International Journal of Computer Application
ISSN: 2250-1797
Issue 6, Volume 5 (September-  October  2016)

HOME EDITORIAL BOARD CALL FOR PAPER AUTHOR GUIDELINE ARCHIVE

 

 new now you can share your paper and improve your citation  by one click

 

 

 

OSTBC MODIFIED ENCODER DESIGN FOR NOISE FREE MIMO COMMUNICATION

Urvashi Lokhande, Mukesh Tiwari

 

 

[FULL TEXT] doi: 10.17632/t5cxphc3j8.1
 
-----------------------------------------------------

 

COMPREHENSIVE STUDY AND ANALYSIS OF MALICIOUS WEBSITE DETECTION TECHNIQUES

K.Rajitha and Dr.D.VijayaLakshmi

 

[FULL TEXT] doi: 10.17632/n49sxwrrn4.1
 
-----------------------------------------------------


Collocation Method for Seventh Order Boundary Value Problems by Using Quartic B-splines

S.M.Reddy

 

[FULL TEXT] doi: 10.17632/k7pvtw933n.1
 
-----------------------------------------------------

 

AN ENHANCED TBAHIBE-LBKQS TECHNIQUES FOR PRIVACY PRESERVATION IN CLOUD

VALARMATHI G and JINIL JACOB

 

[FULL TEXT] doi: 10.17632/czkdwpv35s.1
 
-----------------------------------------------------



AN EFFECTIVE ENHANCEMENT IN OPTIMAL ARCHITECTURE CONSTRUCTION OF ENSEMBLING CLASSIFIERS FOR FINANCIAL FRAUD DETECTION

C. Gayathri and R. Gunasundari

 

[FULL TEXT] doi: 10.17632/s8xwkbh676.1
 
-----------------------------------------------------

 

An Enhance Firefly Algorithm for Flexible Job Shop Scheduling

Amit kumarSrivastava and Hari Mohan Singh

 

[FULL TEXT] doi: 10.17632/wg46kj4jmw.1
 
-----------------------------------------------------


A SMART CRAWLER FOR WEB PAGES RETRIEVAL USING PAGE RANKING

KARRI. LAKSHMI KANTH and Dr.A.MARY SOWJANYA

 

[FULL TEXT] doi: 10.17632/74wryvdd5v.1
 
-----------------------------------------------------

 

Attack detection and Attack prevention methods by comparing different DDOS IN wireless ADHOC models

Veguru Gayatri

 

[FULL TEXT] doi: http://dx.doi.org/10.17632/rsjcvrm6my.1
 
-----------------------------------------------------


A Study on Congestion Control in Mobile Ad-hoc networks

Veguru Gayatri

 

[FULL TEXT] doi: http://dx.doi.org/10.17632/pndxnhms7p.1
 
-----------------------------------------------------


Towards an Effective Distance Learning Model: Implementation Framework for Arab Universities

Ahmed Al-Hunaiyyan, Rana Al-Hajri, Asaad Alzayed and Bander Alraqqas

 

[FULL TEXT] doi: http://dx.doi.org/10.17632/wssr544nxz.1
 
-----------------------------------------------------


A study of various Machine Learning Techniques for Medical Data Mining

Aakshi Mahajan and Er.Ajay Sharma

 

[FULL TEXT] doi: http://dx.doi.org/10.17632/483ksgsd9f.1
 
-----------------------------------------------------

 

Enhancing Security Using Image Processing

Mr.Pravin Chaudhari

 

 

[FULL TEXT] doi: http://dx.doi.org/10.17632/4cfdvyyfgt.1
 
-----------------------------------------------------



VIRTUAL HERITAGE: COMBINING CULTURAL HERITAGE AND VITUAL REALITY

SANDHYA KATIYAR, SHUBHAM VERMA and SHIVAM VERMA

 

[FULL TEXT] doi: http://dx.doi.org/10.17632/3ccmn9vs34.1
 
-----------------------------------------------------


 A NOVEL APPROACH TO PROVIDE SECURITY FOR THE DIGITAL DATA BY USING REVERSIBLE TEXTURE SYNTHESIS

PENUMATCHA PAVANI and YUGANDHARA RAO AMBATI

[FULL TEXT] 
doi: http://dx.doi.org/10.17632/sbzzrksfyd.1


-----------------------------------------------------



Design and Evaluation of the Performance of a Cloud Data Storage for Multiple Data Owners Based on Ranked Search

DASARI DIVYA and Y. SATISH KUMAR

[FULL TEXT]
doi: http://dx.doi.org/10.17632/xgcf943c38.1


-----------------------------------------------------


Performance Evaluation of a Novel Key Aggregate Searchable Encryption over Encrypted Cloud Data Storage and Group Sharing

DANNINA ANIL KUMAR and BONELA KISHORE

[FULL TEXT]
doi: http://dx.doi.org/10.17632/pmvxdtftyr.1


-----------------------------------------------------


A Novel Approach to Detect and Provide Countermeasure for the various Spoofing Attacks based on PIT using Path Back Scatter Messages

M. LALITHA and I.S.SRINIVASA RAO

[FULL TEXT]
doi: http://dx.doi.org/10.17632/c9g4bgtdd2.1


-----------------------------------------------------

Problems of system requirements in the new systems and its solutions

Passent M. ELkafrawy*, Mohamed. S. Khalaf


[FULL TEXT] doi: http://dx.doi.org/10.17632/kvgy7dfj7w.1


-----------------------------------------------------


Enhancing Agile Software Engineering Based on Cloud Computing

A. Meligy and H. Eldolel

[FULL TEXT] doi: http://dx.doi.org/10.17632/4jzdf34yfc.1

 


-----------------------------------------------------

 


more to add..............