{"id":508,"date":"2023-01-03T08:01:34","date_gmt":"2023-01-03T08:01:34","guid":{"rendered":"https:\/\/ijcsmc.com\/journal\/?page_id=508"},"modified":"2024-10-31T11:09:25","modified_gmt":"2024-10-31T11:09:25","slug":"volume-2-issue-4","status":"publish","type":"page","link":"https:\/\/ijcsmc.com\/index.php\/volume-2-issue-4\/","title":{"rendered":"Volume 2 Issue 4"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Using Some Data Mining Techniques to Predict the Survival Year of Lung Cancer Patient<br>Authors: Ada, Rajneet Kaur<br>Country: India<br><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201322.pdf\" target=\"_blank\">Abstract<\/a><\/strong><br><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201322.pdf\" target=\"_blank\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Inflection Rules for English to Marathi Translation<br>Authors: Charugatra Tidke, Shital Binayakya, Shivani Patil, Rekha Sugandhi<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201301.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong><br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201301.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: BIOCOMPUTATIONAL ANALYSIS OF GENE EXPRESSION FOR RHEUMATIC ARTHRITIS DISEASE Authors: Dr. K.B.RAMESH, VIDYA M, Dr. B.P.Mallikarjunaswamy, Dr. E.T.Puttaiah<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201305.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong><br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201305.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201305.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Study of Speech Emotion Recognition Methods<br>Authors: Aastha Joshi, Rajneet Kaur<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201323.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201323.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Review<br>Title: COMPREHENSIVE FRAMEWORK FOR PATTERN ANALYSIS THROUGH WEB LOGS USING WEB MINING: A REVIEW <br>Authors: Bhaiyalal Birla, Sachin Patel, Hemlata Sunhare <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201306.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201306.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Design and Analysis of Register Element for Low Power Clocking System <br>Authors: Nagarajan.P, Dr.Saravanan.R <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201307.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201307.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Implementation of High-Performance Image Scaling Processor using VLSI <br>Authors: R.S. KARTHIC<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201308.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201308.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201308.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: FPGA Design of Parallel Linear-Phase FIR Digital Filter Using Distributed Arithmetic Algorithm<br>Authors: P. Karthikeyan, Dr. Saravanan.R <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201309.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201309.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Perceptual Video Quality Measurement Based on Generalized Priority Model <br>Authors: S. Bharath, S. Jaganath, J. Prakash <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201310.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201310.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Enhanced Network Based Query Processing in Road networks <br>Authors: Rathinaeswari.S.P, R. Parvathi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201311.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201311.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Low-complexity Histogram Modification Algorithm for Contrast Enhancement <br>Authors: V. Magudeeswaran, M. Krishnamurthy<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201315.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201315.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Review<br>Title: A Review on Various Web mining Techniques with Purposed Algorithm of K-means Web Ranking<br>Authors: Mohinder Singh, Navjot Kaur <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201340.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201340.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Verifying Integrity and Availability in Multi-Cloud Using PDP <br>Authors: Chandrasekaran Anand, Prabu. P, Roopan Prasath. V, Sasikumar. P, Silambarasan. P, Mr. P. Sivakumar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201317.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201317.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Supervised Neural Network using Maximum-Margin (MM) Principle <br>Authors: Prakash J. Kulkarni, Somnath Kadam <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201319.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201319.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Elliptical Iris Detection using Morphological Operations <br>Authors: Prakash J. Kulkarni, Vidya H. Kopanar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201320.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201320.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: A Survey of Transport Layer Protocols on Reliability in Wireless Sensor Networks <br>Authors: Sambhaji Sarode, Kasturi Pansambal, Rupali Kshirsagar, Anubhooti Nayakawadi, Supriya Vedpathak <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201326.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201326.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: TRANSINFORMER &#8211; An Integrated System for Health Monitoring of Power Transformers <br>Authors: K.Gowri, T.Thangam, Rajasaranya <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201327.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201327.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: A Survey on k-Means Clustering Algorithm Using Different Ranking Methods in Data Mining<br>Authors: Amar Singh, Navjot Kaur <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201348.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201348.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: HDL IMPLEMENTATION OF ALGEBRAIC SOFT DECISION ALGORITHM FOR RS CODES <br>Authors: M. Revathy, R. Saravanan <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201331.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201331.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Research in Retrieving Concrete Image from the Blurred Image <br>Authors: Ashutosh Singhal, Charu Jain <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201335.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201335.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"http:\/\/www.ijcsmc.com\/docs\/papers\/january2013\/V2I1201306.pdf\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Detecting and Resolving Firewall Policy Anomalies Using Rule-Based Segmentation <br>Authors: Anbarasan.A, Balasubramani.G, Madhan.C, Naveenkumar.P, Mrs. N.S.Nithya <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201337.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201337.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Comparative Analysis and Implementation of Image Enhancement Techniques Using MATLAB<br>Authors: Er. Nancy, Er. Sumandeep Kaur <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201313.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201313.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Hardware-Optimized Lattice Reduction Algorithm for WiMax\/LTE MIMO Detection using VLSI<br>Authors: R.Ragumadhavan <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201314.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201314.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: A Survey on Various Clustering Techniques with K-means Clustering Algorithm in Detail <br>Authors: Supreet Kaur, Usvir Kaur<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201361.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201361.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201361.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: A Survey on Web Usage Mining with Fuzzy c-Means Clustering Algorithm <br>Authors: Chhaman Lakheyan, Usvir kaur <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201362.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201362.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Review<br>Title: Study on Various Web Mining Functionalities using Web Log Files <br>Authors: Supinder Singh, Sukhpreet Kaur <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201377.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201377.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Comparative Analysis and Implementation of Image Encryption Algorithms <br>Authors: Rajinder Kaur, Er. Kanwalpreet Singh <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201321.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201321.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Enhancing Interaction between Smartphones and Web Services on Cloud for Improved Bandwidth and Latency <br>Authors: Mandeep Singh, Kanwalvir Singh Dhindsa <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201324.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201324.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: DYNAMIC DATA GATHERING PROTOCOL IN WIRELESS SENSOR NETWORKS <br>Authors: Ms. S.SOBANA, M.KASTHURI, Mrs. S.KRISHNA PRABHA <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201332.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201332.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Sharing File System for Campus Wide-Workgroups <br>Authors: Hangad Abdulkadar J, Avantkar Amol D, Chougule Amit B <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201333.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201333.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: AN ADAPTIVE PARTITIONAL CLUSTERING METHOD FOR CATEGORICAL ATTRIBUTE USING K-MEDOID <br>Authors: A. Selvakumar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201336.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201336.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201336.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: SPOT PROTOCOL DETECTING OUTGOING SPAM MESSAGES <br>Authors: Ansari.R, Dr. V.N Raja Varman<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201338.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201338.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: SECURING CLOUD COMPUTING ENVIRONMENT USING TIME DELAY BASED ON SESSION <br>Authors: Koteswar rao.M, Mr. G. Sree Ram <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201339.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201339.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points<br>Authors: Karthhik.K, Keerthana.R, Porkodi.A, Udhayakumar.S, Kesavan.S, Mr.Balamurugan.P <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201342.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201342.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201342.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Clustering for Collaborative Filtering Application in Web Recommendations <br>Authors: M. Kanimozhi, K. Logeshwari, K. Saranya, D. Sowbha, Mr. R. Velumani <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201343.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201343.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: RELAY SELECTION FOR SECURE CO-OPERATIVE NETWORKS WITH JAMMING <br>Authors: Lakshmipraba.K, Nithya Devi.S, Praveen.P, Suresh Kumar.M, Mrs.V.Vennila <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201352.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201352.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Analysis of Buffer Sizing in Core Routers and Investigating Its Impact on Flow of Files <br>Authors: Priyadarsini S, Sharmila S, SivaSankari B, Vijaya Kumar P, Vipin P, Mr.A.Mummoorthy <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201353.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201353.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Character Identification Using Graph Matching Algorithm <br>Authors: S. Bharathi, P. Manirathnam, K. Ramya, R. Ranjith Kumar, Mrs. M. Tamilarasi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201364.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201364.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201364.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Encryption of Data to Prevent Jamming Attacks <br>Authors: N. Abirami, R. Jeeva, L. Revathi, U. Safiya, Mrs. E. Baby Anitha <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201365.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201365.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: PACKET HANDLING SCHEDULING IN MULTIPLE ROUTING CONFIGURATIONS FOR FAST IP NETWORK RECOVERY <br>Authors: H.V. Laxman Vijay, K. Sudheer Kumar, R.V. Krishnaiah<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201354.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201354.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Historical Document Preservation using Image Processing Technique <br>Authors: Prof. D.N. Satange, Ms. Swati S. Bobde, Ms. Snehal D. Chikate <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201356.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201356.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201356.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: IBM I SERIES OVER IBM Z SERIES <br>Authors: MUPPALLA PRUDHVI, KOLA SIVA THARUN, SATTI SWAMI REDDY <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201363.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201363.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: An Implementation of a Novel Secret Image Sharing Algorithm <br>Authors: Shanu Sharma <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201366.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201366.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Novel Prediction on Breast Cancer from the Basis of Association rules and Neural Network<br>Authors: S. Palaniappan, T. Pushparaj <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201367.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201367.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: ROBUST WATERMARKING SCHEME AGAINST GEOMETERICAL ATTACKS <br>Authors: Kiratpreet Singh, Rajneet Kaur <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201368.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201368.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201368.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Automatic Licenses Plate Recognition <br>Authors: Ronak P Patel, Narendra M Patel, Keyur Brahmbhatt<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201370.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201370.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Hand Gesture Recognition Based Real-time Command System <br>Authors: P. Jenifer Martina, P. Nagarajan, P. Karthikeyan <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201355.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201355.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: IMPLEMENTATION OF NORMLIZED CUT ALGORITHAM FOR IMAGE SEGMENTATION <br>Authors: Hardik K Patel, Darshak G Thakore, Mahasweta Joshi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201371.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201371.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201371.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Exigent Vulnerability in Mobile Ad-hoc Network and Solutions in Context of Energy Optimization with Clustering Technique <br>Authors: Keshav Kumar Tiwari, Prof. Sanjay Agrawal <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201372.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201372.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: A Survey on Techniques and Challenges in Image Super Resolution Reconstruction <br>Authors: Pandya Hardeep, Prof. Prashant B. Swadas, Prof. Mahasweta Joshi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201375.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201375.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Moving Object Tracking Using Kalman Filter <br>Authors: Hitesh A Patel, Darshak G Thakore <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201376.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201376.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201376.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: The Amalgamation of Digital Watermarking &amp; Cloud Watermarking for Security Enhancement in Cloud Computing <br>Authors: Navneet Singh, Prof. Shailendra Singh <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201378.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201378.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: ADVANTAGES OF WCF OVER WEB SERVICES <br>Authors: Kola Siva Tharun, Muppalla Prudhvi, Satti Swami Reddy <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201380.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201380.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Design of Low Power Dual Trigger Sequential Circuit <br>Authors: R. Balakumaresan, A. Selvapandian, S. Krishnakumar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201384.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201384.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: HIGH IMPERCEPTIBLE ENCODING FOR COMPUTER NETWORKS SECURITY <br>Authors: C. KAVITHA, ANTONY JUDICE A, S. PRATHIBA <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201389.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201389.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: IMPROVED IMAGE WATERMARKING WITH CURVELET WAVELET <br>Authors: Mr. N. Suresh Kumar, Mr. B. Mathan Kumar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201390.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201390.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: AUTHENTICATING MOBILE DEVICE USERS THROUGH IMAGE SELECTION <br>Authors: G. Vijay Baskar, N. Sangeetha <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201359.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201359.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: ROLE OF DATA MINING IN EDUCATION SECTOR <br>Authors: Dr. Mohd Maqsood Ali <br>Country: Saudi Arabia <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201386.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201386.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201386.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Enhanced Anomaly Detection IDS-Based Scheme for Dynamic MANET on-Demand (DYMO) Routing Protocol for MANETS <br>Authors: Anand Nayyar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201373.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201373.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: An Analysis for Black Hole Attack in AODV Protocol and Its Solution <br>Authors: Rahul Sharma, Naveen Dahiya, Divya Upadhyay <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201358.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201358.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: An Enhanced HASBE for Cloud Computing Environment <br>Authors: D. Hephzi Rachel, S. Prathiba <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013103.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013103.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Modified Security Frame Work for PIR Cloud Computing Environment <br>Authors: J. Sinduja, S. Prathiba <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013104.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013104.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Novel Network Interjection Avoidance for MANET <br>Authors: M. Sudharani, K.P. Kaliyamurthie<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013105.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013105.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Remote System Controller: An Implementation of a Secure Channel <br>Authors: Shanu Sharma <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201387.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201387.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Adapted Encryption Algorithm with Multiple Skew Tent Map <br>Authors: Sarika Tyagi, Deepak chaudhary <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201388.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201388.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201388.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: IP Trace Back Scheme for Packet Marking and Packet Logging Using RIHT <br>Authors: C. VAIYAPURI, R. MOHANDAS <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201399.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201399.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Secure Decentralized Cloud Computing Environment over Peer to Peer <br>Authors: Tanupriya Choudhury, Vasudha Vashisht, Himanshu Srivastava <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013102.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013102.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: TECHNOLOGY BOON: EEG BASED BRAIN COMPUTER INTERFACE &#8211; A SURVEY <br>Authors: Vasudha Vashisht, Dr. T. V. Prasad, Dr. S.V.A.V. Prasad <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013107.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013107.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013107.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: DESIGN AND ANALYSIS OF POWER EFFICIENT CLOCKED PAIR SHARED FLIPFLOP <br>Authors: B. Ragavi, K. Rajesh, A. Selvapandian <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201397.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201397.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: CANCER RESEARCH THROUGH THE HELP OF SOFT COMPUTING TECHNIQUES: A SURVEY<br>Authors: Mr. Tanupriya Choudhury, Dr. Vivek Kumar, Dr. Darshika Nigam <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013109.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013109.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: IMAGE COMPRESSION WITH SCALABLE ROI USING ADAPTIVE HUFFMAN CODING <br>Authors: P. Sutha <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201398.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201398.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: Improve Query Performance Using Effective Materialized View Selection and Maintenance: A Survey <br>Authors: Ashish P. Mohod, Manoj S. Chaudhari <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201379.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201379.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Coverage Analysis and Chinese Postman Algorithm for Efficient Model-Based Test Generation<br>Authors: Parampreet Kaur, Gaurav Gupta <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013112.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013112.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Receiver Based Geographic Multicast Routing in Ad Hoc Networks <br>Authors: Koteswararao Nuthalapati, Poornima Samamthula, Gunasekhar Bathina <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013101.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013101.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Customer Security Issues in Cloud Computing <br>Authors: Nimmati Satheesh <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013110.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013110.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013110.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: SECURED SEARCHING OF VALUABLE DATA IN A METRIC SPACE BASED ON SIMILARITY MEASURE<br>Authors: R. Rathika, Dr. K. Raja<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201393.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201393.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: IMPLEMENTATION OF PARALLEL APRIORI ALGORITHM ON HADOOP CLUSTER <br>Authors: A. Ezhilvathani, Dr. K. Raja <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201396.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201396.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Deep Malicious Website Detection <br>Authors: Parvatam Sriram Rohit, R. Krishnaveni <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013116.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013116.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Security Based Phishing Website Detection <br>Authors: Yalavarthi Ravi Theja, R. Krishnaveni <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013117.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013117.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Feature Extraction and Classification of Emotions in Wave Files Using Crossbreed Algorithm<br>Authors: Aastha Joshi, Rajneet Kaur <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I4201357.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I4201357.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Robust DR Classification from Blood Vessel Features <br>Authors: Alka Vijayan, Antony Judice.A <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013119.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013119.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Methodologies for Trend Detection Based on Temporal Text Mining <br>Authors: M. BANU PRIYA, Dr. A. KUMARAVEL <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013120.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013120.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Modified Approach of User Profiling from Search Engine Logs <br>Authors: C. DEEPA, S. PRATHIBA <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013121.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013121.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Optimized Rapid Data Collection in Tree Based WSN <br>Authors: DEVASAHAYAM, K.P. KALIYAMURTHIE <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013122.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013122.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Novel Approach of Detecting the Camouflaging Worm <br>Authors: HEMALATHA R, S. PRATHIBA <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013123.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013123.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Information Extraction by Mining the Semantic Web <br>Authors: R. PREETHI, C. ANURADHA <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013124.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013124.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Review<br>Title: A Review on Data Leakage Detection <br>Authors: SHAJ.V, K.P. KALIYAMURTHIE <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013125.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013125.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Privacy-Preserving Updates to Anonymous Databases <br>Authors: SIVASUBRAMANIAN.R, K.P. KALIYAMURTHIE <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013126.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013126.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013126.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: An Evaluation of Location Privacy in Wireless Sensor Networks <br>Authors: R. SUGANYA SUBATHRA, A.R. ARUNACHALAM <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013127.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013127.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Detection of Mobile Replica Nodes in Wireless Sensor Networks <br>Authors: KARTHIK.S, K.P. KALIYAMURTHIE <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013128.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013128.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013128.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Implementation of Cryptographic Algorithm on FPGA <br>Authors: Prof. S. Venkateswarlu, Deepa G.M, G. Sriteja <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013108.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013108.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013108.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: New Data Mining Algorithm for Intrusion Detection in Networks <br>Authors: M. Penchala Praveen, M. Sambath, S. Ravi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013118.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013118.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Novel Security Technique in Message Passing Interface Systems <br>Authors: UDHAYASHANKAR.S, Dr. K.P. KALIYAMURTHIE, MATHIVILASINI.S <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013129.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013129.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Novel Resource Distributed Discovery and Management in Grid Computing <br>Authors: M. Brinda Kumar, Dr. K.P. Kaliyamurthie <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013130.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013130.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A New Segmentation Technique by KDE Model and Two-Phase Graph Cut Method <br>Authors: S. Bhagawath, T.D. Subha, A. Arul Mary <br>Country: India<br><strong>Abstract<\/strong> <br><strong>View PDF<\/strong> <br><strong>Paper Deleted<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Normalized graph-cut based Necrotic Image Segmentation of Brain Tumours <br>Authors: J.S. JUFIN, D. JEBA DERWIN <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013132.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013132.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Modified Approaches on Face Recognition By using Multisensory Image <br>Authors: S. Dhanarajan, G. Michael <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013133.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013133.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Cognitive Digital Home Framework using Admission Control and Resource Distribution <br>Authors: A. Sakira Parveen, T. Muruga Jothi, R. Raja Kumari<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/abstracts\/V2I42013106.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/April2013\/V2I42013106.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p style=\"font-size:26px\"><strong>Contact us or submit a paper through below form:<\/strong><\/p>\n\n\n\n<div class=\"forminator-guttenberg\"><div class=\"forminator-ui forminator-custom-form forminator-custom-form-1020 forminator-design--default  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-1020\" data-uid=\"69e49c6018391\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-1020\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-1020 forminator-design--default  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"1020\"\n\t\t\t\tenctype=\"multipart\/form-data\" data-color-option=\"default\" data-design=\"default\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"69e49c6018391\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div class=\"forminator-row\"><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_69e49c6018391\" id=\"forminator-field-name-1_69e49c6018391-label\" class=\"forminator-label\">First Name <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"E.g. John\" id=\"forminator-field-name-1_69e49c6018391\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_69e49c6018391\" id=\"forminator-field-email-1_69e49c6018391-label\" class=\"forminator-label\">Email Address <span class=\"forminator-required\">*<\/span><\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"E.g. john@doe.com\" id=\"forminator-field-email-1_69e49c6018391\" class=\"forminator-input forminator-email--field\" data-required=\"true\" aria-required=\"true\" autocomplete=\"email\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"phone-1\" class=\"forminator-field-phone forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-phone-1_69e49c6018391\" id=\"forminator-field-phone-1_69e49c6018391-label\" class=\"forminator-label\">Phone Number<\/label><input type=\"text\" name=\"phone-1\" value=\"\" placeholder=\"E.g. +1 3004005000\" id=\"forminator-field-phone-1_69e49c6018391\" class=\"forminator-input forminator-field--phone\" data-required=\"\" aria-required=\"false\" autocomplete=\"off\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_69e49c6018391\" id=\"forminator-field-textarea-1_69e49c6018391-label\" class=\"forminator-label\">Message <span class=\"forminator-required\">*<\/span><\/label><textarea name=\"textarea-1\" placeholder=\"Enter your message...\" id=\"forminator-field-textarea-1_69e49c6018391\" class=\"forminator-textarea\" rows=\"6\" style=\"min-height:140px;\" maxlength=\"180\" ><\/textarea><span id=\"forminator-field-textarea-1_69e49c6018391-description\" class=\"forminator-description\"><span data-limit=\"180\" data-type=\"characters\" data-editor=\"\">0 \/ 180<\/span><\/span><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"upload-1\" class=\"forminator-field-upload forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-upload-1_69e49c6018391\" id=\"forminator-field-upload-1_69e49c6018391-label\" class=\"forminator-label\">Upload file <span class=\"forminator-required\">*<\/span><\/label><div class=\"forminator-file-upload \" data-element=\"upload-1_69e49c6018391\"><input type=\"file\" name=\"upload-1\" id=\"forminator-field-upload-1_69e49c6018391\" class=\"forminator-input-file-required do-validate\" accept=\".jpg,.jpeg,.jpe,.gif,.png,.bmp,.tiff,.tif,.webp,.ico,.heic,.asf,.asx,.wmv,.wmx,.wm,.avi,.divx,.flv,.mov,.qt,.mpeg,.mpg,.mpe,.mp4,.m4v,.ogv,.webm,.mkv,.3gp,.3gpp,.3g2,.3gp2,.txt,.asc,.c,.cc,.h,.srt,.csv,.tsv,.ics,.rtx,.vtt,.mp3,.m4a,.m4b,.aac,.ra,.ram,.wav,.ogg,.oga,.flac,.mid,.midi,.wma,.wax,.mka,.rtf,.pdf,.class,.tar,.zip,.gz,.gzip,.7z,.psd,.xcf,.doc,.pot,.pps,.ppt,.wri,.xla,.xls,.xlt,.xlw,.mdb,.mpp,.docx,.docm,.dotx,.dotm,.xlsx,.xlsm,.xlsb,.xltx,.xltm,.xlam,.pptx,.pptm,.ppsx,.ppsm,.potx,.potm,.ppam,.sldx,.sldm,.onetoc,.onetoc2,.onetmp,.onepkg,.oxps,.xps,.odt,.odp,.ods,.odg,.odc,.odb,.odf,.wp,.wpd,.key,.numbers,.pages\" tabindex=\"-1\"><button id=\"forminator-field-upload-1_69e49c6018391_button\" class=\"forminator-button forminator-button-upload\" data-id=\"forminator-field-upload-1_69e49c6018391\">Choose File<\/button><span data-empty-text=\"No file chosen\">No file chosen<\/span><button class=\"forminator-button-delete\" style=\"display: none;\"><i class=\"forminator-icon-close\" aria-hidden=\"true\"><\/i><span class=\"forminator-screen-reader-only\">Delete uploaded file<\/span><\/button><\/div><\/div><\/div><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><div class=\"forminator-row forminator-row-last\"><div class=\"forminator-col\"><div class=\"forminator-field\"><button class=\"forminator-button forminator-button-submit\">Send Message<\/button><\/div><\/div><\/div><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"ae84059f3a\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/index.php\/wp-json\/wp\/v2\/pages\/508\" \/><input type=\"hidden\" name=\"form_id\" value=\"1020\"><input type=\"hidden\" name=\"page_id\" value=\"508\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/ijcsmc.com\/index.php\/volume-2-issue-4\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><\/form><\/div>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Getting any problem in Paper Uploading?<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Please dont worry, just Submit \/ Email your paper at ijcsmc@zainpublications.com<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Type: ResearchTitle: Using Some Data Mining Techniques to Predict the Survival Year of Lung Cancer PatientAuthors: Ada, Rajneet KaurCountry: IndiaAbstractView PDF Type: ResearchTitle: Inflection Rules for English to Marathi TranslationAuthors: Charugatra Tidke, Shital Binayakya, Shivani Patil, Rekha SugandhiCountry: IndiaAbstractView PDF Type: ResearchTitle: BIOCOMPUTATIONAL ANALYSIS OF GENE EXPRESSION FOR RHEUMATIC ARTHRITIS DISEASE Authors: Dr. K.B.RAMESH, VIDYA [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"slim_seo":{"title":"Volume 2 Issue 4 - International Journal of Computer Science and Mobile Computing - IJCSMC","description":"Type: Research Title: Using Some Data Mining Techniques to Predict the Survival Year of Lung Cancer Patient Authors: Ada, Rajneet Kaur Country: India Abstract V"},"footnotes":""},"class_list":["post-508","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages\/508","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/comments?post=508"}],"version-history":[{"count":5,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages\/508\/revisions"}],"predecessor-version":[{"id":1887,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages\/508\/revisions\/1887"}],"wp:attachment":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/media?parent=508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}