ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.2, No.3

Publisher: ZAIN Publications

Publishing Date: 2013-03-15

  1. Various Approaches for Detecting Attacks in Intrusion Detection System??

    Authors: Purva Adlakha, Prof. Priti Subramanium

  2. Quality of Service Routing Protocol for Mobile Ad hoc Network?

    Authors: D. Annapurna, K B Raja, Venugopal K R, L M Patnaik?

  3. Iris Recognition Using Fuzzy System?

    Authors: Prof.D.D.Patil, Prof.N.A.Nemade, K.M.Attarde

  4. An Automated Biometric Attendance Management System with Dual Authentication Mechanism Based on Bluetooth and NFC Technologies?

    Authors: Samuel King Opoku?

  5. Effect of Twisted Pair Cable Arrangement on Manual Termination with RJ 45 and the Quality of Communication in Auto-Sensing Port Devices

    Authors: Samuel King Opoku, Malik Adams, Edward Akaadom

  6. Business Process Modeling Notation?

    Authors: Robert Flowers, Charles Edeki

  7. Signal Strength and System Operating Margin Estimation for Vehicular Ad-Hoc Networks in Rayleigh Fading Environment?

    Authors: Tilotma Yadav, Partha Pratim Bhattacharya

  8. Energy Awareness in HPC: A Survey?

    Authors: A. R. Surve, A. R. Khomane, S.D. Cheke

  9. Federated Network Security Administration Framework?

    Authors: Bhadreshsinh G. Gohil, Rishi K. Pathak, Axaykumar A. Patel

  10. Prolonged Network Lifetime and Data Wholeness by Clusters Using B-Ct Algorithm?

    Authors: P.Thiyagarajan, O.K.Gowrishankar, K.Sudhakar

  11. Design of Search Engine using Vector Space Model for Personalized Search

    Authors: R.K.Makhijani, I.N.Bharambe

  12. Mesh Technique for Nymble Architecture Sustaining - Secrecy and Security in Anonymizing Networks?

    Authors: J.Praveen Kumar, B.Shyam Kumar

  13. Energy Conscious Dynamic Provisioning of Virtual Machines using Adaptive Migration Thresholds in Cloud Data Center

    Authors: Khushbu Maurya, Richa Sinha?

  14. A Survey on Knowledge Based Classification of Different Routing Protocols in Delay Tolerant Networks?

    Authors: Chintan B. Desai, Vyomal N. Pandya, Prof. Sarman K. Hadia

  15. Grouping and Categorization of Documents in Relativity Measure?

    Authors: V. Asaithambi, D. John Aravindhar, V. Dheepa

  16. Signature Free Virus Blocking Method to Detect Software Code Security?

    Authors: N. Magarani, K. Devipriya, S. Madhan Kumar, T. Viknesh Kumar, K. Kumaresan?

  17. System Monitoring and Security Using Keylogger?

    Authors: Preeti Tuli, Priyanka Sahu

  18. A Collaborative Selfish Replica with Watchdog and Pathrater in MANETS

    Authors: D. Anitha, Dr. M.Punithavalli

  19. Efficient Key Generation for Multimedia and Web Applications?

    Authors: S.Swamy Reddy, V.Ramana reddy, K.Praveen kumar

  20. Face detection using a hybrid approach that combines HSV and RGB?

    Authors: Mrs. Sunita Roy, Prof. Samir K. Bandyopadhyay

  21. Analysis of Robustness of Hybrid Digital Image Watermarking Technique under Various Attacks

    Authors: Yashovardhan Kelkar?, Heena Shaikh, Mohd.Imran Khan