ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.3, No.8

Publisher: ZAIN Publications

Publishing Date: 2014-08-30

  1. TARGET TRACKING AND MOBILE SENSOR NAVIGATION IN WIRELESS SENSOR NETWORKS?

    Authors: Pooja; Anish Mittal?

  2. Study and Comparison of Chain Based Protocol to Enhance Energy Utilization in Wireless Sensor Network?

    Authors: Sakshi Rana; Ankita Aggarwal?

  3. Security Issues in the Firewall Authentication caused by the Wireshark- A Protocol Analyzer Tool?

    Authors: Er. Narender Kumar Naryal; Er. Satinderjit Kaur Gill?

  4. A Framework for Web Based Student Record Management System using PHP?

    Authors: Er. Saurabh Walia; Er. Satinderjit Kaur Gill?

  5. Distributed Data Collection Scheme for Store and Forward Information in Wireless Sensor Network?

    Authors: Madhavi S. Kukade; Kapil N. Hande?

  6. DESIGN AND IMPLEMENT PRIVACY PROTECTION FOR SECURE INFORMATION BROKERING SYSTEMS

    Authors: SHAIK.MAHABOOB BASHA; A.BHASKAR; D.V SATISH KALADHAR REDDY?

  7. 'Good' versus 'Bad' Opinion on Micro Blogging Networks: Polarity Classification of Twitter?

    Authors: Haziq Jeelani; Khushal Singh?

  8. Automated Window 8 Security and Safety System?

    Authors: Geeta?; Neelam Sharivastav?

  9. FoCUS ? Forum Crawler Under Supervision?

    Authors: V.Rajapriya?

  10. Detection of Distributed Reflection DoS by using Rank Correlation?

    Authors: Preeti Goyal; Sangeeta Malik?

  11. APAQM: An Alternate Path AQM Congestion Control Algorithm

    Authors: B.Kiruthiga; E. George Dharma Prakash Raj?

  12. Energy Depletion Attacks: Detecting and Blocking in Wireless Sensor Network?

    Authors: V.Sharmila; K. MuthuRamalingam?

  13. FAST DATA COLLECTION IN TREE BASED WIRELESS SENSOR NETWORK

    Authors: Seema; Mukesh Singla?

  14. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding

    Authors: V. Dharma Rayudu; M.Vazralu; M. Sandeep

  15. Intelligent Pressure Measuring System

    Authors: Shayama Subair; Lizy Abraham?

  16. An Effective Implementation of Improved Halstead Metrics for Software Parameters Analysis

    Authors: Prachi Chhabra?; Lalit Bansal?

  17. Idleness Scheming and Intrusion Tolerance using Acknowledgement through Multipath Routing in Heterogeneous Wireless Sensor Network?

    Authors: Sachin Singh V. Thakur; Rachana Kambale; Kshama Dwivedi?

  18. GSA BASED ROUTING IN MANET?

    Authors: Manisha Kumari; Sangeeta?

  19. EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)?

    Authors: B.Ashok; V.Sucharitha?

  20. A Study on Matching of the Process Data and Operational Data for a Deep Business Analysis. Ontology Design for Possible Matching and Recommendations to Improve it?

    Authors: Humaira Majeed; Ramzan Talib; Madeeha Aslam; Hira Majeed?

  21. A Review on Question Generation System from Punjabi Text Contain Historical Information?

    Authors: Parshan Singh; Rajbhupinder Kaur?

  22. A Survey on FEC Based Packet Loss Recovery Technique in Networks?

    Authors: Pradeep Kumar Shaga; G.Venkat Rami Reddy?

  23. A COMPARATIVE STUDY OF VARIOUS ERROR CORRECTION CODES?

    Authors: David.S?; Gayathree.K

  24. EFFICIENT POWER FACTOR MEASUREMENT SYSTEM WITH LABVIEW INTERFACING FOR HOUSEHOLD APPLICATIONS?

    Authors: Arya Krishna.S; Lizy Abraham?

  25. Maintains Secure Intrusion Detection System for Mobile Ad-hoc Network?

    Authors: B.Reddy Sumanth; T.Venkataramana?

  26. Auditing Mechanisms for Outsourced Cloud Storage?

    Authors: J.Aparna; R.Sathiyaraj?

  27. RECOGNIZING AND DISCOVERING SPOOFING ATTACKS FOR MOBILE ADHOC NETWORK?

    Authors: T.Navaneethan; M.Lalli?

  28. Routing Protocols in Ad-hoc Network?

    Authors: Ankita; Vikram Nandal?

  29. SEAD AND ARIANE Routing Protocol: Comparative Study?

    Authors: Ankita; Vikram Nandal?

  30. Wireless Acoustic Signal Monitoring Using MEMS sensor and ATmega on LabVIEW Platform?

    Authors: Swathy L; Lizy Abraham?

  31. A Practical Approach to Faster Spatial Queries with Keywords?

    Authors: B.ChinnaReddaiah; K.R.K.Satheesh?

  32. Security System in Speech Recognition?

    Authors: Sunita Dixit; MD Yusuf Mulge?

  33. Review on Speech Enhancement Techniques?

    Authors: Sunita Dixit; MD Yusuf Mulge

  34. Image Compression Techniques: A Review?

    Authors: Sonal Chawla; Meenakshi Beri; Ritu Mudgil?

  35. A Combined Weighted Approach to Detect Code Cloning?

    Authors: Himanshu?; Sushil Garg?

  36. A Security Integrated Data Storage Model for Cloud Environment?

    Authors: Sonia Rani?; Neetu Sharma?

  37. A Panorama of Web Accessibility?

    Authors: Ramesh Babu J.; Chandra Sekharaiah K.?

  38. A NOVEL ALGORITHM FOR SATILLITE IMAGE RESOLUTION ENHANCEMENT BASED ON DUAL-TREE COMPLEX WAVELET TRANSFORM (DT-CWT) AND NONLOCAL MEANS (NLM)?

    Authors: SYED.AZAS; B.M.K. REDDY?

  39. Impact of AODV under Black Hole and Flooding Attack?

    Authors: Sunanda Puri; Harish Saini?

  40. Reserving Room Before Encryption

    Authors: Renuka Devi; C.H.Kiran?

  41. Use of Fuzzy System in the Eye Images?

    Authors: M.A.Pirbonyeh; Gh.Moloudian

  42. Integrally Mysterious Profile Matching Protocols in Mobile Social Networks?

    Authors: Akkanagamma; C.H.Kiran?

  43. PERFORMANCE ANALYSIS OF ORTHOGONAL SPACE TIME BLOCK CODE AND TRANSMISSION ANTENNA SELECTION WITH MULTI USER DIVERSITY?

    Authors: Sathi Babu. A; Ajay Kumar. D?

  44. Privacy Preserving Incentive Compatible Way

    Authors: Shweta; C.H.Kiran?

  45. NICE?

    Authors: Renuka Devi; C.H.Kiran?

  46. Schema Based Parallel XML Parser: A Fast XML Parser Designed for Large XML Files?

    Authors: Ravi Varma; G. Venkat Rami Reddy

  47. Secured Access Control Driven Pay per Usage and Logging of Cloud Resources

    Authors: Sudha.V.Pareddy; Chandrakant.Biradar

  48. Survey on Dynamic Resource Allocation Techniques in Cloud Environment?

    Authors: S.Natarajan; R.Pugazendi?

  49. A Survey on Acknowledgment-Based IDS in Mobile Ad hoc Network (MANET)?

    Authors: Y.Gowsika; R.Pugazendi?

  50. IMPROVED LOAD BALANCING MODEL BASED ON PARTITIONING IN CLOUD COMPUTING?

    Authors: M.Nataraja Suresh; Muppana Manoj Kumar?

  51. OBJECT DETECTION SCHEME FOR DYNAMIC VIDEOS BASED ON LOCAL ILLUMINATION BASED TECHNIQUES?

    Authors: T. SOWRYA PRATAP; V. SURENDRA BABU?

  52. Data Dissemination Approaches for Roadside Content Delivery Systems in VANET: A Review

    Authors: Vinothkumar.K; Dr.R.Manavalan?

  53. Payment Schemes for Securing Multihop Wireless Networks: A Survey?

    Authors: Mrs.N.Sathya; Dr.R.Pugazendi?

  54. AMENABILITY OF DISTRIBUTED DATA IN THE CLOUD BY MEANS OF CIA FRAMEWORK?

    Authors: Shaik Mohammed Rayhan; K.Bala Chowdappa?

  55. Bi-Orthogonal Wavelet Transform Based 3-D Image Watermarking on Colour Image

    Authors: Neha Ganjir?; Nivedita Singh?

  56. A NOVEL ENERGY EFFICIENT TECHNIQUE FOR COGNITIVE RADIO NETWORKS

    Authors: S.SWATHIKA; C.ABINAYA; C.THIAGARAJAN?

  57. Process of Obtaining Accuracy by Identifying Critical Nuggets during Classification of Information?

    Authors: Mallipamula Megha Sai Sree; S. Shravani?

  58. Finger Print Enhancement Using Minutiae Based Algorithm?

    Authors: Mallipamula Megha Sai Sree; S. Shravani?

  59. Efficient Image Retrieval Using Different Content Based Image Retrieval Methods: A Review

    Authors: Priyanka Srivastava; K.S.Patnaik?

  60. Generating Multimodal Grammar using CYK and e-GRIDS Algorithm?

    Authors: Pankaj Devre; Madhuri Bhalekar?

  61. ASIDS - Authenticated Secure and Integral Data Storage in Cloud?

    Authors: Anjali A; Joe Mathew Jacob?

  62. Improved Detection and Tracking of Lane Marking Using Hough Transform?

    Authors: Nimmy Joshy; Dona Jose?

  63. TFRC Based Adaptive Video Streaming In Cloud?

    Authors: Ajimon Siji; Amel Austine?

  64. FILTERING OF UNDESIRED MESSAGES FROM OSN USER SPACE?

    Authors: Poli Reddy; B. Bala Krishna?

  65. Providing Security and Efficient Privacy-Preserving Public Auditing?

    Authors: Poli Reddy; B. Bala Krishna?

  66. Multicarrier Iterative Generalized Least Squares Data Extraction in Digital Images?

    Authors: Srinivas M; Dhana Lakshmi?

  67. A Review on Compressive Sensing in Synthetic Aperture Radar (SAR)?

    Authors: Ankit; Manoj Ahlawat?

  68. Using the Literature to Develop a Preliminary Conceptual Model for the Student Success Factors in a Programming Course: Java as a Case Study?

    Authors: Salam Abdulabbas Ghanim; Nassir Jabir Al-khafaji?

  69. CONGESTION CONTROL USING ENHANCE AODV (EAODV) ROUTING MECHANISM IN MANET?

    Authors: Heena; Deepak Goyal?

  70. ABC_AODV: ARTIFICIAL BEE COLONY BASED AODV ROUTING IN MANET?

    Authors: Richa Kalucha; Deepak Goyal?

  71. A Review on Comparative Analysis of Routing Protocols of MANET?

    Authors: Umara Urooj; Nafees Ayub; Ramzan Talib; Yahya Saeed?

  72. Fully Automated Approach to Identify Brain Tumors in 2D MRI Using Thresholding and Region Growing Method?

    Authors: Yogesh Dewangan; Aakanksha S. Choubey?

  73. User Friendly Data Searching?

    Authors: D.Sravani; K. Madhurima?

  74. TRACKING DOWN DATA LEAKAGE BY USING ENCRYPTED FAKE OBJECTS

    Authors: Anugu Rahul Reddy; BalaKrishna Bangaru?

  75. Proximate Mining Order- Sub Matrices Maintaining from Probabilistic Matrices?

    Authors: Anugu Rahul Reddy; Balakrishna Bangaru?

  76. Methods for Image Enhancement: A Review?

    Authors: Cheenu Sharma; Manshi Shukla

  77. Design and Implementation of Power Efficient Turbo Decoder?

    Authors: Akshay. P; Rohini Deshpande; Abdul Imran Rasheed?

  78. An Enhanced Image Steganography Technique in Art Images?

    Authors: Shemi P B; Remya Paul?

  79. Designing of Circular and Square Microstrip Feed Antennas?

    Authors: Manish Kumar; Sarita Gajraj?

  80. Securing Online Name System through Trust Demonstrating and Temporal Analysis

    Authors: Chandana Krishna Sivunigunta; Sudha.K?

  81. A Generalized Flow-Based Method for Research on Acted Relationships in Wikipedia?

    Authors: Nalini N; Padmavathi V; Prudhvi Raj V?

  82. Polymorphic Worms Collection in Cloud Computing?

    Authors: Ashraf A. Shahin?

  83. A Customizable Content Based System to Filter Unwanted Messages from OSN User Wall?

    Authors: Mayuri Uttarwar; Pragati Patil; Yogesh Bhute?

  84. Improving the Effectiveness of Learning Content Retrieval through Content Classification and Profiling?

    Authors: V.R.Raghuveer; R.Mohanasundaram?

  85. A Lightweight Access for Hybrid Mobile Web Cloud Content Architecture

    Authors: Shawkat K. Guirguis; Adel A. El-Zoghabi; Mohamed A. Hassan

  86. An Implementation of Early Warning of Floods along Zambezi Basin Through the Use of Context-Awareness?

    Authors: Munyaradzi Magomelo; Hilton Chikwiriro; Clive Gurure?

  87. SMART SURVEILLANCE SYSTEM FOR FACE RECOGNITION?

    Authors: Mayuri Patel?

  88. MOBILE ADHOC NETWORKS AND PTP NETWORK?

    Authors: S.Sivakumar; B.Rajesh?

  89. A Study of Energy Efficiency Techniques in Cloud Computing?

    Authors: Aditi Mahajan; Anita Ganpati?

  90. Verification and Innovation of Neighbor Positions in MANETs?

    Authors: A. Yuvaraj; Manohar. K?

  91. Multi View Compressed Images Based On Distributed Coding Scheme?

    Authors: Kattera Srinivasa Rao; Bangaru BalaKrishna?

  92. Optimal Multi Server Using Time Based Cost Calculation in Cloud Computing?

    Authors: Kattera Srinivasa Rao; Bangaru BalaKrishna?

  93. Peak to Average Power Ratio Reduction in OFDM by Exponential Companding Technique

    Authors: Sujata P. Jogdand; S.L.Kotgire

  94. Speech Recognition Module for Home Automation System Based On ZigBee

    Authors: B. Muniswamy Naik; B. Vamsi Krishna?

  95. VIRTUALIZATION IN CLOUD COMPUTING?

    Authors: LAKSHAY MALHOTRA; DEVYANI AGARWAL; ARUNIMA JAISWAL?

  96. Power Stability Solution using Genetic Algorithm?

    Authors: Meena; Rose Tayal; Naveen Kumar?

  97. Power Quality Disturbances and Improving Power System Reliability?

    Authors: Sonia; Pinkey; Naveen Kumar?

  98. Predicting Web User's Behavior Patterns?

    Authors: Muhammad Ramzan Talib; Safi Ullah Hidayat; Muhammad Umer Sarwar?

  99. IMAGE QUALITY ASSESSMENT BY USING AR PREDICTION ALGORITHM WITH INTERNAL GENERATIVE MECHANISM?

    Authors: C. Naga Venkat Raam; K. Lakshmi Bhavani?

  100. EXPLORING THE DIFFERENT TYPES OF IMAGE BASED CAPTCHA METHODS

    Authors: S.THANGAVELU; T. PURUSOTHAMAN