Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.4, No.3
Publisher: ZAIN Publications
Publishing Date: 2015-03-30
- Finger Vein Recognition Using Haar Wavelet Transform?Authors: Asmaa Q. Shareef; Loay E. George; Roaa E. Fadel?
- Image Mining with CBIR?Authors: S.Chidambaranathan?
- Survey on Secure & Efficient Data Transmission in Cluster Based Wireless Sensor Network?Authors: Anup Pawar; Divya K V?
- Attacks in Opportunistic Networks?Authors: Mandeep Kaur?
- Seclusion Search over Encrypted Data in Cloud Storage Services?Authors: G. Karthika Priya Dharshini; D.Viji; K.Saravanan?
- REMOTE CAMERA CONTROLLERAuthors: Apurva Karmakar; Ameya Narkhede; Dhananjay Khapekar; Ashlesha Kawale; Bhagyashree Lakhudkar; Pawan Khade
- Decision Support System Using Social Intelligence?Authors: Anisha Dawle; Janhavi Nakade; Revati Aloni; Utkarsha Washimkar; Ankita Dehare; Pritam Gaigole
- Nearest Neighbor Query in Location-Aware Mobile Ad-Hoc Network?Authors: Archana Yadhav D; Rajalakshmi.R?
- IDT: MINING DATA STREAMS USING INDETERMINATE DECISION TREE ALGORITHM?Authors: Vinodhini.K; Manju Bala?
- IMPLEMENTATION OF SECURE HASH ALGORITHM SHA-1 BY LABVIEW?Authors: Raaed K. Ibrahim; Ali SH. Hussain; Roula A. Kadhim?
- Android based Greenhouse Monitoring and Controlling System?Authors: Pradeep Kasale; Shekhar Kedar; Mrinal Kishore; Kanchan Maske?
- AUTOMATED TRACKING OF USER ACTIVITIES USING GSM?Authors: V. Ravi?; N. Marie Claude?
- TO DETECT AND ISOLATE SELECTIVE PACKET DROP ATTACK IN OPPORTUNISTIC TYPES OF NETWORK?Authors: Mandeep Kaur?; Parminder Singh?
- A Clustering Algorithm in Two-Phase Commit Protocol for Optimizing Distributed Transaction Failure?Authors: Teresa K. Abuya; Richard M. Rimiru; Cheruiyot W.K?
- Mobile Based Campus Information Retrieval Android Application?Authors: Ankit Bansal; Ajit Rana; Akhil Bansod; Prafulla Baviskar?
- Evaluation of Stemming Techniques for Text Classification?Authors: S.P.Ruba Rani; B.Ramesh; M.Anusha; J.G.R.Sathiaseelan?
- FINGERPRINT COMPRESSION BASED ON SPARSE REPRESENTATION?Authors: Linda J Goldina?; Y. Baby Kalpana?
- A Study on Traffic Engineering Architecture for Multiprotocol Label Switching?Authors: Ritika Dangi; Akshat Jain?
- Understanding Steganography over Cryptography and Various Steganography Techniques?Authors: Rajesh Kumar; A.J. Singh?