ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.3, No.9

Publisher: ZAIN Publications

Publishing Date: 2014-09-30

  1. Designing of Microstrip Feed Antenna by Combining Circular and Square Microstrip Antennas

    Authors: Manish Kumar; Kapil Kumawat; Sarita Gajraj?

  2. FINGERPRINT MATCHING BASED ON STATISTICAL TEXTURE FEATURES?

    Authors: K. PHALGUNA RAO; M.CHARAN KUMAR?

  3. MATCHING of PROCESS DATA and OPERATIONAL DATA for a DEEP BUSINESS ANALYSIS. ONTOLOGY DESIGN for POSSIBLE MATCHING and RECOMMENDATIONS to IMPROVE it?

    Authors: Humaira Majeed; Ramzan Talib?

  4. ANALYSIS OF BIG DATA?

    Authors: Anshul Sharma; Preeti Gulia

  5. OPTIMIZING BIG DATA?

    Authors: Anshul Sharma; Preeti Gulia?

  6. Analysis of Student Behavior in Teacher’s Evaluation: Based on Time Spent Method

    Authors: Safi Ullah Hidayat; Muhammad Ramzan Talib?

  7. FoCUS: Learning to Crawl Web Forums?

    Authors: V.Shanmugapriya; S.Krishnaveni?

  8. A QUERY FORMULATION LANGUAGE FOR DATA WEB?

    Authors: Jagadish Kumar. Talagapu; G. Ravi?

  9. Comparative Analysis on Visual Cryptographic Schemes?

    Authors: T. Anuradha; K. Usha Rani?

  10. Survey of Proxy Creates Continuous Location Based Spatial Queries for Mobile Clients by Exploiting Spatial and Temporal Locality?

    Authors: K.Suresh Babu; Swetha Madireddy?

  11. A SECURE PROTOCOL FOR IMPULSIVE WIRELESS ADHOC NETWORK?

    Authors: Sana Shireen Ismail; V. Usha?

  12. A SECURE AODV PROTOCOL TO DETECT BLACK HOLE AND WARM HOLE ATTACK IN MANET?

    Authors: A. Manisha?; S. Vaishnavi?

  13. A NEIGHBOUR COVERAGE PROTOCOL FOR REDUCING ROUTING OVERHEAD IN MOBILE AD HOC NETWORKS?

    Authors: Y. Neelima Sandhya?; Ch. Anitha?

  14. Review on Different Video Watermarking Techniques?

    Authors: Paramjit Kaur; Vijay Laxmi?

  15. CONSISTENCY MODELS IN DISTRIBUTED SHARED MEMORY SYSTEMS?

    Authors: Radhika Gogia; Preeti Chhabra; Rupa Kumari?

  16. DNS HEALTH VISUALIZATION?

    Authors: C.Yamini; R.Balaji; N.Papanna?

  17. Optimizing and Reconstruction of SAR Images Using Glowworm Swarm Optimization (GSO)?

    Authors: J. Manimozhi?

  18. A Study on Various Attacks in Wireless Ad hoc Sensor Network?

    Authors: Savitha.M; R.Manavalan?

  19. Intelligent Vehicle Control Using Wireless Embedded System in Transportation System Based On GSM and GPS Technology

    Authors: M. Abinaya?; R. Uthira Devi?

  20. REVIEW ON THE COIN RECOGNITION SYSTEM WITH ROTATION INVARIANT?

    Authors: Sandeep Kaur; Mandeep Kaur?

  21. STUDY OF CLASSIFIERS IN DATA MINING?

    Authors: Gaurav Taneja; Ashwini Sethi?

  22. TIRE PRESSURE MONITORING SYSTEM INTERFERENCE SUPPRESSION USING BEAM FORMER TECHNIQUES?

    Authors: M.Srikanth; Smt.K.Soujanya?

  23. PERFORMANCE EVALUATION OF AODV AND AOMDV ON THE BASIS OF THROUGHPUT?

    Authors: POOJA DAHIYA; GUNJAN MADAN; REEMA GUPTA?

  24. A Review of Data Mining as a Tool for Organization’s Growth and Productivity?

    Authors: Oluigbo Ikenna; Nwakanma Ifeanyi; Roland Justina; Nwachukwu Nnamdi; Ujunwa Anuli; Ndanike Paul?

  25. AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS?

    Authors: Y. Srinivasulu; P.Srinivas?

  26. Real Time System Fault Tolerance Scheduling Algorithms

    Authors: Ramita Mehta?; Upasna?

  27. DESIGNING OF MICROSTRIP PATCH ANTENNAS USING CROWN & SIERPIENKSI FRACTAL SLOTS

    Authors: Manish Kumar; Sarita Gajraj; Kapil Kumawat?

  28. Face Image Retrieval Using Pose Specific Set Sparse Feature Representation

    Authors: Abdul Afeef N; Sebastian George?

  29. RIHT: A Novel Hybrid IP Traceback Scheme?

    Authors: Chinthaparthy Charan Kumar Reddy; K.Srilakshmi

  30. PROVIDING DATA SECURITY FROM ANOMALOUS USERS WITH DATA AGGREGATION SCHEME?

    Authors: Mohammed Amair; Mohd Abdul Wasey Muzakkir; M. Saidi Reddy?

  31. FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS?

    Authors: K. Shivakrishna; M. Jayapal?

  32. Received Signal Strength Based Detection and Localization of Multiple Spoofing Attacks in Wireless Networks?

    Authors: K.Suresh Babu; Swetha Gurram?

  33. Data Security Issues in Distributed Cloud System?

    Authors: P. Raja Kaushik; G. Praveen Babu?

  34. COMPARATIVE STUDY OF GRAPHICAL USER AUTHENTICATION APPROACHES?

    Authors: Radhika?; Siddhartha Sankar Biswas?

  35. COMPARE USABILITY AND SECURITY OF GRAPHICAL USER AUTHENTICATION APPROACHES

    Authors: Radhika?; Siddhartha Sankar Biswas?

  36. Detection and Removal of Wood Pellets in Pneumatic Conveying Pipelines Using Robot?

    Authors: K.Suganyadevi; M.Lydia Sindhuja

  37. Orchestration Of Software-Defined Application Delivery Networks using Open-Flow Architecture?

    Authors: Raghuram.P; G. Praveen Babu?

  38. DESIGN AND ANALYSIS OF VARIOUS APPROACHES TO DETECT INTRUSION?

    Authors: Sonia?; Vikram Nandal?

  39. AN INTELLIGENT APPROACH TO DETECT INTRUSION OVER WIRELESS?

    Authors: Sonia?; Vikram Nandal?

  40. User Access Control for OSNs: An Empirical Study in the Offing

    Authors: Saritha Bhukya; Usha Gayatri; K Chandra Sekharaiah

  41. PROJECT PLANNING?

    Authors: Ritika Manchanda; Sanjay Yadav; Stela Sarkar?

  42. An Approach for Determining the Health of the DNS?

    Authors: TEJASWINI YADAV C.Y; BALAJI RAJENDRAN; RAJANI P?

  43. PEERS ORGANIZING TRUST BASED ON METRICS

    Authors: Sheshadri Shirisha; K. Chandra Sekharaiah?

  44. License Plate Recognition?

    Authors: Leelawati Gaddam; Sukanya H.Rane; Jayshri Kishan Baspure; Priyanka B.Gagare; Amol Baviskar?

  45. Segmentation of Medical Images using Image Registration?

    Authors: A.Nirmala; V.Sridevi?

  46. Various Load Balancing Techniques in Cloud Computing?

    Authors: Ashima Narang; Vijay Laxmi?

  47. SECURED TRUST COMMUNICATION IN MULTI-AGENT SYSTEMS?

    Authors: Anuradha Balasubramanian

  48. Security in Cloud Computing Using Cryptographic Algorithms?

    Authors: Shakeeba S. Khan; Sakshi S. Deshmukh?

  49. AUTOMATED MASS DETECTION SYSTEM IN MAMMOGRAMS?

    Authors: M.MONICA; K.SRIDEVI?

  50. Effective Partition Method for Public Cloud?

    Authors: Shaik Khaja Shareef; D.Murahari Reddy?

  51. Region Detection and Matching for Object Recognition?

    Authors: Manpreet Kaur; Silky Narang; Naseeb Singh Dhillon?

  52. Construction of Stream Ciphers from Block Ciphers and their Security

    Authors: Sridevi?

  53. Architectural Shift from 4G to 5G Wireless Mobile Networks?

    Authors: Pratik Sule; Anish Joshi?

  54. Reducing the Time Delay in Data Transfer using SOGR-BGP Protocol for Mobile Ad Hoc Network?

    Authors: R. Srithulasiraman; S. Mythili?

  55. Survey Paper on Achieving MAC Layer Fairness using Back off Schemes in Wireless Ad hoc Networks?

    Authors: Varsha Pandey; Neelmani Verma?

  56. REAL TIME SYSTEM FOR DETERMINATION OF DRINKING WATER QUALITY?

    Authors: B. MENAKA DEVI; N. AMMU ABIRAMI?

  57. An Algorithm for Mobile Ad-hoc Networks to Reducing Cut Vertices?

    Authors: Marru Sandeep Kumar?; N.Anjaneyulu; B.Satyanarayana

  58. BASICS OF ARTIFICIAL NEURAL NETWORK?

    Authors: Sakshi Kohli; Surbhi Miglani; Rahul Rapariya?

  59. LOCATION AWARE ADAPTIVE ROUTING PROTOCOLS IN VANETS?

    Authors: Pooja Malik?; Vikram Nandal?

  60. STUDY AND ANALYSIS OF VARIOUS ROUTING PROTOCOLS IN VANETS?

    Authors: Pooja Malik?; Vikram Nandal?

  61. DISTRIBUTED SINR-BASED SCHEDULING ALGORITHM FOR MULTIHOP WIRELESS NETWORKS

    Authors: S.Vijayalakshmi; R.Kavitha?

  62. OVERVIEW OF ROUTING PROTOCOLS FOR VEHICULAR AD-HOC NETWORKS?

    Authors: R.Logapriya; R.Kavitha?

  63. DIGITAL SIGNATURE ALGORITHM (DSA) BASED SECURE INTRUSION DETECTION SYSTEM FOR MANETS?

    Authors: G.Jothimani; R.Kavitha?

  64. A STUDY OF ROUTING PROTOCOLS AND ATTACK PATTERNS ON ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS

    Authors: S.Jothilakshmi; R.Kavitha?

  65. Dynamic Voltage and Frequency Scheduling For Mobile Devices?

    Authors: R.GOWRIMANOHARI; M.ISHWARYA NIRANJANA; E.ARUN KUMAR?

  66. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring?

    Authors: G. Jayashree; U. Sadhana; K.S. Parimala?

  67. Voice Based Guidance and Location Indications System for the Blind using GSM, GPS and Optical Device Indicator?

    Authors: Sama Santhosh Reddy; G. Sathyaprabha; P.V. Vara Prasad Rao?

  68. The Study for Application of ZigBee Location Tracing Monitoring System for ATM Device Theft?

    Authors: R. Pradeep Kumar; A. Indra Kumar; P.V. Vara Prasad Rao?

  69. Cache Memory ? Various Algorithm?

    Authors: Priyanka Yadav; Vishal Sharma; Priti Yadav?

  70. Lip-Reading using Neural Networks?

    Authors: Priti Yadav; Priyanka Yadav; Vishal Sharma?