An Open Access Journal
|
Publisher - D-LAR Labs [Digital Library of Academic Research] |
ISSN Under CSIR -
NISCAIR
Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us
Impact Factor -
1.02
All Publications
Volume 5, Issue 3
Volume 5, Issue 2
Volume 5, Issue 1
Volume 4, Issue 6
Volume 4, Issue 5
Volume 4, Issue 4
Volume 4, Issue 3
Volume 4, Issue 2
Volume 4, Issue 1
Volume 3, Issue 6
Volume 3, Issue 5
Volume 3, Issue 4
Volume 3, Issue 3
Volume 3, Issue 2
Volume 3, Issue 1
Volume 2, Issue 6
Volume 2, Issue 5
Volume 2, Issue 4
Volume 2, Issue 3
Volume 2, Issue 2
Volume 2, Issue 1
Volume 1, Issue 6
Volume 1, Issue 5
Volume 1, Issue 4
Volume 1, Issue 3
Volume 1, Issue 2
Volume 1, Issue 1
June 2016,
Volume 5, Issue 3 -
Full Volume
Deafness Removal for Directional MAC in Ad-hoc Network
Gopal Singh Bhadoriya
Reena Chauhan
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
424-428
A Comparative Study of Multi Scale Transform based Fusion Techniques
Arwinder Kaur
Ramanjeet Kaur
Manish Mahajan
Shalini Singh
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
429-436
Neighbor Node Discovery for Wireless Ad-Hoc Network
Snehal V. Ambatkar
Pravin Kulkarni
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
437-440
Home Automation Using the Concept of IoT
Tejal Deshpande
Nitin Ahire
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
441-445
Wireless Multi-Hop Dynamic Live Video Sharing using Android Gadgets
Suvarna L. Kattimani
Deepa Deshpande
Nazeera Madabhavi
Rohini Naganur
Savitri Seeparamatti
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
446-453
Hybrid Approach for Anonymity based Secured Routing in MANET with Effective Resource Utilization
Charulata Ahir
Dr. Hemant Deshmukh
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
454-457
An Efficient Multipath Routing Protocol with Replication for On-demand Video Streaming in MANETs
R. Raja Sekhar
Dr. P. Chennareddy
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
458-466
Directions Aids for the Visually Challenged Using Image Processing Using Image Recognition
Riya Mishra
Sampurna Mondal
Aditi Kuchnure
Risha Shah
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
467-471
Prioritizing Emails and Protect from Spam by Effectively Using Identity and Address Book Features
Venkata SanyasiRao Sasipalli
Krishnam Raju Gottumukkala
K.S. Murthy Naidu
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
472-476
Statistical Approach for Sentiment Analysis of Product Reviews
Nilesh Shelke
Shriniwas Deshpande
Vilas Thakare
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
477-482
Mash-Up in Multiple Cloud Computing With Security
Mrunali Khedikar
Sulbha Patil
Rajiv Dharasakar
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
483-488
Improved Technique for Simulation of Digital Forensic Architecture Framework in Cloud
Smita Kamble
Sulabha Patil
Rajiv Dharaskar
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
489-496
Technique for Proficiently Yielding Deep-Web Interfaces Using Smart Crawler
Devendra Hapase
M. D. Ingle
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
497-503
E-learning Optimization by Improving Education Cloud Using the Grid
Abbas Taheri
Morteza Zolfpour-Arokhlo
Farhad Rad
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
504-508
Review on Secure Proof of Retrievability
Saurabhee Wandhekar
Aradhana Deshmukh
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
509-512
Internet Usage by Distance Students in Private University Libraries in GHANA
Samuel Ameyaw
Edward Asante
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
513-522
Effective Sampling Selection Strategy with Reduced Effort Implied, In Tuning Large Scale Deduplication
Ashwini R.
Sridevi S.
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
523-525
A Review on Development of Real Time Algorithm using Mobile Adhoc Networks for Disaster Management
Moresh M Mukhedkar
Dr. Uttam Kolekar
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
526-534
An Approach for Integrating Data with Uncertainty Schema in a Slow Network Connection
Vitalis Ndume
Jesuk Ko
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
535-543
Approach Using Genetic Algorithm for Intrusion Detection System
Abhijeet Karve
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
544-548
Data Preserving and Sharing in a Multi Owner Environment While Preserving Identity Privacy
Swapnil N. Naidu
Sunilkumar N. Jaiswal
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
549-553
Rules Based Intrusion Detection System Using Genetic Algorithm
Pawan S. Maniyar
Dr. Vijaya Musande
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
554-558
Authorized Deduplication in Hybrid Cloud
Jagadish P
Shryavani K
Anand R
Dr. M V Vijaykumar
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
559-563
Torrent Based Content Streaming and Image Compression in WSN
Bhushan Mahajan
Dr. A. R. Mahajan
A. Thomas
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
564-573
Comparison of Routing Protocols in MANET- A Review
Indu Sharma
Shaina Pundir
Full Text Paper
| Year: June 2016
| Volume 5
Issue 3
| Pages
574-577
List of Computer Science Journals
Computer Science Journal
IEEE Journals
Conference Alerts
International Conference Alerts
Impact Factor
List of computer science journal
Engineering Journals
IJCSN
Electronics Journals
IEEE Papers *
Mathematics Journals
Call for papers 2013