ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.4, No.3

Publisher: ZAIN Publications

Publishing Date: 2015-03-30

  1. Finger Vein Recognition Using Haar Wavelet Transform?

    Authors: Asmaa Q. Shareef; Loay E. George; Roaa E. Fadel?

  2. Image Mining with CBIR?

    Authors: S.Chidambaranathan?

  3. Survey on Secure & Efficient Data Transmission in Cluster Based Wireless Sensor Network?

    Authors: Anup Pawar; Divya K V?

  4. Attacks in Opportunistic Networks?

    Authors: Mandeep Kaur?

  5. Seclusion Search over Encrypted Data in Cloud Storage Services?

    Authors: G. Karthika Priya Dharshini; D.Viji; K.Saravanan?

  6. REMOTE CAMERA CONTROLLER

    Authors: Apurva Karmakar; Ameya Narkhede; Dhananjay Khapekar; Ashlesha Kawale; Bhagyashree Lakhudkar; Pawan Khade

  7. Decision Support System Using Social Intelligence?

    Authors: Anisha Dawle; Janhavi Nakade; Revati Aloni; Utkarsha Washimkar; Ankita Dehare; Pritam Gaigole

  8. Nearest Neighbor Query in Location-Aware Mobile Ad-Hoc Network?

    Authors: Archana Yadhav D; Rajalakshmi.R?

  9. IDT: MINING DATA STREAMS USING INDETERMINATE DECISION TREE ALGORITHM?

    Authors: Vinodhini.K; Manju Bala?

  10. IMPLEMENTATION OF SECURE HASH ALGORITHM SHA-1 BY LABVIEW?

    Authors: Raaed K. Ibrahim; Ali SH. Hussain; Roula A. Kadhim?

  11. Android based Greenhouse Monitoring and Controlling System?

    Authors: Pradeep Kasale; Shekhar Kedar; Mrinal Kishore; Kanchan Maske?

  12. AUTOMATED TRACKING OF USER ACTIVITIES USING GSM?

    Authors: V. Ravi?; N. Marie Claude?

  13. TO DETECT AND ISOLATE SELECTIVE PACKET DROP ATTACK IN OPPORTUNISTIC TYPES OF NETWORK?

    Authors: Mandeep Kaur?; Parminder Singh?

  14. A Clustering Algorithm in Two-Phase Commit Protocol for Optimizing Distributed Transaction Failure?

    Authors: Teresa K. Abuya; Richard M. Rimiru; Cheruiyot W.K?

  15. Mobile Based Campus Information Retrieval Android Application?

    Authors: Ankit Bansal; Ajit Rana; Akhil Bansod; Prafulla Baviskar?

  16. Evaluation of Stemming Techniques for Text Classification?

    Authors: S.P.Ruba Rani; B.Ramesh; M.Anusha; J.G.R.Sathiaseelan?

  17. FINGERPRINT COMPRESSION BASED ON SPARSE REPRESENTATION?

    Authors: Linda J Goldina?; Y. Baby Kalpana?

  18. A Study on Traffic Engineering Architecture for Multiprotocol Label Switching?

    Authors: Ritika Dangi; Akshat Jain?

  19. Understanding Steganography over Cryptography and Various Steganography Techniques?

    Authors: Rajesh Kumar; A.J. Singh?