Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.3, No.8
Publisher: ZAIN Publications
Publishing Date: 2014-08-30
- TARGET TRACKING AND MOBILE SENSOR NAVIGATION IN WIRELESS SENSOR NETWORKS?Authors: Pooja; Anish Mittal?
- Study and Comparison of Chain Based Protocol to Enhance Energy Utilization in Wireless Sensor Network?Authors: Sakshi Rana; Ankita Aggarwal?
- Security Issues in the Firewall Authentication caused by the Wireshark- A Protocol Analyzer Tool?Authors: Er. Narender Kumar Naryal; Er. Satinderjit Kaur Gill?
- A Framework for Web Based Student Record Management System using PHP?Authors: Er. Saurabh Walia; Er. Satinderjit Kaur Gill?
- Distributed Data Collection Scheme for Store and Forward Information in Wireless Sensor Network?Authors: Madhavi S. Kukade; Kapil N. Hande?
- DESIGN AND IMPLEMENT PRIVACY PROTECTION FOR SECURE INFORMATION BROKERING SYSTEMSAuthors: SHAIK.MAHABOOB BASHA; A.BHASKAR; D.V SATISH KALADHAR REDDY?
- 'Good' versus 'Bad' Opinion on Micro Blogging Networks: Polarity Classification of Twitter?Authors: Haziq Jeelani; Khushal Singh?
- Automated Window 8 Security and Safety System?Authors: Geeta?; Neelam Sharivastav?
- FoCUS ? Forum Crawler Under Supervision?Authors: V.Rajapriya?
- Detection of Distributed Reflection DoS by using Rank Correlation?Authors: Preeti Goyal; Sangeeta Malik?
- APAQM: An Alternate Path AQM Congestion Control AlgorithmAuthors: B.Kiruthiga; E. George Dharma Prakash Raj?
- Energy Depletion Attacks: Detecting and Blocking in Wireless Sensor Network?Authors: V.Sharmila; K. MuthuRamalingam?
- FAST DATA COLLECTION IN TREE BASED WIRELESS SENSOR NETWORKAuthors: Seema; Mukesh Singla?
- A Secure Erasure Code-Based Cloud Storage System with Secure Data ForwardingAuthors: V. Dharma Rayudu; M.Vazralu; M. Sandeep
- Intelligent Pressure Measuring SystemAuthors: Shayama Subair; Lizy Abraham?
- An Effective Implementation of Improved Halstead Metrics for Software Parameters AnalysisAuthors: Prachi Chhabra?; Lalit Bansal?
- Idleness Scheming and Intrusion Tolerance using Acknowledgement through Multipath Routing in Heterogeneous Wireless Sensor Network?Authors: Sachin Singh V. Thakur; Rachana Kambale; Kshama Dwivedi?
- GSA BASED ROUTING IN MANET?Authors: Manisha Kumari; Sangeeta?
- EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)?Authors: B.Ashok; V.Sucharitha?
- A Study on Matching of the Process Data and Operational Data for a Deep Business Analysis. Ontology Design for Possible Matching and Recommendations to Improve it?Authors: Humaira Majeed; Ramzan Talib; Madeeha Aslam; Hira Majeed?
- A Review on Question Generation System from Punjabi Text Contain Historical Information?Authors: Parshan Singh; Rajbhupinder Kaur?
- A Survey on FEC Based Packet Loss Recovery Technique in Networks?Authors: Pradeep Kumar Shaga; G.Venkat Rami Reddy?
- A COMPARATIVE STUDY OF VARIOUS ERROR CORRECTION CODES?Authors: David.S?; Gayathree.K
- EFFICIENT POWER FACTOR MEASUREMENT SYSTEM WITH LABVIEW INTERFACING FOR HOUSEHOLD APPLICATIONS?Authors: Arya Krishna.S; Lizy Abraham?
- Maintains Secure Intrusion Detection System for Mobile Ad-hoc Network?Authors: B.Reddy Sumanth; T.Venkataramana?
- Auditing Mechanisms for Outsourced Cloud Storage?Authors: J.Aparna; R.Sathiyaraj?
- RECOGNIZING AND DISCOVERING SPOOFING ATTACKS FOR MOBILE ADHOC NETWORK?Authors: T.Navaneethan; M.Lalli?
- Routing Protocols in Ad-hoc Network?Authors: Ankita; Vikram Nandal?
- SEAD AND ARIANE Routing Protocol: Comparative Study?Authors: Ankita; Vikram Nandal?
- Wireless Acoustic Signal Monitoring Using MEMS sensor and ATmega on LabVIEW Platform?Authors: Swathy L; Lizy Abraham?
- A Practical Approach to Faster Spatial Queries with Keywords?Authors: B.ChinnaReddaiah; K.R.K.Satheesh?
- Security System in Speech Recognition?Authors: Sunita Dixit; MD Yusuf Mulge?
- Review on Speech Enhancement Techniques?Authors: Sunita Dixit; MD Yusuf Mulge
- Image Compression Techniques: A Review?Authors: Sonal Chawla; Meenakshi Beri; Ritu Mudgil?
- A Combined Weighted Approach to Detect Code Cloning?Authors: Himanshu?; Sushil Garg?
- A Security Integrated Data Storage Model for Cloud Environment?Authors: Sonia Rani?; Neetu Sharma?
- A Panorama of Web Accessibility?Authors: Ramesh Babu J.; Chandra Sekharaiah K.?
- A NOVEL ALGORITHM FOR SATILLITE IMAGE RESOLUTION ENHANCEMENT BASED ON DUAL-TREE COMPLEX WAVELET TRANSFORM (DT-CWT) AND NONLOCAL MEANS (NLM)?Authors: SYED.AZAS; B.M.K. REDDY?
- Impact of AODV under Black Hole and Flooding Attack?Authors: Sunanda Puri; Harish Saini?
- Reserving Room Before EncryptionAuthors: Renuka Devi; C.H.Kiran?
- Use of Fuzzy System in the Eye Images?Authors: M.A.Pirbonyeh; Gh.Moloudian
- Integrally Mysterious Profile Matching Protocols in Mobile Social Networks?Authors: Akkanagamma; C.H.Kiran?
- PERFORMANCE ANALYSIS OF ORTHOGONAL SPACE TIME BLOCK CODE AND TRANSMISSION ANTENNA SELECTION WITH MULTI USER DIVERSITY?Authors: Sathi Babu. A; Ajay Kumar. D?
- Privacy Preserving Incentive Compatible WayAuthors: Shweta; C.H.Kiran?
- NICE?Authors: Renuka Devi; C.H.Kiran?
- Schema Based Parallel XML Parser: A Fast XML Parser Designed for Large XML Files?Authors: Ravi Varma; G. Venkat Rami Reddy
- Secured Access Control Driven Pay per Usage and Logging of Cloud ResourcesAuthors: Sudha.V.Pareddy; Chandrakant.Biradar
- Survey on Dynamic Resource Allocation Techniques in Cloud Environment?Authors: S.Natarajan; R.Pugazendi?
- A Survey on Acknowledgment-Based IDS in Mobile Ad hoc Network (MANET)?Authors: Y.Gowsika; R.Pugazendi?
- IMPROVED LOAD BALANCING MODEL BASED ON PARTITIONING IN CLOUD COMPUTING?Authors: M.Nataraja Suresh; Muppana Manoj Kumar?
- OBJECT DETECTION SCHEME FOR DYNAMIC VIDEOS BASED ON LOCAL ILLUMINATION BASED TECHNIQUES?Authors: T. SOWRYA PRATAP; V. SURENDRA BABU?
- Data Dissemination Approaches for Roadside Content Delivery Systems in VANET: A ReviewAuthors: Vinothkumar.K; Dr.R.Manavalan?
- Payment Schemes for Securing Multihop Wireless Networks: A Survey?Authors: Mrs.N.Sathya; Dr.R.Pugazendi?
- AMENABILITY OF DISTRIBUTED DATA IN THE CLOUD BY MEANS OF CIA FRAMEWORK?Authors: Shaik Mohammed Rayhan; K.Bala Chowdappa?
- Bi-Orthogonal Wavelet Transform Based 3-D Image Watermarking on Colour ImageAuthors: Neha Ganjir?; Nivedita Singh?
- A NOVEL ENERGY EFFICIENT TECHNIQUE FOR COGNITIVE RADIO NETWORKSAuthors: S.SWATHIKA; C.ABINAYA; C.THIAGARAJAN?
- Process of Obtaining Accuracy by Identifying Critical Nuggets during Classification of Information?Authors: Mallipamula Megha Sai Sree; S. Shravani?
- Finger Print Enhancement Using Minutiae Based Algorithm?Authors: Mallipamula Megha Sai Sree; S. Shravani?
- Efficient Image Retrieval Using Different Content Based Image Retrieval Methods: A ReviewAuthors: Priyanka Srivastava; K.S.Patnaik?
- Generating Multimodal Grammar using CYK and e-GRIDS Algorithm?Authors: Pankaj Devre; Madhuri Bhalekar?
- ASIDS - Authenticated Secure and Integral Data Storage in Cloud?Authors: Anjali A; Joe Mathew Jacob?
- Improved Detection and Tracking of Lane Marking Using Hough Transform?Authors: Nimmy Joshy; Dona Jose?
- TFRC Based Adaptive Video Streaming In Cloud?Authors: Ajimon Siji; Amel Austine?
- FILTERING OF UNDESIRED MESSAGES FROM OSN USER SPACE?Authors: Poli Reddy; B. Bala Krishna?
- Providing Security and Efficient Privacy-Preserving Public Auditing?Authors: Poli Reddy; B. Bala Krishna?
- Multicarrier Iterative Generalized Least Squares Data Extraction in Digital Images?Authors: Srinivas M; Dhana Lakshmi?
- A Review on Compressive Sensing in Synthetic Aperture Radar (SAR)?Authors: Ankit; Manoj Ahlawat?
- Using the Literature to Develop a Preliminary Conceptual Model for the Student Success Factors in a Programming Course: Java as a Case Study?Authors: Salam Abdulabbas Ghanim; Nassir Jabir Al-khafaji?
- CONGESTION CONTROL USING ENHANCE AODV (EAODV) ROUTING MECHANISM IN MANET?Authors: Heena; Deepak Goyal?
- ABC_AODV: ARTIFICIAL BEE COLONY BASED AODV ROUTING IN MANET?Authors: Richa Kalucha; Deepak Goyal?
- A Review on Comparative Analysis of Routing Protocols of MANET?Authors: Umara Urooj; Nafees Ayub; Ramzan Talib; Yahya Saeed?
- Fully Automated Approach to Identify Brain Tumors in 2D MRI Using Thresholding and Region Growing Method?Authors: Yogesh Dewangan; Aakanksha S. Choubey?
- User Friendly Data Searching?Authors: D.Sravani; K. Madhurima?
- TRACKING DOWN DATA LEAKAGE BY USING ENCRYPTED FAKE OBJECTSAuthors: Anugu Rahul Reddy; BalaKrishna Bangaru?
- Proximate Mining Order- Sub Matrices Maintaining from Probabilistic Matrices?Authors: Anugu Rahul Reddy; Balakrishna Bangaru?
- Methods for Image Enhancement: A Review?Authors: Cheenu Sharma; Manshi Shukla
- Design and Implementation of Power Efficient Turbo Decoder?Authors: Akshay. P; Rohini Deshpande; Abdul Imran Rasheed?
- An Enhanced Image Steganography Technique in Art Images?Authors: Shemi P B; Remya Paul?
- Designing of Circular and Square Microstrip Feed Antennas?Authors: Manish Kumar; Sarita Gajraj?
- Securing Online Name System through Trust Demonstrating and Temporal AnalysisAuthors: Chandana Krishna Sivunigunta; Sudha.K?
- A Generalized Flow-Based Method for Research on Acted Relationships in Wikipedia?Authors: Nalini N; Padmavathi V; Prudhvi Raj V?
- Polymorphic Worms Collection in Cloud Computing?Authors: Ashraf A. Shahin?
- A Customizable Content Based System to Filter Unwanted Messages from OSN User Wall?Authors: Mayuri Uttarwar; Pragati Patil; Yogesh Bhute?
- Improving the Effectiveness of Learning Content Retrieval through Content Classification and Profiling?Authors: V.R.Raghuveer; R.Mohanasundaram?
- A Lightweight Access for Hybrid Mobile Web Cloud Content ArchitectureAuthors: Shawkat K. Guirguis; Adel A. El-Zoghabi; Mohamed A. Hassan
- An Implementation of Early Warning of Floods along Zambezi Basin Through the Use of Context-Awareness?Authors: Munyaradzi Magomelo; Hilton Chikwiriro; Clive Gurure?
- SMART SURVEILLANCE SYSTEM FOR FACE RECOGNITION?Authors: Mayuri Patel?
- MOBILE ADHOC NETWORKS AND PTP NETWORK?Authors: S.Sivakumar; B.Rajesh?
- A Study of Energy Efficiency Techniques in Cloud Computing?Authors: Aditi Mahajan; Anita Ganpati?
- Verification and Innovation of Neighbor Positions in MANETs?Authors: A. Yuvaraj; Manohar. K?
- Multi View Compressed Images Based On Distributed Coding Scheme?Authors: Kattera Srinivasa Rao; Bangaru BalaKrishna?
- Optimal Multi Server Using Time Based Cost Calculation in Cloud Computing?Authors: Kattera Srinivasa Rao; Bangaru BalaKrishna?
- Peak to Average Power Ratio Reduction in OFDM by Exponential Companding TechniqueAuthors: Sujata P. Jogdand; S.L.Kotgire
- Speech Recognition Module for Home Automation System Based On ZigBeeAuthors: B. Muniswamy Naik; B. Vamsi Krishna?
- VIRTUALIZATION IN CLOUD COMPUTING?Authors: LAKSHAY MALHOTRA; DEVYANI AGARWAL; ARUNIMA JAISWAL?
- Power Stability Solution using Genetic Algorithm?Authors: Meena; Rose Tayal; Naveen Kumar?
- Power Quality Disturbances and Improving Power System Reliability?Authors: Sonia; Pinkey; Naveen Kumar?
- Predicting Web User's Behavior Patterns?Authors: Muhammad Ramzan Talib; Safi Ullah Hidayat; Muhammad Umer Sarwar?
- IMAGE QUALITY ASSESSMENT BY USING AR PREDICTION ALGORITHM WITH INTERNAL GENERATIVE MECHANISM?Authors: C. Naga Venkat Raam; K. Lakshmi Bhavani?
- EXPLORING THE DIFFERENT TYPES OF IMAGE BASED CAPTCHA METHODSAuthors: S.THANGAVELU; T. PURUSOTHAMAN