Archived Papers for Journal    
       
        International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.3, No.2
Publisher: ZAIN Publications
Publishing Date: 2014-02-28
- Distributing, Ensuring and Recovery of Data Stored in Cloud?Authors: Dr. B. F. Momin, Mr. Girish Bamane?
 - A Survey Conducted on E-Agriculture with Indian Farmers?Authors: Sumitha Thankachan, Dr. S. Kirubakaran?
 - A Survey on Delegating Log Management to The CloudAuthors: Sinu P S, M.Ananthi?
 - Survey on Clinical Decision Support System for Diagnosing Heart Disease?Authors: Suchithra, Dr. P. Uma Maheswari?
 - Various Approaches to Detect Wormhole Attack in Wireless Sensor Networks?Authors: Nishant Sharma, Upinderpal Singh?
 - Decision Support System for Precluding Coronary Heart Disease (CHD)?Authors: K. Cinetha, Dr. P. Uma Maheswari?
 - A SURVEY ON WORKFLOW SCHEDULING IN CLOUD USING ANT COLONY OPTIMIZATION?Authors: J.Elayaraja, S.Dhanasekar?
 - Integrated System for Reading Multiple FilesAuthors: Awanti Kamble, Anshoola Jaiswal, Nikita Dekate, Shama Haridas, Kalyani Pendke?
 - ENHANCING SECURITY IN TWO-WAY RELAY NETWORK BY USING COOPERATION JAMMING AND RELAY SELECTION APPROACH?Authors: Ramya T V, M. Madan Mohan?
 - Honey Trap Security Server: An Efficient Approach of Securing E-Banking Network?Authors: Ashwini Gabhane, Kiran Bansule, Pradnya Kedar, Lekha Gahukar, Swati Sahare, Ketki Bhakare
 - Secure Hierarchical Temporal Access Control in Cloud Computing?Authors: Karthika.RN, Vijay Anand.P, M.Rajesh Khanna?
 - Weighted Moving Average Forecast Model based Prediction Service Broker Algorithm for Cloud ComputingAuthors: Prof. Deepak Kapgate?
 - A NOVEL ON FAST PARALLEL FILE TRANSFER USING REPLICATION?Authors: K.Sabarigirivason?, R. Giridharan
 - Evaluating and Analyzing Clusters in Data Mining using Different Algorithms?Authors: N. Sunil Chowdary, D. Sri Lakshmi Prasanna, P. Sudhakar
 - High Efficiency Data Access System Architecture for Deblocking Filter Supporting Multiple Video Coding StandardsAuthors: S.Karthikeyan, K.Saran?
 - Literature Survey on Applications of Digital Signal Processing using Anti-Aliasing and Anti-Imaging Filters?Authors: S.Arun Kumar?
 - An Investigation of Face Recognition Characteristics Using PCA and ICA?Authors: Yundi Fu, Yongli Cao, Arun Kumar Sangaiah?
 - An Investigation of Dijkstra and Floyd Algorithms in National City Traffic Advisory Procedures?Authors: Arun Kumar Sangaiah, Minghao Han, Suzi Zhang?
 - AN EFFICIENT LOCATION BASED ROUTING FOR MOBILE ADHOC NETWORKS?Authors: S.Saranya, D.Gokilapriya
 - Porter Five Forces Analysis of the Leading Mobile Cellular Telephony Service Provider in India?Authors: Subhasish Majumdar, Partha Pratim Bhattacharya?
 - Implementing & Developing Cloud Computing on Web ApplicationAuthors: Anisha Tandon?
 - A ZIG-BEE BASED WEARABLE HEALTH MONITORING SYSTEM?Authors: M.Sherwin Nayanar, V.Pandimurugan, V.Gowri?
 - Application of the Fuzzy Logic in Content Based Image Retrieval using Color Feature?Authors: Aqeel M. Humadi, Hameed A. Younis?
 - VLSI Implementation and Analysis of Parallel Adders for Low Power Applications?Authors: Arunprasath S, Karthick A, Dhineshkumar D?
 - Degraded Documents Recovering by Using Adaptive Binarizations and Convex Hull Concept?Authors: Mahendar.R, Navaneetha Krishnan.S, Roshini Ravinayagam, Prakash.P?
 - A New Key Management Paradigm for Fast Transmission in Remote Co-operative Groups?Authors: M.VIJAYAKUMAR, V.PRIYA DHARSHINI, Dr.C.SELVAN?
 - SECURE DATA TRANSMISSION OVER WIMAX NETWORKS USING VPN TECHNOLOGY IN REALTIME ENVIRONMENTS?Authors: J.BALU, DR.S.THIRUNIRAI SENTHIL
 - On Generating Permutations under User Defined Constraints?Authors: Dhruvil Badani?
 - ADVANCED WEB BROWSER WITH EFFECTIVE TOOLS?Authors: M.Loganathan, K.E.Dharani?
 - EXTENDED AND EMBEDDED VISUAL CRYPTOGRAPHY?Authors: G.Tejeswar Reddy, N.Meenakshi?
 - CONDITIONAL PRIVACY PRESERVING SECURITY PROTOCOL FOR NFC APPLICATIONAuthors: V.Gowri, F.W.JESUDAS, M.Sherwin Nayanar?
 - Trust Based Voting Scheme and Optimal Multipath Routing for Intrusion Tolerance in Wireless Sensor Network?Authors: P.PRIYADHARSHINI, C.ANOOR SELVI?
 - AN ANDROID APPLICATION FOR UNIVERSITY ONLINE COUNSELING?Authors: N. Banu Priya, I. Juvanna?
 - XML Dissemination Scheme for Mobile Computing Based on Lineage Encoding?Authors: K. Anusree, Mrs. D. Usha, C. Shiny Jennifer
 - APPLICATION OF CLOUD COMPUTING AS HPC PLATFORM FOR EMBEDDED SYSTEMS?Authors: N.S.Gawai, B.V.Chikte, V.R.Pandit, S.M.Ingale, M.S. Burle?
 - PATH LOSS PREDICTION FOR GSM MOBILE NETWORKS FOR URBAN REGION OF ABA, SOUTH-EAST NIGERIA?Authors: NWALOZIE GERALD .C, UFOAROH S.U, EZEAGWU C.O, EJIOFOR A.C?
 - Analysis of Lossy Hyperspectral Image Compression Techniques?Authors: Dr. S.M.Ramesh, P.Bharat, J.Anand, J.Anbu Selvan
 - VLSI Architecture for Implementing Kaiser Bessel Window Function Using Expanded Hyperbolic CORDIC Algorithm?Authors: M.Mohana Arasi, J.Anand, P.Bharat, J.Anbu Selvan?
 - Copyright Protection through Deep Packet Inspection- An Indian PerspectiveAuthors: Priyanka Jain, Jai Sachith Paul, Prof. K.Pradeep Kumar?
 - FINITE?PRECISION ANALYSIS OF DEMAPPERS AND DECODERS FOR LDPC-CODED M-QAM SYSTEMS?Authors: Hoglah Leena Bollam?
 - VAMPIRE ATTACKS: PROTOCOL ROUTING INFRASTRUCTURE IN WIRELESS SENSOR NETWORKSAuthors: T.Nivethitha, S.Muthukrishnan, S. Navaneethakrishnan?
 - FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM?Authors: K.Senthamil Selvi, P.Chitrakala, A.Antony Jenitha?
 - Monitoring Factory Machine Status from Remote Location using GSM Technologies?Authors: C. Shiny Jennifer, B.V. Baiju, K. Anusree?
 - EFFICIENT GRIDDING AND SEGMENTATION FOR MICROARRAY IMAGES?Authors: P.Thamaraimanalan, D.Dhinesh kumar, K.Nirmalakumari?
 - Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption TechniqueAuthors: A.Jeeva, Dr.C.Selvan, A.Anitha?
 - DETECTING NODE REPLICATION ATTACKS IN STATIC AND MOBILE SENSOR NETWORKS USING SPRT?Authors: T.EZHILARASAN, R.BACKIYALAKSHMI
 - A Supervised Method for Multi-keyword Web Crawling on Web Forums?Authors: A.Gowtham, Dr.K.Deepa
 - Improvement of Email Summarization Using Statistical Based Method?Authors: Mithak I. Hashem
 - Intrusion Detection, Secure Protocol & Network Creation for Spontaneous Wireless AD HOC Network?Authors: Nikhil Varghane, Prof. Bhakti Kurade, Prof. Chandradas Pote?
 - DESIGN PATTERN BASED ANALYSIS IN MULTI-AGENT FRAMEWORK?Authors: A.Sindhuja, Rathi.P.R, Anis Fathima.A.R, A.P.Jeyasanthini?
 - LARYNX DISEASE ANALYSIS USING DYNAMIC TIME WARPING ALGORITHM?Authors: K. Aiswarya Lakshmi, D. Karunanithi, G.Swetha?
 - Traveler Guide using GPS?Authors: Prashant Beldar, Prashant Bansode, Rajendra Mane, Swapnil Gaikwad?
 - TIMETABLE GENERATION SYSTEM?Authors: Anuja Chowdhary, Priyanka Kakde, Shruti Dhoke, Sonali Ingle, Rupal Rushiya, Dinesh Gawande?
 - Smart Remote Health Care Data Collection ServerAuthors: Kalyani Bangale, Karishma Nadhe, Nivedita Gupta, Swati Singh Parihar, Gunjan Mankar?
 - LABVIEW Based Module For Bio Signals MonitoringAuthors: Sabeetha Begum.M, Kumarnath.J?
 - Review on MANET: Characteristics, Challenges, Imperatives and Routing Protocols?Authors: Mahima Chitkara, Mohd. Waseem Ahmad?
 - Review of Techniques for Detecting Video Forgeries?Authors: Aniket Pathak, Dinesh Patil
 - QUASI RESONANT BUCK CONVERTER FOR DUAL STRING BUCK LED DRIVER?Authors: Vijayadevi.A, Sneha Prem, Jikku Mathew, Manikandan.K, Sajla Rehman?
 - Lossless Compression for Compound Documents Based on Block Classification?Authors: A.Thamarai Selvi, M.Sambath, S.Ravi?
 - ADDRESSING BIG DATA WITH HADOOP?Authors: TWINKLE ANTONY?, SHAIJU PAUL?
 - Privacy in Map Reduce Based Systems: A ReviewAuthors: Rosmy C Jose, Shaiju Paul?
 - AN ELLIPTIC CURVE CRYPTOGRAPHY BASED ENHANCED ADAPTIVE ACKNOWLEDGMENT (ECC-EAACK) INTRUSION DETECTION SYSTEM?Authors: Deboral C, Sudhagar G?
 - PRECIPITATE MESSAGE MANIFEST PROTOCOL FOR VEHICULAR AD HOC NETWORKS?Authors: Ramya. K, Nithya. N?
 - JOINT VIDEO COMPRESSION AND ENCRYPTION USING SECURE WAVELET TRANSFORM AND ENTROPY CODING?Authors: E.Mallika, K.SivaKumar?
 - Study of Security Risk and Vulnerabilities of Cloud ComputingAuthors: Dr.P.K.Rai, R.K.Bunkar
 - Novel Techniques for Color and Texture Feature Extraction?Authors: Miss. Priyanka N.Munje?, Prof. Deepak Kapgate?, Prof. Snehal Golait
 - Data Integration Models for Operational Data Warehousing?Authors: G. Swetha, D. Karunanithi, K. Aiswarya Lakshmi?
 - REALIZATION OF VLSI ARCHITECTURE FOR DECISION TREE BASED DENOISING METHOD IN IMAGES?Authors: Gobu.CK, Priya.R?
 - Providing Efficient Data management Services Using Cloud Cache?Authors: Swapnil L. Mahadeshwar, A.R.Surve
 - GAPSS: GPS Aided Photo Search System?Authors: Amey Divekar, Pravin Khot, Gaurav Chaudhari, Vishal Shembekar?
 - A Review on Privacy Problems in Distributed Information Brokering System and Solutions?Authors: Mr. Ashutosh Kamble, Prof. Deepak Kapgate, Prof. Prakash Prasad?
 - SURVEY ON SECURE AUDIO ENCRYPTION USING SILENCE PART OF THE SPEECH?Authors: V. Anusuya Devi, Dr. V. Kalaivani, T. Sam Pradeep Raj?
 - An Approach for Minimization of Power Consumption in Ad-Hoc Network?Authors: Abhiruchi Akre, Kimi Bhoyar, Ankita Malve, Avantika Kalbande, Pawan Khade?
 - Outlier Mining for Removing the Anomalies in High Dimensional Data Using ARVDH AlgorithmAuthors: Krupa Mary Jacob, K.Sangeetha, S.Karthik?
 - DETECTION OF MASQUERADERS USING TREE STRUCTURED SVM?Authors: P.Anishprabu, M.Sangeetha, M.Nagulanand?
 - EduPad- “A Tablet Based Educational System for Improving Adult Literacy in Rural India”?Authors: Mayuri Tawri, Richa Sharma, Charandas Pote
 - Solution to Data Sharing for Confidentiality between Service Provider and the Data Owner?Authors: Mr. Ajay Bhaisare, Prof. Prakash Prasad, Prof. Ashwini Meshram?
 - TOWARDS SECURE PROCESSING PRIVATE QUERIES OVER ENCRYPTED CLOUD DATA?Authors: Sumathi Sivaraj, S. Yasotha?
 - CYBER SECURITY -Trends and Challenges?Authors: Vidhya P.M?
 - Gas Level Detection and Leakage Monitoring System using a Specific Technique?Authors: I. Juvanna, N. Meenakshi?
 - Lane Detection Techniques - A Review?Authors: Anjali Goel?
 - A Review on Image Dehazing Methods?Authors: Reshma Kurian, Namitha T.N??
 - APPLICATION OF STATISTICAL MODELS TO THE COLLABORATIVE PUBLICATIONS IN BIOINFORMATICS?Authors: Dr. N. Amsaveni, M. Manjula??
 - Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryption?Authors: Prof. Y.B.Gurav?, Manjiri Deshmukh
 - EFFICIENT AND DISTRIBUTED NETWORK MODEL FOR P2P SYSTEMS?Authors: K.KAYALVIZHI, BHARATHI.R?
 - Attendance Monitoring Using Face Recognition?Authors: Divya Singh, Ruhi Sunil Hadke, Shruti Sanjay Khonde, Valhavi Diwakar Patil, Monica Kamnani, Mitali R. Ingle?
 - GEOGRAPHIC ROUTING SCHEME BASED ON DYNAMIC LOCATION UPDATE AND LOAD BALANCING MECHANISMAuthors: M.Rajalakshmi, K.Gowsic?
 - SECURE NETWORK SHARING NEMO BASED AD-HOC?Authors: V.Pavithra, M.Mohankumar?
 - A SECURITY ARCHITECTURE ACHIEVING ANONYMITY AND TRACEABILITY IN PAYMENT BASED SYSTEMAuthors: M.Sangeetha, S.Rajasulochana, S.Shanmathi?
 - SAT4BSC: A Static Analysis Tool for BPEL Source Codes?Authors: Esubalew Alemneh, Abdul Azim Abd Ghani, Rodziah Atan?
 - Improvising Authenticity and Security of Automated Teller Machine ServicesAuthors: Srivatsan Sridharan, Gorthy Ravi Kiran, Sridhar Jammalamadaka?
 - A Survey on Privacy-Preserving Techniques for Secure Cloud Storage?Authors: Salve Bhagyashri, Prof. Y.B.Gurav?
 - Cloud Removal from Satellite Images Using Information Cloning?Authors: Saranya M?
 - Automatic Detection of Optic Disc for the Extraction of Ocular Structure?Authors: Nivedha S, Dinesh V?
 - PHISHING WEBSITE DETECTION: A REVIEW?Authors: Feon Jaison, Seenia Francis?
 - A Review of Intrusion Detection System in Computer Network?Authors: Abhilasha A Sayar, Sunil. N. Pawar, Vrushali Mane?
 - MULTIMEDIA QA GENERATION BY USING SEARCH DIVERSIFICATION?Authors: Nandhini.N, Ramya.K, Sandeepa.P
 - CPU Power Prediction on Modern Multicore Embedded Processor?Authors: Shuhaizar Daud, R. Badlishah Ahmad, Ong Bi Lynn?
 - Vampire Attacks: Topology Discovery in Wireless Ad Hoc Sensor NetworksAuthors: P. Dhivya, P. Sathya Priya, M. Thenila?
 - Integration of Touch Technology in Restaurants using Android?Authors: Sushmita Sarkar, Resham Shinde, Priyanka Thakare, Neha Dhomne, Ketki Bhakare?
 - VIDEO MINING AND ANOMALY DETECTION ? SURVEY?Authors: Subashree.D, Sobitha Ahila.S
 - Review on Authentication Mechanisms of Digital Signatures used for Certification?Authors: Shraddha Kulkarni, Prof. Vikrant Chole, Prof. P S Prasad?
 - AN ANTI-PHISHING FRAMEWORK WITH NEW VALIDATION SCHEME USING VISUAL CRYPTOGRAPHY?Authors: Mr. Bhushan Yenurkar, Mr. Shrikant Zade?
 - Advanced E-mail Spam Detection Methodology by the Neural Network ClassifierAuthors: V. BRINDHA, J. GEORGE CHRISTOBER, V.NANDHINI?
 - Translation of English Algorithm in C Program using Syntax Directed Translation SchemaAuthors: Nisha N. Shirvi, Mahesh H. Panchal?
 - One-Dimension Multi-Objective Bin Packing Problem using Memetic Algorithm?Authors: Khushbu Patel, Mahesh Panchal
 - Filtered Wall: An Automated System to Filter Unwanted Messages from OSN User Walls?Authors: Ms. Pallavi Kalyane, Prof. Sachin Chavan, Prof. Pravin Rahate?
 - Mining Multilevel Fuzzy Association Rule from Transaction Data?Authors: Urvi A. Chaudhary, Mahesh Panchal?
 - Enhanced Live Migration of Virtual Machine Using Comparison of Modified and Unmodified Pages?Authors: Sushil Kumar Soni, Ravi Kant Kapoor?
 - DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGINGAuthors: Mary Michael, J.Mary Metilda?
 - A Wavelet Transform Based Secure Data Transfer Using Blowfish Algorithm?Authors: Rashmi.J, Bharathi.G?
 - AN EFFICIENT METHOD TO AVOID FALSE VOTING USING SMS VOTING APPROACH?Authors: K.Mythili?, K.Kanagavalli,? B.Shibi?
 - An Efficient Real Time Video Multicasting Protocol and WLANs Cross-Layer Optimization in IEEE 802.11N?Authors: Gopikrishnan.R, Ms. J.R.Thresphine??
 - Implementation of Password Guessing Resistant Protocol (PGRP) to Prevent Online Attacks?Authors: M.YUVARAJ, A.R.BHARATHIDASAN, N.KUMAR?
 - Selection of Most Relevant Features from High Dimensional Data using IG-GA Hybrid Approach?Authors: Ishani Mandli, Prof. Mahesh Panchal?
 - WIRELESS MESH NETWORKS: ISSUES AND CHALLENGES?Authors: Jubil Jose, Rigi C.R?
 - A TECHNIQUE FOR IMPROVING CAKEPHP WEB PAGE RESPONSE TIMEAuthors: Pharaoh Chaka, Hilton Chikwiriro?
 - EXHAUSTING VERVE BY VAMPIRE’S IN WIRELESS AD HOC SENSOR NETWORKS?Authors: P. DivyaPrabha, R. Sundaram?
 - Enhanced Privacy ID for Remote Authentication using Direct Anonymous Attestation Scheme?Authors: Uma.R, Aravind.P?
 - Intrusion Detection in Mobile Adhoc Network?Authors: Mrs. Mugdha Kirkire, Prof. Poonam Gupta?
 - ENTITY SEARCH ENGINES?Authors: Pinky Paul?, Mr. Thomas George?
 - CONCEALED CLIENT DATA AGGREGATION FOR DATABASE-AS-SERVICE (DAS)?Authors: JEBARANJANI.B?, SANGEETHA.S?
 - BUNDLE PROTOCOL ALONG WITH OLSR IN MANET?Authors: J. Vithya Roshni, J. Prabin Jose
 - A Rendezvous Based Sensory Data Collection with Re-clustering Technique?Authors: D.Gokilapriya, N.Lokesh?
 - Literature Survey on DWT Based Image Steganography?Authors: Mrs. Suvarna Patil; Mr. Gajendra Singh Chandel
 - Detection of Fire Flow in Videos by SVM Classifier with EM-Segmentation Method?Authors: S.Shanthi; J.George Christober
 
                    Share Your Research, Maximize Your Social Impacts
                
