An Open Access Journal | Publisher - D-LAR Labs [Digital Library of Academic Research] |
ISSN Under CSIR - NISCAIR
Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us
All Publications
  Volume 3, Issue 2
  Volume 3, Issue 1
  Volume 2, Issue 6
  Volume 2, Issue 5
  Volume 2, Issue 4
  Volume 2, Issue 3
  Volume 2, Issue 2
  Volume 2, Issue 1
  Volume 1, Issue 6
  Volume 1, Issue 5
  Volume 1, Issue 4
  Volume 1, Issue 3
  Volume 1, Issue 2
  Volume 1, Issue 1
     June 2014 Volume 3, Issue 3
   
  A Comparative Study of Cryptographic Algorithms
 
Manzoor Hussain Dar Pardeep Mittal Vinod Kumar
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 01-04
   
   
  Wireless Buddy – LAN Monitoring Using Android Phone
 
Chaitanya Surana Tejas Pote Chhaya Varade Rekha Jadhav
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 05-07
   
   
  Dynamic Data Mining Tool o on Distributed Encrypted Data
 
Pranali M. Sonawane Vikas K. Kumawat Vijayalaxmi L. Balsane Prachi B. Suryavanshi Ramnath Banerjee
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 08-11
   
   
  NIOS II Based Embedded Web Server Development for Networking Applications
 
Sheetal Bhoyar Dr. D. V. Padole
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 12-16
   
   
  Jamming Aware Traffic Allocation in Wireless Mesh ware Network for Multiple Path Routing using Portfolio Selection
 
Sagar Tete Vaidehi Baporikar
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 17-20
   
   
  Cloud Based Web IDE for Collaborating Programmers
 
Rohini C. Ekghare Manish Hadap
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 21-26
   
   
  Design Approach for Implementation of Vehicle to Vehicle Communication Using Control and Warning Packets
 
Pooja Kothe V. N. Katkare
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 27-32
   
   
  3G Broadband Solution for Small and Medium Enterprises
 
Haruna U. Adoga
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 33-40
   
   
  Deciphering of Transposition Ciphers u using Genetic sing Algorithm
 
Alok Singh Jadaun Vikas Chaudhary Lavkush Sharma Gajendra Pal Singh
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 41-45
   
   
  A Framework for Improving Securit Security Efficiency in Wireless y Sensor Networks
 
Soumya B Pramela Devi S
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 46-49
   
   
  Gossip Based Information Dissemination in a Distributed System
 
Navaraj Chettri Dhruba Ningombam
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 50-56
   
   
  A Watermarking Scheme with Scrambled Watermark for Authentication of Video
 
J.V. Bagade Nilesh Khare Nikhil Patil Abhijeet Kumar
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 57-60
   
   
  An Algorithm for D Deployment of Homogeneous Sensors
 
Amol Lachake Girish Potdar
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 61-65
   
   
  Track Track-Before Before-Detect Technique for Mitigating Sea Clutter Based on Hough Transform
 
Megha Chittapur Sharavana K
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 66-70
   
   
  A Comparative Study of Cryptographic Algorithms
 
Himadri Sekhar Atta
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 71-76
   
   
  Critical Success Factors of Enterprise Resource Planning Systems Implementation in Sudan
 
Nasir M. Ali Yousif Ahmed Talab Eltyeb E. Abed Elgabar Samani A. Talab
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 77-84
   
   
  Rerouting Based o on Receiver Feedback in Real Time n Streaming
 
Debjyoti Dutta Kaushik Banerjee
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 85-87
   
   
  Integration of Signature Based and Anomaly ased Based ased Detection
 
Prerika Agarwal Sangita Rani Satapathy
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 88-91
   
   
  Multi Multi-camera Based Monitoring Approach to Support the Prediction of Landslides
 
Takeshi Hashimoto Satorushi Kimura András Rövid Satoshi Tsuchiya Yoichi Takebayashi
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 92-98
   
   
  Combining Cryptographic Primitive to Prevent Selective Jamming Attacks
 
Omana Bangaru R
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 99-111
   
   
  A Survey on Fraud and ID Thefts in Cyber Crime
 
Manish Kumar Jha Dr.Surendra Yadav Rishindra Shashi Ranjan
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 112-114
   
   
  A New WSN Scheme B Benefited with Low Cost and Power enefited Efficiency
 
Nidhi Sewal Urvashi Chugh
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 115-118
   
   
  Cross Site Request Forgery on Android WebView
 
Bhavani A B
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 119-124
   
   
  Design an Improved Pa Path Selection Algorithm that is th Inspired from Particle Swarm Optimization (PSO)
 
Manju Chaudhary Sunil Ahuja Komal
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 125-131
   
   
  Advanced Heuristic Technique for Solving Travelling Salesperson Problem Using Ant Colony Optimization
 
Wrishin Sarkar Himadri Nath Saha Sourav Kumar Dhar Sandipan Roy
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 132-137
   
   
  Adaptive Wavelet Thresholding for Noise Reduction in eduction Electrocardiogram (ECG) Signals
 
Manpreet Kaur Gagandeep Kaur
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 138-143
   
   
  Authentication and Integrity for Outsourced Enterprise Storage E Environments
 
ch.Sravan Kumar srinivas Kolli Dr P.Chenna Reddy
 
Full Text Paper | Year: June 2014 | Volume 3 Issue 3 | Pages 144-147
   

  List of Computer Science Journals
Computer Science Journal IEEE Journals Conference Alerts
International Conference Alerts Impact Factor List of computer science journal
Engineering Journals IJCSN Electronics Journals
IEEE Papers * Mathematics Journals Call for papers 2013