survey on Spam Filtering for Online Social NetworksAuthors: Bhavish Santhosh Kumar M; G.Venkat Rami Reddy?
 - A Process Scheduling Algorithm Based on Threshold for the Cloud Computing Environment?Authors: Kiran Kumar Shakya; D. Singh Karaulia?
 - Eye Localization under Different Lighting Ambiance using ANFIS?Authors: Sarmila K. B.; Saranya R.?
 - A Review of XML Parallel Parsing TechniquesAuthors: Ravi Varma; G. Venkata Rami Reddy?
 - Opportunities and Challenges of Big Data in Economics Research and EnterprisesAuthors: Tushar M. Chavan; S. P. Akarte?
 - Forbidden Twin Substantiate Consuming Hash Generation and SVM?Authors: Deepa R?; Noor Alleema N?
 - SECURITY ISSUES IN WIRELESS BODY AREA NETWORK?Authors: Shikha Pathania; Naveen Bilandi?
 - A NOVAL HINDI LANGUAGE INTERFACE FOR DATABASES?Authors: Mahesh Chauhan; Nikita Bhati?
 - Comparison of Asymmetric Algorithms in CryptographyAuthors: Neha Garg; Partibha Yadav?
 - A Secure Routing Protocol under Eavesdropping using SPENA Scheme?Authors: Mohini Singhal; Kaushik Ghosh?
 - Transfiguring of an Android App Using Reverse Engineering?Authors: Taranjeet Kaur Chawla; Aditi Kajala?
 - An Effective Load Balancing Grouping Based Job & Resource Scheduling Algorithms for Fine Grained Jobs in Distributed Environment?Authors: Miss. Hemangi Joshi; Viraj Daxini?
 - ENSURING THE NODE AUTOCONFIGURATION AND NODE PREVENTION FROM INTRUDERS USING SFAPAuthors: Udaya.R?; Jenifer.P?
 - Data Store and Multi-Keyword Search on Encrypted Cloud Data?Authors: Miss. Devika M. Shelke; Miss. Roshani S. Bhojane; Miss. Tina B. Madane; Pratik N. Gawande; D.J. Manowar; S.S. Dubey?
 - EXTENDED STATE KALMAN FILTERING BASED FETAL ECG, MATERNAL ECG EXTRACTION & ESTIMATE THE MATERNAL BLOOD PRESSURE USING SINGLE CHANNEL RECORDINGS?Authors: Remi D; Jebila S?
 - An Efficient Directional Multiresolution Image Representation using Contourlet Transform?Authors: Ankita Sharma; Abhay Kumar; Rahul Deshmukh?
 - Integrating Static Analysis Tools for Improving Operating System SecurityAuthors: Ashish Joshi; Kanak Tewari; Vivek Kumar; Dibyahash Bordoloi
 - Brain Tumor Detection using Curvelet Transform and Support Vector MachineAuthors: Bhawna Gupta; Shamik Tiwari?
 - Utilizations of LSB Matching and Replacement for Efficiency Improvement in Digital Secret CommunicationAuthors: Nisha.M.J; G.H.Asha; Anandh Kumar.V; Mahendar.R?
 - MULTI LEVEL SECURITY ARCHITECTURE FOR NFC ENABLED CAR KEYSAuthors: Suman Chaudhary; Niharika Garg
 - Recognition of 2D Barcode Images Using Edge Detection and Morphological OperationAuthors: Priyanka Gaur; Shamik Tiwari?
 - Improve Performance by Task Scheduling Beneficial to Both User and Cloud Provider in Cloud Computing?Authors: Drashti P. Hirani; Altaf B. Mogal?
 - Fingerprint Based Gender Classification Using Discrete Wavelet Transform & Artificial Neural Network?Authors: Samta Gupta; A. Prabhakar Rao?
 - Analysis of Packet Filtering Technology in Computer Network Security?Authors: Rupali P. Hinglaspure; B. R. Burghate?
 - Ongole Breed Cattle Health Expert Advisory System Using Parallel Particle Swarm Optimization Algorithm?Authors: B. Jogeswara Rao; M. S. Prasad Babu?
 - MATCHING OF PROCESS DATA AND OPERATIONAL DATA FOR A DEEP BUSINESS ANALYSIS: CHECKING THE SUITABILITY OF PROCESS MANAGEMENT TOOLS AND DATABASE MANAGEMENT TOOLS?Authors: Salman Raza; Ramzan Talib; Atif Amin?
 - RESOLUTION ENHANCEMENT OF SATELLITE IMAGES USING DUAL-TREE COMPLEX WAVELET AND CURVELET TRANSFORM?Authors: P.SUBBULAKSHMI; V.SHALINI?
 - FPGA IMPLEMENTATION OF DIGITAL WATERMARKING SYSTEM?Authors: K.Tamilvanan; R.B.Selvakumar?
 - Development of Mushroom Expert System Based on SVM Classifier and Naive Bayes Classifier?Authors: M.S. Prasad Babu?; Rajani Thommandru?; K.Swapna?; E.Nilima?
 - AN EVALUATION OF METHODS TO PRIORITIZE REQUIREMENTSAuthors: Prachi Bhandari; Rajni Sehgal?
 - An Efficient Privacy Preserving Scheme for VANET?Authors: BUVANESWARI GANESAN; BENNET PRABHA; MOHANA SUNDARI G?
 - Survey on Access Control Delegation to Protect and Maintain Privacy of Cloud DataAuthors: Nicholaus Gati; Sudhakar G.?
 - SURVEY ON PROTECTING PRIVACY AND SECURITY IN XML INFORMATION BROKERING?Authors: Noe Elisa; K. Suresh Babu?
 - ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKSAuthors: A.Napolean; M.Kaushika?
 - COMPARATIVE ANALYSIS OF SOFTWARE COST AND EFFORT ESTIMATION METHODS: A REVIEWAuthors: OMPRAKASH TAILOR; JYOTI SAINI; POONAM RIJWANI?
 - A Self Destructing Data System Based on Active Storage Framework for Protecting Data Privacy from attackers UN agency?Authors: R.Rengasamy; V.Kumaresan; G.Guru Rani?
 - Implementation of Hash Function Based On Neural Cryptography?Authors: Vineeta Soni; Sarvesh Tanwar; Prema K.V.?
 - Host Node Based Collision Free Address Assignment in Ad hoc Networks?Authors: Sumisha Samuel; Avanish Kumar Singh?
 - EFFICIENT TECHNIQUES FOR PRESERVING MICRODATA USING SLICING?Authors: Neenu Varghese; Avanish Kumar Singh?
 
                    Share Your Research, Maximize Your Social Impacts
                
