Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.3, No.4
Publisher: ZAIN Publications
Publishing Date: 2014-04-30
- Survey of the Green within Computing?Authors: Vishnu Kumar M, Ganapathy Sundaram V, Beulah Joice R
- An Advanced Security - A Two-Way Password Technique for Cloud Services?Authors: Yogesh Brar, Shobhit Krishan, Ankur Mehta, Vipul Talwar, Tanupriya Choudhury, Vasudha Vashisht?
- A COMPARATIVE STUDY OF VARIOUS IMAGE COMPRESSION TECHNIQUES?Authors: David.S?, Manikandan.R?
- Vehicle to Vehicle Communication using RFID along with GPS and WAP?Authors: A.Vanitha Katherine, R.Muthumeenakshi, N.Vallilekha?
- ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY?Authors: Ashish M. Jaiswal, Mahip Bartere
- Comparative Analysis of Various Underwater Image Enhancement TechniqueAuthors: Shiwam S. Thakare, Amit Sahu?
- Using OLAP with Diseases Registry Warehouse for Clinical Decision Support?Authors: A. K. Hamoud, Dr. Taleb A.S. Obaid
- Performance Analysis of Classification Algorithms?Authors: Payal Pahwa, Manju Papreja, Renu Miglani?
- SECRET SPLITTING SCHEME: A REVIEW?Authors: Nikita Dhule, Mr. Amit Sahu?
- Multiclass Classification: A Review?Authors: Ruchida Sonar, Dr. P.R. Deshmukh?
- To Enhance Reliability of Dynamic Clustering Using Self Learning Technique: A ReviewAuthors: Shivani Garg?
- Data Mart Designing and Integration Approaches?Authors: Rashmi Chhabra, Payal Pahwa?
- Intelligent System for Brain Diseases Diagnosis Using Neural Network and Bayesian Methods?Authors: Amir Y Mahdi, Shaker k Ali, Rabia R Mkamis?
- Review on Text Clustering Based on Frequent Itemset?Authors: Prajakta Jaswante, Dr. P.R. Deshmukh?
- Review on “Data Mining with Big Data”Authors: Vitthal Yenkar, Prof. Mahip Bartere
- Review on “Adaption of Ranking Model for Domain Specific Search”?Authors: Mr. Pratik R.Mantri, Prof. Mahip M.Bartere?
- Review on “An analysis of the Management Security and Security Algorithms in Cloud Computing”Authors: Nilesh N.Chawande, Prof. Jayant P.Mehare?
- Automatic Segmentation of Digital Images Applied in Cardiac Medical Images?Authors: Mukesh G. Mahore, Vrushali V. Dhanrale, Harshad R. Borde, Pooja G.Lahoti, Suraj B. Borge
- Mobile HealthCare Technology Based on Wireless Sensor?Authors: Pimpre.D.M, Bhagat.V.B?
- QADR with Energy Consumption for DIA in Cloud?Authors: Ms. S.Soundharya, Mr. R.Santhosh?
- Local Octal Pattern: A Proficient Feature Extraction for Face RecognitionAuthors: Nithya J, Suchitra S, Dr. S Chitrakala?
- The Impact of Social Network on Human BeingAuthors: G. M. M. Bashir, M. Fahad Farhan, Syed Md. Galib, Mohammad Jamal Hossain?
- SMART PHONE BASED SOCIAL NETWORKING FOR TEACHING & LEARNING?Authors: G. M. M. Bashir, Md. Atikqur Rahaman, Syed Md. Galib, M.M. Rahaman?
- HAPTIC SCIENCE AND TECHNOLOGY IN SURGICAL SIMULATION, MEDICAL TRAINING AND MILITARY APPLICATION?Authors: Miss. Snehal N. Meshram?, Prof. Amit M. Sahu?
- Forensic Imaging for Online Social Networks?Authors: Mr. Shrikant Kale, Prof. Amit Sahu?
- Network Assisted Mobile Computing with Efficient Cache Maintenance?Authors: K Komarasamy, Dr. L M Nithya
- Performance Analysis of Sequential Element for Low Power Clocking System?Authors: Umayal.S?
- Using Genetic Algorithm for Whole Test suite Generation of Object Oriented Programs?Authors: Mrs.R.Gowri, R.DhanBhagya Preety, B.Durga Devi, G.Aruna?
- Survey on Secure Updates using Over the Air Programming in Wireless Sensor NetworkAuthors: Naresh M. Bhagat, S. P. Akarte?
- A Comprehensive Study of Jelly Fish Attack in Mobile Ad hoc NetworksAuthors: Manjot Kaur; Malti Rani; Anand Nayyar
- A Comprehensive Review of Distance and Density Based Cluster Head Selection SchemesAuthors: Naveen Sharma; Malti Rani; Anand Nayyar?
- Design of Coarse Grain Architecture for DSP Application?Authors: Kushal R. Kalmegh?; Prof. Vaishali Tehre?
- Critical Success Factors for Agile Methodology Adaptation in Software Development Organizations?Authors: Vishvadeep Tripathi; Dr. Arvind Kumar Goyal?
- REVIEW ON STEGANOGRAPHY FOR HIDING DATA?Authors: Sagar S.Pawar; Prof. Vinit Kakde?
- DYNAMIC NUMBER PLATE RECOGNISATION USING GENETIC ALGORITHMSAuthors: M.Sudha; E.Saranya; R.Karthika; R.Santhosh?
- Alienation of Melanocytes in Cancer Pretentious Cells using Level Set Segmentation AlgorithmAuthors: Narmadha.R; Ahalya Mary.J?
- OPTIMIZED KERNEL IMPLEMENTATION OF MANSOS?Authors: M.Prabhu; V.Rajaram
- A Review on Various Techniques for Image Debluring?Authors: Shital Hemant Umale; Prof. Amit M. Sahu
- Monitoring and Self-Transmitting Data Using Zone Routing Protocol in Ad-hoc Network towards Effective Mobility Management?Authors: S.Jayamoorthy; I.Varalakshmi; S.Kumarakrishnan?
- SAAS ? A Gateway to Cost Effective Secure Vehicular Clouds?Authors: M.R.Yasmeen?; M.Ramya Devi?
- Dynamic Bandwidth Allocation Scheme for Efficient Handover in IEEE 802.16e NetworksAuthors: M. Deva Priya; M.L. Valarmathi; R.K. Shanmugapriya; D. Prithviraj?
- Change Monitoring of Burphu Glacier from 1963 to 2011 using Remote Sensing?Authors: Rahul Singh; Dr. Renu Dhir?
- Designing a Web Based Module for SAR to Ensure Data Security Using JAVAAuthors: Bhumi Aravind Kalaria; Dr. C Gurudas Nayak; Dr. N.K. Shrivastava?
- SEMANTIC WEBSERVICE DISCOVERY FOR WEBSERVICE COMPOSITION?Authors: M.Gopianand; S.Jayakumar?
- ISSUES IN KNOWLEDGE DISCOVERY FROM MEDICAL DATABASES?Authors: K.Kathirvel?
- PROTECTING PROXY BASED NETWORK FROM DDoS ATTACKERS WITH IP SPOOFING DETECTION?Authors: Yedu Krishnan.R; A.Anbumani??
- A CONVENTIONAL STUDY OF EDGE DETECTION TECHNIQUE IN DIGITAL IMAGE PROCESSING?Authors: Indrajeet Kumar; Jyoti Rawat; Dr. H.S. Bhadauria?
- Layered Mapping of Cloud Architecture with Grid Architecture?Authors: Pardeep Seelwal?
- On New Approach in Using 433MHz Radio Modules?Authors: Prithviraj Shetti; Prasad V. Sakharpe; Amrut Ubare?
- A SURVEY ON IMPROVING PERFORMANCE OF APRIORI ALGORITHMAuthors: Er.Rajvir Kaur; Er.Nishi Madaan?
- Firewall and Its Policies Management?Authors: Er. Smriti Salaria; Er. Nishi Madaan?
- An Innovative Smart Soft Computing Methodology towards Disease (Cancer, Heart Disease, Arthritis) Detection in an Earlier Stage and in a Smarter Way?Authors: Mr. Tanupriya Choudhury; Prof. (Dr.) Vivek Kumar; Dr. Darshika Nigam; Vasudha Vashisht?
- COMPARISON OF DIFFERENT DATASETS USING VARIOUS CLASSIFICATION TECHNIQUES WITH WEKA?Authors: Deepali Kharche; K. Rajeswari; Deepa Abin?
- EXTRACT ASSOCIATION RULES TO MINIMIZE THE EFFECTS OF DENGUE BY USING A TEXT MINING TECHNIQUE?Authors: Atif Amin; Ramzan Talib; Salman Raza?; Saima Javed?
- Satellite Image Fusion Using Maximization of Non-Gaussianity?Authors: A. M. El Ejaily; F. Eltohamy; M. S. Hamid; G. Ismail?
- Design of Mobile Event Management and Broadcast System Using Rational Unified Process?Authors: Sonali Addetla; Mohini Gorde; Supriya Ghadge; Suvarna Kusal; Anupkumar M Bongale
- GRAPHICAL PASSWORD FOR EMAIL APPLICATION BY PERSUASIVE CLICK POINTS USING CENTERED DISCRETIZATION?Authors: Mr. Aniket G. Jadhav; Ms. Rajashri D. Dipak; Ms. Lavina P. Dadlani; Mr. Mangesh K. Manke?
- WIRELESS CHARGING OF MOBILE PHONE USING MICROWAVE?Authors: Priya A. Rewaskar; Prof. Dinesh Datar?
- Enhancing Security in Mobile Communication using a Unique Approach in Steganography?Authors: Prof. Sharmishta Desai; Sanaa Amreliwala; Vineet Kumar?
- Performance Improvement of Routing Protocol Using Two Different Mobility Models In Vehicular Adhoc Vehicular Network?Authors: Mr.Vaibhav D. Patil; Prof. Atul R. Deshmukh?
- A Review on the Role of Big Data in Business?Authors: Jafar Raza Alam; Asma Sajid; Ramzan Talib; Muneeb Niaz?
- Detection of Automobile Drivers Stress from Physiological Signals?Authors: Dayalin Subi J; Anuja H S
- Application Layer’s Approaches for TCP Incast Problem at Data Center Networks?Authors: Irfan Riaz Shohab; Muhammad Younas; Ramzan Talib; Umer Sarwar?
- Light Fidelity (LI-FI)-A Comprehensive Study?Authors: Ekta; Ranjeet Kaur?
- Oculus Wearable Technology -Vision for Blind?Authors: Anand Singh; Shalini Mishra; Prof. T. Venkat Narayana Rao?
- Encryption and Decryption of Data Using QR Authentication SystemAuthors: Atul Hole; Mangesh Jadhav; Shivkant Kad; Swanand Shinde?; Prof. Pramod Patil?
- IDS: Survey on Intrusion Detection System in Cloud Computing?Authors: Mr. Ashish Kumbhare; Mr. Manoj Chaudhari?
- Improvement of Expectation Maximization Clustering using Select AttributeAuthors: Rupali Bhondave; Madhura Kalbhor; Supriya Shinde; K. Rajeswari?
- A Survey on Security in Cloud ComputingAuthors: Varsha Yadav; Preeti Aggarwaal?
- Secure Sharing of Medical Records Using Cryptographic Methods in CloudAuthors: M.P. Radhini; P.Ananthaprabha; P.Parthasarathi?
- A Distributed Computer Machine Vision System for Automated Inspection and Grading of Fruits?Authors: Yogitha.S; Sakthivel.P?
- A Multi-Level Security Framework for Cloud Computing?Authors: Mr. Anup Date; Mr. Dinesh Datar?
- Predicting the Effect of Diabetes on Kidney using Classification in Tanagra?Authors: Divya Jain; Sumanlata Gautam
- Design of Moderate Speed and Moderate Resolution Successive Approximation Analog to Digital Converter?Authors: Mr. Jitendra Waghmare?; Prof. P.M. Ghutke?
- An Aggregate Key Based Cryptosystem for Secure Data Sharing in Cloud Computing?Authors: R. Vanitha; V. Elavarasi?
- Challenges and Security Issues in Cloud Computing?Authors: Joshna S; Manjula P?
- Multimodality Sensor System for Sleep- Quality Monitoring?Authors: Ms. Snehal R. Sawale; Vijay S. Gulhane
- Data Mining Technique its Needs and Using Applications?Authors: Anup Arvind Lahoti?; P. L. Ramteke?
- Advanced Hands Free Computing?Authors: S. T. Patil; Snehal M. Chavan; Nileshwari R. Chaudhari; Pranali J. Patil?
- Mosix the Operating System that Support Multiple Cluster Environment with its Advancements & Features?Authors: Rahul Rajkumar Pahlajani; G. R. Bamnote?
- MONITORING OF RAILWAY BOGIES AND PREVENTING ACCIDENTS USING ARM7TDMI AND CAN PROTOCOLSAuthors: Siddu S Kadiwal?; C. Gurudas Nayak?; Shobha Kadiwal?; Gururaj Kadiwal?
- An Advanced Watermarking and Compression of Images using SPIHT CompressionAuthors: Shihas Abdul Razak J; Rekha Bhandarkar
- A Review: Grid ComputingAuthors: Ankit Punia; Ms. Pooja Mittal
- The Multitenant Cloud Architecture?Authors: JUEE DARYAPURKAR; KARUNA BAGDE
- ISONET: HARDWARE BASED JOB QUEUE MANAGEMENT FOR MANY CORE ARCHITECTURESAuthors: Jeyanthi.S; M. Deivakani?
- Human Computer Interaction: Analysis and Journey through Eras?Authors: Pratibha T Jose; Surbhi Miglani; Sanjay Yadav?
- Survey on Network Based Intrusion Detection System in MANET?Authors: Nithya Karthika M; Raj Kumar?
- Social Authentication and Untrusted Clouds for Secure Location Sharing?Authors: Miss. Priyanka K. Shinde; Nitin R. Chopde
- Mobile Computing with WirelessLAN and its Modes Ad hoc Network with Challenges?Authors: Pallavi D. Dudhe; P. L. Ramteke?
- Different Genetic Operator Based Analysis and Exploration of TSP?Authors: Ashima Malik?
- To Avoid Unwanted Messages from User Wall: Content Based Filtering ApproachAuthors: Miss. Dipali D. Vidhate; Ajay P. Thakare?
- CLUSTER ENHANCED SECURE AUTHENTICATION SCHEME FOR DATA INTEGRITY IN MANET?Authors: A. Praveena; L.M. Nithya?
- SECURE DATA TRANSMISSION IN MANETS USING DSR, AODV, TRUST PROTOCOLS?Authors: K.Sangeetha; K.Rajakumari?
- Hybrid Approach for Optimizing the Search Engine Result?Authors: Ashish Kumar Kushwaha; Nitin Chopde?
- AN IMAGE FORENSICS ANALYSIS OF DECISION FUSION APPROACHESAuthors: D.GOKILA BHARATHI; G.SELVAVINAYAGAM?
- Enhancement the Security of WSN using ALARM Protocol to Prevention from Reply Attack?Authors: Neelam Shekhawat; Moumita Ghosh
- Review on “Image Segmentation Methods”?Authors: Rita Harle; M. R. Joshi?
- ASSOCIATION RULE MINING IN DISTRIBUTED DATABASE SYSTEM?Authors: E.Deenadayalan; D.Kerana Hanirex; K.P.Kaliyamurthie?
- A Comprehensive Study on Cloud Computing?Authors: Suruchee V.Nandgaonkar; A. B. Raut?
- Optimization of Rule - Based Medication Delivery in Large scale Healthcare FrameworkAuthors: G.Manikandan; S.Prabakaran?
- A GRAPHICAL PASSWORD BASED AUTHENTICATION BASED SYSTEM FOR MOBILE DEVICES?Authors: Er.Aman Kumar; Er.Naveen Bilandi?
- An Enhancement in Centroid Algorithm in Range-free Grid Based Environment for Wireless Sensor Networks?Authors: Gurleen Singh; Malti Rani?
- RFID Library ImplementationAuthors: Akansha Verma; Niharika Garg?
- MOVIE RECOMMENDATION SYSTEM BASED ON USERS’ SIMILARITY?Authors: Gaurav Arora; Ashish Kumar; Gitanjali Sanjay Devre; Amit Ghumare?
- A Comparative Analysis of OLSR, DSR and ZRP Routing Protocols in MANETsAuthors: Er. Samiti Gupta; Er. Naveen Bilandi?
- A Revived Survey of Various Credit Card Fraud Detection Techniques?Authors: Neha Sethi; Anju Gera?
- Energy Efficient Data Gathering in Wireless Sensor Network?Authors: Bhavna G. Pise; Nikita Chavhan?
- Data Security using Hadoop on Cloud ComputingAuthors: Miss. Pooja.D.Bardiya; Miss. Rutuja.A.Gulhane; P.P.Karde?
- Efficient Data Storage and Searching for Location Based Services using Quadtrees and H-ordering?Authors: Capt. S. Santhosh Baboo; V.Narmadha
- Mail_Alert: Online Suspicious URL Detection of Tweets from Twitter Public TimelineAuthors: SPOORTHI K; SARVAMANGALA D R?
- A Preliminary Review on Web Usage Mining: A Web Mining Technique?Authors: Snehal R. Kawalkar; Pravin P. Karde?
- Retrieving Information by Using Personalized Mobile Search Engine (PMSE)?Authors: D. D. SHIPNE; B. S. AHIRWADKAR?
- A NOVEL METHOD FOR SECURE ROUTING WITH EFFICIENT ENERGY RESOURCES IN WIRELESS NETWORK?Authors: Ms. G.Subbulakshmi @ Nithya; J.Priskilla Angel Rani?
- ANALYSIS OF FIREWALL TECHNOLOGY IN COMPUTER NETWORK SECURITYAuthors: Miss. Shwetambari G. Pundkar; G. R. Bamnote?
- PEER-TO-PEER AD HOC NETWORK: AN OVERVIEW?Authors: Miss. Kalyani U. Sapre; G. R. Bamnote
- BIRCH and DB-scan Techniques in Phishing and Malware Detection?Authors: Shabin Blesson; R.Ravi; Beulah Shekar?
- Correlation Based Feature Selection with Irrelevant Feature Removal?Authors: P.Velavan; S.Subashini?
- IMAGE RECOGNITION BASED CROP DISEASE IDENTIFICATION SYSTEM: A SURVEYAuthors: Nitin S. Tijare; Sagar S. Badnerkar?
- MULTI TARGET TRACKING USING IDOL IN SENSOR NETWORKS?Authors: M.Navanidha; V.Nirosha?
- Data Mining Techniques?Authors: Sayyed Muzammil Ali; Ms. R.R Tuteja?
- DETECTION AND RECOGNITION OF HUMAN FACE USING ANN TRAINED BY GENETICAL ALGORITHM?Authors: Vaibhav N. Dhage; P. L. Ramteke?
- ZigBee Wireless Sensor Network Technology?Authors: Miss. Pooja V. Ingalkar; A. B. Deshmukh?
- Enhancing Probabilistic Packet Marking by Integrating Dynamic Probability and Time to Live (TTL) Clustering?Authors: Souzan Asadollahi?
- DIAGNOSING SENSOR NODES AND DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS?Authors: R. Dhivya Subathra; M. Suguna; D. Sharmila?
- Design Augmented Embedded System for 2D-3D Visualization in Cardiac Surgery?Authors: Lokesh Zambare; S.V.Bhalerao?
- Analysis of Test Case Prioritization Techniques?Authors: Manisha Sahni; Isha Sharma; Jasleen Kaur?
- Quality-Based Image Communication for Wireless Sensor Networking?Authors: Ms. Sneha V.Kalbande; N.M.Tarbani?
- A Review on Virtual Machine Scheduling in Cloud Computing?Authors: Archana Pawar; Deepak Kapgate?
- Security Issues in MANET Routing Protocols and Their Solutions?Authors: Mahesh Kumar Kumawat; Jitendra Singh Yadav?
- V-ISA use in Transmeta Crusoe Processor?Authors: Dipali M. Dhaskat; P. P. Karde?
- A Modified Method for Multiple Description Coding using Quincunx Subsampling?Authors: S. Radhakrishnan; M. Mohamed Sathik?
- Development and Evaluation Mobile Multimedia Cloud Application?Authors: S.P.Warhekar; V.T.Gaikwad; H.N.Datir?
- EUCLIDEAN GEMETRY LDPC CODES FOR ERROR CORRECTION AND ERROR DETECTION IN MEMORY APPLICATION?Authors: P.Kannan; Ms. S.Karthiga?
- Design of ANFIS System for Efficient Throttle and Brake Control of Vehicles?Authors: Roby Siddharth Jangam; Manjurkha M. Pathan?
- Performance Analysis of Dual Tail Comparator for Low Power Applications?Authors: P. Raja Sekara Pandian; M. Krishnamurthy?
- A Survey on Advanced Page Ranking in Query Recommendation?Authors: Rinki Khanna; Asha Mishra?
- An Approach for Finding Frequent Item Set Done By Comparison Based TechniqueAuthors: Ms. Ankita Parmar; Kamal Sutaria; Krutarth Joshi?
- AN APPROACH TO SECURE LOCATION OF USER IN PERVASIVE COMPUTING ENVIRONMENT?Authors: SUDHEER KUMAR SINGH; SHANSHANK SINGH; NITIN GOEL; RAHUL RANJAN
- Efficient Allocation of Resources in Cloud Server Using Lopsidedness?Authors: B. Selvi; C. Vinola; R. Ravi?
- Secure and Energy Efficient CDAMA Scheme in Wireless Sensor Network Using DAS Model?Authors: Nidhi Mouje; Nikita Chavhan
- Finding Correlated CCC-Biclusters from Gene Expression Data?Authors: Geethamani.S; Vijayalakshmi.S?
- A NOVEL STEGANOGRAPHIC APPROACH FOR IMAGE ENHANCEMENT USING LEAST SIGNIFICANT BITAuthors: Deepti Sharma; Anshu Sharma?
- Investigation of New Approach to the Design and Development for Clumping Algorithm in MANET?Authors: Sanjay Kumar; Sudhir Kumar Rathi?
- A Dynamic Approach to Extract Texts and Captions from Videos?Authors: R.Bhavadharani; P.M. Sowmya; A.Thilagavathy?
- AN EFFICIENT APPROACH TO AN IMAGE RETRIEVAL USING PARTICLE SWARM OPTIMIZATIONAuthors: G. Saranya; K. Anitha; A. Chilambuchelvan?
- DEFENDING STEALTHY MODE ATTACKS BY LIVE DETECTION AND ADOPTABLE LEARNING TECHNIQUE?Authors: G.Suganya; K.E Narayana
- Securing Data Stored in Clouds Using Privacy Preserving Authenticated Access Control?Authors: S Divya Bharathy; T Ramesh?
- Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram ShiftingAuthors: KS.Karthik Kumar; R.Bhavani?
- Secure Mining of Association Rules in Horizontally Distributed DatabasesAuthors: Chitteni Siva; Selvi?
- THE EFFECT OF VAMPIRE ATTACKS ON DISTANCE VECTOR ROUTING PROTOCOLS FOR WIRELESS AD HOC SENSOR NETWORKSAuthors: Jagadeesh; Joseph William
- Interaction System with Smart Phones By Speech to Text and Accelerometer?Authors: Monali P. Admane?; Ratnaprabha Jasutkar
- Ancillary Multi Trust Virtual Dissemination for Capability Fortifying Systems?Authors: S. Sundar Raj; Ashish Chaturvedi?
- SURVEY ON TRIPLE SYSTEM SECURITY IN CLOUD COMPUTING?Authors: Parul Mukhi; Bhawna Chauhan
- A Review Paper on Effort Estimation and Model Based Regression Testing with SOAAuthors: Yogesh Bhardwaj; Manju Kaushik?
- Efficient Semantic Information Retrieval System from Relational DatabaseAuthors: Rajeshkumar T; Ramathilagam C?
- A Survey on Spam Filtering for Online Social NetworksAuthors: Bhavish Santhosh Kumar M; G.Venkat Rami Reddy?
- A Process Scheduling Algorithm Based on Threshold for the Cloud Computing Environment?Authors: Kiran Kumar Shakya; D. Singh Karaulia?
- Eye Localization under Different Lighting Ambiance using ANFIS?Authors: Sarmila K. B.; Saranya R.?
- A Review of XML Parallel Parsing TechniquesAuthors: Ravi Varma; G. Venkata Rami Reddy?
- Opportunities and Challenges of Big Data in Economics Research and EnterprisesAuthors: Tushar M. Chavan; S. P. Akarte?
- Forbidden Twin Substantiate Consuming Hash Generation and SVM?Authors: Deepa R?; Noor Alleema N?
- SECURITY ISSUES IN WIRELESS BODY AREA NETWORK?Authors: Shikha Pathania; Naveen Bilandi?
- A NOVAL HINDI LANGUAGE INTERFACE FOR DATABASES?Authors: Mahesh Chauhan; Nikita Bhati?
- Comparison of Asymmetric Algorithms in CryptographyAuthors: Neha Garg; Partibha Yadav?
- A Secure Routing Protocol under Eavesdropping using SPENA Scheme?Authors: Mohini Singhal; Kaushik Ghosh?
- Transfiguring of an Android App Using Reverse Engineering?Authors: Taranjeet Kaur Chawla; Aditi Kajala?
- An Effective Load Balancing Grouping Based Job & Resource Scheduling Algorithms for Fine Grained Jobs in Distributed Environment?Authors: Miss. Hemangi Joshi; Viraj Daxini?
- ENSURING THE NODE AUTOCONFIGURATION AND NODE PREVENTION FROM INTRUDERS USING SFAPAuthors: Udaya.R?; Jenifer.P?
- Data Store and Multi-Keyword Search on Encrypted Cloud Data?Authors: Miss. Devika M. Shelke; Miss. Roshani S. Bhojane; Miss. Tina B. Madane; Pratik N. Gawande; D.J. Manowar; S.S. Dubey?
- EXTENDED STATE KALMAN FILTERING BASED FETAL ECG, MATERNAL ECG EXTRACTION & ESTIMATE THE MATERNAL BLOOD PRESSURE USING SINGLE CHANNEL RECORDINGS?Authors: Remi D; Jebila S?
- An Efficient Directional Multiresolution Image Representation using Contourlet Transform?Authors: Ankita Sharma; Abhay Kumar; Rahul Deshmukh?
- Integrating Static Analysis Tools for Improving Operating System SecurityAuthors: Ashish Joshi; Kanak Tewari; Vivek Kumar; Dibyahash Bordoloi
- Brain Tumor Detection using Curvelet Transform and Support Vector MachineAuthors: Bhawna Gupta; Shamik Tiwari?
- Utilizations of LSB Matching and Replacement for Efficiency Improvement in Digital Secret CommunicationAuthors: Nisha.M.J; G.H.Asha; Anandh Kumar.V; Mahendar.R?
- MULTI LEVEL SECURITY ARCHITECTURE FOR NFC ENABLED CAR KEYSAuthors: Suman Chaudhary; Niharika Garg
- Recognition of 2D Barcode Images Using Edge Detection and Morphological OperationAuthors: Priyanka Gaur; Shamik Tiwari?
- Improve Performance by Task Scheduling Beneficial to Both User and Cloud Provider in Cloud Computing?Authors: Drashti P. Hirani; Altaf B. Mogal?
- Fingerprint Based Gender Classification Using Discrete Wavelet Transform & Artificial Neural Network?Authors: Samta Gupta; A. Prabhakar Rao?
- Analysis of Packet Filtering Technology in Computer Network Security?Authors: Rupali P. Hinglaspure; B. R. Burghate?
- Ongole Breed Cattle Health Expert Advisory System Using Parallel Particle Swarm Optimization Algorithm?Authors: B. Jogeswara Rao; M. S. Prasad Babu?
- MATCHING OF PROCESS DATA AND OPERATIONAL DATA FOR A DEEP BUSINESS ANALYSIS: CHECKING THE SUITABILITY OF PROCESS MANAGEMENT TOOLS AND DATABASE MANAGEMENT TOOLS?Authors: Salman Raza; Ramzan Talib; Atif Amin?
- RESOLUTION ENHANCEMENT OF SATELLITE IMAGES USING DUAL-TREE COMPLEX WAVELET AND CURVELET TRANSFORM?Authors: P.SUBBULAKSHMI; V.SHALINI?
- FPGA IMPLEMENTATION OF DIGITAL WATERMARKING SYSTEM?Authors: K.Tamilvanan; R.B.Selvakumar?
- Development of Mushroom Expert System Based on SVM Classifier and Naive Bayes Classifier?Authors: M.S. Prasad Babu?; Rajani Thommandru?; K.Swapna?; E.Nilima?
- AN EVALUATION OF METHODS TO PRIORITIZE REQUIREMENTSAuthors: Prachi Bhandari; Rajni Sehgal?
- An Efficient Privacy Preserving Scheme for VANET?Authors: BUVANESWARI GANESAN; BENNET PRABHA; MOHANA SUNDARI G?
- Survey on Access Control Delegation to Protect and Maintain Privacy of Cloud DataAuthors: Nicholaus Gati; Sudhakar G.?
- SURVEY ON PROTECTING PRIVACY AND SECURITY IN XML INFORMATION BROKERING?Authors: Noe Elisa; K. Suresh Babu?
- ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKSAuthors: A.Napolean; M.Kaushika?
- COMPARATIVE ANALYSIS OF SOFTWARE COST AND EFFORT ESTIMATION METHODS: A REVIEWAuthors: OMPRAKASH TAILOR; JYOTI SAINI; POONAM RIJWANI?
- A Self Destructing Data System Based on Active Storage Framework for Protecting Data Privacy from attackers UN agency?Authors: R.Rengasamy; V.Kumaresan; G.Guru Rani?
- Implementation of Hash Function Based On Neural Cryptography?Authors: Vineeta Soni; Sarvesh Tanwar; Prema K.V.?
- Host Node Based Collision Free Address Assignment in Ad hoc Networks?Authors: Sumisha Samuel; Avanish Kumar Singh?
- EFFICIENT TECHNIQUES FOR PRESERVING MICRODATA USING SLICING?Authors: Neenu Varghese; Avanish Kumar Singh?