{"id":534,"date":"2023-01-03T08:57:41","date_gmt":"2023-01-03T08:57:41","guid":{"rendered":"https:\/\/ijcsmc.com\/journal\/?page_id=534"},"modified":"2024-10-31T11:31:53","modified_gmt":"2024-10-31T11:31:53","slug":"volume-2-issue-6","status":"publish","type":"page","link":"https:\/\/ijcsmc.com\/index.php\/volume-2-issue-6\/","title":{"rendered":"Volume 2 Issue 6"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Review<br>Title: A Review of Geometry Based Symmetric Key Encryption Using Ellipse <br>Authors: Prerna Gaur, Dr. Paramjit Singh <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201303.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201303.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201303.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Review<br>Title: A Review of Wormhole Detection Using HMM Approach <br>Authors: Himani Deswal, Rahul Yadav <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201306.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201306.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: A Survey on Brain?Machine Interface used in VLSI Field-Programmable Mixed-Signal Array<br>Authors: Umayal.S <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201309.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201309.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201309.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Novel Positioning Technique for 3D Underwater Sensor Networks <br>Authors: Aditya Tandon, Kamal Kant <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201308.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201308.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: RECOGNITION AND PREPROCESSING OF INTRUSION DATA IN WIRELESS SENSOR NETWORK<br>Authors: Manjot Singh, Himanshu Sharma <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201302.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201302.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Remote Temperature Monitoring Using LM35 sensor and Intimate Android user via C2DM Service Authors: Poonam, Prof. (Dr.) Yusuf Mulge <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201313.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201313.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Ethics and Impacts of Information and Communication Technology in E-Commerce <br>Authors: Tryambak Hiwarkar, Dr. P.G Khot <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201305.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201305.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201305.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Architecture of Discrete Wavelet Transform Processor for Image Compression <br>Authors: Ms. Yamini S.Bute, Ms. Indu Mandawi, Ms. Sarita Sakure <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201310.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201310.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: Android Optimization: A Survey <br>Authors: Ms. Debosmita Sen Purkayastha, Mr. Nitin Singhla <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201314.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201314.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201314.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Lookup Table Based Secure Cryptographic SMS Communication on Android Environment<br>Authors: Nishika, Rahul Kumar Yadav <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201327.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201327.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: WIRELESS SENSOR NETWORK AND ITS ROUTING PROTOCOL: A SURVEY PAPER<br>Authors: Reena, Sunil Phulre, Rekha Pandit <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201320.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201320.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Study on growth of Online Shopping in India <br>Authors: Deepali <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201328.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201328.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201328.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Wormhole Detection Using Hidden Markov Model Approach <br>Authors: Himani Deswal, Rahul Kumar Yadav <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201341.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201341.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Developing Web Based Model (Disblogwik) in Informal eLearning <br>Authors: Triveni Dixit, Dinesh Gill <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201323.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201323.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201323.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: CNX PSU Bank Index Prediction Using Soft Computing &#8211; A Study <br>Authors: J. Mary Dallfin Bruxella, S. Arun Joe Babulo <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201326.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201326.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Path Loss Estimation for a Wireless Sensor Network for Application in Ship<br>Authors: Ananya Sarkar, Subhasish Majumdar, Partha Pratim Bhattacharya <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201335.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201335.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Performance Analysis of Cloud Computing for Distributed Client <br>Authors: Dr. Neeraj Bhargava, Dr. Ritu Bhargava, Manish Mathuria, Ravi Daima <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201325.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201325.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201325.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Analysis of Android Applications &amp; Missed Call Alerts to Registered Email Address <br>Authors: A. Maharaju <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201316.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201316.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Novel Fuzzy Logic Analysis &amp; Study on Intrusion Detection System <br>Authors: G. Shilpa, N. Anjaneyulu <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201329.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201329.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Fuzzy Improved Association Mining Approach to Estimate Software Quality <br>Authors: Sonakshi Rana, Rahul Kumar Yadav <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201338.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201338.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: Security and Privacy in Cloud Computing: A Survey <br>Authors: Shachindra Kumar Dubey, Prof. Ashok Verma <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201332.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201332.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A STUDY AND PERFORMANCE ANALYSIS OF RSA ALGORITHM <br>Authors: M. Preetha, M. Nithya <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201330.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201330.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A REPLACEMENT POLICY FOR BUFFER MANAGEMENT IN IPTV SERVICES <br>Authors: K.B. Dinesh Babu, M. Somu, N. Rengarajan <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201334.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201334.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: AN IMPLEMENTATION OF WEB PERSONALIZATION USING WEB MINING TECHNIQUES <br>Authors: V. Shanmuga Priya, S. Sakthivel <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201337.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201337.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Performance Analysis of Routing Protocols in MANETs <br>Authors: Manoj Kumar, Devendra Singh <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201344.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201344.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: GREEN: The New Color in Computer Technology <br>Authors: Navdeep Kaur Maan, Navdeep Kaur Dhillon <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201347.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201347.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Novel Steganographic Approach to enhance the Performance of Security System in a Smarter Way <br>Authors: Parveen Mor, Tanupriya Choudhury, Vasudha Vashisht <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201321.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201321.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Monitoring and Its Impacts over Distributed Systems and Possible Solutions <br>Authors: Manjunath Kotari, Dr. Niranjan N. Chiplunkar, Dr. Nagesh H R <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201349.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201349.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Content Management System (CMS) for Web-Based MIS Application <br>Authors: P. Divya <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201350.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201350.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Novel Approach of Handwritten Character Recognition using Positional Feature Extraction<br>Authors: Swapnil A. Vaidya, Balaji R. Bombade <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201354.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201354.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Protein Structure Prediction using Genetic Algorithm <br>Authors: Subhendu Bhusan Rout, Satchidananda Dehury, Bhabani Sankar Prasad Mishra <br>Country: India, South Korea<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201359.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201359.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Security Refinement in Nymble System <br>Authors: Maheshkumar S. Kamble, Hatkar S. S. <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201362.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201362.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Rule-Based and Cluster-Based Intrusion Detection Technique for Wireless Sensor Network<br>Authors: Ms. Rachana Deshmukh, Ms. Rashmi Deshmukh, Prof. Manoj Sharma <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201343.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201343.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Novel Steganographic Approach for Enhancing the Security of Images <br>Authors: Priya Thomas, Avanish Kumar Singh <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201353.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201353.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: Comparison of ANNs, Fuzzy Logic and Neuro-Fuzzy Integrated Approach for Diagnosis of Coronary Heart Disease: A Survey <br>Authors: Nitin Kumari, Sunita, Smita <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201358.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201358.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Using Maple to Evaluate the Partial Derivatives of Two-Variables Functions <br>Authors: Chii-Huei Yu <br>Country: Taiwan<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201360.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201360.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201360.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: An Overview of Speech Recognition Using HMM <br>Authors: Ms. Rupali S Chavan, Dr. Ganesh. S Sable <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201369.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201369.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201369.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Avoiding Pollution Attacks in Network Coding using Authentication Code <br>Authors: Mangesh N. Bhandare, Ravindra C. Thool, Gurdeep Singh Wahi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201371.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201371.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Novel Architecture of Mercator: A Scalable, Extensible Web Crawler with Focused Web Crawler<br>Authors: Sarnam Singh, Nidhi Tyagi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201372.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201372.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Proposed YANG Validator <br>Authors: Jisha S Manjaly <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201389.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201389.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Data Protection for Clients in Private Network through Virus-Protection as a Service <br>Authors: Manivannan Palanivel, Murali Prasath <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201331.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201331.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Review<br>Title: A REVIEW ON EFFICIENT RESOURCE BLOCK ALLOCATION IN LTE SYSTEM <br>Authors: Rupinder Kaur, Manoj Kumar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201364.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201364.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: NODE AND SINK MOBILITY SUPPORTED ROUTING PROTOCOL IN WIRELESS SENSOR NETWORK WITH IMPROVED ENERGY EFFICIENCY <br>Authors: Neha Upadhyay, Vikram Jain <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201370.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201370.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Dynamic Round Robin for Load Balancing in a Cloud Computing <br>Authors: Ajay Gulati, Ranjeev.K.Chopra <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201373.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201373.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: INTERACTIVE IMAGE SEGMENTATION BASED ON HARMONIC FUNCTIONS &amp; RECONSTRUCTIONS<br>Authors: Alisha Abraham <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201377.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201377.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Multioriented and Curved Text Lines Extraction from Documents <br>Authors: Vaibhav Gavali, B. R. Bombade <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201383.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201383.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: A Survey on Web Page Change Detection System Using Different Approaches <br>Authors: Shobhna, Manoj Chaudhary <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201391.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201391.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Performance Comparison of an Effectual Approach with K-Means Clustering Algorithm for the Recognition of Facial Expressions <br>Authors: Tanvi Sheikh, Shikha Agrawal <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201368.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201368.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A SECURE CLOUD WITH ADDITIONAL LAYER OF PROTECTION AND USER AUTHENTICATION <br>Authors: Mr. Iranna Telasang, Mr. Manjunatha S <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201380.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201380.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Distributed Auditing for user data in the Cloud <br>Authors: Ms. Indushree T G, Mr. Anand R <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201381.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201381.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: An Improved Method in Peer-To-Peer System <br>Authors: Neetha Thomas <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201387.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201387.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Fast and Efficient Automated Iris Segmentation by Region Growing <br>Authors: Ms. Sruthi.T.K <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201392.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201392.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201392.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Management Decisions against Functional Violations of Web Services <br>Authors: M. Mohemmed Sha, K. Vivekanandan <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201375.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201375.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Combined Protection for Entire Network Based On Immune Inspired Theories <br>Authors: P.S. ThumilVannan, S. Hirutiha <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201336.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201336.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Comparative Study of Different Application of OFDM in FPGA Implementation <br>Authors: Ashwin Thakur, Vipul Agrawal, Yogeshwar Khandagre, Alok Duby <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201345.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201345.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201345.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Improving the Congestion Control over Stateless Wireless Ad Hoc Network Systems <br>Authors: Shrikant Pujar, Prof. Vasudev K Parvati <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201357.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201357.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Review<br>Title: PERFORMANCE ANALYSIS OF AODV, OLSR, DSR AND GRP ROUTING PROTOCOL OF MOBILE ADHOC NETWORK ? A REVIEW <br>Authors: Suchita Baxla, Prof. Rajesh Nema <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201379.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201379.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Facial Expression Recognition Using SVM Classification in Perceptual Color Space <br>Authors: Ms. Aswathy.R <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201393.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201393.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Detection of an Individual after Piercing Using Ear Biometric <br>Authors: Sushreeti Bandyopadhyay, Devesh Narayan <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201395.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201395.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Key Generation Using Genetic Algorithm for Image Encryption <br>Authors: Aarti Soni, Suyash Agrawal <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201396.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201396.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Intraoperative Organ Deformation and 3D Visualization during MIS Using Spherical Harmonics<br>Authors: Ms. Greeshma Jacob, Ms. Reshma V.K <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201399.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201399.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Solving Improper Integrals with Maple <br>Authors: Chii-Huei Yu <br>Country: Taiwan <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I62013102.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I62013102.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I62013102.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A New Approach for Retrieving Unconstrained Blurred Images <br>Authors: Minu Poulose <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I62013100.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I62013100.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A New Cluster Based Broadcast Protocol for Delay Tolerant Mobile Networks <br>Authors: Mr. Harish Kumar T.R, Dr. Dinesh K. Anvekar, Mr. K. Sundeep Kumar, Mr. Manoj Challa <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I62013101.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I62013101.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Mitigating Risk Using Puzzle-Based Defense Technique to Improve Confidentiality <br>Authors: Ms. Sapna S. Khapre, Prof. Shrikant Ardhapurkar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201397.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201397.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Study of Manet and Wormhole Attack in Mobile Adhoc Network <br>Authors: Ranjeeta Siwach, Vanditaa Kaul <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201384.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201384.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Design &amp; Analysis of Computational Features Prediction Model for Heart Disease Diagnosis<br>Authors: Atul Kumar Pandey,?Prabhat Pandey,?K.L. Jaiswal <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201374.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201374.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Various Edge Detection Methods for Foreground Detection <br>Authors: Gurjeet kaur Seerha, Rajneet Kaur <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201366.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201366.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: POWER AND AREA EFFICIENT DESIGN OF COUNTER FOR LOW POWER VLSI SYSTEM <br>Authors: SURESH KUMAR.R <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201367.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201367.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201367.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: REMOVAL OF NOISE IN PPG SIGNALS USING WAVELETS <br>Authors: YADHURAJ S.R, HARSHA.H, Dr. PADMAJA K.V <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/abstracts\/V2I6201311.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/June2013\/V2I6201311.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p style=\"font-size:26px\"><strong>Contact us or submit a paper through below form:<\/strong><\/p>\n\n\n\n<div class=\"forminator-guttenberg\"><div class=\"forminator-ui forminator-custom-form forminator-custom-form-1020 forminator-design--default  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-1020\" data-uid=\"69f59d20cf961\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-1020\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-1020 forminator-design--default  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"1020\"\n\t\t\t\tenctype=\"multipart\/form-data\" data-color-option=\"default\" data-design=\"default\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"69f59d20cf961\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div class=\"forminator-row\"><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_69f59d20cf961\" id=\"forminator-field-name-1_69f59d20cf961-label\" class=\"forminator-label\">First Name <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"E.g. John\" id=\"forminator-field-name-1_69f59d20cf961\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_69f59d20cf961\" id=\"forminator-field-email-1_69f59d20cf961-label\" class=\"forminator-label\">Email Address <span class=\"forminator-required\">*<\/span><\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"E.g. john@doe.com\" id=\"forminator-field-email-1_69f59d20cf961\" class=\"forminator-input forminator-email--field\" data-required=\"true\" aria-required=\"true\" autocomplete=\"email\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"phone-1\" class=\"forminator-field-phone forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-phone-1_69f59d20cf961\" id=\"forminator-field-phone-1_69f59d20cf961-label\" class=\"forminator-label\">Phone Number<\/label><input type=\"text\" name=\"phone-1\" value=\"\" placeholder=\"E.g. +1 3004005000\" id=\"forminator-field-phone-1_69f59d20cf961\" class=\"forminator-input forminator-field--phone\" data-required=\"\" aria-required=\"false\" autocomplete=\"off\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_69f59d20cf961\" id=\"forminator-field-textarea-1_69f59d20cf961-label\" class=\"forminator-label\">Message <span class=\"forminator-required\">*<\/span><\/label><textarea name=\"textarea-1\" placeholder=\"Enter your message...\" id=\"forminator-field-textarea-1_69f59d20cf961\" class=\"forminator-textarea\" rows=\"6\" style=\"--forminator-textarea-min-height:140px;\" maxlength=\"180\" ><\/textarea><span id=\"forminator-field-textarea-1_69f59d20cf961-description\" class=\"forminator-description\"><span data-limit=\"180\" data-type=\"characters\" data-editor=\"\">0 \/ 180<\/span><\/span><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"upload-1\" class=\"forminator-field-upload forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-upload-1_69f59d20cf961\" id=\"forminator-field-upload-1_69f59d20cf961-label\" class=\"forminator-label\">Upload file <span class=\"forminator-required\">*<\/span><\/label><div class=\"forminator-file-upload \" data-element=\"upload-1_69f59d20cf961\"><input type=\"file\" name=\"upload-1\" id=\"forminator-field-upload-1_69f59d20cf961\" class=\"forminator-input-file-required do-validate\" accept=\".jpg,.jpeg,.jpe,.gif,.png,.bmp,.tiff,.tif,.webp,.ico,.heic,.asf,.asx,.wmv,.wmx,.wm,.avi,.divx,.flv,.mov,.qt,.mpeg,.mpg,.mpe,.mp4,.m4v,.ogv,.webm,.mkv,.3gp,.3gpp,.3g2,.3gp2,.txt,.asc,.c,.cc,.h,.srt,.csv,.tsv,.ics,.rtx,.vtt,.mp3,.m4a,.m4b,.aac,.ra,.ram,.wav,.ogg,.oga,.flac,.mid,.midi,.wma,.wax,.mka,.rtf,.pdf,.class,.tar,.zip,.gz,.gzip,.7z,.psd,.xcf,.doc,.pot,.pps,.ppt,.wri,.xla,.xls,.xlt,.xlw,.mdb,.mpp,.docx,.docm,.dotx,.dotm,.xlsx,.xlsm,.xlsb,.xltx,.xltm,.xlam,.pptx,.pptm,.ppsx,.ppsm,.potx,.potm,.ppam,.sldx,.sldm,.onetoc,.onetoc2,.onetmp,.onepkg,.oxps,.xps,.odt,.odp,.ods,.odg,.odc,.odb,.odf,.wp,.wpd,.key,.numbers,.pages\" tabindex=\"-1\"><button id=\"forminator-field-upload-1_69f59d20cf961_button\" class=\"forminator-button forminator-button-upload\" data-id=\"forminator-field-upload-1_69f59d20cf961\">Choose File<\/button><span data-empty-text=\"No file chosen\">No file chosen<\/span><button class=\"forminator-button-delete\" style=\"display: none;\"><i class=\"forminator-icon-close\" aria-hidden=\"true\"><\/i><span class=\"forminator-screen-reader-only\">Delete uploaded file<\/span><\/button><\/div><\/div><\/div><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><div class=\"forminator-row forminator-row-last\"><div class=\"forminator-col\"><div class=\"forminator-field\"><button class=\"forminator-button forminator-button-submit\">Send Message<\/button><\/div><\/div><\/div><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"a730c97a3f\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/index.php\/wp-json\/wp\/v2\/pages\/534\" \/><input type=\"hidden\" name=\"form_id\" value=\"1020\"><input type=\"hidden\" name=\"page_id\" value=\"534\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/ijcsmc.com\/index.php\/volume-2-issue-6\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><\/form><\/div>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Getting any problem in Paper Uploading?<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Please dont worry, just Submit \/ Email your paper at ijcsmc@zainpublications.com<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Type: ReviewTitle: A Review of Geometry Based Symmetric Key Encryption Using Ellipse Authors: Prerna Gaur, Dr. Paramjit Singh Country: IndiaAbstract View PDF Type: ReviewTitle: A Review of Wormhole Detection Using HMM Approach Authors: Himani Deswal, Rahul Yadav Country: IndiaAbstract View PDF Type: SurveyTitle: A Survey on Brain?Machine Interface used in VLSI Field-Programmable Mixed-Signal ArrayAuthors: Umayal.S [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"slim_seo":{"title":"Volume 2 Issue 6 - International Journal of Computer Science and Mobile Computing - IJCSMC","description":"Type: Review Title: A Review of Geometry Based Symmetric Key Encryption Using Ellipse Authors: Prerna Gaur, Dr. Paramjit Singh Country: India Abstract View PDF"},"footnotes":""},"class_list":["post-534","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages\/534","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/comments?post=534"}],"version-history":[{"count":2,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages\/534\/revisions"}],"predecessor-version":[{"id":1951,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages\/534\/revisions\/1951"}],"wp:attachment":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/media?parent=534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}