ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.3, No.5

Publisher: ZAIN Publications

Publishing Date: 2014-05-30

  1. Color Image Segmentation using IMOWT with 2D Histogram Grouping?

    Authors: Christo Ananth; A.S.Senthilkani; S.Kamala Gomathy; J.Arockia Renilda; G.Blesslin Jebitha; Sankari @Saranya.S.?

  2. Cloud Computing for Academic Environment?

    Authors: S. Palaniappan?

  3. An Industrial Investigation of Human Factors Effect on Software Productivity: Analyzed by SEM Model?

    Authors: Rabia Khan; Israr Ahmed; Md. Faisal?

  4. Design of Piezoelectric MEMS Sensor for Energy Harvesting from Low Frequency Applications

    Authors: Swapnil D.Shamkuwar; Kunal N.Dekate?

  5. MONITORING AND SECURITY SYSTEM OF LOCOMOTIVES USING CAN AND PRINCIPLE COMPONENT ANALYSIS?

    Authors: Lingaraju M R; Pradyumna Bhat?

  6. Reversible Watermarking for Data Embedding into Images using DHS and IIC

    Authors: D.Maladevi; V.Rajaram; K.Thaiyalnayaki?

  7. Improving Selfish Node Detection in ZigBee Wireless Network with Shortcut Tree Routing?

    Authors: A. Mohanasundaram; R. Regin; P. S. Prakash?

  8. Path Planning Algorithm for Mobile Anchor-Based Localization in Mobile Networks?

    Authors: T. S. Lokhande; R. R. Shelke

  9. AN EFFICIENT APPROACH FOR MOBILE HEALTH MONITORING?

    Authors: Neena Jose; Jini KM?

  10. Secure Authentication with 3D Password?

    Authors: GANESH JAIRAM RAJGURU?; P. L. Ramteke?

  11. A MISBEHAVIOR DETECTION SCHEME ESTABLISHMENT IN DELAY TOLERANT NETWORKS?

    Authors: B.Sivakumar; J.Sandhiya?

  12. Host-Based Intrusion Detection and Attack Graph Selection in VNS?

    Authors: B.Manikandan; S.Balaji?

  13. Open Source Solution for Cloud Computing Platform Using OpenStack?

    Authors: Rakesh Kumar; Neha Gupta; Shilpi Charu; Kanishk Jain; Sunil Kumar Jangir?

  14. A Review of Rule Based Clustering and Routing Approach to Improve Clustered Network Communication?

    Authors: Shafali Vashist; Samit Yadav?

  15. Approaches for Combating Delay and Achieving Optimal Path Efficiency in Wireless Sensor Networks?

    Authors: Agam Gupta; Mansi Gupta; Anand Nayyar?

  16. Review of Routing Techniques Driving Wireless Sensor Networks

    Authors: Shuchi Sharma; Mansi Gupta; Anand Nayyar?

  17. FPGA PROTOTYPING OF UNIVERSAL ASYNCHRONOUS RECEIVER TRANSMITTER (UART) WITH LOW POWER TPG BASED BIST ARCHITECTURE?

    Authors: Manjesh H N; Pradyumna G R?

  18. Improving Security to avoid Malicious Node for Reducing Routing Overhead in Mobile Ad Hoc Networks (MANET)?

    Authors: ANANDRAJ D.S; P.Madhavan?

  19. DETECTION OF SKIN CANCER USING HYBRID OF SVM-ID3 ALGORITHM?

    Authors: Greeshma Rajan; G Shivaraj?

  20. Loading Margin Enhancement in Power System via FACTS Devices Hybrid Structure

    Authors: Mohammad Hasan Raouf; Ahmad Rouhani; Reza Sedaghati

  21. A Research Work on Identification of Cardiac Disorders using LabVIEW?

    Authors: Mohan Kumar; Umesh K; Pandiaraja G; Sonu Thomas; Venkatesh M?

  22. MOBILE MULTIMEDIA TRAFFIC ANALYSIS: CLIENTS CAN WASTE NETWORK BANDWIDTH?

    Authors: Karishma Talan; G.R. Bamnote?

  23. Multi Interface Mobility Management with SIP and MIP (To Avoid Handoff Delay)?

    Authors: K.Durairaj; S.Jeevanandham; M.Rajkumar; R.Selvakumar?

  24. An Efficient Multilayer Perceptron Neural Network for Mobile Image Annotation on the Cloud?

    Authors: Jai Bharathi; M. Tamizharasi?

  25. A Naïve Approach to Send Large Textual File using Mobile Phones?

    Authors: Mohnish Vidyarthi?; Bright Keswani?

  26. An Improved Energy Efficient Multipath Routing in WSN?

    Authors: R.Indhu; A.Balamurugan; E. Merlin Mercy?

  27. REDUCING DYNAMIC POWER BY PULSED LATCH AND MULTIPLE PULSE GENERATOR IN CLOCKTREE?

    Authors: T. Angala Parameshwari; S. Jeevitha; T.Thamaraimanalan?

  28. Improving Service Credibility in Password Authentication Peer Service?

    Authors: S. Bhuvanesh; L. Anita Elizabeth?

  29. MOOC Providers and their Strategies?

    Authors: Shilpi Taneja; Anita Goel?

  30. Improved Service Broker Algorithm Based On Weighted Moving Average Forecast Model for Cloud Computing?

    Authors: Sonali Rathod; Deepak Kapgate?

  31. A Survey of Sinkhole Attack on DSR in MANET?

    Authors: G. Vennila; D. Arivazhagan; N. Manickasankari?

  32. Soft Computing Based Intrusion Detection System?

    Authors: Ravi Sharma; Balkishan; Sunil Sikka

  33. Confronts and Applications in Marine Sensor Networks?

    Authors: H.J Shanthi; E.A Mary Anita?

  34. Probabilistic Topic Modeling using LDA of Taxonomic Structure of Genomic Data?

    Authors: Dnyati S. Randhave; Kiran V. Sonkamble?

  35. Comparison of Epileptic Seizure Detection using Auto-Regressive Model and Linear Prediction Model?

    Authors: Priyanka Jain; Pradeep Kumar Govindaiah?

  36. Simulation of Insects Classification Based on Android Computing Platform?

    Authors: Baydaa F. Dhahir; Alaa Hussein?

  37. An Improved Stable Election Based Routing Protocol with Threshold Sensitiveness for Wireless Sensor Network?

    Authors: Anand Mohan Tripathi; P.Velmurugan?

  38. Enhanced Reactive Routing Protocol for Wireless Sensor Networks?

    Authors: P. Balasubramanian?; T. Maheswaran

  39. Energy Efficient Trust Dependable System for Wireless Sensor Networks

    Authors: K.Anandaraj; N.Kumaratharan; D.Balasubramanian?

  40. An Optimization in Cloud Computing for Job Forecast?

    Authors: Seema Gusain?; Rupak Kumar?

  41. Stability Analysis and State Feedback Stabilization of Inverted Pendulum?

    Authors: Nithya.R; Vivekanandan.C?

  42. Effective Concept for Detection of Web Based Attacks Using ID3 Algorithm

    Authors: Sachin S. Patil; Deepak Kapgate; P.S. Prasad?

  43. A STUDY ON ISSUES AND TECHNIQUES OF WEB MINING

    Authors: R. Munilatha; K.Venkataramana

  44. A Review on Partitioning Techniques in Database?

    Authors: Abhay Kumar; Jitendra Singh Yadav?

  45. A Framework for an Outlier Pattern Detection in Weather Forecasting?

    Authors: Kavita Thawkar; Snehal Golait; Rushi Longadge

  46. Clustering Techniques Analysis for Microarray Data?

    Authors: Shweta Srivastava; Nikita Joshi?

  47. A Review: Security Issues in Mobile Ad Hoc Network?

    Authors: Priti; Priti Sharma?

  48. Face Detection Using Skin Likelihood with Mean Shift Tracking For Digital Video Processing?

    Authors: Vishakha V. Navlakhe; Deepak Kapgate; P. S. Prasad?

  49. An Improved Novel Steganographic Technique for RGB and YCbCr Colorspace?

    Authors: Shweta Maurya; Vishal Shrivastava?

  50. Study and Approaches to Green Environment through Eco- Friendly Devices?

    Authors: Jamshed Siddiqui; Abdus Samad; Zaki Ahmad Khan

  51. DEBLOCKING FILTER BASED ARTIFACT REDUCTION USING PSEUDO RANDOM NOISE MASKING

    Authors: R. Prabhakaran

  52. Enhancement of Web Search Engine Results Using Keyword Frequency Based Ranking?

    Authors: Nilima V. Pardakhe; R. Keole?

  53. Appraisal of Efficient Techniques for Online Record Linkage and Deduplication using Q-Gram Based Indexing?

    Authors: M.V Shiva Prasad; Ch.Krishna Prasad; B.Rambabu?

  54. Cloud Computing and Faults in Cloud Computing?

    Authors: Pallavi A. Patil; K. G. Bagde

  55. A Proposed Mobile Based Health Care System for Patient Diagnosis using Android OS?

    Authors: Ketan D. Bodhe; R. R. Sawant; A. N. Kazi?

  56. Advancement in Dynamic Source Routing Protocol for MANETs?

    Authors: Geetanjali Sharma; Malti Rani?

  57. Critical Analysis of Database Management Using NewSQL?

    Authors: Rakesh Kumar; Neha Gupta; Hitesh Maharwal; Shilpi Charu; Kusum Yadav?

  58. Enhancing Image and Video Transmission by Applying Unequal Power Allocation, over MIMO OFDM System?

    Authors: Pallavi B. Kowale; Bhakti Kurhade

  59. Efficient Virtual Machine Scheduling in Cloud Computing?

    Authors: Dilshad H.Khan; Deepak Kapgate?

  60. A Review of Rician Noise Reduction in MRI Images using Wave Atom Transform

    Authors: Shashi Jangra; Samit Yadav?

  61. Securing Fingerprint and Iris Templates using Non-Expanded Inverted Share Image Visual Cryptography?

    Authors: Sneha .P. Meshram; Rushi Longadge

  62. Implementation of Preprocessing Techniques in Datamining?

    Authors: A. Abdullah; O. Fadhil?

  63. Effective Concept of Implementing Secure DIBS using Query Segmentation

    Authors: Ashutosh Kamble; Deepak Kapgate?

  64. FEATURE SELECTION USING AN EFFECTIVE DIMENSIONALITY REDUCTION TECHNIQUE?

    Authors: M.V.Siva Prasad; CH. Suresh Kumar; T. Maneesha?

  65. The Energy Efficient Multi-Hop Clustering Process for Data Transmission in Mobile Sensor Networks

    Authors: V. Shunmuga Sundaram

  66. Comparison of SVD-Watermarking and LSB-Watermarking Techniques?

    Authors: Anupma Yadav; Anju Yadav?

  67. Implementation of Reversible Sequential Circuits Using Conservative Logic Gates

    Authors: Dhaarinee.S; Rajeswaran.N

  68. A SURVEY OF SECURE AND PRIVACY PRESERVING IN SOCIAL NETWORK WITH GROUP MATCHING TECHNIQUES?

    Authors: RESHMA ZUNKE; AMIT PIMPALKAR?

  69. DESIGN AND ANALYSIS OF SRAM ARRAY STRUCTURES?

    Authors: S.Divyapriya; P.Ramamoorthy?

  70. Implementation of Content Base Image Retrieval Using Clustering Technique?

    Authors: Junaid Khan; S.S. Kulkarni?

  71. A Review Report on Secured Encryption in Cloud Computing using Symmetric Cryptography?

    Authors: Anand D.Darne; Rushikesh Longadge; Pradnya Kambale?

  72. Inference Mining using Direct and Indirect Discrimination Prevention in Data Mining

    Authors: S. Shanthi; A. Gomathi?

  73. VIRTUALIZATION IN CLOUD COMPUTING?

    Authors: T.Swathi; K.Srikanth; S. Raghunath Reddy?

  74. Fault Tolerance Testing for Crash and Omission Transient Failure during Resource Scheduling of Grid Computing?

    Authors: Inderpreet Kaur; Sarpreet Singh

  75. An Improved min - min Algorithm for Job Scheduling using Ant Colony Optimization

    Authors: Davinder Kaur; Sarpreet Singh?

  76. Code Optimization in Compilers using ANN?

    Authors: Jay Patel; Mahesh Panchal?

  77. Weighted Mean Scheme for PAPR Reduction of OFDM Signals?

    Authors: K. Rajesh; K. Suresh?

  78. An Efficient VLSI Architecture for Removal of Impulse Noise in Images?

    Authors: S. Karpagaabirami; P. Ramamoorthy?

  79. Encrypted Query Processing for Improved Protection of Confidentiality?

    Authors: Sinu P S; M.Ananthi?

  80. EXPERT SYSTEM FOR CORONARY HEART DISEASE - BUILT USING ARTIFICIAL INTELLIGENCE?

    Authors: Suchithra; P.Uma Maheswari?

  81. E-Agriculture Information Management System?

    Authors: Sumitha Thankachan; S.Kirubakaran

  82. Data Protection Outsourcing of Cloud Data to Maintain Trust between Cloud Service and Data Owner Using RC5 Algorithm?

    Authors: Ajay Bhaisare?; Ajay Bhaisare?

  83. Secure Profile Matching and Privacy Preserving In Mobile Social Network?

    Authors: Deepa Kale; Rushi Longadge?

  84. Selective Packet Drop Attack in MANET-A Review?

    Authors: Anubha Goyal?

  85. An Eccentric Methodology for Augmenting Web Navigation?

    Authors: Adhokshaj Haridas; Pragati Patil; Yogesh Bhute?

  86. Multiple Fault Detection in an Automobile Engine Using Single Sensor System?

    Authors: Shankar N. Dandare; S. V. Dudul?

  87. Multiple Fault Detection in a Four Stroke Engine Using Single Sensor System?

    Authors: Shankar N. Dandare; S. V. Dudul

  88. Classification of Multiple Fault in an Automobile Engine Using Statistical and ANN Based Classifiers

    Authors: Shankar N. Dandare; S. V. Dudul??

  89. Monitoring the Network and System Performance for Efficient Data Storage?

    Authors: Birunda Devi.M; Vairachilai.S?

  90. VIDEO SURVEILLANCE FRAMEWORK FOR REMOTE MONITORING

    Authors: Kshitij Raj?; Prajakta Kapadnis?; Ashwini Natambe?; Sainath Sarkar?

  91. ADAPTIVE TECHNIQUE FOR HIGH SPEED MOBILE ENVIRONMENT USING TFT-OFDM?

    Authors: Aravinth Babu.G; Suresh.K?

  92. RESULT ANALYSIS OF BLOOD CELLS BLAST DETECTION BY USING LPG PCA LPG 2DPCA AND FAST NONLOCAL FILTERING ALONG WITH OTSU’S THRESHOLDING TECHNIQUE?

    Authors: SHRUTIKA MAHAJAN; ASHWINI MESHRAM?

  93. Fingerprinting Based Recursive Information Hiding Strategy in Cloud Computing Environment?

    Authors: Varsha Yadav; Preeti Aggarwal?

  94. A Review on the Role of Domain Driven Data Mining?

    Authors: Madeeha Aslam; Ramzan Talib; Humaira Majeed

  95. Implementation of Hierarchical Clustering with Multiviewpoint-Based Similarity Measure?

    Authors: Ashish Moon; Vinod Nayyar?

  96. Energy Efficient Administrator Based Routing Approach in MANET?

    Authors: Vimal M. Kotadiya?; Altaf B. Mogal?

  97. Improving Classification Accuracy Using Ensemble Learning Technique (Using Different Decision Trees)?

    Authors: Nikita Joshi; Shweta Srivastava?

  98. Analysis of Low Power Flip Flops using an Efficient Embedded Logic?

    Authors: Krishnapriya.K.P; V.J.Arul Karthick?

  99. A Review Data Safeguard for Cloud Computing?

    Authors: Naveen Hemrajani; Surendra Yadav; Bhanu Bhushan Parashar?

  100. Fast and Robust Method for Nuclei segmentation in Cytological Images of Breast FNAC Samples?

    Authors: Aditya Pise; Rushi Longadge?

  101. Secure Protocol and Signature Based Intrusion Detection for Spontaneous Wireless AD HOC Network?

    Authors: Nikhil Varghane; Bhakti Kurade?

  102. Content Based Image Retrieval: A Review Paper?

    Authors: Babita Singh; Waseem Ahmad?

  103. Extraction of Classification Rules from Trained ANN for Multiclass Data?

    Authors: Ankita Patel; Mahesh Panchal?

  104. A Novel Approach for Face Recognition Using PCA and Artificial Neural Network?

    Authors: Karthik G; Sateesh Kumar H C?

  105. A Simplified Review on REAL TIMEOBJECT DETECTION AND 3D MODELING

    Authors: Prerna Dahiya; Kamal Kumar Ranga?

  106. Simulative Investigation of VANET through Small Scale LOS-NLOS Channel Conditions?

    Authors: Amandeep Kaur; Malti Rani; Jyoteesh Malhotra?

  107. Enhance Two-Tier Secure Model of Modern Image Steganography?

    Authors: Tanuja Mahajan; Bhakti Kurhade?

  108. Various Image Segmentation Techniques: A Review?

    Authors: Dilpreet Kaur; Yadwinder Kaur?

  109. SERIAL COMPUTING vs. PARALLEL COMPUTING: A COMPARATIVE STUDY USING MATLAB?

    Authors: Abhay B. Rathod; Rajratna Khadse; M Faruk Bagwan?

  110. Reversible Data Hiding and its Methods: A Survey?

    Authors: Sukhdeep Kaur; Manshi Shukla?

  111. Result Analysis for LBP and Shape Context Methodologies used as Authentication Mechanisms of Digital Signatures used for Certification?

    Authors: Shraddha Kulkarni; Vikrant Chole

  112. Optimizing the Performance and Secure Distributed Wireless Network in Unreliable D-NCS using CGA?

    Authors: Babu Pinjar?; C.N.Chinnaswamy?

  113. Dynamic Routing for ADA in Wireless Sensor Networks?

    Authors: Nagaraj?; C.N.Chinnaswamy?

  114. PROCURE DATA CENTRE SHARING SCHEME IN VIRTUAL CLOUD ENVIRONMENT USING CLOUDSIM?

    Authors: P. Ranjith Kumar; M. Shanthi?

  115. Effective Copyright Protection of Digital Products by Embedding Watermarking?

    Authors: Monika Craig; Deepak Kapgate?

  116. Privacy Preserving in Online Social Network?

    Authors: Navnath.S.Bagal; Navnath.D.Kale

  117. Survey of Document Clustering?

    Authors: Hetal Gaudani; Khushboo Lakhani; Riten Chhatrala

  118. A REVIEW: GUI TESTING

    Authors: Suman?; R.S.Chhillar?

  119. A Review on Software Defect Prediction Models Based on Different Data Mining Techniques?

    Authors: Raminder Kaur; Punam Bajaj?

  120. Energy Efficient Resource Allocation in Wireless Sensor Networks?

    Authors: Shraddha Fulkar?; Deepak Kapgate?

  121. Design and Implementation of a Weather Forecasting System Based on Temperature and Light Sensors?

    Authors: Pranjali U. Wankhede; Amit Pimpalkar?

  122. PROXY MOBILE IPv6 AND SOLUTION FOR PMIPv6?

    Authors: Bhagyashri P. Deshpande; N.M.Tarbani?

  123. Various Techniques for Detecting Skin Lesion: A Review?

    Authors: Hina Sood; Manshi Shukla?

  124. IMPROVEMENT USING WEIGHTED METHOD FOR HISTOGRAM EQUALIZATION IN PRESERVING THE COLOR QUALITIES OF RGB IMAGE

    Authors: Er.Navneet Kaur; Er.Kanwalpreet Singh?

  125. Discovery of Frequent Itemset and Promising Frequent Itemset Using Incremental Association Rule Mining Over Stream Data Mining?

    Authors: Anju Kakkad; Anita Zala

  126. Techniques in Detection and Analyzing Malware Executables: A Review?

    Authors: Milan Jain; Punam Bajaj?

  127. Time-Frequency Domain Characterization of Stationary and Non stationary Signals?

    Authors: Ramandeep Kaur?; Vikramjit Singh?

  128. SECURITY PROTOCOLS FOR VEHICULAR ADHOC NETWORKS: A REVIEW?

    Authors: Shubham Gandhi; Shalini?

  129. A HEURISTIC APPROACH FOR MIXED CRITICALITY JOBS SCHEDULING IN REAL TIME SYSTEMS?

    Authors: Naveenkumar Koregol; M. V. Panduranga Rao?

  130. Investigation of Flooding / Gossiping Of Messages by a Node inside Hop Using Spanning Tree?

    Authors: Ramandeep Kaur; Vikramjit Singh?

  131. A STUDY ON CLOUD STORAGE?

    Authors: M. Lakshmi Neelima; M. Padma?

  132. Mobile Cloud Computing: Issues from a Security Perspective

    Authors: M. Padma; M. Lakshmi Neelima?

  133. A New Approach to Preserve Privacy in Distributed Information Sharing Using Privacy Preserving Information Brokering?

    Authors: Vijaymahanthesh K.H; T.R. Muhibur Rahman?

  134. Ab-initio Algorithms for 3D-Protein Structure Prediction?

    Authors: Mohan Kumar; Satish Pandey; K. L. Jaiswal; Pramod Yadav

  135. A Survey on Swarm Intelligence Algorithms?

    Authors: S. Vanitha; T.Padma?

  136. Avoiding Overload by Using Virtual Machine in Cloud Data Centre?

    Authors: Indumathi.S; P. Ranjithkumar?

  137. Using Position Based and Cognitive Radio in Vehicular Ad-hoc Network

    Authors: P. Ranjith Kumar; D. Jeya; G. Naresh Kumar?

  138. An Efficient Algorithm for Clustering Data Using Map-Reduce Approach?

    Authors: Puppala Priyanka; SK.Abdul Nabi; Meena Kumari P?

  139. Security Issues in Mobile Ad Hoc Networks

    Authors: Mali Basaveshwar Laxman?

  140. Cloud Based Framework for Road Accident Analysis?

    Authors: T Senthil Kumar; J Vishak; Sanjay Sanjeev; Sneha B

  141. Efficient High Dimensional Data Clustering Using Hubness Phenomenon

    Authors: Sayali P. Barde; Vikrant Chole?; L. H. Patil??

  142. Data Hiding At 7th Bit (RGB) With Cryptography?

    Authors: Rashi Singh; Gaurav Chawla?

  143. Verifying Data Integrity in Hybrid Cloud

    Authors: Sachin Lakade; Mirza Baig?

  144. Steganography on Android Based Smart Phones

    Authors: S.Sivakumar; B.Rajesh?

  145. Detection of ARP Spoofing Attack Using ICMP Protocol?

    Authors: Vinay K.R; B.K. Gudur?

  146. Dissemination of Xml Data in Wireless Environment Supporting Twig Pattern Queries?

    Authors: Namose; R.H.Kulkarni?

  147. Analysing Geographic based Routing Protocols in Manets?

    Authors: Shelja Malhotra; Nasib Singh Gill?

  148. FAULT TOLERANT REAL TIME COMMUNICATION IN MULTIHOP NETWORKS USING SEGMENTED BACKUP

    Authors: K.Shirisha; Ch. Radha Krishna; Gousiya Begum; S.Vijaya Lakshmi?

  149. CYBER TERRORISM ATTACK OF THE CONTEMPORARY INFORMATION TECHNOLOGY AGE: ISSUES, CONSEQUENCES AND PANACEA?

    Authors: Kuboye Oluwafemi Samuel; Wan Rozaini Sheik Osman; Yazan Al Khasawneh; Saif Duhaim?

  150. Minimal Cost Data Sets Storage in the Cloud?

    Authors: Sanoop Jacob Thomas; P. Balakumar?

  151. Virtual Identity Creation by Fingerprint Combination for Privacy Protection?

    Authors: Namrata Yesansure; Rushi Longadge?

  152. Implementation of Privacy Mechanism using Curve Fitting Method for Data Publishing in Health Care Domain?

    Authors: Varsha Meshram; Y.C .Bhute?

  153. Improved Inter-Cluster Data Aggregation HEER Protocol?

    Authors: Sakshi Sharma; Malti Rani?

  154. A Unique Approach to Multimedia Based Dynamic Symmetric Key Cryptography?

    Authors: Vinay Verma; Rajesh Kumar?

  155. Next Day Congestion &Traffic Management (EBFCN) with Intelligent Switch for Ethernet in Datacenters?

    Authors: Naveen Kumar; Priti Sharma?

  156. Optimization Of Capacity Of MIMO Antenna Based Wireless System Using Genetic Algorithm?

    Authors: R.Sharma; A.S.Buttar?

  157. Design and Implementation of Bluetooth Based Data Logging of Processed Real Time Signal Using PIC16F877A?

    Authors: Bhargavi.K.Rao; Sukesh.Rao.M

  158. Java Based Serial Data Logging System

    Authors: Anupama.B; Sukesh Rao.M?

  159. A Survey on Energy Efficient Clustering Protocols for Wireless Sensor Network?

    Authors: M.Sheik Dawood; P.Jayalakshmi; R Abdul Sikkandhar; G.Athisha?

  160. ANALYSIS OF PROTECTIVE SYSTEM FOR HIGH VOLTAGE LINES USING PROTOCOL IEC 61850?

    Authors: Pooja Naik M; M V Gopalan; Sudheendran L?

  161. AN APPROACH TOWARDS REMOVAL OF COMPARABLE ASPECTS BY ACCUMULATING QUERIES?

    Authors: M.V.Siva Prasad; P.Guru Lingam; N.Mahesh Babu?

  162. ID SECURITY SYSTEM IN HIGH TRAFFIC FOR MOBILE ADHOC NETWORK USING ACKNOWLEDGEMENTS

    Authors: Asha N; Gowtham M?

  163. Performance Improvement in Multimedia Answering By Web Excavation?

    Authors: Aparna.N; Prathima.V.R?

  164. Prevention of Session Hijacking and IP Spoofing With Sensor Nodes and Cryptographic Approach?

    Authors: Krunal P. Bhaturkar?; Karuna G. Bagde?

  165. Document Clustering Using Concept Weight?

    Authors: Sapna Gupta; Vikrant Chole

  166. An Analysis of Subspace Methods for Large South Indian Datasets

    Authors: Krishna Murthy C.R; C.Naveena; T.C Manjunath?

  167. A Simplified Review on Fast HSV Image Color and Texture Detection and Image Conversion Algorithm

    Authors: Monika Deswal; Neetu Sharma?

  168. A Framework for MEMS Based Hand Gesture Recognition System for Controlling the Mouse Cursor using Wireless Technology?

    Authors: Khushbu Agrawal; Vikrant Chole?

  169. Intrusion Detection using Fuzzy Data Mining

    Authors: Sandeep Dhopte; Manoj Chaudhari

  170. A Simplified Review on Study and Implementation of Recognizing Terrorist by Rapid Detection by Activities and their Facial Match

    Authors: Ritu Kanwa; Samit Yadav?

  171. Security in WLAN- Review of Security and Throughput Tradeoff?

    Authors: Avinash Kaur; Harwant Singh

  172. A DYNAMIC APPROACH FOR DATABASE SECURITY?

    Authors: Mahesh Singh; Alka

  173. Optimization of Distributed Association Rule Mining Based Partial Vertical Partitioning

    Authors: MONIKA?

  174. VIRTUALIZATION IN CLOUD COMPUTING?

    Authors: Deepanshu Thakral; Mahesh Singh

  175. Content Based Image Retrieval using Color Feature Extraction with KNN Classification

    Authors: PRAGATI ASHOK DEOLE; RUSHI LONGADGE?

  176. Review Paper on E-learning Using Cloud Computing?

    Authors: Poonam R.Maskare; Sarika R.Sulke?

  177. A RELIABLE APPLICATION LEVEL BROADCASTING PROTOCOL FOR VANET?

    Authors: S. Vijayakumar; A. Noble Mary Juliet; M.L.Valarmathi?

  178. A Review on GPS and its Applications in Computer Science?

    Authors: POOJA SINGAL; R.S.CHHILLAR