Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computer Science and Network

ISSN: 2277--5420
Publisher: IJCSN publisher


ADD TO MY LIST
 
Analytical Modeling of Social Network Growth Using Multilayer Network Projection PDF available

Author(s): Kambiz Behfar | Ekaterina Turkina | Patrick Cohendet | Animesh Animesh
Volume: 2
Issue: 6
Year: 2013
Back Propagation Neural Network Based Gender Classification Technique Based on Facial Features PDF available

Author(s): Ms. Anushri Jaswante | Dr. Asif Ullah Khan | Dr. Bhupesh Gour
Volume: 2
Issue: 6
Year: 2013
Designing of a Tool for String Matching using Regular Expressions PDF available

Author(s): Panthadeep Bhattacharjee | Hussain Ahmed Choudhury | Nasima Aktar Laskar
Volume: 2
Issue: 6
Year: 2013
A Survey on Privacy Enhancement in Cloud Computing using Identity Management PDF available

Author(s): M. Janaki | Dr.M.Ganaga Durga
Volume: 2
Issue: 6
Year: 2013
JPEG versus GIF Images in forms of LSB Steganography PDF available

Author(s): ELTYEB E. ABED ELGABAR | FAKHRELDEEN A. MOHAMMED
Volume: 2
Issue: 6
Year: 2013
Improvised Security for RDF using Random Salt and Levels with Bi-Directional Translation to Relational Database PDF available

Author(s): Siva Srinivasa Rao Mothukuri | Sai Ganesh Repaka
Volume: 2
Issue: 6
Year: 2013
The Adoption of Information and Communications Technology in the Administration of Health Insurance Schemes in Ghana PDF available

Author(s): Jeffrey Mingle | Michael Dzigbordi Dzandu
Volume: 2
Issue: 6
Year: 2013
Data Warehouse Creation for Preparing an Electricity Statistics Dashboard PDF available

Author(s): Shivani Khedikar | Purva Kirolikar | Supriya Thombre
Volume: 2
Issue: 6
Year: 2013
Data Minder using Steganography : Technology of Data Encryption PDF available

Author(s): Bhushan Walke | Riddhi Naik | Dhara Desai
Volume: 2
Issue: 6
Year: 2013
A Survey on Algorithms for Optimal Path Search in Dynamic Networks PDF available

Author(s): Neeraj Navlakha | Manisha J. Nene
Volume: 2
Issue: 6
Year: 2013
DPMAP for Abrupt Manuscript Clustering with Attribute Partition PDF available

Author(s): K.Nithya | G.PadmaPriya
Volume: 2
Issue: 6
Year: 2013
Taxonomy of Dummy Generation Techniques for Preserving Location Privacy PDF available

Author(s): Priti Jagwani | Ranjan Kumar
Volume: 2
Issue: 6
Year: 2013
Review of Various Algorithms Used in Hybrid Cryptography PDF available

Author(s): Veerpal Kaur | Aman Singh
Volume: 2
Issue: 6
Year: 2013
A Review on the Various Recent Steganography Techniques PDF available

Author(s): Sandeep Singh | Aman Singh
Volume: 2
Issue: 6
Year: 2013
Distributed Conditional Multicast Access for IP TV in High-Speed Wireless Networks (Destination Specific Multicast) PDF available

Author(s): Jan Fesl | Richard Klee | Marie Dolezalova
Volume: 2
Issue: 6
Year: 2013
A Review on Metamorphic Cryptography for Video Files PDF available

Author(s): Dhananjay M. Dumbere | Nitin J. Janwe
Volume: 2
Issue: 6
Year: 2013
A Survey on Schedule-Based MAC Protocols for Wireless Sensor Networks PDF available

Author(s): Abul Kalam Azad | M. Humayun Kabir | Md. Bellal Hossain
Volume: 2
Issue: 6
Year: 2013
A Methodology for Software Design Quality Assessment of Design Enhancements PDF available

Author(s): Sahar Reda | Hany Ammar | Osman Hegazy
Volume: 1
Issue: 6
Year: 2012
Secure Public Key Protocol for Ad-Hoc Wireless Networks PDF available

Author(s): Nazeer Unnisa Nazima | Shahana Tanveer | Abdul Majeed
Volume: 1
Issue: 6
Year: 2012
Web Service Integration Using Cloud Data Store PDF available

Author(s): Asfia Mubeen | Mohd Murtuza Ahmed Khan | Sana Mubeen Zubedi
Volume: 1
Issue: 6
Year: 2012
ZigBee : A Promising Wireless Technology PDF available

Author(s): Harleen Kaur Sahota | Sandeep Singh Kang
Volume: 1
Issue: 6
Year: 2012
Policies Based Intrusion Response System for DBMS PDF available

Author(s): Fatima Nayeem | M.Vijayakamal
Volume: 1
Issue: 6
Year: 2012
Resource Aware and Quality Aware Secure Location Monitoring Algorithm for WSNs PDF available

Author(s): M.N.Praneswara Rao | G.Radha Devi
Volume: 1
Issue: 6
Year: 2012
Review Paper on Preserving Confidentiality of Data in Cloud Using Dynamic Anonymization PDF available

Author(s): Bhushan Mahajan | Swati Ganar
Volume: 1
Issue: 6
Year: 2012
Hand Gesture Recognition using Neural Network PDF available

Author(s): Rajesh Mapari | Dr. Govind Kharat
Volume: 1
Issue: 6
Year: 2012
Throughput Maximization Using Portfolio Selection and Jamming-Aware Routing Algorithm PDF available

Author(s): Narasimha Rao Sriramula | Md.Murtuza Ahmed Khan
Volume: 1
Issue: 6
Year: 2012
Self Configurable Re-link Establishment using Continuous Neighbor Discovery in Asynchronous Sensor Networks PDF available

Author(s): Rushikesh B. Shreshtha | Rajeswari Goudar
Volume: 1
Issue: 6
Year: 2012
Extracting TARs from XML for Efficient Query Answering PDF available

Author(s): Chandra Sekhar.K | Dhanasree
Volume: 1
Issue: 6
Year: 2012
Active Watermark-Based Correlation Scheme for Identifying Source of Attack in Presence of Timing Perturbations PDF available

Author(s): Srikanth Apuri | Md Murtuza Ahmed Khan
Volume: 1
Issue: 6
Year: 2012
Minimizing Navigation Cost Through Interactive Data Exploration and Discovery PDF available

Author(s): Srilaxmi Challa | Department of CSE, JNTU H, DRK College of Engineering and Technology Hyderabad, Andhra Pradesh, India
Volume: 1
Issue: 6
Year: 2012
Handling Uncertainty Information through Extended Classifiers PDF available

Author(s): Poonam.Khaparde | Farhana Zareen | Dr.R.V.Krishnaiah
Volume: 1
Issue: 6
Year: 2012
Secret Image Sharing System Using Meaningful Covering Shares PDF available

Author(s): Alekya K, | Dr.R.V.Krishnaiah
Volume: 1
Issue: 6
Year: 2012
Throughput Maximization in MANET’s using AODV Routing Protocol with coding Opportunity Discovery PDF available

Author(s): M. Nagaratna | Waseem Ahmed
Volume: 1
Issue: 6
Year: 2012
Privacy Preserving Data Mining Operations without Disrupting Data Quality PDF available

Author(s): B.Swapna | R.VijayaPrakash
Volume: 1
Issue: 6
Year: 2012
Actionable Knowledge Discovery using Multi-Step Mining PDF available

Author(s): DharaniK | Kalpana Gudikandula
Volume: 1
Issue: 6
Year: 2012
Selection of Dual Soft Handoff Leading to Improvements in Wireless Communication PDF available

Author(s): Sayem Patni | B. G. Hogade | D. S. Kurule
Volume: 1
Issue: 5
Year: 2012
Im Improving Memory proving Space Utilization in Multi-core Embedded Systems using Task Recomputation PDF available

Author(s): Hakduran Koc | Suleyman Tosun | Ozcan Ozturk, | Mahmut Kandemir
Volume: 1
Issue: 5
Year: 2012
SINR Based Vertical Handoff Algorithms : A Survey PDF available

Author(s): Mrs. Jyotsna P. Gabhane | Manisha N. Nimbalkar
Volume: 1
Issue: 5
Year: 2012
The Robust Digital Image Watermarking using Quantization and Fuzzy Logic Approach in DWT Domain PDF available

Author(s): Nallagarla Ramamurthy | Dr.S.Varadarajan
Volume: 1
Issue: 5
Year: 2012
Intelligent Heuristic Search Algorithm for N Queens Problem of constraint satisfaction PDF available

Author(s): JAGDISH PRASAD | A. K. BHARDWAJ | SURENDRA KUMAR YADAV
Volume: 1
Issue: 5
Year: 2012
IMPLEMENTATION OF BLIND DIGITAL SIGNATURE USING ECC PDF available

Author(s): MS.DHANASHREE M.KUTHE | AVINASH J. AGRAWAL
Volume: 1
Issue: 5
Year: 2012
REVIEW ON SHARING OF EMBEDDED DEVICES IN LAN PDF available

Author(s): Mohini Kontamwar | S. P. Karmore
Volume: 1
Issue: 5
Year: 2012
Improved location services with cost and delay of Manet’s PDF available

Author(s): R.Veerasundari | V. Krishna Priya
Volume: 1
Issue: 5
Year: 2012
Cloud Computing: An Analysis of Its Challenges & Security Issues PDF available

Author(s): Mr. D. Kishore Kumar | Dr.G.Venkatewara Rao | Dr.G.Srinivasa Rao
Volume: 1
Issue: 5
Year: 2012
Web Application and its Marketing as Cloud Computing PDF available

Author(s): Shiv Kumar
Volume: 1
Issue: 5
Year: 2012
Graphical User Authentication for E-Transaction PDF available

Author(s): Dr. Manish Manoria | Ankur Jain
Volume: 1
Issue: 5
Year: 2012
RBFNN Approach for Recognizing Indian License Plate PDF available

Author(s): Rani Thakur | Dr. Manish Manoria
Volume: 1
Issue: 5
Year: 2012
Design and implementation of battery statistics monitoring & analysis for android based system PDF available

Author(s): Suruchi Kitey | S. P. Karmore
Volume: 1
Issue: 5
Year: 2012
Introduction to Real Time & Secure Video Transmission using Distributed & Parallel Approach PDF available

Author(s): Trupti Dandamwar | Manish Narnaware
Volume: 1
Issue: 5
Year: 2012
AUTOMATIC PCB DEFECT DETECTION USING IMAGE SUBTRACTION METHOD PDF available

Author(s): Sonal Kaushik | Javed Ashraf
Volume: 1
Issue: 5
Year: 2012
MOTIVATION TO OPTICAL MULTISTAGE INTERCONNECTION NETWORKS PDF available

Author(s): SindhuLakshmi Manchikanti | Gayathri Korrapati
Volume: 1
Issue: 5
Year: 2012
Prevention of Buffer overflow Attack Blocker Using IDS PDF available

Author(s): Pankaj B. Pawar | Malti Nagle | Pankaj K. Kawadkar
Volume: 1
Issue: 5
Year: 2012
Evaluation of Discrete Event Wireless Sensor Network Simulators PDF available

Author(s): AnilKumar Patil | Dr P. M .Hadalgi
Volume: 1
Issue: 5
Year: 2012
Dynamic Test Case Design Scenario and analysis of Module Testing Using Manual vs. Automated Technique PDF available

Author(s): Er. RAJENDER KUMAR | Dr. M.K.GUPTA
Volume: 1
Issue: 5
Year: 2012
Adaptive Congestion Control status for mobile adhoc network PDF available

Author(s): Dr.V.B.Narsimha
Volume: 1
Issue: 4
Year: 2012
FPGA Based Intruder Detection System Using CMOS Sensor PDF available

Author(s): Ashwin Belure | J. S. Rajashekhar | Basheer Ahmed
Volume: 1
Issue: 4
Year: 2012
Approach for Application on Cloud Computing PDF available

Author(s): Shiv Kumar | Bimlendu Verma | Archana Neog
Volume: 1
Issue: 4
Year: 2012
A Study of the Various Architectures for Natural Language Interface to DBs PDF available

Author(s): B.Sujatha | Dr.S.Viswanadha Raju | Humera Shaziya
Volume: 1
Issue: 4
Year: 2012
A Review on New Paradigm’s of Parallel Programming Models in High Performance Computing PDF available

Author(s): Mr.Amitkumar S Manekar | Pankaj Kawadkar | Malati Nagle
Volume: 1
Issue: 4
Year: 2012
MODIFIED MUTUAL AUTHENTICATION AND KEY AGREEMENT PROTOCOL BASED ON NTRU CRYPTOGRAPHY FOR WIRELESS COMMUNICATIONS PDF available

Author(s): Raj Kumar G.V.S | Naveen Kumar K | Chandra Sekhar P | Bhargav Nunna V. V. S | Vinod Kumar B
Volume: 1
Issue: 4
Year: 2012
Study of Network Layer Attacks and Countermeasures in Wireless Sensor Network PDF available

Author(s): Atul Yadav | Mangesh Gosavi | Parag Joshi
Volume: 1
Issue: 4
Year: 2012
Wireless Sensor Network Architectures for Different Systems PDF available

Author(s): Sanjeev Narayan Bal
Volume: 1
Issue: 4
Year: 2012
Credit Card Fraud: The study of its impact and detection techniques PDF available

Author(s): Khyati Chaudhary | Bhawna Mallick
Volume: 1
Issue: 4
Year: 2012
Range free Localization Mechanism using Beacon node Range Level PDF available

Author(s): Shweta Sirothia | Rakesh Tripathi
Volume: 1
Issue: 4
Year: 2012
Establishing a Service Model of Private Elastic VPN for cloud computing PDF available

Author(s): Priyanka Gupta | Ashok Verma
Volume: 1
Issue: 4
Year: 2012
MULTI QUERY OPTIMIZATION USING HEURISTIC APPROACH PDF available

Author(s): S. D. Pandao | A. D. Isalkar
Volume: 1
Issue: 4
Year: 2012
Advent and Importance of Handoff under Wireless Communication Evolution PDF available

Author(s): Sayem Patni | B. G. Hogade
Volume: 1
Issue: 4
Year: 2012
A Survey on Spatio-Temporal Data Mining PDF available

Author(s): DIPIKA KALYANI | Setu Kumar Chaturvedi
Volume: 1
Issue: 4
Year: 2012
Optimized Multi Agent Coordination using Evolutionary Algorithm: Special Impact in Online Education PDF available

Author(s): Subrat P Pattanayak | Dr Sujata Dash | Sanjay Sen
Volume: 1
Issue: 4
Year: 2012
Distance Measurement with Active & Passive Method PDF available

Author(s): Atul Yadav | T. B. Mohite-Patil
Volume: 1
Issue: 4
Year: 2012
Biological Early Brain Cancer Detection Using Artificial Neural Network PDF available

Author(s): Shaikh Afroz Fatima
Volume: 1
Issue: 4
Year: 2012
Secured Routing Protocols for Wireless & ATM Networks : An Analysis PDF available

Author(s): Sanyam Agarwal | Dr.A.K.Gautam
Volume: 1
Issue: 4
Year: 2012
A Differential Evaluation Algorithm for routing Optimization in Mobile Ad-hoc Networks PDF available

Author(s): Anju Sharma | Madhavi Sinha
Volume: 1
Issue: 4
Year: 2012
Design of FIR Filter Using Particle Swarm Optimization Algorithm for Audio Processing PDF available

Author(s): Amanpreet Kaur | Ranjit Kaur
Volume: 1
Issue: 4
Year: 2012
Construction of Extended Visual Cryptography Scheme for Secret Sharing PDF available

Author(s): T.Rajitha | P.Pradeep Kumar | V.Laxmi
Volume: 1
Issue: 4
Year: 2012
Accelerating MATLAB Applications on Parallel Hardware PDF available

Author(s): Kavita Chauhan | Javed Ashraf
Volume: 1
Issue: 4
Year: 2012
Simulation of Un-Symmetrical 2-Phase Induction Motor PDF available

Author(s): S. F. Bandhekar | S. N. Dhurvey | P. P. Ashtankar
Volume: 2
Issue: 3
Year: 2013
Evolution of Gi-Fi Technology over other Technologies PDF available

Author(s): Jyoti Tewari | Swati Arya
Volume: 2
Issue: 3
Year: 2013
Digital Data Security and Copyright Protection Using Cellular Automata PDF available

Author(s): M.Khlaif | M.Talb
Volume: 2
Issue: 3
Year: 2013
Performance Improvement Using Contention Window Adaptation in IEEE 802.11 WLANs PDF available

Author(s): Swapnil S Tale | Jyoti Kulkarni
Volume: 2
Issue: 3
Year: 2013
Improved Multimodal Biometric Watermarking in Authentication Systems Based on DCT and Phase Congruency Model PDF available

Author(s): Bairagi Nath Behera | V.K. Govindan
Volume: 2
Issue: 3
Year: 2013
An Unsupervised Pattern Clustering Approach for Identifying Abnormal User Behaviors in Smart Home PDF available

Author(s): Sukanya P | Gayathri K S
Volume: 2
Issue: 3
Year: 2013
Activity Modeling in Smart Home using High Utility Pattern Mining over Data Streams PDF available

Author(s): Menaka Gandhi . J | Gayathri K . S
Volume: 2
Issue: 3
Year: 2013
A New Checkpoint Approach for Fault Tolerance in Grid Computing PDF available

Author(s): Gokuldev S | Valarmathi M
Volume: 2
Issue: 3
Year: 2013
3D Reconstruction of Coronary Arteries from Angiographic Images: A Survey PDF available

Author(s): Mahima Goyal | Jian Yang | Arun PrakashAgrawal
Volume: 2
Issue: 3
Year: 2013
Using Unobtrusive Techniques for Detecting Leakage of Data PDF available

Author(s): Shailaja B. Jadhav | Prachi Joshi
Volume: 2
Issue: 3
Year: 2013
An Approach to Develop Embedded System For Web Based Monitoring & Controlling of Renewable Energy Sources PDF available

Author(s): Akansha S. Fating | T.H. Nagrare
Volume: 2
Issue: 3
Year: 2013
Mining Weather Data Using Rattle PDF available

Author(s): Venkata Abhishek Bavirisetty | Avinash Ankireddy | Prasad Seemakurthi | K.V.N. Rajesh
Volume: 2
Issue: 3
Year: 2013
Contribution to Securing Communications on VOIP PDF available

Author(s): Tahina Ezéchiel Rakotondraina | Ndaohialy Manda-vy Ravonimanantsoa | Andry Auguste Randriamitantsoa
Volume: 2
Issue: 3
Year: 2013
Efficient Algorithms for Materialized View Selection in Data Warehousing Environment PDF available

Author(s): Ashish Mohod | Manoj Chaudhari
Volume: 2
Issue: 3
Year: 2013
The Adaptive Optimized Routing Protocol for Vehicular Ad-hoc Networks PDF available

Author(s): Kunal Vikas Patil | M.R. Dhage
Volume: 2
Issue: 3
Year: 2013
Performance of IEEE 802.15.4 in WSN for Monitoring Real Time Air Pollution Parameters PDF available

Author(s): Darshana N. Tambe | Nekita A. Chavhan
Volume: 2
Issue: 3
Year: 2013
Role of Assembling Invariant Moments and SVM in Fingerprint Recognition PDF available

Author(s): Supriya Wable | Chaitali Laulkar
Volume: 2
Issue: 3
Year: 2013
An Adaptive Expert System for an Educational Institute PDF available

Author(s): Renuka Agrawal | Jyoti Singh
Volume: 2
Issue: 3
Year: 2013
Compensatory Fuzzy Min-Max Neural Network for Object Recognition PDF available

Author(s): Paras A. Tolia
Volume: 2
Issue: 3
Year: 2013
Algorithm and Approaches to Handle Large Data - A Survey PDF available

Author(s): Chanchal Yadav | Shuliang Wang | Manoj Kumar
Volume: 2
Issue: 3
Year: 2013
An Overview of the Research on Texture Based Plant Leaf Classification PDF available

Author(s): Vishakha Metre | Jayshree Ghorpade
Volume: 2
Issue: 3
Year: 2013
Artificial Intelligence:Simulated Embodied Agents PDF available

Author(s): Astha Jain | Payal Jain | Jitendra Singh
Volume: 2
Issue: 3
Year: 2013
Impact of Server Virtualization on Real Business World PDF available

Author(s): Kapil Saxena
Volume: 2
Issue: 3
Year: 2013
Detecting Sinking Behavior at MAC and Network Layer Using SVM in Wireless Ad hoc Networks PDF available

Author(s): K.Kiruthika Devi | M.Ravichandran
Volume: 1
Issue: 3
Year: 2012
A Development of an ISG Framework for Mosul’s Health Sector PDF available

Author(s): Mohammad Salim | Marini Othman | Maha M.Ablahd
Volume: 1
Issue: 3
Year: 2012
PC-RC4 Algorithm: An Enhancement Over Standard RC4 Algorithm PDF available

Author(s): Pardeep | Pushpendra Kumar Pateriya
Volume: 1
Issue: 3
Year: 2012
RELIABILITY ORIENTED TRANSPORT PROTOCOL IN WSN PDF available

Author(s): Bejoy.B.J | Dr.B.Paramasivan
Volume: 1
Issue: 3
Year: 2012
Development of evelopment Virtual Experiment on Clipping Circuits PDF available

Author(s): Bhaskar Y. Kathane | Pradeep B. Dahikar
Volume: 1
Issue: 3
Year: 2012
RFID based Bill Generation and Payment through Mobile PDF available

Author(s): Swati R.Zope | Maruti Limkar
Volume: 1
Issue: 3
Year: 2012
Detection and Classification of QRS and ST segment using WNN PDF available

Author(s): Surendra Dalu | Nilesh Pawar
Volume: 1
Issue: 3
Year: 2012
Implementation of Human Health Monitoring using Zigbee PDF available

Author(s): Ms. Chetana. P. Dodke | Trupti. H. Nagrare
Volume: 1
Issue: 3
Year: 2012
Review on Reducing Noise Over Color Image Processing Pipeline for Digital Camera PDF available

Author(s): Payun S. Tembhurne | V.K. Shandilya
Volume: 1
Issue: 3
Year: 2012
Real Time Health Monitoring Using GPRS Technology PDF available

Author(s): Shubhangi M. Verulkar | Maruti Limkar
Volume: 1
Issue: 3
Year: 2012
GPS INTEGRATED NAVIGATION SYSTEM PDF available

Author(s): Swati R. Dhabarde
Volume: 1
Issue: 3
Year: 2012
3-Layer Security Using Face Recognition in Cloud PDF available

Author(s): Yogeshwari Chaudhari | Tanaya Dave | Sarita Barade | SupriyaMane | S.M.Sangve | A.S.Devare
Volume: 1
Issue: 3
Year: 2012
Interpretation of significant eye blinks with the use of intelligent agent for effective human computer interaction PDF available

Author(s): Suman Deb | Diptendu Bhattacharya | Mrinal Kanti Debbarma
Volume: 1
Issue: 3
Year: 2012
Implementation of Discrete Wavelet Transform Processor For Image Compression PDF available

Author(s): Ms.Yamini S.Bute | R.W. Jasutkar
Volume: 1
Issue: 3
Year: 2012
Early Pest Identification in Greenhouse Crops using Image Processing Techniques PDF available

Author(s): Mr. S. R. Pokharkar | Dr. Mrs. V. R. Thool
Volume: 1
Issue: 3
Year: 2012
FCM Based Blood Vessel Segmentation Method for Retinal Images PDF available

Author(s): Nilanjan Dey | Anamitra Bardhan Roy | Moumita Pal | Achintya Das
Volume: 1
Issue: 3
Year: 2012
Use of Inheritance Feature in Relational Database Development PDF available

Author(s): A.V.Saurkar | A.R. Itkikar
Volume: 1
Issue: 3
Year: 2012
Integrating Heterogeneous Data Sources Using XML Mediator PDF available

Author(s): Yogesh R.Rochlani | A.R. Itkikar
Volume: 1
Issue: 3
Year: 2012
An Efficient Parallel Strategy for Data Forwarding in Event Based Wireless Sensor Networks PDF available

Author(s): Itu Snigdh | Partha Pratim Bhuyan | Nisha Gupta
Volume: 1
Issue: 3
Year: 2012
Minimizing the overhead in the terminode routing protocol in mobile adhoc networks PDF available

Author(s): Sd Salman Ali | Syed Arfath Ahmed | Dr. Mohammed Yousuf Khan
Volume: 1
Issue: 3
Year: 2012
Pervasive Computing goals and its Challenges for Modern Era PDF available

Author(s): Lalit Prasad | Y.B Joshi
Volume: 1
Issue: 3
Year: 2012
PC1-RC4 and PC2-RC4 Algorithms: Pragmatic Enrichment Algorithms to Enhance RC4 Stream Cipher Algorithm PDF available

Author(s): Pardeep | Pushpendra Kumar Pateriya
Volume: 1
Issue: 3
Year: 2012
CVLEACH: Coverage based energy efficient LEACH algorithm PDF available

Author(s): Ankit Thakkar | Dr K Kotecha
Volume: 1
Issue: 3
Year: 2012
Dynamic Cache Compression Technique in Chip Multiprocessors PDF available

Author(s): H. R. Deshmukh | Dr. G. R. Bamnote
Volume: 1
Issue: 3
Year: 2012
DIAGNOSTICS IN HOMEOPATHIC SYSTEM USING NEURO-FUZZY NETWORKS PDF available

Author(s): K.L. Kar | Rajiv Pathak
Volume: 1
Issue: 3
Year: 2012
On Line Real Time Health Monitoring of ICU Patients using ARM7 PDF available

Author(s): Rajashri Patil | Balaji Hogade
Volume: 1
Issue: 3
Year: 2012
The Challenges of ICT Graduate Un-Employment in Developing Economies in Africa - Case Study: Ghana PDF available

Author(s): Edward Danso Ansong | Emmanuel A. Affum | James. B. Hayfron-Acquah
Volume: 1
Issue: 3
Year: 2012
Physical modeling of musical synthesiser PDF available

Author(s): Sofia K.Pillai | J.J.Shah
Volume: 1
Issue: 3
Year: 2012
Hiding Sensitive Association Rule Using Clusters of Sensitive Association Rule PDF available

Author(s): Sanjay keer | Anju Singh
Volume: 1
Issue: 3
Year: 2012
Noise Suppression in Tele-Lectures using Bi-Modal Feature Extraction PDF available

Author(s): E.S.Selvakumar | S.Shanmuga Priya
Volume: 2
Issue: 2
Year: 2013
An Approach to Authenticate user’s Mobile device and to Preserve Privacy towards Location Proof(A2MP2LP) PDF available

Author(s): Senthilguru S | Blessed Prince P
Volume: 2
Issue: 2
Year: 2013
Energy Efficient VM Live Migration in Cloud Data Centers PDF available

Author(s): Jyothi Sekhar | Getzi Jeba
Volume: 2
Issue: 2
Year: 2013
Security Threats in Prepaid Mobile PDF available

Author(s): Arshiya Begum | Mohammed Tanveer Ali
Volume: 2
Issue: 2
Year: 2013
Protection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique PDF available

Author(s): Mr.A.Duraisamy | Mr.M.Sathiyamoorthy | Mr.S.Chandrasekar
Volume: 2
Issue: 2
Year: 2013
Wireless Networks Security Using Dispersive Routing Mechanism PDF available

Author(s): Vulupala Sridhar Reddy | M. Venkateswara Rao
Volume: 2
Issue: 2
Year: 2013
Preserving User Location Privacy with Safe Zone for Spatial Queries PDF available

Author(s): Sakthi Priya | Dinesh Babu, | Karthiga
Volume: 2
Issue: 2
Year: 2013
Towards Designing Multi Agent Mobile and Internet Based Voting System PDF available

Author(s): Mohamed Khlaif
Volume: 2
Issue: 2
Year: 2013
The Performance Evaluation of AODV & DSR (On-Demand- Driven) Routing Protocols using QualNet 5.0 Simulator PDF available

Author(s): Mukesh Kumar Garg | Dr. Ela Kumar
Volume: 2
Issue: 2
Year: 2013
Collision Avoidance Using Inter-Vehicle Ad-hoc Communication PDF available

Author(s): Mahesh Panjwani | Humera Syed | Sumera Qazi
Volume: 2
Issue: 2
Year: 2013
Energy Efficient and Mobility Based Clustering for MANET PDF available

Author(s): Rani.V.G | Dr.Punithavalli.M
Volume: 2
Issue: 2
Year: 2013
Analysis of Performance of Broadcasting Protocol in Vehicular Ad-hoc Network Environment PDF available

Author(s): A. Singaravelan | Dr. C. Suresh Gnana Dhas
Volume: 2
Issue: 2
Year: 2013
Cross-site Scripting Attacks on Android WebView PDF available

Author(s): Bhavani A B
Volume: 2
Issue: 2
Year: 2013
A reactive protocol for privacy preserving using location based Routing in MANETs PDF available

Author(s): Namrata Marium Chacko | Getzi P. Leelaipushpam
Volume: 2
Issue: 2
Year: 2013
Scalable ALARM: Anonymous Location Aided Routing in Hostile MANETs PDF available

Author(s): Geethu Mohandas | Dr Salaja Silas
Volume: 2
Issue: 2
Year: 2013
Energy-Efficient Cloud Computing: A Vision, Introduction, and Open Challenges PDF available

Author(s): Ms.Jayshri Damodar Pagare | Dr.Nitin A Koli
Volume: 2
Issue: 2
Year: 2013
An Empirical Study on Classification Using Modified Teaching Learning Based Optimization PDF available

Author(s): Amaresh Sahu | Sushanta Kumar Panigrahi | Sabyasachi Pattnaik
Volume: 2
Issue: 2
Year: 2013
A Novel Authenticity of an Image Using Visual Cryptography PDF available

Author(s): Prashant Kumar Koshta | Dr. Shailendra Singh Thakur
Volume: 1
Issue: 2
Year: 2012
High-speed Multiplier Design Using Multi-Operand Multipliers PDF available

Author(s): Mohammad Reza Reshadi Nezhad | Kaivan Navi
Volume: 1
Issue: 2
Year: 2012
A Novel Method for Water irrigation System for paddy fields using ANN PDF available

Author(s): L. Prisilla | P. Simon Vasantha Rooban | Dr. L. Arockiam
Volume: 1
Issue: 2
Year: 2012
Converter Protection Scheme for Doubly-Fed Induction Generators during Disturbances PDF available

Author(s): Kadam D.P. | Dr. Kushare B.E.
Volume: 1
Issue: 2
Year: 2012
Modified Small Business Network Security PDF available

Author(s): Md. Belayet Ali | Oveget Das | Md. Shamim Hossain
Volume: 1
Issue: 1
Year: 2012
High Performance Efficiency of Distributed Optical Fiber Raman Amplifiers for Different Pumping Configurations in Different Fiber Cable Schemes PDF available

Author(s): Abd El–Naser A. Mohamed | Ahmed Nabih Zaki Rashed | Mahmoud M. A. Eid
Volume: 1
Issue: 1
Year: 2012
Performance Evaluation of Dynamic Particle Swarm Optimization PDF available

Author(s): Ms. Hemlata S. Urade | Rahila Patel
Volume: 1
Issue: 1
Year: 2012
Analytical Scenario of Software Testing Using Simplistic Cost Model PDF available

Author(s): RAJENDER BATHLA | Dr. ANIL KAPIL
Volume: 1
Issue: 1
Year: 2012
Modified Cocomo Model For Maintenance cost Estimation of Real Time System Software PDF available

Author(s): Sugandha Chakraverti | Sheo Kumar | Dr. S.C. Agarwal | Ashish Kumar Chakraverti
Volume: 1
Issue: 1
Year: 2012
A Statistical Analysis of Bubble Sort in terms of Serial and Parallel Computation PDF available

Author(s): Sunil Kumar Panigrahi | Dr. Soubhik Chakraborty | Dr. jibitesh Mishra
Volume: 1
Issue: 1
Year: 2012
Class Imbalance Problem in Data Mining: Review PDF available

Author(s): Mr.Rushi Longadge | Ms. Snehlata S. Dongre | Dr. Latesh Malik
Volume: 2
Issue: 1
Year: 2013
Review Paper on Concept Drifting Data Stream Mining PDF available

Author(s): Mr. Sudhir Ramrao Rangari | Ms. Snehlata S Dongre | Dr. Latesh Malik
Volume: 2
Issue: 1
Year: 2013
Authentication System Securing Index of Image using SVD and ECC 1 PDF available

Author(s): Tahina Ezéchiel Rakotondraina | Dr. Henri Bruno Razafindradina
Volume: 2
Issue: 1
Year: 2013
A Study on Cloud Computing and its Security Issues PDF available

Author(s): Mr. Venkata Sreedhar Ventrapragada | Daniel Ravuri | G Jyothi
Volume: 2
Issue: 1
Year: 2013
A Framework for Semantic Advertisement over Social Media PDF available

Author(s): Rakesh Kumar Donthi | Vishwesh Nagamalla | Srujan Kumar
Volume: 2
Issue: 1
Year: 2013
Performance Evaluation of Zigbee Protocol Using Opnet Modeler for Mine Safety PDF available

Author(s): Rana Mahajan | Sudha Nair
Volume: 2
Issue: 1
Year: 2013
Techniques of Data Stream Mining for Health Care Application PDF available

Author(s): Satish Thombre | Snehalata Dongre
Volume: 2
Issue: 1
Year: 2013
Design of Generalized Discrete Fourier Transform with Non Linear Phase on Real Time System PDF available

Author(s): Mr. Umesh P. Sakhare | Prof. Lalit Dole
Volume: 2
Issue: 1
Year: 2013
A Survey on 3D Localization in Wireless Sensor Networks PDF available

Author(s): Shayon Samanta | Prof. Punesh U. Tembhare | Prof. Charan R. Pote
Volume: 2
Issue: 1
Year: 2013
A Survey on Location Based Authentication Protocols For Mobile Devices PDF available

Author(s): Smruti. P. Patil | S.U. Nimbhorkar
Volume: 2
Issue: 1
Year: 2013
Secure and Stable VANET Architecture Model PDF available

Author(s): Ankit Temurnikar | Dr.Sanjeev Sharma
Volume: 2
Issue: 1
Year: 2013
Multi Agent system Randomized in Road Traffic PDF available

Author(s): Gouiouez Mounir, | N. Rais, | M. Azzouzi Idrissi | Sefrioui Abdelhamid
Volume: 2
Issue: 1
Year: 2013
A Survey of Encroachment Disclosure in Wireless Sensor Network PDF available

Author(s): Sushma J. Gaurkar | Piyush k. Ingole
Volume: 2
Issue: 1
Year: 2013
Image Processing by Preserving a Manifold Structure PDF available

Author(s): Kavitha G L
Volume: 2
Issue: 1
Year: 2013
Design and Implementation of Real Time Embedded Tele-Health Monitoring System PDF available

Author(s): Suhas Kale | C. S. Khandelwal
Volume: 2
Issue: 1
Year: 2013
Movement Based Voice Enabled Robotic Chair for Physically Challenged PDF available

Author(s): Ajay Vijaykumar Khake | Vandana B. Malode
Volume: 2
Issue: 1
Year: 2013
Fast Speaker Recognition using Efficient Feature Extraction Technique PDF available

Author(s): Sejal Shah | Archana Bhise
Volume: 2
Issue: 1
Year: 2013
A Survey on Railway Security in Wireless Network PDF available

Author(s): Nisha S.Punekar | Archana Raut
Volume: 2
Issue: 1
Year: 2013
Quality Assurance in Open Distance Learning: IGNOU a Case Study PDF available

Author(s): GanapathiAvabrath
Volume: 2
Issue: 1
Year: 2013
Literature Review on Path planning in Dynamic Environment PDF available

Author(s): Bhushan Mahajan | Punam Marbate
Volume: 2
Issue: 1
Year: 2013
Design Approach for Dynamic Traffic Control System Based on Radio Propagation Model in VANET PDF available

Author(s): Sanjay S. Dorle | Pratima L. Patel
Volume: 2
Issue: 1
Year: 2013
Algorithm to handle Concept Drifting in Data Stream Mining PDF available

Author(s): Ms. Snehlata Dongre | Dr. Latesh Malik
Volume: 2
Issue: 1
Year: 2013
Design Approach for Adaptive Car Safety System in Intelligent Transportation system PDF available

Author(s): Pravin P Ashtankar | Dr.Sanjay S.Dorle | M.Chakole | Dinesh K.katole
Volume: 2
Issue: 1
Year: 2013
Comparative Analysis of Stein’s and Euclid’s Algorithm with BIST for GCD Computations PDF available

Author(s): Sachin D.Kohale | Ratnaprabha W.Jasutkar
Volume: 2
Issue: 1
Year: 2013
Survey on security challenges in VANET PDF available

Author(s): Anup Dhamgaye | Nekita Chavhan
Volume: 2
Issue: 1
Year: 2013
Optimization in Software Test Management PDF available

Author(s): Soumya Samal | Ayeskant Mohapatra | Sanjay Ku.Padhi
Volume: 2
Issue: 1
Year: 2013
Sparse Representation through Multi-Resolution Transform for Image Coding PDF available

Author(s): Dr. P. Arockia Jansi Rani
Volume: 2
Issue: 1
Year: 2013
A Model of Computing Trust in Web Based Social Network Using New Aggregation and Concatenation Operators PDF available

Author(s): Heisnam Rohen Singh | Arambam Neelima | Lourembam Suraj Singh | Sarangthem Ibotombi Singh
Volume: 02
Issue: 04
Year: 2013
Automated Traffic Surveillance: Evolution and Implementation PDF available

Author(s): Kriti Bhandari | Niranjana Raghavan | Aditya Iyer | Niteen Autade
Volume: 02
Issue: 04
Year: 2013
Performance Evaluation of Routing Protocol for Mobile Ad-Hoc Network PDF available

Author(s): Chaitali Uikey
Volume: 02
Issue: 04
Year: 2013
A Dynamic Performance-Based Flow Control Method for High-Speed Data Transfer PDF available

Author(s): Umme Gousia | Dr.Mohd.Abdul.Waheed | Syed Shah Md Saifullah Hussaini
Volume: 02
Issue: 04
Year: 2013
A Group of Token Based Approach for Key-Word Recommendation PDF available

Author(s): Mona Amarnani | C. S. Warnekar
Volume: 02
Issue: 04
Year: 2013
Recognizing Bharatnatyam Mudra Using Principles of Gesture Recognition PDF available

Author(s): Shweta Mozarkar | Dr.C.S.Warnekar
Volume: 02
Issue: 04
Year: 2013
Direct Heuristic Algorithm for Linear Programming PDF available

Author(s): N.Nagamalleswara Rao | Dr. O. Naga Raju | I. Ramesh Babu
Volume: 02
Issue: 04
Year: 2013
Improved Watermarking Scheme Using Discrete Cosine Transform and Schur Decomposition PDF available

Author(s): Henri Bruno Razafindradina | Nicolas Raft Razafindrakoto | Paul Auguste Randriamitantsoa
Volume: 02
Issue: 04
Year: 2013
Cable Fault Monitoring and Indication: A Review PDF available

Author(s): Shweta Gajbhiye | S. P. Karmore
Volume: 02
Issue: 04
Year: 2013
Context Specific Event Model For News Articles PDF available

Author(s): Kowcika A | Uma Maheswari | Geetha T V
Volume: 02
Issue: 04
Year: 2013
A Review on Secured Money Transaction with Fingerprint Technique in ATM System PDF available

Author(s): Susmita Mandal
Volume: 02
Issue: 04
Year: 2013
AIDSS-HR: An Automated Intelligent Decision Support System for Enhancing the Performance of Employees PDF available

Author(s): Nana Yaw Asabere | Nana Kwame Gyamfi
Volume: 02
Issue: 04
Year: 2013
Pair Triplet Association Rule Generation in Streams PDF available

Author(s): Manisha Thool | Preeti Voditel
Volume: 02
Issue: 04
Year: 2013
Machine Learning Techniques for Prediction of Subject Scores: A Comparative Study PDF available

Author(s): Mamta Singh | Dr. Jyoti Singh
Volume: 02
Issue: 04
Year: 2013
Affiliate Program     Free Forms + CRM