Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computer Science and Mobile Computing

ISSN: 2320--088X
Publisher: International Journal of Computer Science and Mobile Computing


ADD TO MY LIST
 
Safety Measures in Wireless Information Networks PDF available

Author(s): K.V.N.R. Sai Krishna | CH. Krishnamohan
Volume: 2
Issue: 9
Year: 2013
NEXT GENERATION MOBILE COMPUTING PDF available

Author(s): N. LAKSHMI PRASANNA | DR. R. V. KRISHNAIAH
Volume: 2
Issue: 9
Year: 2013
Performance Base Static Analysis of Malware on Android PDF available

Author(s): Khyati Rami | Vinod Desai
Volume: 2
Issue: 9
Year: 2013
Prototype of Vehicle Security Alert System on Proton Iswara 1.3 PDF available

Author(s): N. A. Ali | A. S. Ja’afar | A. Salleh | M. A. M. Razali | M.Z.A.A Aziz | N. M. Z. Hashim
Volume: 2
Issue: 9
Year: 2013
A Review of the Vulnerabilities of Web Applications PDF available

Author(s): Ravneet Kaur Sidhu
Volume: 2
Issue: 9
Year: 2013
Design and Implementation of Rijndael Encryption Algorithm Based on FPGA PDF available

Author(s): K. Soumya | G. Shyam Kishore
Volume: 2
Issue: 9
Year: 2013
A Survey of Time Synchronization Protocols for Wireless Sensor Networks PDF available

Author(s): Baljinder Kaur | Amandeep Kaur
Volume: 2
Issue: 9
Year: 2013
HYBRID ENSEMBLE GENE SELECTION ALGORITHM FOR IDENTIFYING BIOMARKERS FROM BREAST CANCER GENE EXPRESSION PROFILES PDF available

Author(s): DR. S. ARUNA | DR. L.V. NANDAKISHORE
Volume: 2
Issue: 9
Year: 2013
DELAY – Disruption Tolerant Network (DTN), its Network Characteristics and Core Applications PDF available

Author(s): Vaishali.S.Raj | Dr. R. Manicka Chezian
Volume: 2
Issue: 9
Year: 2013
Outsourced Comparison Seek on Metric Information Resources PDF available

Author(s): M. Praveen | S. Dorababu
Volume: 2
Issue: 9
Year: 2013
Home Electrical Appliances Smart System PDF available

Author(s): S. H. Husin | A. A. Ngahdiman | N. M. Z. Hashim | Y. Yusop | A.S Ja’afar
Volume: 2
Issue: 9
Year: 2013
Design and Performance Analysis of Various Adders using Verilog PDF available

Author(s): Maroju SaiKumar | Dr. P. Samundiswary
Volume: 2
Issue: 9
Year: 2013
Performance Evaluation of AODV and DSR Routing Protocols with PCM and GSM Voice Encoding Schemes PDF available

Author(s): Osamah Yaseen Fadhil
Volume: 2
Issue: 9
Year: 2013
Impact of Uncertainty Factors in Cost Estimation – Substantiation through Normal Distribution Curve PDF available

Author(s): G. Rajkumar | Dr. K. Alagarsamy
Volume: 2
Issue: 9
Year: 2013
A New Technique for Test Case Prioritization PDF available

Author(s): Amandeep Kaur | Sheena Singh
Volume: 2
Issue: 9
Year: 2013
Analysis of Attribute Set-Based Encryption Solution for Access Control in Cloud Computing PDF available

Author(s): P. Sravanthi | N. Uday Bhaskar | P. Swapna | Nagaraju
Volume: 2
Issue: 9
Year: 2013
Zforce Touchscreen Technology PDF available

Author(s): A. ANUSHA REDDY | DR. R. V. KRISHNAIAH
Volume: 2
Issue: 9
Year: 2013
CONTRAIL – ARCHITECTURE FOR MOBILE DATA SHARING APPLICATIONS PDF available

Author(s): Lavanya.K | Devipriya.C | Saradha.S | Sangeetha Priya.M
Volume: 2
Issue: 9
Year: 2013
Comparison of Previous Result with New Model for the Improvement of Gain in Raman Amplifier PDF available

Author(s): Jyoti Dhir | Vivek Gupta
Volume: 2
Issue: 9
Year: 2013
TRACKING AND ACTIVITY RECOGNITION THROUGH CAMERA NETWORKS PDF available

Author(s): P. Ravali | D. Sampath Kumar
Volume: 2
Issue: 9
Year: 2013
Cloud Security for Computing Secure Cloud Bursting, Brokerage and Aggregation Using Cryptography PDF available

Author(s): Neeraj Shrivastava | Rahul Yadav
Volume: 2
Issue: 9
Year: 2013
A Comprehensive Study on Fast Image Dehazing Techniques PDF available

Author(s): Elisée A KPONOU | Zhengning Wang | Liping Li
Volume: 2
Issue: 9
Year: 2013
Lifetime Maximization in Sensor Networks for Rare-Event Detection using Optimal Sleep Scheduling PDF available

Author(s): M. Sindhuja | N. Kokila
Volume: 2
Issue: 9
Year: 2013
Safety Dimensions of Session Initiation Protocol PDF available

Author(s): K.V.N.R. Sai Krishna
Volume: 2
Issue: 8
Year: 2013
Design of Improved Web Crawler By Analysing Irrelevant Result PDF available

Author(s): Prashant Dahiwale | Dr. M.M. Raghuwanshi | Dr. Latesh Malik
Volume: 2
Issue: 8
Year: 2013
Privacy Protected Query Processing on Spatial Networks PDF available

Author(s): K. SASIKALA | REKA.R | SASIKALA.K
Volume: 2
Issue: 8
Year: 2013
Backfilling Strategies for Computational Grid System Load Balancing PDF available

Author(s): Prakash Kumar | Pradeep Kumar | Vikas Kumar
Volume: 2
Issue: 8
Year: 2013
Low Power Flip-Flop Design for Low Swing LC Resonant Clock Distribution Networks PDF available

Author(s): Ms. Rihana P A | Mr. R Ramar Kalangiyam
Volume: 2
Issue: 8
Year: 2013
SECURITY TECHNIQUES FOR MULTI TENANCY APPLICATIONS IN CLOUD PDF available

Author(s): C.C. Kalyan Srinivas | S.Sajida | Lokesh
Volume: 2
Issue: 8
Year: 2013
Automated Libraries: What we expect from Digital Libraries PDF available

Author(s): Gulbasar | Prof. Saoud Sarwar
Volume: 2
Issue: 8
Year: 2013
Depiction of Routing Protocols in Mobile Adhoc Networks: Behaviour Analysis PDF available

Author(s): Veeralakshmi M | Dr. R Pugazendi
Volume: 2
Issue: 8
Year: 2013
ADOPTION OF AUTOMATED TELLER MACHINE IN NIGERIAN BANKS: USE ENHANCEMENTS AND LIMITATIONS PDF available

Author(s): DAWODU BAMIDELE FRIDAY | OSONDU MARY C
Volume: 2
Issue: 8
Year: 2013
Intelligent Heart Disease Prediction Model Using Classification Algorithms PDF available

Author(s): Pramod Kumar Yadav | K.L.Jaiswal | Shamsher Bahadur Patel | D. P.Shukla
Volume: 2
Issue: 8
Year: 2013
AIM OF PROTECTED ROUTING MESSAGE AUTHENTICATION PROTOCOL FOR VEHICULAR AD HOC NETWORKS PDF available

Author(s): R. UmaSaraswathi | N. Kavitha | G. KesavaRaj
Volume: 2
Issue: 8
Year: 2013
SMART ASSOCIATION CONTROL IN WIRELESS FIDELITY USING FBA PDF available

Author(s): Devipriya A | Prashanth M | Parameshachari B D | Muruganantham C | H S Divakara Murthy | Arun Jose
Volume: 2
Issue: 8
Year: 2013
Analysis of Attribute Association Rule from Large Medical Datasets towards Heart Disease Prediction PDF available

Author(s): D. P. Shukla | Shamsher Bahadur Patel | Ashish Kumar Sen | Pramod Kumar Yadav
Volume: 2
Issue: 8
Year: 2013
Low Complexity Multiple Active Transmit Antenna For High Transmit Rate PDF available

Author(s): Aparna S | Nithin S S | Parameshachari B D | Muruganatham C | Prof. H S DivakaraMurthy
Volume: 2
Issue: 8
Year: 2013
ANOMALY INTRUSION DETECTION SYSTEM USING NEURAL NETWORK PDF available

Author(s): Ms. Vrushali D Mane | Ms. Abhilasha Sayar | Prof. Sunil Pawar
Volume: 2
Issue: 8
Year: 2013
Steganographic Method for Data Hiding In Audio Signals with LSB & DCT PDF available

Author(s): Linu Babu | Jais John S | Parameshachari B D | Muruganantham C | H S DivakaraMurthy
Volume: 2
Issue: 8
Year: 2013
Policy Enforcing and Revoking Mechanism on Trusted Ad Hoc Networks PDF available

Author(s): Sujatha J | Manoj Challa
Volume: 2
Issue: 8
Year: 2013
Overview of Security Threats in WSN PDF available

Author(s): Ms. Poonam Barua | Mr. Sanjeev Indora
Volume: 2
Issue: 7
Year: 2013
A Survey on Security Issues in Wireless Sensor Network PDF available

Author(s): H.N. Pratihari
Volume: 2
Issue: 7
Year: 2013
A Survey of Image Segmentation Algorithms Based On Fuzzy Clustering PDF available

Author(s): R. Ravindraiah | K. Tejaswini
Volume: 2
Issue: 7
Year: 2013
TPM as a Middleware for Enterprise Data Security PDF available

Author(s): Abhishek Patel | Prabhat Dansena
Volume: 2
Issue: 7
Year: 2013
Technical Advances in Fall Detection System – A Review PDF available

Author(s): Raveendra Hegde | Dr. B G Sudarshan | Dr. S C Prasanna Kumar | Dr. Hariprasad S A | Dr. B S Satyanarayana
Volume: 2
Issue: 7
Year: 2013
Ensuring QOS in WiMAX Networks PDF available

Author(s): S. Gandhimathi | A. Srivishnuparaneetharan | M. Madhushudhanan
Volume: 2
Issue: 7
Year: 2013
An Efficient Resource Management and Scheduling Technique for Fault Tolerance in Grid Computing PDF available

Author(s): Deeptanoy Ghosh | Ramandeep Singh | Jimmy Laishram
Volume: 2
Issue: 7
Year: 2013

Tango Rapperswil
Tango Rapperswil

    
RPA Switzerland

Robotic Process Automation Switzerland