Archived Papers for Journal
International Journal of Computer Science and Mobile Applications IJCSMA >>
Vol.2, No.11
Publisher: ZAIN Publications
Publishing Date: 2014-11-30
- IMPLEMENTATION OF UNMANNED GROUND VEHICLE WITH A SMARTPHONEAuthors: Levent Seyfi; Isa Akbulut
- Evaluation Metrics for Intrusion Detection Systems - A StudyAuthors: Gulshan Kumar
- Intrusions in Computer Networks - A PerspectiveAuthors: Gulshan Kumar
- Computer Network Attacks - A StudyAuthors: Gulshan Kumar; Amanjeet Kaur; Sania Sethi
- Analysis of TOI (Things of Internet) Industrial Monitoring System on Raspberry pi PlatformAuthors: Mehta Karankumar D.; Mehta Shreya B.; Raviya Kapil S.
- An Architectural-Model for the Mobile based E-Learning EnvironmentAuthors: V.Nehru; M.Anto Bennet
- Protected Mining of Association Instructions in Horizontally Scattered RecordsAuthors: Chittaluri.Veeraiah; G.L.Chandrasekharao
- A Technique for Mining Uncommon Causal Relations and Its Submission in Finding Adverse Drug Reaction Indication PairsAuthors: I.Gurumurthy; R.Jayamma
- Real Time System Fault Tolerance Scheduling AlgorithmsAuthors: Ramita Mehta; Upasana Garg
- A REVIEW ON DIMINISH THE UTILIZATION COST IN DISTRIBUTED DCsAuthors: M Vishnu Kumar; E Vanitha
- Performance Evaluation of Various Discrete Cosine TransformsAuthors: S.Varkeessheeba; V.Magudeeswaran
- DATA MINING INFORMATION SEARCHAuthors: Prashant S. Gawande; Vivekkumar Shrivastav
- Web Log Mining Based on Soft Clustering and Multi-Objective Genetic AlgorithmAuthors: Harish Bhabad; Pankaj Kawadkar
- Study of Dynamic Routing ProtocolsAuthors: Shipra Chaudhary; Vimal Bibhu; Ankit Arora; Baljeet Singh; Aastha Jyoti Agarwal
- A Review Report on the Evolution and Implementation of Business Intelligence Technique in the Banking SectorAuthors: Rajorsi Panja; Subrata Paul
- Analysis and Comparison of Different Image Denoising Techniques- ReviewAuthors: S. Swathi; V.Magudeeswaran
- A SURVEY ON VARIOUS METHODS IN MANET BASED ON ANALYSING VARIOUS TRAFFIC PATTERNS FOR ANONYMOUS COMMUNICATIONAuthors: Prabhu.K; Gowtham.I; L.M.Nithya
- Model Based Test Case Optimization of UML Activity Diagrams using Evolutionary AlgorithmsAuthors: V.Mary Sumalatha; G.S.V.P.Raju
- REVIEW OF TWO DIMENSIONAL ANALYTICAL MODEL OF DUAL MATERIAL GATE TUNNEL FIELD EFFECT TRANSISTORAuthors: VENKATESH.M; VINOTHKUMAR.K; KARTHIKEYAN.P
- Study of Data Transmission Using SocketsAuthors: Divya Singh; Pragun Arora; Rakshit; Saket Tomar
- Enhanced Approach for Keyword Based Search on Uncertain Graph Data: A ReviewAuthors: Ashwini. V. Urade; Pravin Kulurkar
- Remote Data Back-up and Privacy Preserving Data Distribution in the Cloud: A ReviewAuthors: Ruchira. H. Titare; Pravin Kulurkar
- HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORKAuthors: K.RANJITH SINGH; T.HEMA
- Dynamic Linkability with User Authentication Privacy Preserving for Roaming Services: A ReviewAuthors: Mrunalini S. Kalamkar; Pravin Kulurkar
- A SURVEY OF TEXTURE CLASSIFICATION USING RECENT TECHNOLOGYAuthors: Keerthana.A.V; Ashwin M