ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.3, No.7

Publisher: ZAIN Publications

Publishing Date: 2014-07-30

  1. Survey of Creating Location Based Regions of Spatial Queries Using Proxy Approach in Mobile Environments?

    Authors: K.Suresh Babu; Swetha Madireddy

  2. Automatic Number Plate Recognition System?

    Authors: Rajshree Dhruw; Dharmendra Roy?

  3. Survey of Detection and Localization of Multiple Spoofing Attacks in Wireless Networks?

    Authors: K.Suresh Babu; Swetha Gurram?

  4. Analysis of Face Recognition using Manhattan Distance Algorithm with Image Segmentation?

    Authors: K.M.Ponnmoli?; S. Selvamuthukumaran

  5. A REVIEW ON CONGESTION CONTROL IN AD-HOC NETWORK?

    Authors: Heena Gupta; Deepak Goyal?

  6. A Review on Artificial Bee Colony in MANET?

    Authors: Richa Kalucha; Deepak Goyal?

  7. Improving the Effectiveness of Marketing and Sales using Genetic Algorithm?

    Authors: Pratima O. Fegade; Dinesh D. Patil?

  8. SURVEY ON HETEROGENEOUS NETWORK TRAFFIC ANALYSIS WITH SUPERVISED AND UNSUPERVISED DATA MINING TECHNIQUES?

    Authors: D.Jayachitra; J. Jebamalar Tamilselvi?

  9. An Analysis of Genetic Algorithm and Tabu Search Algorithm for Channel Optimization in Cognitive AdHoc Networks?

    Authors: V.Jayaraj; J.Jegathesh Amalraj; S.Hemalatha?

  10. Analysis of Location Based Routing Protocols against Wormhole Attack for MANETs: A Literature Survey?

    Authors: Devendra Kumar; Deepak Kumar Xaxa?

  11. A Detail Survey on Wireless Sensor Networks (WSNs) Security Issues

    Authors: Pratibha; Prem Chand Vashist?

  12. Routing Protocols in MANET: Comparative Study?

    Authors: Jayanti; Vikram Nandal?

  13. CACHE ENHANCEMENT IN DYNAMIC SOURCE ROUTING?

    Authors: Jayanti; Vikram Nandal?

  14. ADAPTIVE VIDEO DATA STREAMING AND SHARING IN CLOUD?

    Authors: P.N.Lokeswari; K.ChandraSekhar; Sathiyaraj?

  15. Efficient Texture Segmentation by Hierarchical Multiple Markov Chain Model?

    Authors: S.Allwin Devaraj; M.M. Vijay; S.Grout; S.Delfin Ruby; K.Kodeeswari?

  16. PRIVACY PRESERVING IN MULTI USERS INFORMATION SHARING FOR SOCIAL COMMUNITY NETWORK MODEL?

    Authors: P.N.V. Mani Kumar; K.V.N. Rajesh; R. Pradeep?

  17. Call Admission Control and Resource Utilization in 3G Networks?

    Authors: K. Prasuna; Chilakalapudi Meher Babu; Ujwal A. Lanjewar; K. Priya?

  18. SORT: A SELF-ORGANIZING TRUST MODEL FOR PEER-TO-PEER SYSTEMS

    Authors: Anuja Thorata?; P. Prem Kumar?

  19. ERROR-TOLERANT RESOURCE ALLOCATION AND PAYMENT MINIMIZATION FOR CLOUD SYSTEM?

    Authors: Suneetha Kurapati; P. Prem Kumar?

  20. A Novel Approach for Multilevel Steganography?

    Authors: M.Ananathavalli; K. Kuppusamy?

  21. A Two Level Communication Analysis Approach for Effective Multipath Routing in MANET?

    Authors: Teena?

  22. Comparison of Attacks on Wireless Sensor Networks

    Authors: Jyotsna; Vikram Nandal?

  23. Energy Efficient Neural Network Technique to Recover Collision in WSN?

    Authors: Jyotsna; Vikram Nandal?

  24. PRIVACY ON METRIC DATA ASSETS

    Authors: M.V. Siva Prasad; G. Sreenivasa Rao; L. Ashok?

  25. Efficient Mining Web Navigation Pattern using an Efficient Graph Traverse Algorithm

    Authors: Rajdeepa. B; Sumathi. P?

  26. Semantic Similarity Measure using Web Page Count, NGD and Snippet Based Method?

    Authors: Anita Jadhav; Sonali Tidke?

  27. Faster Multipattern Matching System on GPU Based on Aho-Corasick Algorithm?

    Authors: Gaurav Bhamare; Satish Banait?

  28. Solution Level Parallelization of Local Search Metaheuristic Algorithm on GPU?

    Authors: S. V. Ghorpade; S. M. Kamalapur?

  29. An Improved Wireless Sensor Network Protocol to Increase the Network Throughput and Life?

    Authors: Yatika; Vikram Nandal?

  30. Enhancing Maintainability of Software Using Fuzzy Approach: A Review?

    Authors: Taruna?; Bal Kishan?

  31. Vocal Mouse: Various Phases?

    Authors: Nibha; Vikram Nandal?

  32. MOUSE CONTROL - A NEW ERA IN HUMAN COMPUTER INTERACTION?

    Authors: Nibha; Vikram Nandal?

  33. INCREASE THROUGHPUT OF A NETWORK THROUGH WIRELESS SENSOR NETWORK?

    Authors: Yatika; Vikram Nandal?

  34. Video Forgery Detection Based on Variance in Luminance and Signal to Noise Ratio using LESH Features and Bispectral Analysis?

    Authors: Aniket Pathak; Dinesh Patil?

  35. Modified Shape Context for Signature Verification of Automated Cheque Authentication System?

    Authors: Sangeeta Girish Narkhede; Dinesh D. Patil?

  36. REVIEW ON LATIN SQUARE?

    Authors: Yukti Gupta; Aashima Bansal; Devdutt Baresary?

  37. Research Study on Internal Order Cancellation in Online Shopping Industry?

    Authors: Niranjanamurthy M?

  38. EFFICIENT ALGORITHMS SYSTOLIC TREE WITH ABC BASED PATTERN MINING ALGORITHM FOR HIGH UTILITY ITEMSETS FROM TRANSACTIONAL DATABASES

    Authors: S. Vignesh; K. Sujana Banu; K. Manoj Kumar

  39. IMPLEMENTATION OF CELLULAR NETWORKS WITH LEASING CAPABILITIES FOR LARGE QUERY PROCESS

    Authors: D.V Sateesh Kaladhar Reddy; D. Prasanth; N. Srinath Reddy

  40. Recommended Screening-Checks for Placed Orders in Industry Internal Tool- OMS

    Authors: Niranjanamurthy M; Dharmendra Chahar?

  41. UTILISATION OF MOBILE COMMUNICATION IN OPENCAST MINES?

    Authors: Guntha Karthik; Prof.Singam Jayanthu; Rammohan.P; Atheeq Rahman?

  42. Evaluation of Authentication and Ciphering Algorithms in GSM?

    Authors: Payal; Vikram Nandal?

  43. GSM: Improvement of Authentication and Encryption Algorithms?

    Authors: Payal; Vikram Nandal?

  44. Performance Analysis of Dynamic Rate Based Borrowing Scheme on Basis of QoS Parameters?

    Authors: Veenu Saini?

  45. Dynamic Query Generator?

    Authors: B.Rawali; S.Geetha Sree; I.S.Raghuram; N.Srikar Setty?

  46. Offline Signature Verification Using Supervised and Unsupervised Neural Networks?

    Authors: Meenakshi Sharma; Kavita Khanna?

  47. Result on Enforce Secure and Privacy Preserving Information Brokering in Distributed Information Sharing?

    Authors: Mukesh Kawatghare; Pradnya Kamble

  48. MORE SMART, SECURED AND PRIVACY CONCERNED PARTICIPATION IN PARTICIPATORY SENSING?

    Authors: Sayara Bano Sheikh; Preeti Deshmukh

  49. A Survey of Routing Protocols AODV in Mobile Ad Hoc Networks?

    Authors: Deepak Goyal; Munisha Devi?

  50. PERFORMANCE EVALUATION OF COLLABORATIVE ATTACKS IN MANET?

    Authors: Ajay Dureja; Vandna Dahiya?

  51. Detection of Black Hole & Gray Hole in MANET?

    Authors: Vandna Dahiya; Ajay Dureja?

  52. SIMULATION AND PERFORMANCE ANALYSIS OF AODV PROTOCOL IN MANET?

    Authors: Munisha; Deepak Goyal?

  53. PERFORMANCE EVALUATION OF AODV AND DSR IN FEASIBLE AND RANDOM PLACEMENT MODELS?

    Authors: K. Narasimha Raju; S.P.Setty?

  54. Implementation of a Protocol for Secure E-Commerce Transactions?

    Authors: Arvind Tudigani; Lahari .D?

  55. Implemented IDS Version of Advanced Artificial Neural Networks (ANN) using Layered Method?

    Authors: Prashant D. Somwanshi; S. M. Chaware?

  56. MEMORY EFFICIENT WDR (WAVELET DIFFERENCE REDUCTION) using INVERSE OF ECHELON FORM by EQUATION SOLVING?

    Authors: Sandeep Dalal; Poonam Rani?

  57. A NEAR WELLBORE SIMULATOR?

    Authors: Zeeshan Ahmad; Jaspal K Saini; Haziq Jeelani?

  58. Data Broadcasting Approximation Algorithms for Wireless Networks

    Authors: B.Sujatha; S.Nagaprasad; G.Srinivasa Rao?

  59. Study of Energy Consumption in DSR using NS2

    Authors: Palak; Nasib Singh Gill?

  60. A DWT and DCT based Hybrid Approach for Audio Watermarking?

    Authors: Lovely Malhotra; Neha Gupta?

  61. EVALUATING PERFORMANCE OF DSDV & DSR ROUTING PROTOCOLS IN MANET THROUGH QoS PARAMETERS

    Authors: Mahima Chitkara; Waseem Ahmad

  62. Improved Markovian Model for Annotation Based Image Retrieval using Multiple and Synonymous Keywords?

    Authors: Himali P. Chaudhari; Dinesh D. Patil?

  63. A NOVEL THRESHOLD BASED IMAGE ENCRYPTION FOR BITMAP IMAGES?

    Authors: K.Berlin; A.Padmapriya?

  64. Multi-Robot Co-ordination For Box-Pushing using Embedded Controller?

    Authors: Ketaki.P.Dahale; Vijay.D.Chaudhari; Kantilal.P.Rane?

  65. Performance of Students Evaluation in Education Sector Using Clustering K-Means Algorithms?

    Authors: S.Ganga; T.Meyyappan?

  66. Analyses of Autistic Patients By using Interpretation Value Analysis?

    Authors: Priyanka Juneja; Anshul Anand?

  67. Evaluation for Alive Node on Wireless Sensor Network Denial of Sleep Attack?

    Authors: Sunita Devi; Anshul Anand?

  68. A Novel Approach for Secure Mining of Horizontally Distributed Databases?

    Authors: Wasudev.W.Pingle; S.S. Banait?

  69. A Test Case Prioritization Approach in Regression Testing?

    Authors: Isha Sharma; Jasleen Kaur; Manisha Sahni?

  70. A Review on Fruit Grading Systems for Quality Inspection?

    Authors: R.SwarnaLakshmi; B.Kanchanadevi?

  71. Local Recovery Based Route Maintenance (AODV-LR) for AODV Routing Protocol?

    Authors: R. Vijayadharshini; A. Padmapriya?

  72. Natural Language Processing Interface for Synonym

    Authors: Navdeep Kaur; Vandana Pushe; Rupinderdeep Kaur

  73. SECURING PUBLIC HEALTH RECORDS IN CLOUD COMPUTING PATIENT CENTRIC AND FINE GRAINED DATA ACCESS CONTROL IN MULTI OWNER SETTINGS

    Authors: Vaishali Sunagar; Chandrakanth Biradar

  74. Polarity Classification on Twitter- You are “What you Tweet”

    Authors: Haziq Jeelani; Syed Fayeq Jeelani

  75. Usability Factors in Information Systems Development

    Authors: K. Chandra Sekharaiah; A. Radha Krishna

  76. E-commerce: Recommended Online Payment Method - PayPal

    Authors: Niranjanamurthy M

  77. A Result Analysis on Secured Encryption in Cloud Computing using Symmetric Cryptography

    Authors: Anand Darne; Rushikesh Longadge

  78. EFFECTIVE BANDWIDTH ALLOCATION APPROACH BASED ON USERS BILLING IN CLOUD ENVIRONMENT?

    Authors: A.PEDA GOPI?; G.KRISHNA?; Y.SREELAKSHMI?; S.SATYANARAYANA?

  79. A Survey on Edge Detection Techniques using Different Types of Digital Images?

    Authors: R. Swarnalakshmi?

  80. Clustering and Hiding Sensitive Data for Social Network Dataset?

    Authors: N.Revathi; A.Padmapriya?

  81. BANDWIDTH EFFICIENCY IN MAC PROTOCOL FOR AD HOC NETWORK?

    Authors: Mayank Sharma; Sunita Gupta?

  82. Design and Implementation of an Efficient Scheduling Algorithm for QoS Management in WiMAX

    Authors: Sumanpreet Kaur; Maninder Singh?

  83. A Review of NLP Based Upon Semantic Analysis

    Authors: Parneet Kaur; Vandana Pushe; Rupinderdeep Kaur?

  84. Brain Tumor Segmentation of Noisy MRI Images using Anisotropic Diffusion Filter

    Authors: Deepika G.L?

  85. A Comparison and Selection on Basic Type of Searching Algorithm in Data Structure?

    Authors: Kamlesh Kumar Pandey; Narendra Pradhan?

  86. Task States, Triggers and Timeline of New Multi-Level Feedback Queue Scheduler?

    Authors: M.V. Panduranga Rao; K.C. Shet?

  87. Implementation of Load Balancing Using SIP?

    Authors: Sandeep Kholambe

  88. SECURE DATA COLLECTION IN WSN BY RANDOMIZED DISPERSIVE ROUTING

    Authors: Anil Kumar; Jyoti?

  89. Generative Topic Modeling in Taxonomic Structure of Genomic Data using LDA?

    Authors: Dnyati.S.Randhave; S.N.Deshmukh?

  90. Performance Evaluation of AODV and AODV-LR in terms of Route Maintenance

    Authors: R. Vijayadharshini?; A. Padmapriya?

  91. Secure Member Key Management in Cooperative Group based Communication?

    Authors: K.ChandraSekhar; T.Venkataramana?

  92. Design and Development of Speech Database for Travel Purpose in Marathi?

    Authors: Pooja V. Janse; Ratnadeep R. Deshmukh; Smita B. Magre

  93. An Analysis of Various Attacks in MANET?

    Authors: M.Udhayamoorthi; C.Senthilkumar; S.Karthik; T.Kalaikumaran?

  94. A Novel Interoperable Mobile Wallet Model with Capability Based Access Control Framework

    Authors: Neeharika P; V N Sastry?

  95. MINING ASSOCIATION RULES FROM XML DOCUMENT?

    Authors: Neha M. Shroff; G. V. Gujar?

  96. Community-Aware Opportunistic Routing in Mobile Social Networks?

    Authors: Shankarling Umadi; Ranjana B Nadagoudar; Amareshwari Patil?

  97. Seamless Vertical Handoff between WLAN and WiMAX?

    Authors: Nimrat Kaur Kehal; Maninder Singh

  98. Recognition of Packet Dropping and Modification in WSN’s using Ranking Algorithms

    Authors: M. Suresh; Sunil Kumar. V?

  99. An Unwanted Messages Filtering System from OSN User Walls using Blacklist Mechanism?

    Authors: G. Lavanya; Sunil Kumar. V?

  100. File Clustering using Forensic Analysis System

    Authors: G. Madan Kumar; Sunil Kumar. V?

  101. A Literature Review on Kidney Disease Prediction using Data Mining Classification Technique?

    Authors: Suman Bala; Krishan Kumar?

  102. DETECTION OF PLACES BASED ON PLACE EXTRACTION ALGORITHM USING IMAGES?

    Authors: Shilpa Tuteja; R. B. Talmale?

  103. A System to Customize Content Based Messages Filtering for On-Line Social Networks?

    Authors: Vidya Alone; R.B.Talmale?

  104. Prediction of Interface Residues in Protein?Protein Hetero Complexes?

    Authors: Sonkamble K.V?; S.N.Deshmukh?

  105. Comparative Analysis of Image Compression Using DCT and DWT Transforms?

    Authors: Nitu Rani; Savita Bishnoi