Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computer Science and Mobile Computing

ISSN: 2320--088X
Publisher: International Journal of Computer Science and Mobile Computing


ADD TO MY LIST
 
A Review of the Vulnerabilities of Web Applications PDF available

Author(s): Ravneet Kaur Sidhu
Volume: 2
Issue: 9
Year: 2013
TRACKING AND ACTIVITY RECOGNITION THROUGH CAMERA NETWORKS PDF available

Author(s): P. Ravali | D. Sampath Kumar
Volume: 2
Issue: 9
Year: 2013
DELAY – Disruption Tolerant Network (DTN), its Network Characteristics and Core Applications PDF available

Author(s): Vaishali.S.Raj | Dr. R. Manicka Chezian
Volume: 2
Issue: 9
Year: 2013
Performance Base Static Analysis of Malware on Android PDF available

Author(s): Khyati Rami | Vinod Desai
Volume: 2
Issue: 9
Year: 2013
CONTRAIL – ARCHITECTURE FOR MOBILE DATA SHARING APPLICATIONS PDF available

Author(s): Lavanya.K | Devipriya.C | Saradha.S | Sangeetha Priya.M
Volume: 2
Issue: 9
Year: 2013
Prototype of Vehicle Security Alert System on Proton Iswara 1.3 PDF available

Author(s): N. A. Ali | A. S. Ja’afar | A. Salleh | M. A. M. Razali | M.Z.A.A Aziz | N. M. Z. Hashim
Volume: 2
Issue: 9
Year: 2013
HYBRID ENSEMBLE GENE SELECTION ALGORITHM FOR IDENTIFYING BIOMARKERS FROM BREAST CANCER GENE EXPRESSION PROFILES PDF available

Author(s): DR. S. ARUNA | DR. L.V. NANDAKISHORE
Volume: 2
Issue: 9
Year: 2013
A Comprehensive Study on Fast Image Dehazing Techniques PDF available

Author(s): Elisée A KPONOU | Zhengning Wang | Liping Li
Volume: 2
Issue: 9
Year: 2013
Impact of Uncertainty Factors in Cost Estimation – Substantiation through Normal Distribution Curve PDF available

Author(s): G. Rajkumar | Dr. K. Alagarsamy
Volume: 2
Issue: 9
Year: 2013
Design and Performance Analysis of Various Adders using Verilog PDF available

Author(s): Maroju SaiKumar | Dr. P. Samundiswary
Volume: 2
Issue: 9
Year: 2013
Design and Implementation of Rijndael Encryption Algorithm Based on FPGA PDF available

Author(s): K. Soumya | G. Shyam Kishore
Volume: 2
Issue: 9
Year: 2013
Lifetime Maximization in Sensor Networks for Rare-Event Detection using Optimal Sleep Scheduling PDF available

Author(s): M. Sindhuja | N. Kokila
Volume: 2
Issue: 9
Year: 2013
A New Technique for Test Case Prioritization PDF available

Author(s): Amandeep Kaur | Sheena Singh
Volume: 2
Issue: 9
Year: 2013
A Survey of Time Synchronization Protocols for Wireless Sensor Networks PDF available

Author(s): Baljinder Kaur | Amandeep Kaur
Volume: 2
Issue: 9
Year: 2013
Outsourced Comparison Seek on Metric Information Resources PDF available

Author(s): M. Praveen | S. Dorababu
Volume: 2
Issue: 9
Year: 2013
Home Electrical Appliances Smart System PDF available

Author(s): S. H. Husin | A. A. Ngahdiman | N. M. Z. Hashim | Y. Yusop | A.S Ja’afar
Volume: 2
Issue: 9
Year: 2013
Safety Measures in Wireless Information Networks PDF available

Author(s): K.V.N.R. Sai Krishna | CH. Krishnamohan
Volume: 2
Issue: 9
Year: 2013
Analysis of Attribute Set-Based Encryption Solution for Access Control in Cloud Computing PDF available

Author(s): P. Sravanthi | N. Uday Bhaskar | P. Swapna | Nagaraju
Volume: 2
Issue: 9
Year: 2013
Zforce Touchscreen Technology PDF available

Author(s): A. ANUSHA REDDY | DR. R. V. KRISHNAIAH
Volume: 2
Issue: 9
Year: 2013
NEXT GENERATION MOBILE COMPUTING PDF available

Author(s): N. LAKSHMI PRASANNA | DR. R. V. KRISHNAIAH
Volume: 2
Issue: 9
Year: 2013
Comparison of Previous Result with New Model for the Improvement of Gain in Raman Amplifier PDF available

Author(s): Jyoti Dhir | Vivek Gupta
Volume: 2
Issue: 9
Year: 2013
Performance Evaluation of AODV and DSR Routing Protocols with PCM and GSM Voice Encoding Schemes PDF available

Author(s): Osamah Yaseen Fadhil
Volume: 2
Issue: 9
Year: 2013
Cloud Security for Computing Secure Cloud Bursting, Brokerage and Aggregation Using Cryptography PDF available

Author(s): Neeraj Shrivastava | Rahul Yadav
Volume: 2
Issue: 9
Year: 2013
Privacy Protected Query Processing on Spatial Networks PDF available

Author(s): K. SASIKALA | REKA.R | SASIKALA.K
Volume: 2
Issue: 8
Year: 2013
SECURITY TECHNIQUES FOR MULTI TENANCY APPLICATIONS IN CLOUD PDF available

Author(s): C.C. Kalyan Srinivas | S.Sajida | Lokesh
Volume: 2
Issue: 8
Year: 2013
Design of Improved Web Crawler By Analysing Irrelevant Result PDF available

Author(s): Prashant Dahiwale | Dr. M.M. Raghuwanshi | Dr. Latesh Malik
Volume: 2
Issue: 8
Year: 2013
Low Power Flip-Flop Design for Low Swing LC Resonant Clock Distribution Networks PDF available

Author(s): Ms. Rihana P A | Mr. R Ramar Kalangiyam
Volume: 2
Issue: 8
Year: 2013
AIM OF PROTECTED ROUTING MESSAGE AUTHENTICATION PROTOCOL FOR VEHICULAR AD HOC NETWORKS PDF available

Author(s): R. UmaSaraswathi | N. Kavitha | G. KesavaRaj
Volume: 2
Issue: 8
Year: 2013
Intelligent Heart Disease Prediction Model Using Classification Algorithms PDF available

Author(s): Pramod Kumar Yadav | K.L.Jaiswal | Shamsher Bahadur Patel | D. P.Shukla
Volume: 2
Issue: 8
Year: 2013
Depiction of Routing Protocols in Mobile Adhoc Networks: Behaviour Analysis PDF available

Author(s): Veeralakshmi M | Dr. R Pugazendi
Volume: 2
Issue: 8
Year: 2013
Analysis of Attribute Association Rule from Large Medical Datasets towards Heart Disease Prediction PDF available

Author(s): D. P. Shukla | Shamsher Bahadur Patel | Ashish Kumar Sen | Pramod Kumar Yadav
Volume: 2
Issue: 8
Year: 2013
Automated Libraries: What we expect from Digital Libraries PDF available

Author(s): Gulbasar | Prof. Saoud Sarwar
Volume: 2
Issue: 8
Year: 2013
ANOMALY INTRUSION DETECTION SYSTEM USING NEURAL NETWORK PDF available

Author(s): Ms. Vrushali D Mane | Ms. Abhilasha Sayar | Prof. Sunil Pawar
Volume: 2
Issue: 8
Year: 2013
Safety Dimensions of Session Initiation Protocol PDF available

Author(s): K.V.N.R. Sai Krishna
Volume: 2
Issue: 8
Year: 2013
Steganographic Method for Data Hiding In Audio Signals with LSB & DCT PDF available

Author(s): Linu Babu | Jais John S | Parameshachari B D | Muruganantham C | H S DivakaraMurthy
Volume: 2
Issue: 8
Year: 2013
Low Complexity Multiple Active Transmit Antenna For High Transmit Rate PDF available

Author(s): Aparna S | Nithin S S | Parameshachari B D | Muruganatham C | Prof. H S DivakaraMurthy
Volume: 2
Issue: 8
Year: 2013
SMART ASSOCIATION CONTROL IN WIRELESS FIDELITY USING FBA PDF available

Author(s): Devipriya A | Prashanth M | Parameshachari B D | Muruganantham C | H S Divakara Murthy | Arun Jose
Volume: 2
Issue: 8
Year: 2013
Backfilling Strategies for Computational Grid System Load Balancing PDF available

Author(s): Prakash Kumar | Pradeep Kumar | Vikas Kumar
Volume: 2
Issue: 8
Year: 2013
ADOPTION OF AUTOMATED TELLER MACHINE IN NIGERIAN BANKS: USE ENHANCEMENTS AND LIMITATIONS PDF available

Author(s): DAWODU BAMIDELE FRIDAY | OSONDU MARY C
Volume: 2
Issue: 8
Year: 2013
Policy Enforcing and Revoking Mechanism on Trusted Ad Hoc Networks PDF available

Author(s): Sujatha J | Manoj Challa
Volume: 2
Issue: 8
Year: 2013
Implementation of SAODV and TAODV Adhoc Secure Routing Protocols PDF available

Author(s): T Nagarjuna | C.C. Kalyan Srinivas | K R Arjun Reddy
Volume: 2
Issue: 7
Year: 2013
Overview of Security Threats in WSN PDF available

Author(s): Ms. Poonam Barua | Mr. Sanjeev Indora
Volume: 2
Issue: 7
Year: 2013
Performance Comparison of Routing Protocols for Remote Login in MANETs PDF available

Author(s): VIKAS GOYAL | SHAVETA RANI | PARAMJIT SINGH
Volume: 2
Issue: 7
Year: 2013
Identifying Under Attack Hateful Email PDF available

Author(s): M. Ramu | B. Triveni | L. Srinivasa Rao
Volume: 2
Issue: 7
Year: 2013
A Novel Authentication Scheme to Increase Security for Non-Repudiation of Users PDF available

Author(s): Khalid Waleed Hussein | Dr. Nor Fazlida Mohd. Sani | Professor Dr. Ramlan Mahmod | Dr. Mohd. Taufik Abdullah
Volume: 2
Issue: 7
Year: 2013
Energy Efficient Routing Protocols in Mobile Ad hoc Network Based on Enhanced AODV Protocol PDF available

Author(s): R. Rajeshkanna | S. Poorana Senthilkumar | C. Kumuthini
Volume: 2
Issue: 7
Year: 2013
Scalable Heat Routing Protocol for Wireless Mesh Networks PDF available

Author(s): Srivani. P
Volume: 2
Issue: 7
Year: 2013
On Some Aspects of Link Analysis and Informal Network in Social Network Platform PDF available

Author(s): Subrata Paul
Volume: 2
Issue: 7
Year: 2013
STUDY ON DECISION TREE COMPETENT DATA CLASSIFICATION PDF available

Author(s): A.Vanitha | S.Niraimathi
Volume: 2
Issue: 7
Year: 2013
METHODS FOR SEGMENTATION OF IVUS ATHEROSCLEROSIS IMAGES PDF available

Author(s): R. Ravindraiah | K. Tejaswini
Volume: 2
Issue: 7
Year: 2013
Accurate Forecasting Prediction of Foreign Exchange Rate Using Neural Network Algorithms: A STUDY PDF available

Author(s): Divyapriya .R | Dr. R. Manicka Chezhian
Volume: 2
Issue: 7
Year: 2013
Genetic Algorithm Assisted Preventive Maintenance Scheduling for Web Servers PDF available

Author(s): Ravi Sindal
Volume: 2
Issue: 7
Year: 2013
TPM as a Middleware for Enterprise Data Security PDF available

Author(s): Abhishek Patel | Prabhat Dansena
Volume: 2
Issue: 7
Year: 2013
Anisotropic Morphological and LLSURE Based Edge Preserving Image Filtering PDF available

Author(s): Ms. Jibi K George
Volume: 2
Issue: 7
Year: 2013
Automated Model-Based Test Path Generation from UML Diagrams via Graph Coverage Techniques PDF available

Author(s): Parampreet Kaur | Gaurav Gupta
Volume: 2
Issue: 7
Year: 2013
ON-DEMAND ROUTING IN MULTI-HOP WIRELESS MOBILE AD HOC NETWORKS PDF available

Author(s): P. Umamaheswari | K. Ranjith singh
Volume: 2
Issue: 7
Year: 2013
FACS BASED AUTOMATIC HUMAN EMOTION RECOGNITION PDF available

Author(s): Prof. Anuradha Savadi | Chandrakala V Patil
Volume: 2
Issue: 7
Year: 2013
ENERGY EFFICIENT ROUTING IN MANET WITH ZRP AND ANYCAST PDF available

Author(s): Satya Bhushan Verma
Volume: 2
Issue: 7
Year: 2013
INNOVATION OF IFGRP AND PERFORMANCE ASSESSMENT OF OLSR, GRP AND IFGRP PDF available

Author(s): Jatin Gupta
Volume: 2
Issue: 7
Year: 2013
Enhance Luhn Algorithm for Validation of Credit Cards Numbers PDF available

Author(s): Khalid Waleed Hussein | Dr. Nor Fazlida Mohd. Sani | Professor Dr. Ramlan Mahmod | Dr. Mohd. Taufik Abdullah
Volume: 2
Issue: 7
Year: 2013
A STUDY ON MANET INTEGRATION THROUGH INTERNET PDF available

Author(s): A. Sharmila | M. Preetha | R. Selvakumar
Volume: 2
Issue: 7
Year: 2013
An Efficient Routing Implementation Using Genetic Algorithm PDF available

Author(s): Priti Gaur
Volume: 2
Issue: 7
Year: 2013
Secure Position-Based Routing Protocol for Mobile Ad hoc Networks PDF available

Author(s): S. Sivakumar | S. Sagunthala
Volume: 2
Issue: 7
Year: 2013
CLUSTERING APPROACH FOR FAST ENERGY EFFICIENT DATA COLLECTION IN WIRELESS SENSOR NETWORK PDF available

Author(s): Mr. Sandeep.C | Mrs. Manimozhi I | Dr. Jitendranath Mungara
Volume: 2
Issue: 7
Year: 2013
Predicting Students Academic Performance Using Education Data Mining PDF available

Author(s): Suchita Borkar | K. Rajeswari
Volume: 2
Issue: 7
Year: 2013
RELATIVE INVESTIGATION OF OLSR, TORA AND GRP ROUTING PROTOCOL USING OPNET PDF available

Author(s): Jatin Gupta | Ritika Gupta
Volume: 2
Issue: 7
Year: 2013
Sentiment Analysis Based Approaches for Understanding User Context in Web Content PDF available

Author(s): M. SAKTHIVEL | G. HEMA
Volume: 2
Issue: 7
Year: 2013
A Pervasive Data Analytic Web Service for Educational Data Mining PDF available

Author(s): Shana. J | T. Venkatachalam
Volume: 2
Issue: 7
Year: 2013
Modified K-Means for Better Initial Cluster Centres PDF available

Author(s): Kalpana D. Joshi | P.S. Nalwade
Volume: 2
Issue: 7
Year: 2013
Efficient Routing Protocol for Highly Dynamic Mobile Ad Hoc Networks PDF available

Author(s): RAMKUMAR. V.D
Volume: 2
Issue: 7
Year: 2013
OVERVIEW OF DDOS ALGORITHMS: A SURVEY PDF available

Author(s): S. Chithra | Dr. E. George Dharma Prakash Raj
Volume: 2
Issue: 7
Year: 2013
A Survey of Image Segmentation Algorithms Based On Fuzzy Clustering PDF available

Author(s): R. Ravindraiah | K. Tejaswini
Volume: 2
Issue: 7
Year: 2013
Ensuring QOS in WiMAX Networks PDF available

Author(s): S. Gandhimathi | A. Srivishnuparaneetharan | M. Madhushudhanan
Volume: 2
Issue: 7
Year: 2013
Energy Conservation in MANET Using Power Saving Protocol BECA/AFECA PDF available

Author(s): R. Suguna | P. Gomathi
Volume: 2
Issue: 7
Year: 2013
An Efficient Resource Management and Scheduling Technique for Fault Tolerance in Grid Computing PDF available

Author(s): Deeptanoy Ghosh | Ramandeep Singh | Jimmy Laishram
Volume: 2
Issue: 7
Year: 2013
Online Optimization for Scheduling Preemptable Tasks on IaaS Cloud Systems PDF available

Author(s): S. Gandhimathi | M. Madhushudhanan | A. Srivishnu Paraneetharan
Volume: 2
Issue: 7
Year: 2013
Selection of Initial Centroids for k-Means Algorithm PDF available

Author(s): Anand M. Baswade | Prakash S. Nalwade
Volume: 2
Issue: 7
Year: 2013
Pragmatic Reactive Programming on Helpless Records PDF available

Author(s): Kaja Masthan
Volume: 2
Issue: 7
Year: 2013
A Comparative Security Study Review on Symmetric Key Cryptosystem Based Algorithms PDF available

Author(s): SSVR Kumar Addagarla | Babji Y
Volume: 2
Issue: 7
Year: 2013
Technical Advances in Fall Detection System – A Review PDF available

Author(s): Raveendra Hegde | Dr. B G Sudarshan | Dr. S C Prasanna Kumar | Dr. Hariprasad S A | Dr. B S Satyanarayana
Volume: 2
Issue: 7
Year: 2013
Evaluating the Derivatives of Two Types of Functions PDF available

Author(s): Chii-Huei Yu
Volume: 2
Issue: 7
Year: 2013
AUTOMATIC PUBLIC DISTRIBUTION SYSTEM PDF available

Author(s): PRASANNA BALAJI.R | MANIKANDAN.T
Volume: 2
Issue: 7
Year: 2013
The Differential Problem of Two Types of Functions PDF available

Author(s): Chii-Huei Yu
Volume: 2
Issue: 7
Year: 2013
A STUDY ON IRIS RECOGNITION SYSTEM PDF available

Author(s): S. RAJESH KUMAR | G.R. SUGANYA | X. NITHIYA | X. SHARMI
Volume: 2
Issue: 7
Year: 2013
FORECASTING IN SAP-SCM (SUPPLY CHAIN MANAGEMENT) PDF available

Author(s): B. Vasumathi | S.P. Shanmuga Ranjani
Volume: 2
Issue: 7
Year: 2013
Enhancing Content Security using MD5 & UTF8 Encoding at Window Azure Cloud PDF available

Author(s): Harjinder Kaur | Sarpreet Singh
Volume: 2
Issue: 7
Year: 2013
A Review and Research of Edge Detection Techniques for Image Segmentation PDF available

Author(s): Poonam Dhankhar | Neha Sahu
Volume: 2
Issue: 7
Year: 2013
Evaluating Some Integrals with Maple PDF available

Author(s): Chii-Huei Yu
Volume: 2
Issue: 7
Year: 2013
Towards Secure and Dependable Ticket Based Tracing System for Obtaining Forgery Attacks in WMN PDF available

Author(s): Chandan Y.N | Manoj Challa | K. Sundeep Kumar
Volume: 2
Issue: 7
Year: 2013
An Integrated Approach to Detect and Limit IP Spoofing PDF available

Author(s): Tanmay A. Abhang | Uday V. Kulkarni
Volume: 2
Issue: 7
Year: 2013
A Survey on Security Issues in Wireless Sensor Network PDF available

Author(s): H.N. Pratihari
Volume: 2
Issue: 7
Year: 2013
USER GUIDED WEB BASED INTERACTION IN MIXED SERVICE ORIENTED SYSTEM PDF available

Author(s): S. TAMIL SELVAN | S. ARUN
Volume: 2
Issue: 7
Year: 2013
A Review on Delay Optimization in Vehicular Ad Hoc Networks Using Ant Colony Optimization and WIMAX PDF available

Author(s): Shikha Rani | Manoj Chaudhary
Volume: 2
Issue: 7
Year: 2013
A Study on the Differential Problems Using Maple PDF available

Author(s): Chii-Huei Yu
Volume: 2
Issue: 7
Year: 2013
ACTIVITY BASED PERSON IDENTIFICATION USING PARTICLE SWARM OPTIMIZATION ALGORITHM PDF available

Author(s): Sruthy Sebastian
Volume: 2
Issue: 7
Year: 2013
REMOVAL OF NOISE IN PPG SIGNALS USING WAVELETS PDF available

Author(s): YADHURAJ S.R | HARSHA.H | Dr. PADMAJA K.V
Volume: 2
Issue: 6
Year: 2013
POWER AND AREA EFFICIENT DESIGN OF COUNTER FOR LOW POWER VLSI SYSTEM PDF available

Author(s): SURESH KUMAR.R
Volume: 2
Issue: 6
Year: 2013
Design & Analysis of Computational Features Prediction Model for Heart Disease Diagnosis PDF available

Author(s): Atul Kumar Pandey | Prabhat Pandey | K.L. Jaiswal
Volume: 2
Issue: 6
Year: 2013
Various Edge Detection Methods for Foreground Detection PDF available

Author(s): Gurjeet kaur Seerha | Rajneet Kaur
Volume: 2
Issue: 6
Year: 2013
Mitigating Risk Using Puzzle-Based Defense Technique to Improve Confidentiality PDF available

Author(s): Ms. Sapna S. Khapre | Prof. Shrikant Ardhapurkar
Volume: 2
Issue: 6
Year: 2013
A Study of Manet and Wormhole Attack in Mobile Adhoc Network PDF available

Author(s): Ranjeeta Siwach | Vanditaa Kaul
Volume: 2
Issue: 6
Year: 2013
A New Approach for Retrieving Unconstrained Blurred Images PDF available

Author(s): Minu Poulose
Volume: 2
Issue: 6
Year: 2013
Solving Improper Integrals with Maple PDF available

Author(s): Chii-Huei Yu
Volume: 2
Issue: 6
Year: 2013
3D Spherical Harmonics Deformation Visualization of Intraoperative Organ PDF available

Author(s): Ms. Greeshma Jacob | Ms. Reshma V.K
Volume: 2
Issue: 6
Year: 2013
Key Generation Using Genetic Algorithm for Image Encryption PDF available

Author(s): Aarti Soni | Suyash Agrawal
Volume: 2
Issue: 6
Year: 2013
A New Cluster Based Broadcast Protocol for Delay Tolerant Mobile Networks PDF available

Author(s): Mr. Harish Kumar T.R | Dr. Dinesh K. Anvekar | Mr. K. Sundeep Kumar | Mr. Manoj Challa
Volume: 2
Issue: 6
Year: 2013
Detection of an Individual after Piercing Using Ear Biometric PDF available

Author(s): Sushreeti Bandyopadhyay | Devesh Narayan
Volume: 2
Issue: 6
Year: 2013
Facial Expression Recognition Using SVM Classification in Perceptual Color Space PDF available

Author(s): Ms. Aswathy.R
Volume: 2
Issue: 6
Year: 2013
PERFORMANCE ANALYSIS OF AODV, OLSR, DSR AND GRP ROUTING PROTOCOL OF MOBILE ADHOC NETWORK – A REVIEW PDF available

Author(s): Suchita Baxla | Prof. Rajesh Nema
Volume: 2
Issue: 6
Year: 2013
Improving the Congestion Control over Stateless Wireless Ad Hoc Network Systems PDF available

Author(s): Shrikant Pujar | Prof. Vasudev K Parvati
Volume: 2
Issue: 6
Year: 2013
Comparative Study of Different Application of OFDM in FPGA Implementation PDF available

Author(s): Ashwin Thakur | Vipul Agrawal | Yogeshwar Khandagre | Alok Duby
Volume: 2
Issue: 6
Year: 2013
A Combined Protection for Entire Network Based On Immune Inspired Theories PDF available

Author(s): P.S. ThumilVannan | S. Hirutiha
Volume: 2
Issue: 6
Year: 2013
Management Decisions against Functional Violations of Web Services PDF available

Author(s): M. Mohemmed Sha | K. Vivekanandan
Volume: 2
Issue: 6
Year: 2013
Fast and Efficient Automated Iris Segmentation by Region Growing PDF available

Author(s): Ms. Sruthi.T.K
Volume: 2
Issue: 6
Year: 2013
An Improved Method in Peer-To-Peer System PDF available

Author(s): Neetha Thomas
Volume: 2
Issue: 6
Year: 2013
Distributed Auditing for user data in the Cloud PDF available

Author(s): Ms. Indushree T G | Mr. Anand R
Volume: 2
Issue: 6
Year: 2013
A SECURE CLOUD WITH ADDITIONAL LAYER OF PROTECTION AND USER AUTHENTICATION PDF available

Author(s): Mr. Iranna Telasang | Mr. Manjunatha S
Volume: 2
Issue: 6
Year: 2013
A Survey on Web Page Change Detection System Using Different Approaches PDF available

Author(s): Shobhna | Manoj Chaudhary
Volume: 2
Issue: 6
Year: 2013
Multioriented and Curved Text Lines Extraction from Documents PDF available

Author(s): Vaibhav Gavali | B. R. Bombade
Volume: 2
Issue: 6
Year: 2013
INTERACTIVE IMAGE SEGMENTATION BASED ON HARMONIC FUNCTIONS & RECONSTRUCTIONS PDF available

Author(s): Alisha Abraham
Volume: 2
Issue: 6
Year: 2013
Dynamic Round Robin for Load Balancing in a Cloud Computing PDF available

Author(s): Ajay Gulati | Ranjeev.K.Chopra
Volume: 2
Issue: 6
Year: 2013
A REVIEW ON EFFICIENT RESOURCE BLOCK ALLOCATION IN LTE SYSTEM PDF available

Author(s): Rupinder Kaur | Manoj Kumar
Volume: 2
Issue: 6
Year: 2013
Data Protection for Clients in Private Network through Virus-Protection as a Service PDF available

Author(s): Manivannan Palanivel | Murali Prasath
Volume: 2
Issue: 6
Year: 2013
A Proposed YANG Validator PDF available

Author(s): Jisha S Manjaly
Volume: 2
Issue: 6
Year: 2013
A Novel Architecture of Mercator: A Scalable, Extensible Web Crawler with Focused Web Crawler PDF available

Author(s): Sarnam Singh | Nidhi Tyagi
Volume: 2
Issue: 6
Year: 2013
Avoiding Pollution Attacks in Network Coding using Authentication Code PDF available

Author(s): Mangesh N. Bhandare | Ravindra C. Thool | Gurdeep Singh Wahi
Volume: 2
Issue: 6
Year: 2013
An Overview of Speech Recognition Using HMM PDF available

Author(s): Ms. Rupali S Chavan | Dr. Ganesh. S Sable
Volume: 2
Issue: 6
Year: 2013
Using Maple to Evaluate the Partial Derivatives of Two-Variables Functions PDF available

Author(s): Chii-Huei Yu
Volume: 2
Issue: 6
Year: 2013
A Novel Steganographic Approach for Enhancing the Security of Images PDF available

Author(s): Priya Thomas | Avanish Kumar Singh
Volume: 2
Issue: 6
Year: 2013
Rule-Based and Cluster-Based Intrusion Detection Technique for Wireless Sensor Network PDF available

Author(s): Ms. Rachana Deshmukh | Ms. Rashmi Deshmukh | Prof. Manoj Sharma
Volume: 2
Issue: 6
Year: 2013
GREEN: The New Color in Computer Technology PDF available

Author(s): Navdeep Kaur Maan | Navdeep Kaur Dhillon
Volume: 2
Issue: 6
Year: 2013
Performance Analysis of Routing Protocols in MANETs PDF available

Author(s): Manoj Kumar | Devendra Singh
Volume: 2
Issue: 6
Year: 2013
AN IMPLEMENTATION OF WEB PERSONALIZATION USING WEB MINING TECHNIQUES PDF available

Author(s): V. Shanmuga Priya | S. Sakthivel
Volume: 2
Issue: 6
Year: 2013
A REPLACEMENT POLICY FOR BUFFER MANAGEMENT IN IPTV SERVICES PDF available

Author(s): K.B. Dinesh Babu | M. Somu | N. Rengarajan
Volume: 2
Issue: 6
Year: 2013
A STUDY AND PERFORMANCE ANALYSIS OF RSA ALGORITHM PDF available

Author(s): M. Preetha | M. Nithya
Volume: 2
Issue: 6
Year: 2013
Protein Structure Prediction using Genetic Algorithm PDF available

Author(s): Subhendu Bhusan Rout | Satchidananda Dehury | Bhabani Sankar Prasad Mishra
Volume: 2
Issue: 6
Year: 2013
A Novel Approach of Handwritten Character Recognition using Positional Feature Extraction PDF available

Author(s): Swapnil A. Vaidya | Balaji R. Bombade
Volume: 2
Issue: 6
Year: 2013
Security and Privacy in Cloud Computing: A Survey PDF available

Author(s): Shachindra Kumar Dubey | Prof. Ashok Verma
Volume: 2
Issue: 6
Year: 2013
A Fuzzy Improved Association Mining Approach to Estimate Software Quality PDF available

Author(s): Sonakshi Rana | Rahul Kumar Yadav
Volume: 2
Issue: 6
Year: 2013
A Novel Fuzzy Logic Analysis & Study on Intrusion Detection System PDF available

Author(s): G. Shilpa | N. Anjaneyulu
Volume: 2
Issue: 6
Year: 2013
Analysis of Android Applications & Missed Call Alerts to Registered Email Address PDF available

Author(s): A. Maharaju
Volume: 2
Issue: 6
Year: 2013
Performance Analysis of Cloud Computing for Distributed Client PDF available

Author(s): Dr. Neeraj Bhargava | Dr. Ritu Bhargava | Manish Mathuria | Ravi Daima
Volume: 2
Issue: 6
Year: 2013
Path Loss Estimation for a Wireless Sensor Network for Application in Ship PDF available

Author(s): Ananya Sarkar | Subhasish Majumdar | Partha Pratim Bhattacharya
Volume: 2
Issue: 6
Year: 2013
CNX PSU Bank Index Prediction Using Soft Computing - A Study PDF available

Author(s): J. Mary Dallfin Bruxella | S. Arun Joe Babulo
Volume: 2
Issue: 6
Year: 2013
Developing Web Based Model (Disblogwik) in Informal eLearning PDF available

Author(s): Triveni Dixit | Dinesh Gill
Volume: 2
Issue: 6
Year: 2013
Wormhole Detection Using Hidden Markov Model Approach PDF available

Author(s): Himani Deswal | Rahul Kumar Yadav
Volume: 2
Issue: 6
Year: 2013
WIRELESS SENSOR NETWORK AND ITS ROUTING PROTOCOL: A SURVEY PAPER PDF available

Author(s): Reena | Sunil Phulre | Rekha Pandit
Volume: 2
Issue: 6
Year: 2013
Study on growth of Online Shopping in India PDF available

Author(s): Deepali
Volume: 2
Issue: 6
Year: 2013
Android Optimization: A Survey PDF available

Author(s): Ms. Debosmita Sen Purkayastha | Mr. Nitin Singhla
Volume: 2
Issue: 6
Year: 2013
Architecture of Discrete Wavelet Transform Processor for Image Compression PDF available

Author(s): Ms. Yamini S.Bute | Ms. Indu Mandawi | Ms. Sarita Sakure
Volume: 2
Issue: 6
Year: 2013
Ethics and Impacts of Information and Communication Technology in E-Commerce PDF available

Author(s): Tryambak Hiwarkar | Dr. P.G Khot
Volume: 2
Issue: 6
Year: 2013
Remote Temperature Monitoring Using LM35 sensor and Intimate Android user via C2DM Service PDF available

Author(s): Poonam | Prof. (Dr.) Yusuf Mulge
Volume: 2
Issue: 6
Year: 2013
RECOGNITION AND PREPROCESSING OF INTRUSION DATA IN WIRELESS SENSOR NETWORK PDF available

Author(s): Manjot Singh | Himanshu Sharma
Volume: 2
Issue: 6
Year: 2013
A Novel Positioning Technique for 3D Underwater Sensor Networks PDF available

Author(s): Aditya Tandon | Kamal Kant
Volume: 2
Issue: 6
Year: 2013
A Review of Wormhole Detection Using HMM Approach PDF available

Author(s): Himani Deswal | Rahul Yadav
Volume: 2
Issue: 6
Year: 2013
A Review of Geometry Based Symmetric Key Encryption Using Ellipse PDF available

Author(s): Prerna Gaur | Dr. Paramjit Singh
Volume: 2
Issue: 6
Year: 2013
Content Management System (CMS) for Web-Based MIS Application PDF available

Author(s): P. Divya
Volume: 2
Issue: 6
Year: 2013
Security Refinement in Nymble System PDF available

Author(s): Maheshkumar S. Kamble | Hatkar S. S.
Volume: 2
Issue: 6
Year: 2013
Monitoring and Its Impacts over Distributed Systems and Possible Solutions PDF available

Author(s): Manjunath Kotari | Dr. Niranjan N. Chiplunkar | Dr. Nagesh H R
Volume: 2
Issue: 6
Year: 2013
A Novel Steganographic Approach to enhance the Performance of Security System in a Smarter Way PDF available

Author(s): Parveen Mor | Tanupriya Choudhury | Vasudha Vashisht
Volume: 2
Issue: 6
Year: 2013
Improvement in Word Sense Disambiguation by Introducing Enhancements in English WordNet Structure PDF available

Author(s): Swati Rastogi | Sanjeev Thakur
Volume: 2
Issue: 5
Year: 2013
Comparison and Simulation of POR and E-POR Routing Protocols in MANETs PDF available

Author(s): M. Chandrika | N. Papanna
Volume: 2
Issue: 5
Year: 2013
A Study on Multi Project Resource Constrained Project Scheduling using Metaheuristic Approach PDF available

Author(s): S. Siva Vidya | M. Suguna | Dr. D. Sharmila
Volume: 2
Issue: 5
Year: 2013
Stimulus-Response Behavior of Moving Agents PDF available

Author(s): Yuniel E. Proenza Arias | Martín E. Proenza Arias
Volume: 2
Issue: 5
Year: 2013
Arduino Based Wireless Intrusion Detection Using IR Sensor and GSM PDF available

Author(s): Prakash Kumar | Pradeep Kumar
Volume: 2
Issue: 5
Year: 2013
An Overview on Reactive Protocols for Mobile Ad-Hoc Networks PDF available

Author(s): P. Narendra Reddy | CH. Vishnuvardhan | V. Ramesh
Volume: 2
Issue: 5
Year: 2013
ROUTING ATTACKS IN MOBILE AD HOC NETWORKS PDF available

Author(s): P. Narendra Reddy | CH. Vishnuvardhan | V. Ramesh
Volume: 2
Issue: 5
Year: 2013
An Efficient Back Propagation Neural Network Based Face Recognition System Using Haar Wavelet Transform and PCA PDF available

Author(s): Prachi Agarwal | Naveen Prakash
Volume: 2
Issue: 5
Year: 2013
A STUDY OF PRIVACY-PRESERVING WHILE SHARING SENSITIVE INFORMATION PDF available

Author(s): K.V. Lakshmi Praveena
Volume: 2
Issue: 5
Year: 2013
SPEAKER RECOGNITION AND AUTHENTICATION PDF available

Author(s): Rakesh D R | JAYASIMHAN N K
Volume: 2
Issue: 5
Year: 2013
Applications of Swarm Intelligence PDF available

Author(s): Amrit Saggu | Pallavi Yadav | Monika Roopak
Volume: 2
Issue: 5
Year: 2013
Genomic Signal Processing (GSP) Of Rheumatic Arthritis (RA) Using Different Indicator Sequences PDF available

Author(s): K.B. Ramesh | Prabhu Shankar.K.S | B.P. Mallikarjunaswamy | E.T. Puttaiah
Volume: 2
Issue: 5
Year: 2013
Mitigation of Blackhole for AODV (Ad hoc On Demand Distance Vector) PDF available

Author(s): Ms. Bhumil Jani | Prof. Hitesh Patel
Volume: 2
Issue: 5
Year: 2013
Performance Evaluation of Rayleigh Multipath Fading Channel using Rectangular QAM schemes PDF available

Author(s): Mr. P. Sunil Kumar | Dr. M.G. Sumithra | Ms. M. Sarumathi
Volume: 2
Issue: 5
Year: 2013
Utilizing WM and GM for Finding Intelligence of Human Behavior PDF available

Author(s): Mrs. Mary Cecil | Prof. Samir Kumar Bandyopadhyay
Volume: 2
Issue: 5
Year: 2013
A Survey on Clustering Principles with K-means Clustering Algorithm Using Different Methods in Detail PDF available

Author(s): Manpreet Kaur | Usvir Kaur
Volume: 2
Issue: 5
Year: 2013
Analysis of Yslow Performance Test tool & Emergences on Web Page Data Extraction PDF available

Author(s): R. Mamatha | N. Indira Priyadarsini
Volume: 2
Issue: 5
Year: 2013
Research Analysis of Cloud Computing PDF available

Author(s): G. Vijay Baskar | N. Sathees Kumar | N. Karthick
Volume: 2
Issue: 5
Year: 2013
REVIEW OF ENSEMBLE CLASSIFICATION PDF available

Author(s): V. Chitraa | Dr. Antony Selvadoss Thanamani
Volume: 2
Issue: 5
Year: 2013
A Survey and Analysis of Media Keying Techniques in Session Initiation Protocol (SIP) PDF available

Author(s): Rajesh Kumar | Sandip Chauhan
Volume: 2
Issue: 5
Year: 2013
Vehicular Ad-Hoc Network a Comparative Study and Simulation PDF available

Author(s): Niranjan Singh | Sunil Kumar | Rajdeep Singh | B S Rawat | Devendra Singh
Volume: 2
Issue: 5
Year: 2013
DATA LEAKAGE DETECTION PDF available

Author(s): N. Bangar Anjali | P. Rokade Geetanjali | Patil Shivlila | R. Shetkar Swati | Prof. N B Kadu
Volume: 2
Issue: 5
Year: 2013
Swarm Intelligence for Network Communication Routing PDF available

Author(s): Gauri Nagar | Arpit Sood | Monika Roopak
Volume: 2
Issue: 5
Year: 2013
A Survey on Software Development Life Cycle Models PDF available

Author(s): T Bhuvaneswari | S Prabaharan
Volume: 2
Issue: 5
Year: 2013
Multi-frequency Measurement of Electrical Bioimpedance of Bone to assess Bone Mineral Density PDF available

Author(s): Mrs. S. Mythili | Dr. G. Athisha
Volume: 2
Issue: 5
Year: 2013
FACTS INCLUSION BIOINFORMATICS: MODERN EFFORTS AND DISPUTE PDF available

Author(s): Dr. Tryambak A. Hiwarkar | R. Sridhar Iyer
Volume: 2
Issue: 5
Year: 2013
SECURE COMMUNICATION OF SECRET DATA USING STEGNOGRAPHY PDF available

Author(s): Sobia Habib | Atiya Parveen | Saoud Sarwar
Volume: 2
Issue: 5
Year: 2013
IMAGE SEGMENTATION FOR TUMOR DETECTION USING FUZZY INFERENCE SYSTEM PDF available

Author(s): V. Janani | P. Meena
Volume: 2
Issue: 5
Year: 2013
Hybrid Compression Using DWT-DCT and Huffman Encoding Techniques for Biomedical Image and Video Applications PDF available

Author(s): K.N. Bharath | G. Padmajadevi | Kiran
Volume: 2
Issue: 5
Year: 2013
Flexible Bloom for Searching Textual Content Based Retrieval System in an Unstructured P2P Overlay Networks PDF available

Author(s): S. Uvaraj | S. Suresh | Dr. E. Mohan
Volume: 2
Issue: 5
Year: 2013
Empowering Intrusion Detection Systems in Multitier Web Applications Using Clustering Algorithms PDF available

Author(s): RANJITH SIVADASAN | P. MADHAVAN
Volume: 2
Issue: 5
Year: 2013
Survey of Resource and Grouping Based Job Scheduling Algorithm in Grid Computing PDF available

Author(s): Sandeep Kaur | Sukhpreet Kaur
Volume: 2
Issue: 5
Year: 2013
Literature Survey on Automated Person Identification Techniques PDF available

Author(s): Sruthy Sebastian
Volume: 2
Issue: 5
Year: 2013
Implementation of Multicast Routing Using Genetic Algorithm PDF available

Author(s): Priti Gaur
Volume: 2
Issue: 5
Year: 2013
THE CLOUD- CHANGING THE INDIAN HEALTHCARE SYSTEM PDF available

Author(s): Atiya Parveen | Sobia Habib | Waseem Ahmad
Volume: 2
Issue: 5
Year: 2013
New Applications of Soft Computing, Artificial Intelligence, Fuzzy Logic & Genetic Algorithm in Bioinformatics PDF available

Author(s): Dr. Tryambak A. Hiwarkar | R. Sridhar Iyer
Volume: 2
Issue: 5
Year: 2013
PATIENT MONITORING SYSTEM USING ANDROID TECHNOLOGY PDF available

Author(s): Prema Sundaram
Volume: 2
Issue: 5
Year: 2013
Enhanced Multistage Content Based Image Retrieval PDF available

Author(s): Nandish Chauhan | Mahesh Goyani
Volume: 2
Issue: 5
Year: 2013
DESIGNING A VIRTUAL MACHINE FOR IDENTIFICATION OF CARDIAC ARRHYTHMIAS USING LAB VIEW PDF available

Author(s): B. Subha | Subha.S.V | M.Anitha | M.Eniya | M.Gaayathri
Volume: 2
Issue: 5
Year: 2013
Cloud Computing: A Revolution in Communication PDF available

Author(s): Rani Srivastava | Shekhar Gupta
Volume: 2
Issue: 5
Year: 2013
Hierarchical EAP Back-End Authenticator State Machine PDF available

Author(s): Desai Malav | Kalpesh Patel
Volume: 2
Issue: 5
Year: 2013
Improved Data Reduction Technique in Data Mining PDF available

Author(s): Pritesh Vora | Bhavesh Oza
Volume: 2
Issue: 5
Year: 2013
GENETIC ALGORITM BASED HINDI WORD SENSE DISAMBIGAUTION PDF available

Author(s): Sabnam Kumari | Prof. (Dr.) Paramjit Singh
Volume: 2
Issue: 5
Year: 2013
AN IMAGE ENCRYPTION USING BIT LEVEL PERMUTATION AND DEPENDENT DIFFUSION PDF available

Author(s): G.S. Nandeesh | P.A. Vijaya | M.V. Sathyanarayana
Volume: 2
Issue: 5
Year: 2013
Decorate Ensemble of Artificial Neural Networks with High Diversity for Classification PDF available

Author(s): Mittal C. Patel | Prof. Mahesh Panchal | Himani P. Bhavsar
Volume: 2
Issue: 5
Year: 2013
A Review: Image Extraction with Weighted Page Rank using Partial Tree Alignment Algorithm PDF available

Author(s): Gagan Preet Kaur | Usvir Kaur | Dheerendra Singh
Volume: 2
Issue: 5
Year: 2013
SCOPE AND LIMITATION OF ELECTRONIC VOTING SYSTEM PDF available

Author(s): Atiya Parveen | Sobia Habib | Saoud Sarwar
Volume: 2
Issue: 5
Year: 2013
Multi-Operating Environment System PDF available

Author(s): Aditya Thakare | Prachi Deshmukh | Shraddha Kawane | Yogesh Sarda
Volume: 2
Issue: 5
Year: 2013
Review Paper on Detection and Prevention Techniques of Gray-Hole Attack in Manet PDF available

Author(s): Ashok Desai
Volume: 2
Issue: 5
Year: 2013
An Efficient Approach to Improve Response Time in Multibiometric Patterns Retrieval from Large Database PDF available

Author(s): S. Balgani | S. Sangeetha
Volume: 2
Issue: 5
Year: 2013
Software Risk Management PDF available

Author(s): P. M. Chawan | Jijnasa Patil | Radhika Naik
Volume: 2
Issue: 5
Year: 2013
Various Hierarchical Routing Protocols in Wireless Sensor Network: A Survey PDF available

Author(s): Vandna Sharma | Payal Jain
Volume: 2
Issue: 5
Year: 2013
Study on Various Glass Defect Using Glass Edge Detection Methods PDF available

Author(s): Sumeet Singh Tiwana | Sukhpreet Kaur
Volume: 2
Issue: 5
Year: 2013
A Novel Approach of Energy Optimization in WSN PDF available

Author(s): S. Geetha Priya | A.R. Arunachalam
Volume: 2
Issue: 5
Year: 2013
Safekeeping of Network Executive for a Domestic Internet Service Provider PDF available

Author(s): K.V.N.R. Sai Krishna
Volume: 2
Issue: 5
Year: 2013
Effective Identification of the Intruders and Modifiers in Wireless Sensor Networks PDF available

Author(s): J. Vijayagajendiran | D. Udhayakumarapandian
Volume: 2
Issue: 5
Year: 2013
Judging Relevance of Candidate Answers in Question Answering System PDF available

Author(s): Rawia Awadallah
Volume: 2
Issue: 5
Year: 2013
MULTIPLE FAULT DIAGNOSIS FOR HIGH SPEED HYBRID MEMORY ARCHITECTURE PDF available

Author(s): B. Kamala Soundari | M. Praveena
Volume: 2
Issue: 5
Year: 2013
MONITORING LOCAL AREA NETWORK USING REMOTE METHOD INVOCATION PDF available

Author(s): Harsh Mittal | Manoj Jain | Latha Banda
Volume: 2
Issue: 5
Year: 2013
An Evaluation of Different Routing Schemes in DTN PDF available

Author(s): S. Anitha | G. Micheal
Volume: 2
Issue: 5
Year: 2013
Cloud on Linux Operating System PDF available

Author(s): Pritee Gavhane | Pratibha Kurumkar | Madhuri Jagtap | Dharti Mahajan
Volume: 2
Issue: 5
Year: 2013
An Evaluation of Crowd Work during Mass Disruption Events PDF available

Author(s): R. Harish | D. Keerna
Volume: 2
Issue: 4
Year: 2013
Modified Approaches on Face Recognition By using Multisensory Image PDF available

Author(s): S. Dhanarajan | G. Michael
Volume: 2
Issue: 4
Year: 2013
Normalized graph-cut based Necrotic Image Segmentation of Brain Tumours PDF available

Author(s): J.S. JUFIN | D. JEBA DERWIN
Volume: 2
Issue: 4
Year: 2013
A New Segmentation Technique by KDE Model and Two-Phase Graph Cut Method PDF available

Author(s): S. Bhagawath | T.D. Subha | A. Arul Mary
Volume: 2
Issue: 4
Year: 2013
A Novel Resource Distributed Discovery and Management in Grid Computing PDF available

Author(s): M. Brinda Kumar | Dr. K.P. Kaliyamurthie
Volume: 2
Issue: 4
Year: 2013
A Novel Security Technique in Message Passing Interface Systems PDF available

Author(s): UDHAYASHANKAR.S | Dr. K.P. KALIYAMURTHIE | MATHIVILASINI.S
Volume: 2
Issue: 4
Year: 2013
New Data Mining Algorithm for Intrusion Detection in Networks PDF available

Author(s): M. Penchala Praveen | M. Sambath | S. Ravi
Volume: 2
Issue: 4
Year: 2013
Implementation of Cryptographic Algorithm on FPGA PDF available

Author(s): Prof. S. Venkateswarlu | Deepa G.M | G. Sriteja
Volume: 2
Issue: 4
Year: 2013
Detection of Mobile Replica Nodes in Wireless Sensor Networks PDF available

Author(s): KARTHIK.S | K.P. KALIYAMURTHIE
Volume: 2
Issue: 4
Year: 2013
An Evaluation of Location Privacy in Wireless Sensor Networks PDF available

Author(s): R. SUGANYA SUBATHRA | A.R. ARUNACHALAM
Volume: 2
Issue: 4
Year: 2013
Privacy-Preserving Updates to Anonymous Databases PDF available

Author(s): SIVASUBRAMANIAN.R | K.P. KALIYAMURTHIE
Volume: 2
Issue: 4
Year: 2013
A Review on Data Leakage Detection PDF available

Author(s): SHAJ.V | K.P. KALIYAMURTHIE
Volume: 2
Issue: 4
Year: 2013
Information Extraction by Mining the Semantic Web PDF available

Author(s): R. PREETHI | C. ANURADHA
Volume: 2
Issue: 4
Year: 2013
A Novel Approach of Detecting the Camouflaging Worm PDF available

Author(s): HEMALATHA R | S. PRATHIBA
Volume: 2
Issue: 4
Year: 2013
Optimized Rapid Data Collection in Tree Based WSN PDF available

Author(s): DEVASAHAYAM | K.P. KALIYAMURTHIE
Volume: 2
Issue: 4
Year: 2013
Modified Approach of User Profiling from Search Engine Logs PDF available

Author(s): C. DEEPA | S. PRATHIBA
Volume: 2
Issue: 4
Year: 2013
Methodologies for Trend Detection Based on Temporal Text Mining PDF available

Author(s): M. BANU PRIYA | Dr. A. KUMARAVEL
Volume: 2
Issue: 4
Year: 2013
A Robust DR Classification from Blood Vessel Features PDF available

Author(s): Alka Vijayan | Antony Judice.A
Volume: 2
Issue: 4
Year: 2013
Feature Extraction and Classification of Emotions in Wave Files Using Crossbreed Algorithm PDF available

Author(s): Aastha Joshi | Rajneet Kaur
Volume: 2
Issue: 4
Year: 2013
Security Based Phishing Website Detection PDF available

Author(s): Yalavarthi Ravi Theja | R. Krishnaveni
Volume: 2
Issue: 4
Year: 2013
Deep Malicious Website Detection PDF available

Author(s): Parvatam Sriram Rohit | R. Krishnaveni
Volume: 2
Issue: 4
Year: 2013
IMPLEMENTATION OF PARALLEL APRIORI ALGORITHM ON HADOOP CLUSTER PDF available

Author(s): A. Ezhilvathani | Dr. K. Raja
Volume: 2
Issue: 4
Year: 2013
SECURED SEARCHING OF VALUABLE DATA IN A METRIC SPACE BASED ON SIMILARITY MEASURE PDF available

Author(s): R. Rathika | Dr. K. Raja
Volume: 2
Issue: 4
Year: 2013
Customer Security Issues in Cloud Computing PDF available

Author(s): Nimmati Satheesh
Volume: 2
Issue: 4
Year: 2013
Receiver Based Geographic Multicast Routing in Ad Hoc Networks PDF available

Author(s): Koteswararao Nuthalapati | Poornima Samamthula | Gunasekhar Bathina
Volume: 2
Issue: 4
Year: 2013
Coverage Analysis and Chinese Postman Algorithm for Efficient Model-Based Test Generation PDF available

Author(s): Parampreet Kaur | Gaurav Gupta
Volume: 2
Issue: 4
Year: 2013
Improve Query Performance Using Effective Materialized View Selection and Maintenance: A Survey PDF available

Author(s): Ashish P. Mohod | Manoj S. Chaudhari
Volume: 2
Issue: 4
Year: 2013
IMAGE COMPRESSION WITH SCALABLE ROI USING ADAPTIVE HUFFMAN CODING PDF available

Author(s): P. Sutha
Volume: 2
Issue: 4
Year: 2013
CANCER RESEARCH THROUGH THE HELP OF SOFT COMPUTING TECHNIQUES: A SURVEY PDF available

Author(s): Mr. Tanupriya Choudhury | Dr. Vivek Kumar | Dr. Darshika Nigam
Volume: 2
Issue: 4
Year: 2013
Exigent Vulnerability in Mobile Ad-hoc Network and Solutions in Context of Energy Optimization with Clustering Technique PDF available

Author(s): Keshav Kumar Tiwari | Prof. Sanjay Agrawal
Volume: 2
Issue: 4
Year: 2013
IMPLEMENTATION OF NORMLIZED CUT ALGORITHAM FOR IMAGE SEGMENTATION PDF available

Author(s): Hardik K Patel | Darshak G Thakore | Mahasweta Joshi
Volume: 2
Issue: 4
Year: 2013
Hand Gesture Recognition Based Real-time Command System PDF available

Author(s): P. Jenifer Martina | P. Nagarajan | P. Karthikeyan
Volume: 2
Issue: 4
Year: 2013
Automatic Licenses Plate Recognition PDF available

Author(s): Ronak P Patel | Narendra M Patel | Keyur Brahmbhatt
Volume: 2
Issue: 4
Year: 2013
ROBUST WATERMARKING SCHEME AGAINST GEOMETERICAL ATTACKS PDF available

Author(s): Kiratpreet Singh | Rajneet Kaur
Volume: 2
Issue: 4
Year: 2013
DESIGN AND ANALYSIS OF POWER EFFICIENT CLOCKED PAIR SHARED FLIPFLOP PDF available

Author(s): B. Ragavi | K. Rajesh | A. Selvapandian
Volume: 2
Issue: 4
Year: 2013
TECHNOLOGY BOON: EEG BASED BRAIN COMPUTER INTERFACE - A SURVEY PDF available

Author(s): Vasudha Vashisht | Dr. T. V. Prasad | Dr. S.V.A.V. Prasad
Volume: 2
Issue: 4
Year: 2013
A Secure Decentralized Cloud Computing Environment over Peer to Peer PDF available

Author(s): Tanupriya Choudhury | Vasudha Vashisht | Himanshu Srivastava
Volume: 2
Issue: 4
Year: 2013
IP Trace Back Scheme for Packet Marking and Packet Logging Using RIHT PDF available

Author(s): C. VAIYAPURI | R. MOHANDAS
Volume: 2
Issue: 4
Year: 2013
Adapted Encryption Algorithm with Multiple Skew Tent Map PDF available

Author(s): Sarika Tyagi | Deepak chaudhary
Volume: 2
Issue: 4
Year: 2013
Remote System Controller: An Implementation of a Secure Channel PDF available

Author(s): Shanu Sharma
Volume: 2
Issue: 4
Year: 2013
A Novel Network Interjection Avoidance for MANET PDF available

Author(s): M. Sudharani | K.P. Kaliyamurthie
Volume: 2
Issue: 4
Year: 2013
Modified Security Frame Work for PIR Cloud Computing Environment PDF available

Author(s): J. Sinduja | S. Prathiba
Volume: 2
Issue: 4
Year: 2013
An Enhanced HASBE for Cloud Computing Environment PDF available

Author(s): D. Hephzi Rachel | S. Prathiba
Volume: 2
Issue: 4
Year: 2013
An Analysis for Black Hole Attack in AODV Protocol and Its Solution PDF available

Author(s): Rahul Sharma | Naveen Dahiya | Divya Upadhyay
Volume: 2
Issue: 4
Year: 2013
ROLE OF DATA MINING IN EDUCATION SECTOR PDF available

Author(s): Dr. Mohd Maqsood Ali
Volume: 2
Issue: 4
Year: 2013
AUTHENTICATING MOBILE DEVICE USERS THROUGH IMAGE SELECTION PDF available

Author(s): G. Vijay Baskar | N. Sangeetha
Volume: 2
Issue: 4
Year: 2013
IMPROVED IMAGE WATERMARKING WITH CURVELET WAVELET PDF available

Author(s): Mr. N. Suresh Kumar | Mr. B. Mathan Kumar
Volume: 2
Issue: 4
Year: 2013
HIGH IMPERCEPTIBLE ENCODING FOR COMPUTER NETWORKS SECURITY PDF available

Author(s): C. KAVITHA | ANTONY JUDICE A | S. PRATHIBA
Volume: 2
Issue: 4
Year: 2013
Design of Low Power Dual Trigger Sequential Circuit PDF available

Author(s): R. Balakumaresan | A. Selvapandian | S. Krishnakumar
Volume: 2
Issue: 4
Year: 2013
ADVANTAGES OF WCF OVER WEB SERVICES PDF available

Author(s): Kola Siva Tharun | Muppalla Prudhvi | Satti Swami Reddy
Volume: 2
Issue: 4
Year: 2013
The Amalgamation of Digital Watermarking & Cloud Watermarking for Security Enhancement in Cloud Computing PDF available

Author(s): Navneet Singh | Prof. Shailendra Singh
Volume: 2
Issue: 4
Year: 2013
Moving Object Tracking Using Kalman Filter PDF available

Author(s): Hitesh A Patel | Darshak G Thakore
Volume: 2
Issue: 4
Year: 2013
A Survey on Techniques and Challenges in Image Super Resolution Reconstruction PDF available

Author(s): Pandya Hardeep | Prof. Prashant B. Swadas | Prof. Mahasweta Joshi
Volume: 2
Issue: 4
Year: 2013
A Novel Prediction on Breast Cancer from the Basis of Association rules and Neural Network PDF available

Author(s): S. Palaniappan | T. Pushparaj
Volume: 2
Issue: 4
Year: 2013
An Implementation of a Novel Secret Image Sharing Algorithm PDF available

Author(s): Shanu Sharma
Volume: 2
Issue: 4
Year: 2013
IBM I SERIES OVER IBM Z SERIES PDF available

Author(s): MUPPALLA PRUDHVI | KOLA SIVA THARUN | SATTI SWAMI REDDY
Volume: 2
Issue: 4
Year: 2013
Historical Document Preservation using Image Processing Technique PDF available

Author(s): Prof. D.N. Satange | Ms. Swati S. Bobde | Ms. Snehal D. Chikate
Volume: 2
Issue: 4
Year: 2013
PACKET HANDLING SCHEDULING IN MULTIPLE ROUTING CONFIGURATIONS FOR FAST IP NETWORK RECOVERY PDF available

Author(s): H.V. Laxman Vijay | K. Sudheer Kumar | R.V. Krishnaiah
Volume: 2
Issue: 4
Year: 2013
Encryption of Data to Prevent Jamming Attacks PDF available

Author(s): N. Abirami | R. Jeeva | L. Revathi | U. Safiya | Mrs. E. Baby Anitha
Volume: 2
Issue: 4
Year: 2013
Character Identification Using Graph Matching Algorithm PDF available

Author(s): S. Bharathi | P. Manirathnam | K. Ramya | R. Ranjith Kumar | Mrs. M. Tamilarasi
Volume: 2
Issue: 4
Year: 2013
Analysis of Buffer Sizing in Core Routers and Investigating Its Impact on Flow of Files PDF available

Author(s): Priyadarsini S | Sharmila S | SivaSankari B | Vijaya Kumar P | Vipin P | Mr.A.Mummoorthy
Volume: 2
Issue: 4
Year: 2013
RELAY SELECTION FOR SECURE CO-OPERATIVE NETWORKS WITH JAMMING PDF available

Author(s): Lakshmipraba.K | Nithya Devi.S | Praveen.P | Suresh Kumar.M | Mrs.V.Vennila
Volume: 2
Issue: 4
Year: 2013
Clustering for Collaborative Filtering Application in Web Recommendations PDF available

Author(s): M. Kanimozhi | K. Logeshwari | K. Saranya | D. Sowbha | Mr. R. Velumani
Volume: 2
Issue: 4
Year: 2013
Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points PDF available

Author(s): Karthhik.K | Keerthana.R | Porkodi.A | Udhayakumar.S | Kesavan.S | Mr.Balamurugan.P
Volume: 2
Issue: 4
Year: 2013
SECURING CLOUD COMPUTING ENVIRONMENT USING TIME DELAY BASED ON SESSION PDF available

Author(s): Koteswar rao.M | Mr. G. Sree Ram
Volume: 2
Issue: 4
Year: 2013
A Cognitive Digital Home Framework using Admission Control and Resource Distribution PDF available

Author(s): A. Sakira Parveen | T. Muruga Jothi | R. Raja Kumari
Volume: 2
Issue: 4
Year: 2013
HDL IMPLEMENTATION OF ALGEBRAIC SOFT DECISION ALGORITHM FOR RS CODES PDF available

Author(s): M. Revathy | R. Saravanan
Volume: 2
Issue: 4
Year: 2013
Save time & money - Smart Internet Solutions      Why do you need a reservation system?