International Journal of Computer Science & Engineering Technology

ISSN : 2229-3345

Open Access
Open Access
May 2014 - IJCSET(ISSN: 2229-3345)
 

VOLUME 5 ISSUE 5

1. Trust Worthy Framework for Wireless Sensor Networks
N.Karthik, J.Karthik
Abstract | PDFIconPDF
478-480
2. A COMPARATIVE ANALYSIS OF OBJECT POINT METHOD WITH USE CASE METHOD IN SOFTWARE EFFORT ESTIMATION
Mr.M.Senthil Kumar, Dr.B.Chidambara Rajan
Abstract | PDFIconPDF
481-483
3. ATTACKS ON SECURITY PROTOCOLS USING AVISPA
Vaishakhi S, Prof.Radhika M
Abstract | PDFIconPDF
484-487
4. Multiple Object Removal Using Exemplar-Based Image Inpainting
Prof. Kawade M.D., Prof. Ufade A.S.
Abstract | PDFIconPDF
488-493
5. COMPREHENSIVE STUDY AND COMPARISON OF INFORMATION DISPERSAL TECHNIQUES FOR CLOUD COMPUTING
Ms. Priyanka, Mr. Kapil Kumar Kaswan
Abstract | PDFIconPDF
494-497
6. A REVIEW: Advancement in Single node data transfer energy protocol in WSN
Lalit Kumar, Madhu sudan
Abstract | PDFIconPDF
498-501
7. Rule Based Exception Handling and Priority Modeling For Diabetes Management Using Ontology and SWRL
THANGARAJ MUTHURAMAN, GNANAMBAL SANKARAN
Abstract | PDFIconPDF
502-506
8. Survey on Service Migration to Cloud Architecture
Girish L S, Dr. H S Guruprasad
Abstract | PDFIconPDF
507-510
9. An Integrated Approach for Mining Closed Sequential Patterns
V. Purushothama Raju, Dr. G.P. Saradhi Varma
Abstract | PDFIconPDF
511-515
10. Analyze the impact of Transmission rate on the Performance of AODV and DSR Protocols in MANETs under Responsive and Non-responsive Traffic.
A.Venkataramana, S.Pallam Shetty
Abstract | PDFIconPDF
516-523
11. Dynamic Modeling Technique for Weather Prediction
Jyotismita Goswami, Alok Choudhury
Abstract | PDFIconPDF
524-531
12. AN EFFECEINT MULTI PARAMETERIC CPU SCHEDULING ALGORITHM FOR SINGLE PROCESSOR SYSTEMS
Dr. R. RAMA KISHORE, ARPNA SAXENA
Abstract | PDFIconPDF
532-540
13. A Survey Report On Software Aging and Rejuvenation studies in Virtualized Environment
SUBHASHREE BARADA, SANTOSH KUMAR SWAIN
Abstract | PDFIconPDF
541-546
14. Modified 4-Bit Comparator Using Sleep Technique
Linet. K
Abstract | PDFIconPDF
547-552
15. Malicious Code Detection through Data Mining Techniques
Ms. Milan Jain, Ms. Punam Bajaj
Abstract | PDFIconPDF
553-557
16. A Symmetric FHE Scheme Based on Linear Algebra
Iti Sharma
Abstract | PDFIconPDF
558-562
17. Highly Secured WSN Life Span Fortification with Data Compression, NNF Technique and ECC Method
M. Nagarajan, T. Dhanapalan, S. Jayanthi
Abstract | PDFIconPDF
563-569
18. Sign Language Recognition System to aid Deaf-dumb People Using PCA
Shreyashi Narayan Sawant
Abstract | PDFIconPDF
570-574
19. A Secure and Privacy Preserving Technique in Distributed Information Sharing using AES Encryption and Genetic Algorithm
Dharani.M, R.Vidhya
Abstract | PDFIconPDF
575-578
20. Different sanitization techniques to prevent inference attacks on social network data
Ms. Patel Madhuri
Abstract | PDFIconPDF
579-582
21. GUI Based Home Automation System Operated By Voice Command
Ms. Rutuja Vijay Patil
Abstract | PDFIconPDF
583-590
22. Medical Disease Diagnosis Using Structuring Text
Gomathi.P, Mrs.N.S.Nithya
Abstract | PDFIconPDF
591-594
23. Software maintenance using effective code clones detection
M.Alagurathinam, Ms.Kavitha Esther Rajakumari
Abstract | PDFIconPDF
595-599
24. The Design and Implementation of Land Management Information System (LMIS), Bauchi State Ministry of Lands and Survey
ESIEFARIENRHE MICHAEL BUKOHWO, EYE OLANREWAJU EMMANUEL
Abstract | PDFIconPDF
600-605
25. Parallel Regulation Technique Based Charge controller to operate DC Motor
Priyanka Ramesh Pandit
Abstract | PDFIconPDF
606-611
25. PAn improved load balancing adaptive QoS buffer scheduler (I-LABS) for streaming services over MANET
A. Ayyasamy, Dr. K. Venkatachalapathy
Abstract | PDFIconPDF
612-620
Copyright © 2010-2024 IJCSET KEJA Publications