{"id":604,"date":"2023-01-04T11:28:56","date_gmt":"2023-01-04T11:28:56","guid":{"rendered":"https:\/\/ijcsmc.com\/journal\/?page_id=604"},"modified":"2024-10-31T11:10:05","modified_gmt":"2024-10-31T11:10:05","slug":"volume-3-issue-1","status":"publish","type":"page","link":"https:\/\/ijcsmc.com\/index.php\/volume-3-issue-1\/","title":{"rendered":"Volume 3 Issue 1"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Reduce Energy Consumption by Improving the LEACH Protocol <br>Authors: Ali F. Marhoon, Mishall H. Awaad <br>Country: Iraq<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201405.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201405.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Data Mining Techniques: To Predict and Resolve Breast Cancer Survivability <br>Authors: Vikas Chaurasia, Saurabh Pal <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201402.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201402.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Adaptive Pixel Pair Matching Technique for Data Embedding <br>Authors: Nalimela Mounika, T. Madhavi Kumari <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201403.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201403.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: DESIGN OF LOW POWER \/ HIGH SPEED MULTIPLIER USING SPURIOUS POWER SUPPRESSION TECHNIQUE (SPST) <br>Authors: G. Sasi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201406.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201406.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201406.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Energy Efficient Mobile Relaying in Data Intensive Wireless Sensor Networks <br>Authors: Satish Chikkala, K. Sathi Reddy <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201408.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201408.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201408.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Virtual Machine-Based Resource Management System for Cloud Computing Services <br>Authors: Sri hari Reddy Medapati, K. Sathi Reddy <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201409.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201409.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: A SURVEY OF WIRELESS NETWORK SECURITY <br>Authors: S. Gopalakrishnan <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201410.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201410.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: WarningBird MailAlert Based Malicious URLs Blocker System in Twitter <br>Authors: MS. SARANYA.S, MR. UDHAYA KUMAR.V <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201411.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201411.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Iris Recognition using Wavelet Transformation Techniques <br>Authors: P.Thirumurugan, G.Mohanbabu <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201415.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201415.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201415.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: ARM MICRO-CONTROLLER BASED MULTI -FUNCTION SOLAR TRACKING SYSTEM <br>Authors: D.Rajendra Prasad, K.Sudhakar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201401.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201401.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201401.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: An Efficient Methodology for Detecting Spam Using Spot System <br>Authors: MRS. SARANYA.S, MRS. R.BHARATHI <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201418.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201418.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Study of Electronic Document Security <br>Authors: Mr. Parag S.Deshmukh, Mr. Pratik Pande <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201422.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201422.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201422.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Design and Implementation of Search Engine Using Vector Space Model for Personalized Search<br>Authors: Mr. Ishwar.N.Bharambe, Prof. Richa.K.Makhijani <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201433.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201433.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Mobile Web Services Invocation System Using SMAP <br>Authors: Prof. Deepak Kapgate, Monali Khune <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201420.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201420.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: FPGA Implementation of Mutual Authentication Protocol Using Modular Arithmetic <br>Authors: T.Sadaiyappan, K.K.Manoj, S.A.Subhasakthe <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201421.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201421.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Automated Cryptanalysis of Transposition Ciphers Using Cuckoo Search Algorithm <br>Authors: Morteza Heydari, Mahdieh Nadi Senejani <br>Country: Iran<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201404.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201404.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: The Survey of Techniques for Link Recovery &amp; Admission Control in Wireless Mesh Network<br>Authors: Kalyani Pendke, Anup Dhamgaye <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201416.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201416.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Application of Unified Network Management in LAN for Load Shedding <br>Authors: Ravi Prakash <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201427.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201427.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Cued Click Point Technique for Graphical Password Authentication <br>Authors: Vaibhav Moraskar, Sagar Jaikalyani, Mujib Saiyyed, Jaykumar Gurnani, Kalyani Pendke <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201431.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201431.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Data Design and Analysis for Survey System Based on Statistical Functionality <br>Authors: Wessam Abbas Hamed, Atheer Yousif Oudah, Sarmad Kadhim Dhiab <br>Country: Iraq<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201434.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201434.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: Survey on Distributed Accountability for Data Sharing in the Cloud <br>Authors: K.S.Khadke, Prof. Umesh.B.Chavan <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201435.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201435.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud<br>Authors: Lokesh.P.Chaudhari, Prof. Umesh.B.Chavan <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201436.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201436.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: DESIGN AND IMPLEMENTATION OF MULTIPLE SENSOR INTERFACE USING ETHERNET <br>Authors: Bandi Praveen Kumar, Dr.R.V.Krishnaiah <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201438.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201438.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Quality of Service Assessment of AOMDV for Random Waypoint and Random Walk Mobility Models <br>Authors: V B Kute, Dr. M U Kharat <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201439.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201439.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: An Optimized Solution to Map Web User Profile Based on Domain Ontology <br>Authors: Prof. Ratheesh Kumar A.M, Prof. Velusamy A, Prof. Shobana G <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201426.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201426.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: EFFICIENT DYNAMIC MULTILEVEL PRIORITY TASK SCHEDULING FOR WIRELESS SENSOR NETWORKS <br>Authors: Mrs. K.Indumathi, Mrs. M. Santhi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201428.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201428.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Evaluate the Performance of the Router Algorithms in Different Scenarios TCP Newreno and TCP Reno <br>Authors: Wessam Abbas Hamed <br>Country: Iraq<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201429.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201434.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Segmentation of Nuclei in Cytological Images of Breast FNAC Sample: Case Study <br>Authors: Aditya P. Pise, Rushi Longadge, L. G. Malik <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201437.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201437.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Review<br>Title: A Review of Numerous Facial Recognition Techniques in Image Processing <br>Authors: A.Swaminathan, N.Kumar, M.Ramesh Kumar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201440.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201440.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Self-optimization and Self-Protection (Transactional Security) in AODV Based Wireless Sensor Network <br>Authors: Rajani Narayan, Dr. B.P. Mallikarjunaswamy, M.C. Supriya <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201419.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201419.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: Surveillance on Bigdata to Mine Pattern <br>Authors: N. Monica, Dr. K. Ramesh Kumar, T. Nelson Gnanaraj <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201442.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201442.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Improved Human Identification using Finger Vein Images <br>Authors: Sameer Sharma, Mr. Shashi Bhushan, Ms. Jaspreet Kaur <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201444.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201444.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201444.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: An Image Fusion Method Using DT-CWT and Average Gradient <br>Authors: A. M. El Ejaily, F. Eltohamy, M. S. Hamid, G. Ismail <br>Country: Egypt<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201445.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201445.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: GAIT RECOGNITION OF HUMAN USING SVM AND BPNN CLASSIFIERS <br>Authors: Arun Joshi, Mr. Shashi Bhushan, Ms. Jaspreet Kaur <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201446.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201446.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: Wireless Mesh Networks: The Survey of Andover Continuum Wireless Technology and Cyber Station Wireless Control <br>Authors: K.Sangeetha, P.Revathi, N.Kokhila, C.Theebendra <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201451.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201451.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: THE IMAGE STEGANOGRAPHY AND STEGANALYSIS BASED ON PEAK-SHAPED TECHNIQUE FOR MP3 AUDIO AND VIDEO <br>Authors: P.Manimegalai, K.S.Gomathi, D.Ponniselvi, M.Santha <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201453.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201453.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Fuzzy Mining Approach for Gene Clustering and Gene Function Prediction <br>Authors: Akhil Kumar Das, Debasis Mandal, Mainak Adhikary, Amit Kumar Sen <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201452.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201452.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: EFFICIENT CLASSIFICATION METHOD FOR LARGE DATASET BY ASSIGNING THE KEY VALUE IN CLUSTERING <br>Authors: Dr. B Rosiline Jeetha <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201461.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201461.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: IMPLEMENTATION OF SPEED UP ROBUST FEATURE FOR DETECTION AND TRACKING OF INANIMATE OBJECTS <br>Authors: Fari Muhammad Abubakar <br>Country: China<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201464.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201464.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: An Analysis on Clustering Algorithms in Data Mining <br>Authors: Mythili S, Madhiya E <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201467.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201467.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201467.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: An Approach to an Emerging Classification Method for Large Dataset in Clustering <br>Authors: Kathiresan V, Dr. P Sumathi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201468.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201468.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: The Image Quality in Computer Tomography Using Curve-let Transform <br>Authors: M.Selvi, J.Vanitha, S.Yasotha <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201469.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201469.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Efficient Service Broker Algorithm for Data Center Selection in Cloud Computing <br>Authors: Prof. Deepak Kapgate <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201462.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201462.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: DATA ENCRYPTION WITH FRIEND BASED ROUTING TO ESTABLISH SECURITY IN MANET <br>Authors: SHARMILA.G, J.R.THRESPHINE <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201466.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201466.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: ENERGY EFFICIENT VOTING BASED INTRUSION DETECTION TECHNIQUES IN HETEROGENEOUS WIRELESS SENSOR NETWORK <br>Authors: Divya.B, Manju.R, Sathyabama.B <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201478.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201478.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: An Efficient Double Talk Detection Algorithm Based on Normalized Least Mean Square Method<br>Authors: T.Madhu, Kadham Nithin Rao, V.Vignesh Kumar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1RC03.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1RC03.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Review<br>Title: REVIEW PAPER ON RESPONSE BASED APPROACHES FOR DETECTION OF MISBEHAVING NODES IN MANETS <br>Authors: Swapna Taksande, Prof. Rajani Bhoomarker, Prof. Sameena Jafar<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201465.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201465.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201465.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Design and Implementation of Web Based Collaborative Learning Model for ICT Course of College Student in Bangladesh <br>Authors: Md. Tariqul Islam, S. M. J. Rahman, Syed Md. Galib, K. M. A. Uddin, G. M. M. Bashir <br>Country: Bangladesh<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201473.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201473.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: AES and DES Using Secure and Dynamic Data Storage in Cloud Authors: Prasanth SP, Gowtham B<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201479.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201479.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: An Overview of MANET: Applications, Attacks and Challenges <br>Authors: Mr. L Raja, Capt. Dr. S Santhosh Baboo <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201472.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201472.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Real Time HCI using Eye Blink Detection <br>Authors: R.T.Narmadha, T.Mythili, R.T.Nivetha <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201481.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201481.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: A Survey on Wireless Sensor Network Protocols <br>Authors: T.Mythili, R.T.Narmadha, R.T.Nivetha <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201482.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201482.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Mining Association Rules to Improve Academic Performance <br>Authors: Rakesh Kumar Arora, Dr. Dharmendra Badal <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201456.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201456.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Design &amp; Implementation of Data Protection Server: Detect Guilty Agent &amp; Protect Secure Data<br>Authors: Hema Donekar, Pratiksha Raut, Nita Janorkar, Shital Admane, Indu Mandwi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201476.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong><br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201476.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201476.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: A Survey Paper on Image Segmentation with Thresholding <br>Authors: Prof. S. T. Khandare, Mr. Akshay D. Isalkar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201477.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201477.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: SURVEY ON AN EFFICIENT APPROACH FOR MULTIMEDIA TRANSMISSION USING MULTIPATH ROUTING IN MANET <br>Authors: A.Sheganaz, P.D.R.Vijaya Kumar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201484.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201484.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: SURVEY ON USER REVOCATION AND FINE GRAINED ACCESS CONTROL OF PHR IN CLOUD USING HASBE <br>Authors: T.Radhika, S.Vasumathi Kannagi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201486.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201486.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201486.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Memetic Algorithm with Hybrid Mutation Operator <br>Authors: Manju Sharma <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201488.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201488.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: A SURVEY OF QUESTION ANSWERING SYSTEM FOR COMPARABLE ENTITY MINING <br>Authors: S.Deepa, S.Vasumathi Kannagi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201490.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201490.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201490.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Code Birthmarks and Graph Isomorphism for Theft Detection <br>Authors: Snehal N. Nayakoji, S. P. Sonavane <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201496.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201496.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: MULTI-WAVELET BASED ON NON-VISIBLE WATER MARKING <br>Authors: P.Venkatapathi, Suresh.N <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201483.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201483.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Collaborative Filtering with query logs in Search engines <br>Authors: M.Suneetha, T.Ramya Sri <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1RC04.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1RC04.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Performance Analysis of Image Fusion Algorithms using HAAR Wavelet <br>Authors: Deepika.L, Mary Sindhuja.N.M <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201475.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201475.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: Survey on Quality Analysis of Cooperation Incentive Strategies in MANET <br>Authors: K Savitha Rohini, S Dhanasekar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201495.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201495.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Speech Recognition Using Backoff N-Gram Modelling in Android Application <br>Authors: S.Aparna, V.Senthil Kumar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201492.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201492.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201492.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Design of Encounter-Based Social Network in Mobile Application <br>Authors: S.Niranjani, A.Rathna <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201493.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201493.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: SEARCHING MOBILE NODES USING MODIFIED COLUMN MOBILITY MODEL <br>Authors: Prabhakar Singh, Dr. Tanweer Alam, Dr. Parveen Kumar <br>Country: India, Saudi Arabia<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201480.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201480.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Predictive Data Mining: A Generalized Approach <br>Authors: Meghana Deshmukh, Prof. S. P. Akarte <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201489.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201489.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Automatic Detection and Restraining Mobile Virus Propagation using Android <br>Authors: S. Chandrasekar, Prof. V. Jayaprakasan <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201494.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201494.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: PERFORMANCE EVALUATION FOR FEEDBACK ROTATE- QUASI- ORTHOGONAL SPACE-TIME BLOCK CODES IN MULTIPLE TRANSMIT ANTENNAS <br>Authors: K. Deepak Babu, Rajesh Durgam, P. Anil Kumar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201423.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201423.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: An Improved IDS Detection with Protection of Agent Collude Attacks <br>Authors: L.Devi, V.Santhiya <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201457.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201457.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201457.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Denial of Service Attacks in Wireless Networks: The Case of Jammers <br>Authors: L.Devi , A.Suganthi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201458.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201458.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Fast IP Network Recovery Using MRC from Multiple Failures <br>Authors: L.Devi , M.Suganthi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201459.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201459.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Wireless Body Area Sensor System for Monitoring Physical Activities Using GUI <br>Authors: L.Devi, R.Nithya <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201460.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201460.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Sybil Attack Detection with Reduced Bandwidth Overhead in Urban Vehicular Networks <br>Authors: D. Balamahalakshmi, Mr. K.N. Vimal Shankar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201413.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201413.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA<br>Authors: Saranya.S, Mr. K.N. Vimal Shankar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201414.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201414.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Appraisal and Analysis on QoS Aware Secured Web Services over VANET Applications <br>Authors: M. Rajeswari, V. Mythili, S. Sridevi, V. Nishanthi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/abstracts\/V3I1201424.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/January2014\/V3I1201424.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<p class=\"wp-block-paragraph\" style=\"font-size:26px\"><strong>Contact us or submit a paper through below form:<\/strong><\/p>\n\n\n\n<div class=\"forminator-guttenberg\"><div class=\"forminator-ui forminator-custom-form forminator-custom-form-1020 forminator-design--default  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-1020\" data-uid=\"6a10a722bb73b\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-1020\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-1020 forminator-design--default  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"1020\"\n\t\t\t\tenctype=\"multipart\/form-data\" data-color-option=\"default\" data-design=\"default\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"6a10a722bb73b\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div class=\"forminator-row\"><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_6a10a722bb73b\" id=\"forminator-field-name-1_6a10a722bb73b-label\" class=\"forminator-label\">First Name <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"E.g. John\" id=\"forminator-field-name-1_6a10a722bb73b\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_6a10a722bb73b\" id=\"forminator-field-email-1_6a10a722bb73b-label\" class=\"forminator-label\">Email Address <span class=\"forminator-required\">*<\/span><\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"E.g. john@doe.com\" id=\"forminator-field-email-1_6a10a722bb73b\" class=\"forminator-input forminator-email--field\" data-required=\"true\" aria-required=\"true\" autocomplete=\"email\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"phone-1\" class=\"forminator-field-phone forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-phone-1_6a10a722bb73b\" id=\"forminator-field-phone-1_6a10a722bb73b-label\" class=\"forminator-label\">Phone Number<\/label><input type=\"text\" name=\"phone-1\" value=\"\" placeholder=\"E.g. +1 3004005000\" id=\"forminator-field-phone-1_6a10a722bb73b\" class=\"forminator-input forminator-field--phone\" data-required=\"\" aria-required=\"false\" autocomplete=\"off\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_6a10a722bb73b\" id=\"forminator-field-textarea-1_6a10a722bb73b-label\" class=\"forminator-label\">Message <span class=\"forminator-required\">*<\/span><\/label><textarea name=\"textarea-1\" placeholder=\"Enter your message...\" id=\"forminator-field-textarea-1_6a10a722bb73b\" class=\"forminator-textarea\" rows=\"6\" style=\"--forminator-textarea-min-height:140px;\" maxlength=\"180\" ><\/textarea><span id=\"forminator-field-textarea-1_6a10a722bb73b-description\" class=\"forminator-description\"><span data-limit=\"180\" data-type=\"characters\" data-editor=\"\">0 \/ 180<\/span><\/span><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"upload-1\" class=\"forminator-field-upload forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-upload-1_6a10a722bb73b\" id=\"forminator-field-upload-1_6a10a722bb73b-label\" class=\"forminator-label\">Upload file <span class=\"forminator-required\">*<\/span><\/label><div class=\"forminator-file-upload \" data-element=\"upload-1_6a10a722bb73b\"><input type=\"file\" name=\"upload-1\" id=\"forminator-field-upload-1_6a10a722bb73b\" class=\"forminator-input-file-required do-validate\" accept=\".jpg,.jpeg,.jpe,.gif,.png,.bmp,.tiff,.tif,.webp,.ico,.heic,.asf,.asx,.wmv,.wmx,.wm,.avi,.divx,.flv,.mov,.qt,.mpeg,.mpg,.mpe,.mp4,.m4v,.ogv,.webm,.mkv,.3gp,.3gpp,.3g2,.3gp2,.txt,.asc,.c,.cc,.h,.srt,.csv,.tsv,.ics,.rtx,.vtt,.mp3,.m4a,.m4b,.aac,.ra,.ram,.wav,.ogg,.oga,.flac,.mid,.midi,.wma,.wax,.mka,.rtf,.pdf,.class,.tar,.zip,.gz,.gzip,.7z,.psd,.xcf,.doc,.pot,.pps,.ppt,.wri,.xla,.xls,.xlt,.xlw,.mdb,.mpp,.docx,.docm,.dotx,.dotm,.xlsx,.xlsm,.xlsb,.xltx,.xltm,.xlam,.pptx,.pptm,.ppsx,.ppsm,.potx,.potm,.ppam,.sldx,.sldm,.onetoc,.onetoc2,.onetmp,.onepkg,.oxps,.xps,.odt,.odp,.ods,.odg,.odc,.odb,.odf,.wp,.wpd,.key,.numbers,.pages\" tabindex=\"-1\"><button id=\"forminator-field-upload-1_6a10a722bb73b_button\" class=\"forminator-button forminator-button-upload\" data-id=\"forminator-field-upload-1_6a10a722bb73b\">Choose File<\/button><span data-empty-text=\"No file chosen\">No file chosen<\/span><button class=\"forminator-button-delete\" style=\"display: none;\"><i class=\"forminator-icon-close\" aria-hidden=\"true\"><\/i><span class=\"forminator-screen-reader-only\">Delete uploaded file<\/span><\/button><\/div><\/div><\/div><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><div class=\"forminator-row forminator-row-last\"><div class=\"forminator-col\"><div class=\"forminator-field\"><button class=\"forminator-button forminator-button-submit\">Send Message<\/button><\/div><\/div><\/div><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"0550703ad9\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/index.php\/wp-json\/wp\/v2\/pages\/604\" \/><input type=\"hidden\" name=\"form_id\" value=\"1020\"><input type=\"hidden\" name=\"page_id\" value=\"604\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/ijcsmc.com\/index.php\/volume-3-issue-1\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><\/form><\/div>\n\n\n\n<p class=\"has-medium-font-size wp-block-paragraph\"><strong>Getting any problem in Paper Uploading?<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size wp-block-paragraph\"><strong>Please dont worry, just Submit \/ Email your paper at ijcsmc@zainpublications.com<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Type: ResearchTitle: Reduce Energy Consumption by Improving the LEACH Protocol Authors: Ali F. Marhoon, Mishall H. Awaad Country: IraqAbstract View PDF Type: ResearchTitle: Data Mining Techniques: To Predict and Resolve Breast Cancer Survivability Authors: Vikas Chaurasia, Saurabh Pal Country: IndiaAbstract View PDF Type: ResearchTitle: Adaptive Pixel Pair Matching Technique for Data Embedding Authors: Nalimela Mounika, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"slim_seo":{"title":"Volume 3 Issue 1 - International Journal of Computer Science and Mobile Computing - IJCSMC","description":"Type: Research Title: Reduce Energy Consumption by Improving the LEACH Protocol Authors: Ali F. Marhoon, Mishall H. Awaad Country: Iraq Abstract View PDF Type:"},"footnotes":""},"class_list":["post-604","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages\/604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/comments?post=604"}],"version-history":[{"count":4,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages\/604\/revisions"}],"predecessor-version":[{"id":1889,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages\/604\/revisions\/1889"}],"wp:attachment":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/media?parent=604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}