Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.3, No.9
Publisher: ZAIN Publications
Publishing Date: 2014-09-30
- Designing of Microstrip Feed Antenna by Combining Circular and Square Microstrip AntennasAuthors: Manish Kumar; Kapil Kumawat; Sarita Gajraj?
- FINGERPRINT MATCHING BASED ON STATISTICAL TEXTURE FEATURES?Authors: K. PHALGUNA RAO; M.CHARAN KUMAR?
- MATCHING of PROCESS DATA and OPERATIONAL DATA for a DEEP BUSINESS ANALYSIS. ONTOLOGY DESIGN for POSSIBLE MATCHING and RECOMMENDATIONS to IMPROVE it?Authors: Humaira Majeed; Ramzan Talib?
- ANALYSIS OF BIG DATA?Authors: Anshul Sharma; Preeti Gulia
- OPTIMIZING BIG DATA?Authors: Anshul Sharma; Preeti Gulia?
- Analysis of Student Behavior in Teacher’s Evaluation: Based on Time Spent MethodAuthors: Safi Ullah Hidayat; Muhammad Ramzan Talib?
- FoCUS: Learning to Crawl Web Forums?Authors: V.Shanmugapriya; S.Krishnaveni?
- A QUERY FORMULATION LANGUAGE FOR DATA WEB?Authors: Jagadish Kumar. Talagapu; G. Ravi?
- Comparative Analysis on Visual Cryptographic Schemes?Authors: T. Anuradha; K. Usha Rani?
- Survey of Proxy Creates Continuous Location Based Spatial Queries for Mobile Clients by Exploiting Spatial and Temporal Locality?Authors: K.Suresh Babu; Swetha Madireddy?
- A SECURE PROTOCOL FOR IMPULSIVE WIRELESS ADHOC NETWORK?Authors: Sana Shireen Ismail; V. Usha?
- A SECURE AODV PROTOCOL TO DETECT BLACK HOLE AND WARM HOLE ATTACK IN MANET?Authors: A. Manisha?; S. Vaishnavi?
- A NEIGHBOUR COVERAGE PROTOCOL FOR REDUCING ROUTING OVERHEAD IN MOBILE AD HOC NETWORKS?Authors: Y. Neelima Sandhya?; Ch. Anitha?
- Review on Different Video Watermarking Techniques?Authors: Paramjit Kaur; Vijay Laxmi?
- CONSISTENCY MODELS IN DISTRIBUTED SHARED MEMORY SYSTEMS?Authors: Radhika Gogia; Preeti Chhabra; Rupa Kumari?
- DNS HEALTH VISUALIZATION?Authors: C.Yamini; R.Balaji; N.Papanna?
- Optimizing and Reconstruction of SAR Images Using Glowworm Swarm Optimization (GSO)?Authors: J. Manimozhi?
- A Study on Various Attacks in Wireless Ad hoc Sensor Network?Authors: Savitha.M; R.Manavalan?
- Intelligent Vehicle Control Using Wireless Embedded System in Transportation System Based On GSM and GPS TechnologyAuthors: M. Abinaya?; R. Uthira Devi?
- REVIEW ON THE COIN RECOGNITION SYSTEM WITH ROTATION INVARIANT?Authors: Sandeep Kaur; Mandeep Kaur?
- STUDY OF CLASSIFIERS IN DATA MINING?Authors: Gaurav Taneja; Ashwini Sethi?
- TIRE PRESSURE MONITORING SYSTEM INTERFERENCE SUPPRESSION USING BEAM FORMER TECHNIQUES?Authors: M.Srikanth; Smt.K.Soujanya?
- PERFORMANCE EVALUATION OF AODV AND AOMDV ON THE BASIS OF THROUGHPUT?Authors: POOJA DAHIYA; GUNJAN MADAN; REEMA GUPTA?
- A Review of Data Mining as a Tool for Organization’s Growth and Productivity?Authors: Oluigbo Ikenna; Nwakanma Ifeanyi; Roland Justina; Nwachukwu Nnamdi; Ujunwa Anuli; Ndanike Paul?
- AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS?Authors: Y. Srinivasulu; P.Srinivas?
- Real Time System Fault Tolerance Scheduling AlgorithmsAuthors: Ramita Mehta?; Upasna?
- DESIGNING OF MICROSTRIP PATCH ANTENNAS USING CROWN & SIERPIENKSI FRACTAL SLOTSAuthors: Manish Kumar; Sarita Gajraj; Kapil Kumawat?
- Face Image Retrieval Using Pose Specific Set Sparse Feature RepresentationAuthors: Abdul Afeef N; Sebastian George?
- RIHT: A Novel Hybrid IP Traceback Scheme?Authors: Chinthaparthy Charan Kumar Reddy; K.Srilakshmi
- PROVIDING DATA SECURITY FROM ANOMALOUS USERS WITH DATA AGGREGATION SCHEME?Authors: Mohammed Amair; Mohd Abdul Wasey Muzakkir; M. Saidi Reddy?
- FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS?Authors: K. Shivakrishna; M. Jayapal?
- Received Signal Strength Based Detection and Localization of Multiple Spoofing Attacks in Wireless Networks?Authors: K.Suresh Babu; Swetha Gurram?
- Data Security Issues in Distributed Cloud System?Authors: P. Raja Kaushik; G. Praveen Babu?
- COMPARATIVE STUDY OF GRAPHICAL USER AUTHENTICATION APPROACHES?Authors: Radhika?; Siddhartha Sankar Biswas?
- COMPARE USABILITY AND SECURITY OF GRAPHICAL USER AUTHENTICATION APPROACHESAuthors: Radhika?; Siddhartha Sankar Biswas?
- Detection and Removal of Wood Pellets in Pneumatic Conveying Pipelines Using Robot?Authors: K.Suganyadevi; M.Lydia Sindhuja
- Orchestration Of Software-Defined Application Delivery Networks using Open-Flow Architecture?Authors: Raghuram.P; G. Praveen Babu?
- DESIGN AND ANALYSIS OF VARIOUS APPROACHES TO DETECT INTRUSION?Authors: Sonia?; Vikram Nandal?
- AN INTELLIGENT APPROACH TO DETECT INTRUSION OVER WIRELESS?Authors: Sonia?; Vikram Nandal?
- User Access Control for OSNs: An Empirical Study in the OffingAuthors: Saritha Bhukya; Usha Gayatri; K Chandra Sekharaiah
- PROJECT PLANNING?Authors: Ritika Manchanda; Sanjay Yadav; Stela Sarkar?
- An Approach for Determining the Health of the DNS?Authors: TEJASWINI YADAV C.Y; BALAJI RAJENDRAN; RAJANI P?
- PEERS ORGANIZING TRUST BASED ON METRICSAuthors: Sheshadri Shirisha; K. Chandra Sekharaiah?
- License Plate Recognition?Authors: Leelawati Gaddam; Sukanya H.Rane; Jayshri Kishan Baspure; Priyanka B.Gagare; Amol Baviskar?
- Segmentation of Medical Images using Image Registration?Authors: A.Nirmala; V.Sridevi?
- Various Load Balancing Techniques in Cloud Computing?Authors: Ashima Narang; Vijay Laxmi?
- SECURED TRUST COMMUNICATION IN MULTI-AGENT SYSTEMS?Authors: Anuradha Balasubramanian
- Security in Cloud Computing Using Cryptographic Algorithms?Authors: Shakeeba S. Khan; Sakshi S. Deshmukh?
- AUTOMATED MASS DETECTION SYSTEM IN MAMMOGRAMS?Authors: M.MONICA; K.SRIDEVI?
- Effective Partition Method for Public Cloud?Authors: Shaik Khaja Shareef; D.Murahari Reddy?
- Region Detection and Matching for Object Recognition?Authors: Manpreet Kaur; Silky Narang; Naseeb Singh Dhillon?
- Construction of Stream Ciphers from Block Ciphers and their SecurityAuthors: Sridevi?
- Architectural Shift from 4G to 5G Wireless Mobile Networks?Authors: Pratik Sule; Anish Joshi?
- Reducing the Time Delay in Data Transfer using SOGR-BGP Protocol for Mobile Ad Hoc Network?Authors: R. Srithulasiraman; S. Mythili?
- Survey Paper on Achieving MAC Layer Fairness using Back off Schemes in Wireless Ad hoc Networks?Authors: Varsha Pandey; Neelmani Verma?
- REAL TIME SYSTEM FOR DETERMINATION OF DRINKING WATER QUALITY?Authors: B. MENAKA DEVI; N. AMMU ABIRAMI?
- An Algorithm for Mobile Ad-hoc Networks to Reducing Cut Vertices?Authors: Marru Sandeep Kumar?; N.Anjaneyulu; B.Satyanarayana
- BASICS OF ARTIFICIAL NEURAL NETWORK?Authors: Sakshi Kohli; Surbhi Miglani; Rahul Rapariya?
- LOCATION AWARE ADAPTIVE ROUTING PROTOCOLS IN VANETS?Authors: Pooja Malik?; Vikram Nandal?
- STUDY AND ANALYSIS OF VARIOUS ROUTING PROTOCOLS IN VANETS?Authors: Pooja Malik?; Vikram Nandal?
- DISTRIBUTED SINR-BASED SCHEDULING ALGORITHM FOR MULTIHOP WIRELESS NETWORKSAuthors: S.Vijayalakshmi; R.Kavitha?
- OVERVIEW OF ROUTING PROTOCOLS FOR VEHICULAR AD-HOC NETWORKS?Authors: R.Logapriya; R.Kavitha?
- DIGITAL SIGNATURE ALGORITHM (DSA) BASED SECURE INTRUSION DETECTION SYSTEM FOR MANETS?Authors: G.Jothimani; R.Kavitha?
- A STUDY OF ROUTING PROTOCOLS AND ATTACK PATTERNS ON ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKSAuthors: S.Jothilakshmi; R.Kavitha?
- Dynamic Voltage and Frequency Scheduling For Mobile Devices?Authors: R.GOWRIMANOHARI; M.ISHWARYA NIRANJANA; E.ARUN KUMAR?
- CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring?Authors: G. Jayashree; U. Sadhana; K.S. Parimala?
- Voice Based Guidance and Location Indications System for the Blind using GSM, GPS and Optical Device Indicator?Authors: Sama Santhosh Reddy; G. Sathyaprabha; P.V. Vara Prasad Rao?
- The Study for Application of ZigBee Location Tracing Monitoring System for ATM Device Theft?Authors: R. Pradeep Kumar; A. Indra Kumar; P.V. Vara Prasad Rao?
- Cache Memory ? Various Algorithm?Authors: Priyanka Yadav; Vishal Sharma; Priti Yadav?
- Lip-Reading using Neural Networks?Authors: Priti Yadav; Priyanka Yadav; Vishal Sharma?