ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.2, No.9

Publisher: ZAIN Publications

Publishing Date: 2013-09-30

  1. INTRUSION DETECTION ON CLOUD APPLICATIONS

    Authors: A. Venkat Reddy, K. Sharath Kumar, V. Hari Prasad?

  2. VEHICLE DETECTION AND TRAFFIC ASSESSMENT USING IMAGES?

    Authors: Pushpalata Patil, Prof. Suvarna Nandyal?

  3. An Analysis on Objectives, Importance and Types of Software Testing

    Authors: Gaurav Saini, Kestina Rai?

  4. Cloud Security for Computing Secure Cloud Bursting, Brokerage and Aggregation Using Cryptography?

    Authors: Neeraj Shrivastava, Rahul Yadav

  5. Performance Evaluation of AODV and DSR Routing Protocols with PCM and GSM Voice Encoding Schemes?

    Authors: Osamah Yaseen Fadhil?

  6. Comparison of Previous Result with New Model for the Improvement of Gain in Raman Amplifier?

    Authors: Jyoti Dhir, Vivek Gupta?

  7. NEXT GENERATION MOBILE COMPUTING?

    Authors: N. LAKSHMI PRASANNA, DR. R. V. KRISHNAIAH?

  8. FACIAL IDENTIFICATION SYSTEM USING MATRIX SPACE

    Authors: Saurabh Mitra, Dr. Moushmi Kar, Shikha Mishra?

  9. Zforce Touchscreen Technology?

    Authors: A. ANUSHA REDDY, DR. R. V. KRISHNAIAH?

  10. Analysis of Attribute Set-Based Encryption Solution for Access Control in Cloud Computing?

    Authors: P. Sravanthi, N. Uday Bhaskar, P. Swapna, Nagaraju?

  11. Safety Measures in Wireless Information Networks?

    Authors: K.V.N.R. Sai Krishna, CH. Krishnamohan?

  12. Real-Time Iterated Shrinkage Deconvolution for Artifacts Images?

    Authors: M. Sravanthi, V. Swathanthra

  13. Home Electrical Appliances Smart System

    Authors: S. H. Husin, A. A. Ngahdiman, N. M. Z. Hashim, Y. Yusop, A.S Ja’afar?

  14. A Survey of Time Synchronization Protocols for Wireless Sensor Networks?

    Authors: Baljinder Kaur, Amandeep Kaur?

  15. A New Technique for Test Case Prioritization

    Authors: Amandeep Kaur, Sheena Singh

  16. Lifetime Maximization in Sensor Networks for Rare-Event Detection using Optimal Sleep Scheduling?

    Authors: M. Sindhuja, N. Kokila?

  17. Design and Implementation of Rijndael Encryption Algorithm Based on FPGA?

    Authors: K. Soumya, G. Shyam Kishore

  18. Design and Performance Analysis of Various Adders using Verilog?

    Authors: Maroju SaiKumar, Dr. P. Samundiswary?

  19. Impact of Uncertainty Factors in Cost Estimation ? Substantiation through Normal Distribution Curve

    Authors: G. Rajkumar, Dr. K. Alagarsamy?

  20. A Comprehensive Study on Fast Image Dehazing Techniques?

    Authors: Elisée A KPONOU, Zhengning Wang, Liping Li?

  21. HYBRID ENSEMBLE GENE SELECTION ALGORITHM FOR IDENTIFYING BIOMARKERS FROM BREAST CANCER GENE EXPRESSION PROFILES?

    Authors: DR. S. ARUNA, DR. L.V. NANDAKISHORE

  22. Prototype of Vehicle Security Alert System on Proton Iswara 1.3?

    Authors: N. A. Ali, A. S. Ja’afar, A. Salleh, M. A. M. Razali, M.Z.A.A Aziz, N. M. Z. Hashim

  23. Mobility and Distance Based Geographic Routing in MANET with Minimal Location Update?

    Authors: S. Joshna, J. Vijay Daniel, P. Manjula?

  24. A New Color-Texture Approach for Products Inspection using Wavelets

    Authors: G. Vikranth Kumar, Y. Durga Prasad, Dr. Y. Venkateswarulu?

  25. Simulation of WiMAX System Based on OFDM Model with Difference Adaptive Modulation Techniques?

    Authors: A.Salleh, N.R. Mohamad, M.Z.A. Abd Aziz, M.H. Misran, M.A. Othman, N.M.Z. Hashim?

  26. A Framework Based Integrated Dynamic Data Storage Scheme Based on Network Coding and Homomorphic Fingerprinting?

    Authors: K. Jothimani, N.Hema?

  27. Buffer Cluster Scheduling Scheme for Smart Grid Advanced Metering Applications?

    Authors: A.C.Dhivya, N.Hema

  28. Performing the Data Reliability Estimation in a Data Warehouse Opened on the Web Enable Data Warehouse?

    Authors: K.Valarmathi, T.Selvakannan?

  29. Well-organized Estimation of Range Aggregates against Uncertain Location-Based Queries?

    Authors: G.Nithya, M.Chinnusamy?

  30. Continuous Aggregation Queries Based on Clustering Based Penalty Adaptive Query Planning?

    Authors: T.Keerthana, T.selvakannan?

  31. A Link-Based Cluster Collection Approach Combined Contagious Cluster With For Categorical Data Clustering

    Authors: N.Premalatha, M.Chinnusamy?

  32. SMELL-O-VISION-THE FUTURE DIGITAL DISPLAY DEVICE

    Authors: CH.ARAVINDA, DR. R.V.KRISHNAIAH?

  33. Performance Base Static Analysis of Malware on Android?

    Authors: Khyati Rami, Vinod Desai?

  34. DELAY ? Disruption Tolerant Network (DTN), its Network Characteristics and Core Applications?

    Authors: Vaishali.S.Raj, Dr. R. Manicka Chezian

  35. CONTRAIL ? ARCHITECTURE FOR MOBILE DATA SHARING APPLICATIONS?

    Authors: Lavanya.K, Devipriya.C, Saradha.S, Sangeetha Priya.M?

  36. Power Efficient Design of Sequential Circuits using OBSC and RTPG Integration

    Authors: Rampriya.R, Marutharaj.T?

  37. NOISE ALIASING TECHNIQUE FOR SOFTWARE DEFINED RADIO: A REVIEW

    Authors: Shyam Mohan Dubey, Saurabh Mitra, Dr. Moushmi Kar?

  38. A Random Mechanism to Measure and Predict Changes in DDos Attacks

    Authors: Hemanth Siramdasu, Premnath G, Karthick M

  39. TRACKING AND ACTIVITY RECOGNITION THROUGH CAMERA NETWORKS

    Authors: P. Ravali?, D. Sampath Kumar?

  40. A Review of the Vulnerabilities of Web Applications?

    Authors: Ravneet Kaur Sidhu?