{"id":620,"date":"2023-01-04T12:04:20","date_gmt":"2023-01-04T12:04:20","guid":{"rendered":"https:\/\/ijcsmc.com\/journal\/?page_id=620"},"modified":"2024-10-31T11:10:19","modified_gmt":"2024-10-31T11:10:19","slug":"volume-3-issue-2","status":"publish","type":"page","link":"https:\/\/ijcsmc.com\/index.php\/volume-3-issue-2\/","title":{"rendered":"Volume 3 Issue 2"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Distributing, Ensuring and Recovery of Data Stored in Cloud <br>Authors: Dr. B. F. Momin, Mr. Girish Bamane <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201402.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201402.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: A Survey Conducted on E-Agriculture with Indian Farmers <br>Authors: Sumitha Thankachan, Dr. S. Kirubakaran <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201408.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201408.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: A Survey on Delegating Log Management to The Cloud <br>Authors: Sinu P S, M.Ananthi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201410.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201410.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201410.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: Survey on Clinical Decision Support System for Diagnosing Heart Disease <br>Authors: Suchithra, Dr. P. Uma Maheswari <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201407.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201407.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Various Approaches to Detect Wormhole Attack in Wireless Sensor Networks <br>Authors: Nishant Sharma, Upinderpal Singh <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201401.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201401.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Decision Support System for Precluding Coronary Heart Disease (CHD) <br>Authors: K. Cinetha, Dr. P. Uma Maheswari <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201403.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201403.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201403.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: A SURVEY ON WORKFLOW SCHEDULING IN CLOUD USING ANT COLONY OPTIMIZATION<br>Authors: J.Elayaraja, S.Dhanasekar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201404.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201404.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Integrated System for Reading Multiple Files <br>Authors: Awanti Kamble, Anshoola Jaiswal, Nikita Dekate, Shama Haridas, Kalyani Pendke <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201411.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201411.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: ENHANCING SECURITY IN TWO-WAY RELAY NETWORK BY USING COOPERATION JAMMING AND RELAY SELECTION APPROACH <br>Authors: Ramya T V, M. Madan Mohan <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201413.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201413.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Honey Trap Security Server: An Efficient Approach of Securing E-Banking Network <br>Authors: Ashwini Gabhane, Kiran Bansule, Pradnya Kedar, Lekha Gahukar, Swati Sahare, Ketki Bhakare<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201416.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201416.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Secure Hierarchical Temporal Access Control in Cloud Computing <br>Authors: Karthika.RN, Vijay Anand.P, M.Rajesh Khanna <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201419.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201419.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Weighted Moving Average Forecast Model based Prediction Service Broker Algorithm for Cloud Computing <br>Authors: Prof. Deepak Kapgate <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201423.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201423.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A NOVEL ON FAST PARALLEL FILE TRANSFER USING REPLICATION <br>Authors: K.Sabarigirivason, R. Giridharan <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201428.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201428.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201428.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Evaluating and Analyzing Clusters in Data Mining using Different Algorithms <br>Authors: N. Sunil Chowdary, D. Sri Lakshmi Prasanna, P. Sudhakar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201409.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201409.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: High Efficiency Data Access System Architecture for Deblocking Filter Supporting Multiple Video Coding Standards <br>Authors: S.Karthikeyan, K.Saran <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201430.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201430.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: Literature Survey on Applications of Digital Signal Processing using Anti-Aliasing and Anti-Imaging Filters <br>Authors: S.Arun Kumar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201434.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201434.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: An Investigation of Face Recognition Characteristics Using PCA and ICA <br>Authors: Yundi Fu, Yongli Cao, Arun Kumar Sangaiah <br>Country: China \/ India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201441.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201441.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201441.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: An Investigation of Dijkstra and Floyd Algorithms in National City Traffic Advisory Procedures<br>Authors: Arun Kumar Sangaiah, Minghao Han, Suzi Zhang <br>Country: India\/China<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201442.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201442.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: AN EFFICIENT LOCATION BASED ROUTING FOR MOBILE ADHOC NETWORKS <br>Authors: S.Saranya, D.Gokilapriya<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201426.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201426.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Porter Five Forces Analysis of the Leading Mobile Cellular Telephony Service Provider in India<br>Authors: Subhasish Majumdar, Partha Pratim Bhattacharya <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201451.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201451.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201451.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Implementing &amp; Developing Cloud Computing on Web Application <br>Authors: Anisha Tandon <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201415.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201415.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A ZIG-BEE BASED WEARABLE HEALTH MONITORING SYSTEM <br>Authors: M.Sherwin Nayanar, V.Pandimurugan, V.Gowri <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201432.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201432.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Application of the Fuzzy Logic in Content Based Image Retrieval using Color Feature <br>Authors: Aqeel M. Humadi, Hameed A. Younis <br>Country: Iraq<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201444.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201444.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: VLSI Implementation and Analysis of Parallel Adders for Low Power Applications <br>Authors: Arunprasath S, Karthick A, Dhineshkumar D <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201453.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201453.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201453.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Degraded Documents Recovering by Using Adaptive Binarizations and Convex Hull Concept<br>Authors: Mahendar.R, Navaneetha Krishnan.S, Roshini Ravinayagam, Prakash.P <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201456.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201456.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A New Key Management Paradigm for Fast Transmission in Remote Co-operative Groups <br>Authors: M.VIJAYAKUMAR, V.PRIYA DHARSHINI, Dr.C.SELVAN <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201458.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201458.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: SECURE DATA TRANSMISSION OVER WIMAX NETWORKS USING VPN TECHNOLOGY IN REALTIME ENVIRONMENTS <br>Authors: J.BALU, DR.S.THIRUNIRAI SENTHIL<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201460.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201460.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: On Generating Permutations under User Defined Constraints <br>Authors: Dhruvil Badani <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201414.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201414.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: ADVANCED WEB BROWSER WITH EFFECTIVE TOOLS <br>Authors: M.Loganathan, K.E.Dharani <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201418.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201418.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: EXTENDED AND EMBEDDED VISUAL CRYPTOGRAPHY <br>Authors: G.Tejeswar Reddy, N.Meenakshi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201425.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201425.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: CONDITIONAL PRIVACY PRESERVING SECURITY PROTOCOL FOR NFC APPLICATION <br>Authors: V.Gowri, F.W.JESUDAS, M.Sherwin Nayanar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201433.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201433.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Trust Based Voting Scheme and Optimal Multipath Routing for Intrusion Tolerance in Wireless Sensor Network <br>Authors: P.PRIYADHARSHINI, C.ANOOR SELVI <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201445.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201445.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: AN ANDROID APPLICATION FOR UNIVERSITY ONLINE COUNSELING <br>Authors: N. Banu Priya, I. Juvanna <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201454.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201454.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: PATH LOSS PREDICTION FOR GSM MOBILE NETWORKS FOR URBAN REGION OF ABA, SOUTH-EAST NIGERIA <br>Authors: NWALOZIE GERALD .C, UFOAROH S.U, EZEAGWU C.O, EJIOFOR A.C <br>Country: Nigeria<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201459.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201459.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201459.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: XML Dissemination Scheme for Mobile Computing Based on Lineage Encoding <br>Authors: K. Anusree, Mrs. D. Usha, C. Shiny Jennifer <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201467.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201467.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: APPLICATION OF CLOUD COMPUTING AS HPC PLATFORM FOR EMBEDDED SYSTEMS <br>Authors: N.S.Gawai, B.V.Chikte, V.R.Pandit, S.M.Ingale, M.S. Burle <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201469.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201469.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Analysis of Lossy Hyperspectral Image Compression Techniques <br>Authors: Dr. S.M.Ramesh, P.Bharat, J.Anand, J.Anbu Selvan<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201421.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201421.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: VLSI Architecture for Implementing Kaiser Bessel Window Function Using Expanded Hyperbolic CORDIC Algorithm <br>Authors: M.Mohana Arasi, J.Anand, P.Bharat, J.Anbu Selvan <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201422.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201422.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Copyright Protection through Deep Packet Inspection- An Indian Perspective <br>Authors: Priyanka Jain, Jai Sachith Paul, Prof. K.Pradeep Kumar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201429.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201429.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: FINITE-PRECISION ANALYSIS OF DEMAPPERS AND DECODERS FOR LDPC-CODED M-QAM SYSTEMS <br>Authors: Hoglah Leena Bollam <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201455.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201455.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: VAMPIRE ATTACKS: PROTOCOL ROUTING INFRASTRUCTURE IN WIRELESS SENSOR NETWORKS<br>Authors: T.Nivethitha, S.Muthukrishnan, S. Navaneethakrishnan <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201465.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201465.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM <br>Authors: K.Senthamil Selvi, P.Chitrakala, A.Antony Jenitha <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201468.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201468.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Monitoring Factory Machine Status from Remote Location using GSM Technologies <br>Authors: C. Shiny Jennifer, B.V. Baiju, K. Anusree <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201470.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201470.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: EFFICIENT GRIDDING AND SEGMENTATION FOR MICROARRAY IMAGES <br>Authors: P.Thamaraimanalan, D.Dhinesh kumar, K.Nirmalakumari <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201471.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201471.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique <br>Authors: A.Jeeva, Dr.C.Selvan, A.Anitha <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201473.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong><br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201473.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: DETECTING NODE REPLICATION ATTACKS IN STATIC AND MOBILE SENSOR NETWORKS USING SPRT <br>Authors: T.EZHILARASAN, R.BACKIYALAKSHMI<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201481.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201481.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Supervised Method for Multi-keyword Web Crawling on Web Forums <br>Authors: A.Gowtham, Dr.K.Deepa <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201484.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201484.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Improvement of Email Summarization Using Statistical Based Method <br>Authors: Mithak I. Hashem <br>Country: Iraq<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201488.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201488.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Intrusion Detection, Secure Protocol &amp; Network Creation for Spontaneous Wireless AD HOC Network <br>Authors: Nikhil Varghane, Prof. Bhakti Kurade, Prof. Chandradas Pote <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201496.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201496.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: DESIGN PATTERN BASED ANALYSIS IN MULTI-AGENT FRAMEWORK <br>Authors: A.Sindhuja, Rathi.P.R, Anis Fathima.A.R, A.P.Jeyasanthini <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201412.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201412.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: LARYNX DISEASE ANALYSIS USING DYNAMIC TIME WARPING ALGORITHM <br>Authors: K. Aiswarya Lakshmi, D. Karunanithi, G.Swetha <br>Country: India<br><strong>Paper Deleted<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Traveler Guide using GPS <br>Authors: Prashant Beldar, Prashant Bansode, Rajendra Mane, Swapnil Gaikwad <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201464.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201464.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: TIMETABLE GENERATION SYSTEM <br>Authors: Anuja Chowdhary, Priyanka Kakde, Shruti Dhoke, Sonali Ingle, Rupal Rushiya, Dinesh Gawande<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201474.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201474.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201474.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Smart Remote Health Care Data Collection Server <br>Authors: Kalyani Bangale, Karishma Nadhe, Nivedita Gupta, Swati Singh Parihar, Gunjan Mankar<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201478.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201478.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201478.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: LABVIEW Based Module For Bio Signals Monitoring <br>Authors: Sabeetha Begum.M, Kumarnath.J <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201489.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201489.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Review<br>Title: Review on MANET: Characteristics, Challenges, Imperatives and Routing Protocols <br>Authors: Mahima Chitkara, Mohd. Waseem Ahmad <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a3.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a3.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a3.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Review<br>Title: Review of Techniques for Detecting Video Forgeries <br>Authors: Aniket Pathak, Dinesh Patil<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a9.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a9.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a9.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: QUASI RESONANT BUCK CONVERTER FOR DUAL STRING BUCK LED DRIVER <br>Authors: Vijayadevi.A, Sneha Prem, Jikku Mathew, Manikandan.K, Sajla Rehman <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a18.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a18.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Lossless Compression for Compound Documents Based on Block Classification <br>Authors: A.Thamarai Selvi, M.Sambath, S.Ravi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201483.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201483.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: ADDRESSING BIG DATA WITH HADOOP <br>Authors: TWINKLE ANTONY, SHAIJU PAUL <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201431.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201431.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Review<br>Title: Privacy in Map Reduce Based Systems: A Review <br>Authors: Rosmy C Jose, Shaiju Paul <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201475.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201475.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: AN ELLIPTIC CURVE CRYPTOGRAPHY BASED ENHANCED ADAPTIVE ACKNOWLEDGEMENT (ECC-EAACK) INTRUSION DETECTION SYSTEM <br>Authors: Deboral C, Sudhagar G <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201477.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201477.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: PRECIPITATE MESSAGE MANIFEST PROTOCOL FOR VEHICULAR AD HOC NETWORKS <br>Authors: Ramya. K, Nithya. N <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201479.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201479.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: JOINT VIDEO COMPRESSION AND ENCRYPTION USING SECURE WAVELET TRANSFORM AND ENTROPY CODING <br>Authors: E.Mallika, K.SivaKumar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201480.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201480.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Study of Security Risk and Vulnerabilities of Cloud Computing<br>Authors: Dr.P.K.Rai, R.K.Bunkar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a34.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a34.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Novel Techniques for Color and Texture Feature Extraction <br>Authors: Miss. Priyanka N.Munje, Prof. Deepak Kapgate, Prof. Snehal Golait <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201435.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201435.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Data Integration Models for Operational Data Warehousing <br>Authors: G. Swetha, D. Karunanithi, K. Aiswarya Lakshmi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201462.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201462.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: REALIZATION OF VLSI ARCHITECTURE FOR DECISION TREE BASED DENOISING METHOD IN IMAGES <br>Authors: Gobu.CK, Priya.R <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201486.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201486.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Providing Efficient Data management Services Using Cloud Cache <br>Authors: Swapnil L. Mahadeshwar, A.R.Surve <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201495.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201495.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201495.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: GAPSS: GPS Aided Photo Search System <br>Authors: Amey Divekar, Pravin Khot, Gaurav Chaudhari, Vishal Shembekar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a2.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a2.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Review<br>Title: A Review on Privacy Problems in Distributed Information Brokering System and Solutions <br>Authors: Mr. Ashutosh Kamble, Prof. Deepak Kapgate, Prof. Prakash Prasad <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a5.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a5.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: SURVEY ON SECURE AUDIO ENCRYPTION USING SILENCE PART OF THE SPEECH <br>Authors: V. Anusuya Devi, Dr. V. Kalaivani, T. Sam Pradeep Raj <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a13.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a13.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: An Approach for Minimization of Power Consumption in Ad-Hoc Network <br>Authors: Abhiruchi Akre, Kimi Bhoyar, Ankita Malve, Avantika Kalbande, Pawan Khade <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a14.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a14.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a14.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Outlier Mining for Removing the Anomalies in High Dimensional Data Using ARVDH Algorithm<br>Authors: Krupa Mary Jacob, K.Sangeetha, S.Karthik <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a17.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a17.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: DETECTION OF MASQUERADERS USING TREE STRUCTURED SVM <br>Authors: P.Anishprabu, M.Sangeetha, M.Nagulanand <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a19.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a19.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: EduPad- &#8220;A Tablet Based Educational System for Improving Adult Literacy in Rural India&#8221; <br>Authors: Miss. Mayuri S. Tawari, Prof. Richa Sharma, Prof. Charandas Pote <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a25.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a25.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Solution to Data Sharing for Confidentiality between Service Provider and the Data Owner<br>Authors: Mr. Ajay Bhaisare, Prof. Prakash Prasad, Prof. Ashwini Meshram <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a32.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a32.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: TOWARDS SECURE PROCESSING PRIVATE QUERIES OVER ENCRYPTED CLOUD DATA <br>Authors: Sumathi Sivaraj, S. Yasotha <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a40.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a40.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: CYBER SECURITY -Trends and Challenges <br>Authors: Vidhya P.M <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a41.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a41.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Gas Level Detection and Leakage Monitoring System using a Specific Technique <br>Authors: I. Juvanna, N. Meenakshi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201490.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201490.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Review<br>Title: Lane Detection Techniques &#8211; A Review <br>Authors: Anjali Goel <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201491.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201491.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201491.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Review<br>Title: A Review on Image Dehazing Methods <br>Authors: Reshma Kurian, Namitha T.N <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a7.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a7.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: APPLICATION OF STATISTICAL MODELS TO THE COLLABORATIVE PUBLICATIONS IN BIOINFORMATICS <br>Authors: Dr. N. Amsaveni, M. Manjula<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a23.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a23.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryption <br>Authors: Prof. Y.B.Gurav, Manjiri Deshmukh<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a29.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a29.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: EFFICIENT AND DISTRIBUTED NETWORK MODEL FOR P2P SYSTEMS <br>Authors: K.KAYALVIZHI, BHARATHI.R <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a38.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a38.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Attendance Monitoring Using Face Recognition <br>Authors: Divya Singh, Ruhi Sunil Hadke, Shruti Sanjay Khonde, Valhavi Diwakar Patil, Monica Kamnani, Mitali R. Ingle <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a48.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a48.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: GEOGRAPHIC ROUTING SCHEME BASED ON DYNAMIC LOCATION UPDATE AND LOAD BALANCING MECHANISM <br>Authors: M.Rajalakshmi, K.Gowsic <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a55.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a55.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a55.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: SECURE NETWORK SHARING NEMO BASED AD-HOC <br>Authors: V.Pavithra, M.Mohankumar <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201485.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201485.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201485.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A SECURITY ARCHITECTURE ACHIEVING ANONYMITY AND TRACEABILITY IN PAYMENT BASED SYSTEM <br>Authors: M.Sangeetha, S.Rajasulochana, S.Shanmathi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a50.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a50.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: SAT4BSC: A Static Analysis Tool for BPEL Source Codes <br>Authors: Esubalew Alemneh, Abdul Azim Abd Ghani, Rodziah Atan <br>Country: Ethiopia\/Malaysia <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a33.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a33.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Improvising Authenticity and Security of Automated Teller Machine Services <br>Authors: Srivatsan Sridharan, Gorthy Ravi Kiran, Sridhar Jammalamadaka <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a66.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a66.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: A Survey on Privacy-Preserving Techniques for Secure Cloud Storage <br>Authors: Salve Bhagyashri, Prof. Y.B.Gurav <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a24.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a24.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Cloud Removal from Satellite Images Using Information Cloning <br>Authors: Saranya <br>M Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a28.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a28.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Automatic Detection of Optic Disc for the Extraction of Ocular Structure <br>Authors: Nivedha S, Dinesh V <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a30.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a30.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a30.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Review<br>Title: PHISHING WEBSITE DETECTION: A REVIEW <br>Authors: Feon Jaison, Seenia Francis <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a42.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a42.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Review<br>Title: A Review of Intrusion Detection System in Computer Network <br>Authors: Abhilasha A Sayar, Sunil. N. Pawar, Vrushali Mane <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a46.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a46.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a46.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: MULTIMEDIA QA GENERATION BY USING SEARCH DIVERSIFICATION <br>Authors: Nandhini.N, Ramya.K, Sandeepa.P <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a63.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a63.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: CPU Power Prediction on Modern Multicore Embedded Processor <br>Authors: Shuhaizar Daud, R. Badlishah Ahmad, Ong Bi Lynn <br>Country: Malaysia<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a67.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a67.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a67.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Vampire Attacks: Topology Discovery in Wireless Ad Hoc Sensor Networks <br>Authors: P. Dhivya, P. Sathya Priya, M. Thenila <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a27.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a27.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Integration of Touch Technology in Restaurants using Android <br>Authors: Sushmita Sarkar, Resham Shinde, Priyanka Thakare, Neha Dhomne, Ketki Bhakare <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a35.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a35.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: VIDEO MINING AND ANOMALY DETECTION: SURVEY <br>Authors: Subashree.D, Sobitha Ahila.S <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a49.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a49.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Review<br>Title: Review on Authentication Mechanisms of Digital Signatures used for Certification <br>Authors: Shraddha Kulkarni, Prof. Vikrant Chole, Prof. P S Prasad <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a52.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a52.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: AN ANTI-PHISHING FRAMEWORK WITH NEW VALIDATION SCHEME USING VISUAL CRYPTOGRAPHY <br>Authors: Mr. Bhushan Yenurkar, Mr. Shrikant Zade <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a61.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a61.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Advanced E-mail Spam Detection Methodology by the Neural Network Classifier <br>Authors: V. BRINDHA, J. GEORGE CHRISTOBER, V.NANDHINI <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a39.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a39.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Translation of English Algorithm in C Program using Syntax Directed Translation Schema <br>Authors: Nisha N. Shirvi, Mahesh H. Panchal <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a47.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a47.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a47.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: One-Dimension Multi-Objective Bin Packing Problem using Memetic Algorithm <br>Authors: Khushbu Patel, Mahesh Panchal<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a51.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a51.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a51.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Filtered Wall: An Automated System to Filter Unwanted Messages from OSN User Walls <br>Authors: Ms. Pallavi Kalyane, Prof. Sachin Chavan, Prof. Pravin Rahate <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a56.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a56.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Mining Multilevel Fuzzy Association Rule from Transaction Data <br>Authors: Urvi A. Chaudhary, Mahesh Panchal <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a64.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a64.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a64.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Enhanced Live Migration of Virtual Machine Using Comparison of Modified and Unmodified Pages <br>Authors: Sushil Kumar Soni, Ravi Kant Kapoor <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a65.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a65.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a65.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING <br>Authors: Mary Michael, J.Mary Metilda <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a71.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a71.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Wavelet Transform Based Secure Data Transfer Using Blowfish Algorithm <br>Authors: Rashmi.J, Bharathi.G <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a45.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a45.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: AN EFFICIENT METHOD TO AVOID FALSE VOTING USING SMS VOTING APPROACH <br>Authors: K.Mythili, K.Kanagavalli, B.Shibi <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a62.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a62.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: An Efficient Real Time Video Multicasting Protocol and WLANs Cross-Layer Optimization in IEEE 802.11N <br>Authors: Gopikrishnan.R, Ms. J.R.Thresphine<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a57.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a57.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Implementation of Password Guessing Resistant Protocol (PGRP) to Prevent Online Attacks<br>Authors: M.YUVARAJ, A.R.BHARATHIDASAN, N.KUMAR <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a22.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a22.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a22.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Selection of Most Relevant Features from High Dimensional Data using IG-GA Hybrid Approach<br>Authors: Ishani Mandli, Prof. Mahesh Panchal <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a68.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a68.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: WIRELESS MESH NETWORKS: ISSUES AND CHALLENGES <br>Authors: Jubil Jose, Rigi C.R <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a58.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a58.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A TECHNIQUE FOR IMPROVING CAKEPHP WEB PAGE RESPONSE TIME <br>Authors: Pharaoh Chaka, Hilton Chikwiriro <br>Country: Zimbabwe<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a43.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a43.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: EXHAUSTING VERVE BY VAMPIRE&#8217;S IN WIRELESS AD HOC SENSOR NETWORKS <br>Authors: P. DivyaPrabha, R. Sundaram <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201476.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201476.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Enhanced Privacy ID for Remote Authentication using Direct Anonymous Attestation Scheme<br>Authors: Uma.R, Aravind.P <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a15.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a15.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a15.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Intrusion Detection in Mobile Adhoc Network <br>Authors: Mrs. Mugdha Kirkire, Prof. Poonam Gupta <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a69.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a69.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: ENTITY SEARCH ENGINES <br>Authors: Pinky Paul, Mr. Thomas George <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a72.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a72.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a72.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: CONCEALED CLIENT DATA AGGREGATION FOR DATABASE-AS-SERVICE (DAS) <br>Authors: JEBARANJANI.B, SANGEETHA.S <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201424.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201424.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: BUNDLE PROTOCOL ALONG WITH OLSR IN MANET <br>Authors: J. Vithya Roshni, J. Prabin Jose <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201452.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201452.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Rendezvous Based Sensory Data Collection with Re-clustering Technique <br>Authors: D.Gokilapriya, N.Lokesh <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201493.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201493.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201493.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: Literature Survey on DWT Based Image Steganography <br>Authors: Mrs. Suvarna Patil, Mr. Gajendra Singh Chandel <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201450.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201450.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201450.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Detection of Fire Flow in Videos by SVM Classifier with EM-Segmentation Method <br>Authors: S.Shanthi, J.George Christober <br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/abstracts\/V3I2201499a60.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Abstract<\/a><\/strong> <br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a60.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Design and Implementation of a New Multi-Functional Fused Dot Product in FPGA <br>Authors: Amir Baniasad Azad, Amir Sabbagh Mollahoseini <br>Country: I<strong>ran<\/strong><br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201461.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Software Risk Management<br>Authors: Sukhdev Singh Ghuman <br>Country: I<strong>ndia<\/strong><br><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2014\/V3I2201499a73.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>View\/Download PDF<\/strong><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p style=\"font-size:26px\"><strong>Contact us or submit a paper through below form:<\/strong><\/p>\n\n\n\n<div class=\"forminator-guttenberg\"><div class=\"forminator-ui forminator-custom-form forminator-custom-form-1020 forminator-design--default  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-1020\" data-uid=\"69f31b848d79b\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-1020\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-1020 forminator-design--default  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"1020\"\n\t\t\t\tenctype=\"multipart\/form-data\" data-color-option=\"default\" data-design=\"default\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"69f31b848d79b\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div class=\"forminator-row\"><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_69f31b848d79b\" id=\"forminator-field-name-1_69f31b848d79b-label\" class=\"forminator-label\">First Name <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"E.g. John\" id=\"forminator-field-name-1_69f31b848d79b\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_69f31b848d79b\" id=\"forminator-field-email-1_69f31b848d79b-label\" class=\"forminator-label\">Email Address <span class=\"forminator-required\">*<\/span><\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"E.g. john@doe.com\" id=\"forminator-field-email-1_69f31b848d79b\" class=\"forminator-input forminator-email--field\" data-required=\"true\" aria-required=\"true\" autocomplete=\"email\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"phone-1\" class=\"forminator-field-phone forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-phone-1_69f31b848d79b\" id=\"forminator-field-phone-1_69f31b848d79b-label\" class=\"forminator-label\">Phone Number<\/label><input type=\"text\" name=\"phone-1\" value=\"\" placeholder=\"E.g. +1 3004005000\" id=\"forminator-field-phone-1_69f31b848d79b\" class=\"forminator-input forminator-field--phone\" data-required=\"\" aria-required=\"false\" autocomplete=\"off\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_69f31b848d79b\" id=\"forminator-field-textarea-1_69f31b848d79b-label\" class=\"forminator-label\">Message <span class=\"forminator-required\">*<\/span><\/label><textarea name=\"textarea-1\" placeholder=\"Enter your message...\" id=\"forminator-field-textarea-1_69f31b848d79b\" class=\"forminator-textarea\" rows=\"6\" style=\"--forminator-textarea-min-height:140px;\" maxlength=\"180\" ><\/textarea><span id=\"forminator-field-textarea-1_69f31b848d79b-description\" class=\"forminator-description\"><span data-limit=\"180\" data-type=\"characters\" data-editor=\"\">0 \/ 180<\/span><\/span><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"upload-1\" class=\"forminator-field-upload forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-upload-1_69f31b848d79b\" id=\"forminator-field-upload-1_69f31b848d79b-label\" class=\"forminator-label\">Upload file <span class=\"forminator-required\">*<\/span><\/label><div class=\"forminator-file-upload \" data-element=\"upload-1_69f31b848d79b\"><input type=\"file\" name=\"upload-1\" id=\"forminator-field-upload-1_69f31b848d79b\" class=\"forminator-input-file-required do-validate\" accept=\".jpg,.jpeg,.jpe,.gif,.png,.bmp,.tiff,.tif,.webp,.ico,.heic,.asf,.asx,.wmv,.wmx,.wm,.avi,.divx,.flv,.mov,.qt,.mpeg,.mpg,.mpe,.mp4,.m4v,.ogv,.webm,.mkv,.3gp,.3gpp,.3g2,.3gp2,.txt,.asc,.c,.cc,.h,.srt,.csv,.tsv,.ics,.rtx,.vtt,.mp3,.m4a,.m4b,.aac,.ra,.ram,.wav,.ogg,.oga,.flac,.mid,.midi,.wma,.wax,.mka,.rtf,.pdf,.class,.tar,.zip,.gz,.gzip,.7z,.psd,.xcf,.doc,.pot,.pps,.ppt,.wri,.xla,.xls,.xlt,.xlw,.mdb,.mpp,.docx,.docm,.dotx,.dotm,.xlsx,.xlsm,.xlsb,.xltx,.xltm,.xlam,.pptx,.pptm,.ppsx,.ppsm,.potx,.potm,.ppam,.sldx,.sldm,.onetoc,.onetoc2,.onetmp,.onepkg,.oxps,.xps,.odt,.odp,.ods,.odg,.odc,.odb,.odf,.wp,.wpd,.key,.numbers,.pages\" tabindex=\"-1\"><button id=\"forminator-field-upload-1_69f31b848d79b_button\" class=\"forminator-button forminator-button-upload\" data-id=\"forminator-field-upload-1_69f31b848d79b\">Choose File<\/button><span data-empty-text=\"No file chosen\">No file chosen<\/span><button class=\"forminator-button-delete\" style=\"display: none;\"><i class=\"forminator-icon-close\" aria-hidden=\"true\"><\/i><span class=\"forminator-screen-reader-only\">Delete uploaded file<\/span><\/button><\/div><\/div><\/div><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><div class=\"forminator-row forminator-row-last\"><div class=\"forminator-col\"><div class=\"forminator-field\"><button class=\"forminator-button forminator-button-submit\">Send Message<\/button><\/div><\/div><\/div><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"5abd2d14af\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/index.php\/wp-json\/wp\/v2\/pages\/620\" \/><input type=\"hidden\" name=\"form_id\" value=\"1020\"><input type=\"hidden\" name=\"page_id\" value=\"620\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/ijcsmc.com\/index.php\/volume-3-issue-2\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><\/form><\/div>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Getting any problem in Paper Uploading?<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Please dont worry, just Submit \/ Email your paper at ijcsmc@zainpublications.com<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Type: ResearchTitle: Distributing, Ensuring and Recovery of Data Stored in Cloud Authors: Dr. B. F. Momin, Mr. Girish Bamane Country: IndiaAbstract View PDF Type: SurveyTitle: A Survey Conducted on E-Agriculture with Indian Farmers Authors: Sumitha Thankachan, Dr. S. Kirubakaran Country: IndiaAbstract View PDF Type: SurveyTitle: A Survey on Delegating Log Management to The Cloud Authors: [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"slim_seo":{"title":"Volume 3 Issue 2 - International Journal of Computer Science and Mobile Computing - IJCSMC","description":"Type: Research Title: Distributing, Ensuring and Recovery of Data Stored in Cloud Authors: Dr. B. F. Momin, Mr. Girish Bamane Country: India Abstract View PDF T"},"footnotes":""},"class_list":["post-620","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages\/620","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/comments?post=620"}],"version-history":[{"count":4,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages\/620\/revisions"}],"predecessor-version":[{"id":1891,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages\/620\/revisions\/1891"}],"wp:attachment":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/media?parent=620"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}