International Journal of Computer Application
ISSN: 2250-1797
Issue 5, Volume 3 (March-April 2015)

HOME EDITORIAL BOARD CALL FOR PAPER AUTHOR GUIDELINE ARCHIVE

 

 new now you can share your paper and improve your citation  by one click

 

Ѱ* ,Ѱ ̅,Ѱ ̅* - maps in Topological Space

Pauline Mary Helen M, AND Jenifer A

 

[FULL TEXT]
 
-----------------------------------------------------


Optimizing Transmission Cost by Using PTop-K Queries in Wireless Sensor Network

Dr. K. Madhavi AND S.kavitha

 

[FULL TEXT]
 
-----------------------------------------------------



Assessing, Evaluating and Managing Cloud Computing Security

S.SENTHIL KUMAR AND R.KANAKARAJ

 

[FULL TEXT]
 
-----------------------------------------------------



Literature Survey on Energy Efficient Clustering and Routing in Wireless Sensor Networks

Vinod Kumar, Monika Bansal AND Dr. Mritunjay Kumar Rai

 

[FULL TEXT]
 
-----------------------------------------------------

 

Protected Authentication by Login Credential and OTP for Cloud Based Application

Mr. Ankush Kudale and Dr. Binod Kumar

 

[FULL TEXT]
 
-----------------------------------------------------


Enhance accuracy for emotion mining from text on social networks

Rashmi Kumari and Mayura Sasane

 

[FULL TEXT]
 
-----------------------------------------------------


Use Case Point and e-Use Case Point method of software effort estimation: A critical performance comparison

Mudasir M Kirmani and Abdul Wahid

 

[FULL TEXT]
 
-----------------------------------------------------


Strong Non split and Strong Split Geodetic Number of a Lict Graph

Venkanagouda M Goudar, Tejaswini K.M and Venkatesha

 

[FULL TEXT]
 
-----------------------------------------------------


CLOUD COMPUTING AND BENEFITS OF PRIVATE CLOUD IN E-LEARNING SOLUTIONS

SHRINIVAS ADHYAPAK

 

[FULL TEXT]
 
-----------------------------------------------------


Minimization of energy-holes By DBPC (Dynamic Bonding and Partitioning Coverage) in a WSN

ManasRanjan Tripathy, Chinmaya Kumar Nayak AND Manoranjan Pradhan

 

[FULL TEXT]
 
-----------------------------------------------------


Cyber Espionage a threat to Information Security

Walter.T.Mambodza

 

[FULL TEXT]
 
-----------------------------------------------------


A Review of Content Based Image Retrieval System

Binal Thakor AND Mayank Kapadia

 

[FULL TEXT]
 
-----------------------------------------------------

 

A review of fuzzy related clustering protocol

Shreya Patel, Jayesh Munjani AND Jemish Maisuria

 

[FULL TEXT]
 
-----------------------------------------------------


Implementation of IEEE 32 Bit Single Precision Floating Point Addition and Subtraction

Khushbu Naik AND Prof.Tarun Lad

 

[FULL TEXT]
 
-----------------------------------------------------

 

Mixed Noise Removal Method Based on Sparse Representation and Dictionary learning: WESNR

Ekta Desai and Asst. Prof. Manish Nakrani

 

[FULL TEXT]
 
-----------------------------------------------------

 

Hamiltonian Laceability in the Modified Brick Product of Odd Cycles

Manjunath. G, Murali. R, Veeresha A Sajjanar and Thimmaraju S.N


 

[FULL TEXT]
 
-----------------------------------------------------

 

Impact of known Input Output attack in CAMDP technique for privacy Preserving Data Mining

Bhupendra Kumar Pandya, Umesh kumar Singh and Keerti Dixit

 

[FULL TEXT]
 
-----------------------------------------------------


Neuro brain MRI anatomical labeling structures segmentation using adaptive interactive algorithm

B.Balakumar and P.Raviraj

 

[FULL TEXT]
 
-----------------------------------------------------


RESERVING ROOM BEFORE ENCRYPTION IN REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES

Mr.Pankaj Uttamrao Washimkar and S.T.Khandare

 

[FULL TEXT]
 
-----------------------------------------------------


Image Morphing Algorithm: A Survey

Aksh Patel and Prof. PranavLapsiwala

 

[FULL TEXT]
 
-----------------------------------------------------


Android Security Model: Apps are safe from Hacking, Attacks, and Security Breaches.

Ahmad Talha Siddiqui and Prof (Dr) Munesh Chandra Trivedi

 

[FULL TEXT]
 
-----------------------------------------------------


A Review on Moving Object Detection and Tracking

Divyani Prajapati and Hiren J Galiyawala

 

 

[FULL TEXT]
 
-----------------------------------------------------

 

DYNAMIC SOURCE ROUTING FOR TRAFFIC PATTERN DISCOVERY SYSTEM in MANETs

Manimekalai.R AND Mr.M.Govindarajan

 

 

[FULL TEXT]
 
-----------------------------------------------------

 

Collaborative SQL Query Recommendation for Interactive Database Exploration: a Survey

Gulnaj.I.Patel and Rajesh V.Argiddi

 

[FULL TEXT]
 
-----------------------------------------------------


Throughput Behaviour in Multi-Channel Wireless Multihop Networks

Gomathi.T and Mr.G.Loganathan

 

[FULL TEXT]
 
-----------------------------------------------------


more to add..............