Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.3, No.5
Publisher: ZAIN Publications
Publishing Date: 2014-05-30
- Color Image Segmentation using IMOWT with 2D Histogram Grouping?Authors: Christo Ananth; A.S.Senthilkani; S.Kamala Gomathy; J.Arockia Renilda; G.Blesslin Jebitha; Sankari @Saranya.S.?
- Cloud Computing for Academic Environment?Authors: S. Palaniappan?
- An Industrial Investigation of Human Factors Effect on Software Productivity: Analyzed by SEM Model?Authors: Rabia Khan; Israr Ahmed; Md. Faisal?
- Design of Piezoelectric MEMS Sensor for Energy Harvesting from Low Frequency ApplicationsAuthors: Swapnil D.Shamkuwar; Kunal N.Dekate?
- MONITORING AND SECURITY SYSTEM OF LOCOMOTIVES USING CAN AND PRINCIPLE COMPONENT ANALYSIS?Authors: Lingaraju M R; Pradyumna Bhat?
- Reversible Watermarking for Data Embedding into Images using DHS and IICAuthors: D.Maladevi; V.Rajaram; K.Thaiyalnayaki?
- Improving Selfish Node Detection in ZigBee Wireless Network with Shortcut Tree Routing?Authors: A. Mohanasundaram; R. Regin; P. S. Prakash?
- Path Planning Algorithm for Mobile Anchor-Based Localization in Mobile Networks?Authors: T. S. Lokhande; R. R. Shelke
- AN EFFICIENT APPROACH FOR MOBILE HEALTH MONITORING?Authors: Neena Jose; Jini KM?
- Secure Authentication with 3D Password?Authors: GANESH JAIRAM RAJGURU?; P. L. Ramteke?
- A MISBEHAVIOR DETECTION SCHEME ESTABLISHMENT IN DELAY TOLERANT NETWORKS?Authors: B.Sivakumar; J.Sandhiya?
- Host-Based Intrusion Detection and Attack Graph Selection in VNS?Authors: B.Manikandan; S.Balaji?
- Open Source Solution for Cloud Computing Platform Using OpenStack?Authors: Rakesh Kumar; Neha Gupta; Shilpi Charu; Kanishk Jain; Sunil Kumar Jangir?
- A Review of Rule Based Clustering and Routing Approach to Improve Clustered Network Communication?Authors: Shafali Vashist; Samit Yadav?
- Approaches for Combating Delay and Achieving Optimal Path Efficiency in Wireless Sensor Networks?Authors: Agam Gupta; Mansi Gupta; Anand Nayyar?
- Review of Routing Techniques Driving Wireless Sensor NetworksAuthors: Shuchi Sharma; Mansi Gupta; Anand Nayyar?
- FPGA PROTOTYPING OF UNIVERSAL ASYNCHRONOUS RECEIVER TRANSMITTER (UART) WITH LOW POWER TPG BASED BIST ARCHITECTURE?Authors: Manjesh H N; Pradyumna G R?
- Improving Security to avoid Malicious Node for Reducing Routing Overhead in Mobile Ad Hoc Networks (MANET)?Authors: ANANDRAJ D.S; P.Madhavan?
- DETECTION OF SKIN CANCER USING HYBRID OF SVM-ID3 ALGORITHM?Authors: Greeshma Rajan; G Shivaraj?
- Loading Margin Enhancement in Power System via FACTS Devices Hybrid StructureAuthors: Mohammad Hasan Raouf; Ahmad Rouhani; Reza Sedaghati
- A Research Work on Identification of Cardiac Disorders using LabVIEW?Authors: Mohan Kumar; Umesh K; Pandiaraja G; Sonu Thomas; Venkatesh M?
- MOBILE MULTIMEDIA TRAFFIC ANALYSIS: CLIENTS CAN WASTE NETWORK BANDWIDTH?Authors: Karishma Talan; G.R. Bamnote?
- Multi Interface Mobility Management with SIP and MIP (To Avoid Handoff Delay)?Authors: K.Durairaj; S.Jeevanandham; M.Rajkumar; R.Selvakumar?
- An Efficient Multilayer Perceptron Neural Network for Mobile Image Annotation on the Cloud?Authors: Jai Bharathi; M. Tamizharasi?
- A Naïve Approach to Send Large Textual File using Mobile Phones?Authors: Mohnish Vidyarthi?; Bright Keswani?
- An Improved Energy Efficient Multipath Routing in WSN?Authors: R.Indhu; A.Balamurugan; E. Merlin Mercy?
- REDUCING DYNAMIC POWER BY PULSED LATCH AND MULTIPLE PULSE GENERATOR IN CLOCKTREE?Authors: T. Angala Parameshwari; S. Jeevitha; T.Thamaraimanalan?
- Improving Service Credibility in Password Authentication Peer Service?Authors: S. Bhuvanesh; L. Anita Elizabeth?
- MOOC Providers and their Strategies?Authors: Shilpi Taneja; Anita Goel?
- Improved Service Broker Algorithm Based On Weighted Moving Average Forecast Model for Cloud Computing?Authors: Sonali Rathod; Deepak Kapgate?
- A Survey of Sinkhole Attack on DSR in MANET?Authors: G. Vennila; D. Arivazhagan; N. Manickasankari?
- Soft Computing Based Intrusion Detection System?Authors: Ravi Sharma; Balkishan; Sunil Sikka
- Confronts and Applications in Marine Sensor Networks?Authors: H.J Shanthi; E.A Mary Anita?
- Probabilistic Topic Modeling using LDA of Taxonomic Structure of Genomic Data?Authors: Dnyati S. Randhave; Kiran V. Sonkamble?
- Comparison of Epileptic Seizure Detection using Auto-Regressive Model and Linear Prediction Model?Authors: Priyanka Jain; Pradeep Kumar Govindaiah?
- Simulation of Insects Classification Based on Android Computing Platform?Authors: Baydaa F. Dhahir; Alaa Hussein?
- An Improved Stable Election Based Routing Protocol with Threshold Sensitiveness for Wireless Sensor Network?Authors: Anand Mohan Tripathi; P.Velmurugan?
- Enhanced Reactive Routing Protocol for Wireless Sensor Networks?Authors: P. Balasubramanian?; T. Maheswaran
- Energy Efficient Trust Dependable System for Wireless Sensor NetworksAuthors: K.Anandaraj; N.Kumaratharan; D.Balasubramanian?
- An Optimization in Cloud Computing for Job Forecast?Authors: Seema Gusain?; Rupak Kumar?
- Stability Analysis and State Feedback Stabilization of Inverted Pendulum?Authors: Nithya.R; Vivekanandan.C?
- Effective Concept for Detection of Web Based Attacks Using ID3 AlgorithmAuthors: Sachin S. Patil; Deepak Kapgate; P.S. Prasad?
- A STUDY ON ISSUES AND TECHNIQUES OF WEB MININGAuthors: R. Munilatha; K.Venkataramana
- A Review on Partitioning Techniques in Database?Authors: Abhay Kumar; Jitendra Singh Yadav?
- A Framework for an Outlier Pattern Detection in Weather Forecasting?Authors: Kavita Thawkar; Snehal Golait; Rushi Longadge
- Clustering Techniques Analysis for Microarray Data?Authors: Shweta Srivastava; Nikita Joshi?
- A Review: Security Issues in Mobile Ad Hoc Network?Authors: Priti; Priti Sharma?
- Face Detection Using Skin Likelihood with Mean Shift Tracking For Digital Video Processing?Authors: Vishakha V. Navlakhe; Deepak Kapgate; P. S. Prasad?
- An Improved Novel Steganographic Technique for RGB and YCbCr Colorspace?Authors: Shweta Maurya; Vishal Shrivastava?
- Study and Approaches to Green Environment through Eco- Friendly Devices?Authors: Jamshed Siddiqui; Abdus Samad; Zaki Ahmad Khan
- DEBLOCKING FILTER BASED ARTIFACT REDUCTION USING PSEUDO RANDOM NOISE MASKINGAuthors: R. Prabhakaran
- Enhancement of Web Search Engine Results Using Keyword Frequency Based Ranking?Authors: Nilima V. Pardakhe; R. Keole?
- Appraisal of Efficient Techniques for Online Record Linkage and Deduplication using Q-Gram Based Indexing?Authors: M.V Shiva Prasad; Ch.Krishna Prasad; B.Rambabu?
- Cloud Computing and Faults in Cloud Computing?Authors: Pallavi A. Patil; K. G. Bagde
- A Proposed Mobile Based Health Care System for Patient Diagnosis using Android OS?Authors: Ketan D. Bodhe; R. R. Sawant; A. N. Kazi?
- Advancement in Dynamic Source Routing Protocol for MANETs?Authors: Geetanjali Sharma; Malti Rani?
- Critical Analysis of Database Management Using NewSQL?Authors: Rakesh Kumar; Neha Gupta; Hitesh Maharwal; Shilpi Charu; Kusum Yadav?
- Enhancing Image and Video Transmission by Applying Unequal Power Allocation, over MIMO OFDM System?Authors: Pallavi B. Kowale; Bhakti Kurhade
- Efficient Virtual Machine Scheduling in Cloud Computing?Authors: Dilshad H.Khan; Deepak Kapgate?
- A Review of Rician Noise Reduction in MRI Images using Wave Atom TransformAuthors: Shashi Jangra; Samit Yadav?
- Securing Fingerprint and Iris Templates using Non-Expanded Inverted Share Image Visual Cryptography?Authors: Sneha .P. Meshram; Rushi Longadge
- Implementation of Preprocessing Techniques in Datamining?Authors: A. Abdullah; O. Fadhil?
- Effective Concept of Implementing Secure DIBS using Query SegmentationAuthors: Ashutosh Kamble; Deepak Kapgate?
- FEATURE SELECTION USING AN EFFECTIVE DIMENSIONALITY REDUCTION TECHNIQUE?Authors: M.V.Siva Prasad; CH. Suresh Kumar; T. Maneesha?
- The Energy Efficient Multi-Hop Clustering Process for Data Transmission in Mobile Sensor NetworksAuthors: V. Shunmuga Sundaram
- Comparison of SVD-Watermarking and LSB-Watermarking Techniques?Authors: Anupma Yadav; Anju Yadav?
- Implementation of Reversible Sequential Circuits Using Conservative Logic GatesAuthors: Dhaarinee.S; Rajeswaran.N
- A SURVEY OF SECURE AND PRIVACY PRESERVING IN SOCIAL NETWORK WITH GROUP MATCHING TECHNIQUES?Authors: RESHMA ZUNKE; AMIT PIMPALKAR?
- DESIGN AND ANALYSIS OF SRAM ARRAY STRUCTURES?Authors: S.Divyapriya; P.Ramamoorthy?
- Implementation of Content Base Image Retrieval Using Clustering Technique?Authors: Junaid Khan; S.S. Kulkarni?
- A Review Report on Secured Encryption in Cloud Computing using Symmetric Cryptography?Authors: Anand D.Darne; Rushikesh Longadge; Pradnya Kambale?
- Inference Mining using Direct and Indirect Discrimination Prevention in Data MiningAuthors: S. Shanthi; A. Gomathi?
- VIRTUALIZATION IN CLOUD COMPUTING?Authors: T.Swathi; K.Srikanth; S. Raghunath Reddy?
- Fault Tolerance Testing for Crash and Omission Transient Failure during Resource Scheduling of Grid Computing?Authors: Inderpreet Kaur; Sarpreet Singh
- An Improved min - min Algorithm for Job Scheduling using Ant Colony OptimizationAuthors: Davinder Kaur; Sarpreet Singh?
- Code Optimization in Compilers using ANN?Authors: Jay Patel; Mahesh Panchal?
- Weighted Mean Scheme for PAPR Reduction of OFDM Signals?Authors: K. Rajesh; K. Suresh?
- An Efficient VLSI Architecture for Removal of Impulse Noise in Images?Authors: S. Karpagaabirami; P. Ramamoorthy?
- Encrypted Query Processing for Improved Protection of Confidentiality?Authors: Sinu P S; M.Ananthi?
- EXPERT SYSTEM FOR CORONARY HEART DISEASE - BUILT USING ARTIFICIAL INTELLIGENCE?Authors: Suchithra; P.Uma Maheswari?
- E-Agriculture Information Management System?Authors: Sumitha Thankachan; S.Kirubakaran
- Data Protection Outsourcing of Cloud Data to Maintain Trust between Cloud Service and Data Owner Using RC5 Algorithm?Authors: Ajay Bhaisare?; Ajay Bhaisare?
- Secure Profile Matching and Privacy Preserving In Mobile Social Network?Authors: Deepa Kale; Rushi Longadge?
- Selective Packet Drop Attack in MANET-A Review?Authors: Anubha Goyal?
- An Eccentric Methodology for Augmenting Web Navigation?Authors: Adhokshaj Haridas; Pragati Patil; Yogesh Bhute?
- Multiple Fault Detection in an Automobile Engine Using Single Sensor System?Authors: Shankar N. Dandare; S. V. Dudul?
- Multiple Fault Detection in a Four Stroke Engine Using Single Sensor System?Authors: Shankar N. Dandare; S. V. Dudul
- Classification of Multiple Fault in an Automobile Engine Using Statistical and ANN Based ClassifiersAuthors: Shankar N. Dandare; S. V. Dudul??
- Monitoring the Network and System Performance for Efficient Data Storage?Authors: Birunda Devi.M; Vairachilai.S?
- VIDEO SURVEILLANCE FRAMEWORK FOR REMOTE MONITORINGAuthors: Kshitij Raj?; Prajakta Kapadnis?; Ashwini Natambe?; Sainath Sarkar?
- ADAPTIVE TECHNIQUE FOR HIGH SPEED MOBILE ENVIRONMENT USING TFT-OFDM?Authors: Aravinth Babu.G; Suresh.K?
- RESULT ANALYSIS OF BLOOD CELLS BLAST DETECTION BY USING LPG PCA LPG 2DPCA AND FAST NONLOCAL FILTERING ALONG WITH OTSU’S THRESHOLDING TECHNIQUE?Authors: SHRUTIKA MAHAJAN; ASHWINI MESHRAM?
- Fingerprinting Based Recursive Information Hiding Strategy in Cloud Computing Environment?Authors: Varsha Yadav; Preeti Aggarwal?
- A Review on the Role of Domain Driven Data Mining?Authors: Madeeha Aslam; Ramzan Talib; Humaira Majeed
- Implementation of Hierarchical Clustering with Multiviewpoint-Based Similarity Measure?Authors: Ashish Moon; Vinod Nayyar?
- Energy Efficient Administrator Based Routing Approach in MANET?Authors: Vimal M. Kotadiya?; Altaf B. Mogal?
- Improving Classification Accuracy Using Ensemble Learning Technique (Using Different Decision Trees)?Authors: Nikita Joshi; Shweta Srivastava?
- Analysis of Low Power Flip Flops using an Efficient Embedded Logic?Authors: Krishnapriya.K.P; V.J.Arul Karthick?
- A Review Data Safeguard for Cloud Computing?Authors: Naveen Hemrajani; Surendra Yadav; Bhanu Bhushan Parashar?
- Fast and Robust Method for Nuclei segmentation in Cytological Images of Breast FNAC Samples?Authors: Aditya Pise; Rushi Longadge?
- Secure Protocol and Signature Based Intrusion Detection for Spontaneous Wireless AD HOC Network?Authors: Nikhil Varghane; Bhakti Kurade?
- Content Based Image Retrieval: A Review Paper?Authors: Babita Singh; Waseem Ahmad?
- Extraction of Classification Rules from Trained ANN for Multiclass Data?Authors: Ankita Patel; Mahesh Panchal?
- A Novel Approach for Face Recognition Using PCA and Artificial Neural Network?Authors: Karthik G; Sateesh Kumar H C?
- A Simplified Review on REAL TIMEOBJECT DETECTION AND 3D MODELINGAuthors: Prerna Dahiya; Kamal Kumar Ranga?
- Simulative Investigation of VANET through Small Scale LOS-NLOS Channel Conditions?Authors: Amandeep Kaur; Malti Rani; Jyoteesh Malhotra?
- Enhance Two-Tier Secure Model of Modern Image Steganography?Authors: Tanuja Mahajan; Bhakti Kurhade?
- Various Image Segmentation Techniques: A Review?Authors: Dilpreet Kaur; Yadwinder Kaur?
- SERIAL COMPUTING vs. PARALLEL COMPUTING: A COMPARATIVE STUDY USING MATLAB?Authors: Abhay B. Rathod; Rajratna Khadse; M Faruk Bagwan?
- Reversible Data Hiding and its Methods: A Survey?Authors: Sukhdeep Kaur; Manshi Shukla?
- Result Analysis for LBP and Shape Context Methodologies used as Authentication Mechanisms of Digital Signatures used for Certification?Authors: Shraddha Kulkarni; Vikrant Chole
- Optimizing the Performance and Secure Distributed Wireless Network in Unreliable D-NCS using CGA?Authors: Babu Pinjar?; C.N.Chinnaswamy?
- Dynamic Routing for ADA in Wireless Sensor Networks?Authors: Nagaraj?; C.N.Chinnaswamy?
- PROCURE DATA CENTRE SHARING SCHEME IN VIRTUAL CLOUD ENVIRONMENT USING CLOUDSIM?Authors: P. Ranjith Kumar; M. Shanthi?
- Effective Copyright Protection of Digital Products by Embedding Watermarking?Authors: Monika Craig; Deepak Kapgate?
- Privacy Preserving in Online Social Network?Authors: Navnath.S.Bagal; Navnath.D.Kale
- Survey of Document Clustering?Authors: Hetal Gaudani; Khushboo Lakhani; Riten Chhatrala
- A REVIEW: GUI TESTINGAuthors: Suman?; R.S.Chhillar?
- A Review on Software Defect Prediction Models Based on Different Data Mining Techniques?Authors: Raminder Kaur; Punam Bajaj?
- Energy Efficient Resource Allocation in Wireless Sensor Networks?Authors: Shraddha Fulkar?; Deepak Kapgate?
- Design and Implementation of a Weather Forecasting System Based on Temperature and Light Sensors?Authors: Pranjali U. Wankhede; Amit Pimpalkar?
- PROXY MOBILE IPv6 AND SOLUTION FOR PMIPv6?Authors: Bhagyashri P. Deshpande; N.M.Tarbani?
- Various Techniques for Detecting Skin Lesion: A Review?Authors: Hina Sood; Manshi Shukla?
- IMPROVEMENT USING WEIGHTED METHOD FOR HISTOGRAM EQUALIZATION IN PRESERVING THE COLOR QUALITIES OF RGB IMAGEAuthors: Er.Navneet Kaur; Er.Kanwalpreet Singh?
- Discovery of Frequent Itemset and Promising Frequent Itemset Using Incremental Association Rule Mining Over Stream Data Mining?Authors: Anju Kakkad; Anita Zala
- Techniques in Detection and Analyzing Malware Executables: A Review?Authors: Milan Jain; Punam Bajaj?
- Time-Frequency Domain Characterization of Stationary and Non stationary Signals?Authors: Ramandeep Kaur?; Vikramjit Singh?
- SECURITY PROTOCOLS FOR VEHICULAR ADHOC NETWORKS: A REVIEW?Authors: Shubham Gandhi; Shalini?
- A HEURISTIC APPROACH FOR MIXED CRITICALITY JOBS SCHEDULING IN REAL TIME SYSTEMS?Authors: Naveenkumar Koregol; M. V. Panduranga Rao?
- Investigation of Flooding / Gossiping Of Messages by a Node inside Hop Using Spanning Tree?Authors: Ramandeep Kaur; Vikramjit Singh?
- A STUDY ON CLOUD STORAGE?Authors: M. Lakshmi Neelima; M. Padma?
- Mobile Cloud Computing: Issues from a Security PerspectiveAuthors: M. Padma; M. Lakshmi Neelima?
- A New Approach to Preserve Privacy in Distributed Information Sharing Using Privacy Preserving Information Brokering?Authors: Vijaymahanthesh K.H; T.R. Muhibur Rahman?
- Ab-initio Algorithms for 3D-Protein Structure Prediction?Authors: Mohan Kumar; Satish Pandey; K. L. Jaiswal; Pramod Yadav
- A Survey on Swarm Intelligence Algorithms?Authors: S. Vanitha; T.Padma?
- Avoiding Overload by Using Virtual Machine in Cloud Data Centre?Authors: Indumathi.S; P. Ranjithkumar?
- Using Position Based and Cognitive Radio in Vehicular Ad-hoc NetworkAuthors: P. Ranjith Kumar; D. Jeya; G. Naresh Kumar?
- An Efficient Algorithm for Clustering Data Using Map-Reduce Approach?Authors: Puppala Priyanka; SK.Abdul Nabi; Meena Kumari P?
- Security Issues in Mobile Ad Hoc NetworksAuthors: Mali Basaveshwar Laxman?
- Cloud Based Framework for Road Accident Analysis?Authors: T Senthil Kumar; J Vishak; Sanjay Sanjeev; Sneha B
- Efficient High Dimensional Data Clustering Using Hubness PhenomenonAuthors: Sayali P. Barde; Vikrant Chole?; L. H. Patil??
- Data Hiding At 7th Bit (RGB) With Cryptography?Authors: Rashi Singh; Gaurav Chawla?
- Verifying Data Integrity in Hybrid CloudAuthors: Sachin Lakade; Mirza Baig?
- Steganography on Android Based Smart PhonesAuthors: S.Sivakumar; B.Rajesh?
- Detection of ARP Spoofing Attack Using ICMP Protocol?Authors: Vinay K.R; B.K. Gudur?
- Dissemination of Xml Data in Wireless Environment Supporting Twig Pattern Queries?Authors: Namose; R.H.Kulkarni?
- Analysing Geographic based Routing Protocols in Manets?Authors: Shelja Malhotra; Nasib Singh Gill?
- FAULT TOLERANT REAL TIME COMMUNICATION IN MULTIHOP NETWORKS USING SEGMENTED BACKUPAuthors: K.Shirisha; Ch. Radha Krishna; Gousiya Begum; S.Vijaya Lakshmi?
- CYBER TERRORISM ATTACK OF THE CONTEMPORARY INFORMATION TECHNOLOGY AGE: ISSUES, CONSEQUENCES AND PANACEA?Authors: Kuboye Oluwafemi Samuel; Wan Rozaini Sheik Osman; Yazan Al Khasawneh; Saif Duhaim?
- Minimal Cost Data Sets Storage in the Cloud?Authors: Sanoop Jacob Thomas; P. Balakumar?
- Virtual Identity Creation by Fingerprint Combination for Privacy Protection?Authors: Namrata Yesansure; Rushi Longadge?
- Implementation of Privacy Mechanism using Curve Fitting Method for Data Publishing in Health Care Domain?Authors: Varsha Meshram; Y.C .Bhute?
- Improved Inter-Cluster Data Aggregation HEER Protocol?Authors: Sakshi Sharma; Malti Rani?
- A Unique Approach to Multimedia Based Dynamic Symmetric Key Cryptography?Authors: Vinay Verma; Rajesh Kumar?
- Next Day Congestion &Traffic Management (EBFCN) with Intelligent Switch for Ethernet in Datacenters?Authors: Naveen Kumar; Priti Sharma?
- Optimization Of Capacity Of MIMO Antenna Based Wireless System Using Genetic Algorithm?Authors: R.Sharma; A.S.Buttar?
- Design and Implementation of Bluetooth Based Data Logging of Processed Real Time Signal Using PIC16F877A?Authors: Bhargavi.K.Rao; Sukesh.Rao.M
- Java Based Serial Data Logging SystemAuthors: Anupama.B; Sukesh Rao.M?
- A Survey on Energy Efficient Clustering Protocols for Wireless Sensor Network?Authors: M.Sheik Dawood; P.Jayalakshmi; R Abdul Sikkandhar; G.Athisha?
- ANALYSIS OF PROTECTIVE SYSTEM FOR HIGH VOLTAGE LINES USING PROTOCOL IEC 61850?Authors: Pooja Naik M; M V Gopalan; Sudheendran L?
- AN APPROACH TOWARDS REMOVAL OF COMPARABLE ASPECTS BY ACCUMULATING QUERIES?Authors: M.V.Siva Prasad; P.Guru Lingam; N.Mahesh Babu?
- ID SECURITY SYSTEM IN HIGH TRAFFIC FOR MOBILE ADHOC NETWORK USING ACKNOWLEDGEMENTSAuthors: Asha N; Gowtham M?
- Performance Improvement in Multimedia Answering By Web Excavation?Authors: Aparna.N; Prathima.V.R?
- Prevention of Session Hijacking and IP Spoofing With Sensor Nodes and Cryptographic Approach?Authors: Krunal P. Bhaturkar?; Karuna G. Bagde?
- Document Clustering Using Concept Weight?Authors: Sapna Gupta; Vikrant Chole
- An Analysis of Subspace Methods for Large South Indian DatasetsAuthors: Krishna Murthy C.R; C.Naveena; T.C Manjunath?
- A Simplified Review on Fast HSV Image Color and Texture Detection and Image Conversion AlgorithmAuthors: Monika Deswal; Neetu Sharma?
- A Framework for MEMS Based Hand Gesture Recognition System for Controlling the Mouse Cursor using Wireless Technology?Authors: Khushbu Agrawal; Vikrant Chole?
- Intrusion Detection using Fuzzy Data MiningAuthors: Sandeep Dhopte; Manoj Chaudhari
- A Simplified Review on Study and Implementation of Recognizing Terrorist by Rapid Detection by Activities and their Facial MatchAuthors: Ritu Kanwa; Samit Yadav?
- Security in WLAN- Review of Security and Throughput Tradeoff?Authors: Avinash Kaur; Harwant Singh
- A DYNAMIC APPROACH FOR DATABASE SECURITY?Authors: Mahesh Singh; Alka
- Optimization of Distributed Association Rule Mining Based Partial Vertical PartitioningAuthors: MONIKA?
- VIRTUALIZATION IN CLOUD COMPUTING?Authors: Deepanshu Thakral; Mahesh Singh
- Content Based Image Retrieval using Color Feature Extraction with KNN ClassificationAuthors: PRAGATI ASHOK DEOLE; RUSHI LONGADGE?
- Review Paper on E-learning Using Cloud Computing?Authors: Poonam R.Maskare; Sarika R.Sulke?
- A RELIABLE APPLICATION LEVEL BROADCASTING PROTOCOL FOR VANET?Authors: S. Vijayakumar; A. Noble Mary Juliet; M.L.Valarmathi?
- A Review on GPS and its Applications in Computer Science?Authors: POOJA SINGAL; R.S.CHHILLAR