ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Applications IJCSMA >>

Vol.2, No.11

Publisher: ZAIN Publications

Publishing Date: 2014-11-30

  1. IMPLEMENTATION OF UNMANNED GROUND VEHICLE WITH A SMARTPHONE

    Authors: Levent Seyfi; Isa Akbulut

  2. Evaluation Metrics for Intrusion Detection Systems - A Study

    Authors: Gulshan Kumar

  3. Intrusions in Computer Networks - A Perspective

    Authors: Gulshan Kumar

  4. Computer Network Attacks - A Study

    Authors: Gulshan Kumar; Amanjeet Kaur; Sania Sethi

  5. Analysis of TOI (Things of Internet) Industrial Monitoring System on Raspberry pi Platform

    Authors: Mehta Karankumar D.; Mehta Shreya B.; Raviya Kapil S.

  6. An Architectural-Model for the Mobile based E-Learning Environment

    Authors: V.Nehru; M.Anto Bennet

  7. Protected Mining of Association Instructions in Horizontally Scattered Records

    Authors: Chittaluri.Veeraiah; G.L.Chandrasekharao

  8. A Technique for Mining Uncommon Causal Relations and Its Submission in Finding Adverse Drug Reaction Indication Pairs

    Authors: I.Gurumurthy; R.Jayamma

  9. Real Time System Fault Tolerance Scheduling Algorithms

    Authors: Ramita Mehta; Upasana Garg

  10. A REVIEW ON DIMINISH THE UTILIZATION COST IN DISTRIBUTED DCs

    Authors: M Vishnu Kumar; E Vanitha

  11. Performance Evaluation of Various Discrete Cosine Transforms

    Authors: S.Varkeessheeba; V.Magudeeswaran

  12. DATA MINING INFORMATION SEARCH

    Authors: Prashant S. Gawande; Vivekkumar Shrivastav

  13. Web Log Mining Based on Soft Clustering and Multi-Objective Genetic Algorithm

    Authors: Harish Bhabad; Pankaj Kawadkar

  14. Study of Dynamic Routing Protocols

    Authors: Shipra Chaudhary; Vimal Bibhu; Ankit Arora; Baljeet Singh; Aastha Jyoti Agarwal

  15. A Review Report on the Evolution and Implementation of Business Intelligence Technique in the Banking Sector

    Authors: Rajorsi Panja; Subrata Paul

  16. Analysis and Comparison of Different Image Denoising Techniques- Review

    Authors: S. Swathi; V.Magudeeswaran

  17. A SURVEY ON VARIOUS METHODS IN MANET BASED ON ANALYSING VARIOUS TRAFFIC PATTERNS FOR ANONYMOUS COMMUNICATION

    Authors: Prabhu.K; Gowtham.I; L.M.Nithya

  18. Model Based Test Case Optimization of UML Activity Diagrams using Evolutionary Algorithms

    Authors: V.Mary Sumalatha; G.S.V.P.Raju

  19. REVIEW OF TWO DIMENSIONAL ANALYTICAL MODEL OF DUAL MATERIAL GATE TUNNEL FIELD EFFECT TRANSISTOR

    Authors: VENKATESH.M; VINOTHKUMAR.K; KARTHIKEYAN.P

  20. Study of Data Transmission Using Sockets

    Authors: Divya Singh; Pragun Arora; Rakshit; Saket Tomar

  21. Enhanced Approach for Keyword Based Search on Uncertain Graph Data: A Review

    Authors: Ashwini. V. Urade; Pravin Kulurkar

  22. Remote Data Back-up and Privacy Preserving Data Distribution in the Cloud: A Review

    Authors: Ruchira. H. Titare; Pravin Kulurkar

  23. HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK

    Authors: K.RANJITH SINGH; T.HEMA

  24. Dynamic Linkability with User Authentication Privacy Preserving for Roaming Services: A Review

    Authors: Mrunalini S. Kalamkar; Pravin Kulurkar

  25. A SURVEY OF TEXTURE CLASSIFICATION USING RECENT TECHNOLOGY

    Authors: Keerthana.A.V; Ashwin M