ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Applications IJCSMA >>

Vol.6, No.2

Publisher: ZAIN Publications

Publishing Date: 2018-02-28

  1. A REVIEW ON SYN FLOODING ATTACK COUNTER MEASURES IN MOBILE AD-HOC NETWORK

    Authors: Jasvir Markandy; Manmohan Sharma

  2. An Optimal Partitioning Algorithm of Mobile Device Interface to the Cloud Application Systems

    Authors: M. R. Sudha

  3. Combining Keystroke Security and Finger Print Identification for Mobile Based Secure Authentication System

    Authors: Shubham Sharma; Rahul Sharma

  4. Broadcasting Based Energy Efficient Protocol to Enhance the Routing Performance in MANET Using BTSNA-DS Algorithm

    Authors: R. SARASWATHI; A.SUBRAMANI

  5. Retrieving Unrecognized Objects using Hyperspectral Imaging

    Authors: Mariadas Ronnie C.P

  6. Cluster Analysis of Cyber Crime Data using R

    Authors: Radha Mothukuri; Bobba Basaveswara Rao

  7. PARTIAL MESH BASED DYNAMIC ROUTING WITH FAST CONVERGENCE FOR WMN

    Authors: Shikha Choudhary; Namisha Mahajan

  8. FAST CONVERGENCE BASED MULTIPATH ROUTING OVER PARTIAL TOPOLOGY BASED WMNS

    Authors: Shikha Choudhary; Namisha Mahajan

  9. DATA SECURITY, PRIVACY, AVAILABILITY AND INTEGRITY IN CLOUD COMPUTING: ISSUES AND SOLUTION

    Authors: A.Logeshwari; M.Aiswariya; V. Swathi; K.Vivekavarthini

  10. CONVOLUTION NEURAL NETWORK(CNN) BASED OBJECT DETECTION IN OCEANOGRAPHIC IMAGERY

    Authors: Bhawanpreet Kaur; Khushbu Cheetu

  11. ROBUST & HYBRID FEATURE DESCRIPTION FOR OBJECT DETECTION IN THE OCEAN IMAGERY

    Authors: Bhawanpreet Kaur; Khushbu Cheetu

  12. A Security Enhanced Voter Identity Verification System based on Blockchain

    Authors: Anjali S; Abhishek Nambiar C; Meenakshi Omprakash; Parvathy TR; Paul Louis

  13. Theoretical Understanding the Concepts of Big Data and its Approaches

    Authors: Marupaka Nagaraju; Dhanalaxmi Vadlakonda

  14. A Trust Based Approach for Security and User Confidence in Pervasive Computing Systems

    Authors: S.Sivakumar; V.Anuratha

  15. A Study on Different Music Genre Classification Methods

    Authors: Alif Noushad; Albin Paul; Anjana Mukesh; Ebin B Plackal; Mohan T D; Anjali S

  16. DETECTION AND PREVENTION OF CHILD ABUSE USING IOT - A SURVEY

    Authors: Shruthi S; Srimathi K; Rashmi T; Saravanan A