Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.3, No.7
Publisher: ZAIN Publications
Publishing Date: 2014-07-30
- Survey of Creating Location Based Regions of Spatial Queries Using Proxy Approach in Mobile Environments?Authors: K.Suresh Babu; Swetha Madireddy
- Automatic Number Plate Recognition System?Authors: Rajshree Dhruw; Dharmendra Roy?
- Survey of Detection and Localization of Multiple Spoofing Attacks in Wireless Networks?Authors: K.Suresh Babu; Swetha Gurram?
- Analysis of Face Recognition using Manhattan Distance Algorithm with Image Segmentation?Authors: K.M.Ponnmoli?; S. Selvamuthukumaran
- A REVIEW ON CONGESTION CONTROL IN AD-HOC NETWORK?Authors: Heena Gupta; Deepak Goyal?
- A Review on Artificial Bee Colony in MANET?Authors: Richa Kalucha; Deepak Goyal?
- Improving the Effectiveness of Marketing and Sales using Genetic Algorithm?Authors: Pratima O. Fegade; Dinesh D. Patil?
- SURVEY ON HETEROGENEOUS NETWORK TRAFFIC ANALYSIS WITH SUPERVISED AND UNSUPERVISED DATA MINING TECHNIQUES?Authors: D.Jayachitra; J. Jebamalar Tamilselvi?
- An Analysis of Genetic Algorithm and Tabu Search Algorithm for Channel Optimization in Cognitive AdHoc Networks?Authors: V.Jayaraj; J.Jegathesh Amalraj; S.Hemalatha?
- Analysis of Location Based Routing Protocols against Wormhole Attack for MANETs: A Literature Survey?Authors: Devendra Kumar; Deepak Kumar Xaxa?
- A Detail Survey on Wireless Sensor Networks (WSNs) Security IssuesAuthors: Pratibha; Prem Chand Vashist?
- Routing Protocols in MANET: Comparative Study?Authors: Jayanti; Vikram Nandal?
- CACHE ENHANCEMENT IN DYNAMIC SOURCE ROUTING?Authors: Jayanti; Vikram Nandal?
- ADAPTIVE VIDEO DATA STREAMING AND SHARING IN CLOUD?Authors: P.N.Lokeswari; K.ChandraSekhar; Sathiyaraj?
- Efficient Texture Segmentation by Hierarchical Multiple Markov Chain Model?Authors: S.Allwin Devaraj; M.M. Vijay; S.Grout; S.Delfin Ruby; K.Kodeeswari?
- PRIVACY PRESERVING IN MULTI USERS INFORMATION SHARING FOR SOCIAL COMMUNITY NETWORK MODEL?Authors: P.N.V. Mani Kumar; K.V.N. Rajesh; R. Pradeep?
- Call Admission Control and Resource Utilization in 3G Networks?Authors: K. Prasuna; Chilakalapudi Meher Babu; Ujwal A. Lanjewar; K. Priya?
- SORT: A SELF-ORGANIZING TRUST MODEL FOR PEER-TO-PEER SYSTEMSAuthors: Anuja Thorata?; P. Prem Kumar?
- ERROR-TOLERANT RESOURCE ALLOCATION AND PAYMENT MINIMIZATION FOR CLOUD SYSTEM?Authors: Suneetha Kurapati; P. Prem Kumar?
- A Novel Approach for Multilevel Steganography?Authors: M.Ananathavalli; K. Kuppusamy?
- A Two Level Communication Analysis Approach for Effective Multipath Routing in MANET?Authors: Teena?
- Comparison of Attacks on Wireless Sensor NetworksAuthors: Jyotsna; Vikram Nandal?
- Energy Efficient Neural Network Technique to Recover Collision in WSN?Authors: Jyotsna; Vikram Nandal?
- PRIVACY ON METRIC DATA ASSETSAuthors: M.V. Siva Prasad; G. Sreenivasa Rao; L. Ashok?
- Efficient Mining Web Navigation Pattern using an Efficient Graph Traverse AlgorithmAuthors: Rajdeepa. B; Sumathi. P?
- Semantic Similarity Measure using Web Page Count, NGD and Snippet Based Method?Authors: Anita Jadhav; Sonali Tidke?
- Faster Multipattern Matching System on GPU Based on Aho-Corasick Algorithm?Authors: Gaurav Bhamare; Satish Banait?
- Solution Level Parallelization of Local Search Metaheuristic Algorithm on GPU?Authors: S. V. Ghorpade; S. M. Kamalapur?
- An Improved Wireless Sensor Network Protocol to Increase the Network Throughput and Life?Authors: Yatika; Vikram Nandal?
- Enhancing Maintainability of Software Using Fuzzy Approach: A Review?Authors: Taruna?; Bal Kishan?
- Vocal Mouse: Various Phases?Authors: Nibha; Vikram Nandal?
- MOUSE CONTROL - A NEW ERA IN HUMAN COMPUTER INTERACTION?Authors: Nibha; Vikram Nandal?
- INCREASE THROUGHPUT OF A NETWORK THROUGH WIRELESS SENSOR NETWORK?Authors: Yatika; Vikram Nandal?
- Video Forgery Detection Based on Variance in Luminance and Signal to Noise Ratio using LESH Features and Bispectral Analysis?Authors: Aniket Pathak; Dinesh Patil?
- Modified Shape Context for Signature Verification of Automated Cheque Authentication System?Authors: Sangeeta Girish Narkhede; Dinesh D. Patil?
- REVIEW ON LATIN SQUARE?Authors: Yukti Gupta; Aashima Bansal; Devdutt Baresary?
- Research Study on Internal Order Cancellation in Online Shopping Industry?Authors: Niranjanamurthy M?
- EFFICIENT ALGORITHMS SYSTOLIC TREE WITH ABC BASED PATTERN MINING ALGORITHM FOR HIGH UTILITY ITEMSETS FROM TRANSACTIONAL DATABASESAuthors: S. Vignesh; K. Sujana Banu; K. Manoj Kumar
- IMPLEMENTATION OF CELLULAR NETWORKS WITH LEASING CAPABILITIES FOR LARGE QUERY PROCESSAuthors: D.V Sateesh Kaladhar Reddy; D. Prasanth; N. Srinath Reddy
- Recommended Screening-Checks for Placed Orders in Industry Internal Tool- OMSAuthors: Niranjanamurthy M; Dharmendra Chahar?
- UTILISATION OF MOBILE COMMUNICATION IN OPENCAST MINES?Authors: Guntha Karthik; Prof.Singam Jayanthu; Rammohan.P; Atheeq Rahman?
- Evaluation of Authentication and Ciphering Algorithms in GSM?Authors: Payal; Vikram Nandal?
- GSM: Improvement of Authentication and Encryption Algorithms?Authors: Payal; Vikram Nandal?
- Performance Analysis of Dynamic Rate Based Borrowing Scheme on Basis of QoS Parameters?Authors: Veenu Saini?
- Dynamic Query Generator?Authors: B.Rawali; S.Geetha Sree; I.S.Raghuram; N.Srikar Setty?
- Offline Signature Verification Using Supervised and Unsupervised Neural Networks?Authors: Meenakshi Sharma; Kavita Khanna?
- Result on Enforce Secure and Privacy Preserving Information Brokering in Distributed Information Sharing?Authors: Mukesh Kawatghare; Pradnya Kamble
- MORE SMART, SECURED AND PRIVACY CONCERNED PARTICIPATION IN PARTICIPATORY SENSING?Authors: Sayara Bano Sheikh; Preeti Deshmukh
- A Survey of Routing Protocols AODV in Mobile Ad Hoc Networks?Authors: Deepak Goyal; Munisha Devi?
- PERFORMANCE EVALUATION OF COLLABORATIVE ATTACKS IN MANET?Authors: Ajay Dureja; Vandna Dahiya?
- Detection of Black Hole & Gray Hole in MANET?Authors: Vandna Dahiya; Ajay Dureja?
- SIMULATION AND PERFORMANCE ANALYSIS OF AODV PROTOCOL IN MANET?Authors: Munisha; Deepak Goyal?
- PERFORMANCE EVALUATION OF AODV AND DSR IN FEASIBLE AND RANDOM PLACEMENT MODELS?Authors: K. Narasimha Raju; S.P.Setty?
- Implementation of a Protocol for Secure E-Commerce Transactions?Authors: Arvind Tudigani; Lahari .D?
- Implemented IDS Version of Advanced Artificial Neural Networks (ANN) using Layered Method?Authors: Prashant D. Somwanshi; S. M. Chaware?
- MEMORY EFFICIENT WDR (WAVELET DIFFERENCE REDUCTION) using INVERSE OF ECHELON FORM by EQUATION SOLVING?Authors: Sandeep Dalal; Poonam Rani?
- A NEAR WELLBORE SIMULATOR?Authors: Zeeshan Ahmad; Jaspal K Saini; Haziq Jeelani?
- Data Broadcasting Approximation Algorithms for Wireless NetworksAuthors: B.Sujatha; S.Nagaprasad; G.Srinivasa Rao?
- Study of Energy Consumption in DSR using NS2Authors: Palak; Nasib Singh Gill?
- A DWT and DCT based Hybrid Approach for Audio Watermarking?Authors: Lovely Malhotra; Neha Gupta?
- EVALUATING PERFORMANCE OF DSDV & DSR ROUTING PROTOCOLS IN MANET THROUGH QoS PARAMETERSAuthors: Mahima Chitkara; Waseem Ahmad
- Improved Markovian Model for Annotation Based Image Retrieval using Multiple and Synonymous Keywords?Authors: Himali P. Chaudhari; Dinesh D. Patil?
- A NOVEL THRESHOLD BASED IMAGE ENCRYPTION FOR BITMAP IMAGES?Authors: K.Berlin; A.Padmapriya?
- Multi-Robot Co-ordination For Box-Pushing using Embedded Controller?Authors: Ketaki.P.Dahale; Vijay.D.Chaudhari; Kantilal.P.Rane?
- Performance of Students Evaluation in Education Sector Using Clustering K-Means Algorithms?Authors: S.Ganga; T.Meyyappan?
- Analyses of Autistic Patients By using Interpretation Value Analysis?Authors: Priyanka Juneja; Anshul Anand?
- Evaluation for Alive Node on Wireless Sensor Network Denial of Sleep Attack?Authors: Sunita Devi; Anshul Anand?
- A Novel Approach for Secure Mining of Horizontally Distributed Databases?Authors: Wasudev.W.Pingle; S.S. Banait?
- A Test Case Prioritization Approach in Regression Testing?Authors: Isha Sharma; Jasleen Kaur; Manisha Sahni?
- A Review on Fruit Grading Systems for Quality Inspection?Authors: R.SwarnaLakshmi; B.Kanchanadevi?
- Local Recovery Based Route Maintenance (AODV-LR) for AODV Routing Protocol?Authors: R. Vijayadharshini; A. Padmapriya?
- Natural Language Processing Interface for SynonymAuthors: Navdeep Kaur; Vandana Pushe; Rupinderdeep Kaur
- SECURING PUBLIC HEALTH RECORDS IN CLOUD COMPUTING PATIENT CENTRIC AND FINE GRAINED DATA ACCESS CONTROL IN MULTI OWNER SETTINGSAuthors: Vaishali Sunagar; Chandrakanth Biradar
- Polarity Classification on Twitter- You are “What you Tweet”Authors: Haziq Jeelani; Syed Fayeq Jeelani
- Usability Factors in Information Systems DevelopmentAuthors: K. Chandra Sekharaiah; A. Radha Krishna
- E-commerce: Recommended Online Payment Method - PayPalAuthors: Niranjanamurthy M
- A Result Analysis on Secured Encryption in Cloud Computing using Symmetric CryptographyAuthors: Anand Darne; Rushikesh Longadge
- EFFECTIVE BANDWIDTH ALLOCATION APPROACH BASED ON USERS BILLING IN CLOUD ENVIRONMENT?Authors: A.PEDA GOPI?; G.KRISHNA?; Y.SREELAKSHMI?; S.SATYANARAYANA?
- A Survey on Edge Detection Techniques using Different Types of Digital Images?Authors: R. Swarnalakshmi?
- Clustering and Hiding Sensitive Data for Social Network Dataset?Authors: N.Revathi; A.Padmapriya?
- BANDWIDTH EFFICIENCY IN MAC PROTOCOL FOR AD HOC NETWORK?Authors: Mayank Sharma; Sunita Gupta?
- Design and Implementation of an Efficient Scheduling Algorithm for QoS Management in WiMAXAuthors: Sumanpreet Kaur; Maninder Singh?
- A Review of NLP Based Upon Semantic AnalysisAuthors: Parneet Kaur; Vandana Pushe; Rupinderdeep Kaur?
- Brain Tumor Segmentation of Noisy MRI Images using Anisotropic Diffusion FilterAuthors: Deepika G.L?
- A Comparison and Selection on Basic Type of Searching Algorithm in Data Structure?Authors: Kamlesh Kumar Pandey; Narendra Pradhan?
- Task States, Triggers and Timeline of New Multi-Level Feedback Queue Scheduler?Authors: M.V. Panduranga Rao; K.C. Shet?
- Implementation of Load Balancing Using SIP?Authors: Sandeep Kholambe
- SECURE DATA COLLECTION IN WSN BY RANDOMIZED DISPERSIVE ROUTINGAuthors: Anil Kumar; Jyoti?
- Generative Topic Modeling in Taxonomic Structure of Genomic Data using LDA?Authors: Dnyati.S.Randhave; S.N.Deshmukh?
- Performance Evaluation of AODV and AODV-LR in terms of Route MaintenanceAuthors: R. Vijayadharshini?; A. Padmapriya?
- Secure Member Key Management in Cooperative Group based Communication?Authors: K.ChandraSekhar; T.Venkataramana?
- Design and Development of Speech Database for Travel Purpose in Marathi?Authors: Pooja V. Janse; Ratnadeep R. Deshmukh; Smita B. Magre
- An Analysis of Various Attacks in MANET?Authors: M.Udhayamoorthi; C.Senthilkumar; S.Karthik; T.Kalaikumaran?
- A Novel Interoperable Mobile Wallet Model with Capability Based Access Control FrameworkAuthors: Neeharika P; V N Sastry?
- MINING ASSOCIATION RULES FROM XML DOCUMENT?Authors: Neha M. Shroff; G. V. Gujar?
- Community-Aware Opportunistic Routing in Mobile Social Networks?Authors: Shankarling Umadi; Ranjana B Nadagoudar; Amareshwari Patil?
- Seamless Vertical Handoff between WLAN and WiMAX?Authors: Nimrat Kaur Kehal; Maninder Singh
- Recognition of Packet Dropping and Modification in WSN’s using Ranking AlgorithmsAuthors: M. Suresh; Sunil Kumar. V?
- An Unwanted Messages Filtering System from OSN User Walls using Blacklist Mechanism?Authors: G. Lavanya; Sunil Kumar. V?
- File Clustering using Forensic Analysis SystemAuthors: G. Madan Kumar; Sunil Kumar. V?
- A Literature Review on Kidney Disease Prediction using Data Mining Classification Technique?Authors: Suman Bala; Krishan Kumar?
- DETECTION OF PLACES BASED ON PLACE EXTRACTION ALGORITHM USING IMAGES?Authors: Shilpa Tuteja; R. B. Talmale?
- A System to Customize Content Based Messages Filtering for On-Line Social Networks?Authors: Vidya Alone; R.B.Talmale?
- Prediction of Interface Residues in Protein?Protein Hetero Complexes?Authors: Sonkamble K.V?; S.N.Deshmukh?
- Comparative Analysis of Image Compression Using DCT and DWT Transforms?Authors: Nitu Rani; Savita Bishnoi