Vol 7, No 5 (2016)

Table of Contents

Vol 7, No 5 (2016)

Articles

Resolution Independent 2D Cartoon Video Conversion
M. S. F. Fayaza, M. A. M. Aazeer, M. F. H. M. Adheeb, K. F. Muhiminah, S. C. Premarathna
 Vol 7, No 5 (2016), Pagination: 2849-2854
ABSTRACT |  PDF Abstract Views: 157  |  PDF Views: 2
Performance Comparison of Different Mobility Model on Topology Managed MANET
Arshdeep Kaur, Paramjit Singh
 Vol 7, No 5 (2016), Pagination: 2855-2861
ABSTRACT |  PDF Abstract Views: 198  |  PDF Views: 4
Tracing out Cross Site Scripting Vulnerabilities in Modern Scripts
Haneet Kour, Lalit Sen Sharma
 Vol 7, No 5 (2016), Pagination: 2862-2867
ABSTRACT |  PDF Abstract Views: 181  |  PDF Views: 2
Web OS in Cloud Computing: A Case study
Ranjan Kumar Mondal, Debabrata Sarddar
 Vol 7, No 5 (2016), Pagination: 2868-2875
ABSTRACT |  PDF Abstract Views: 178  |  PDF Views: 3
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows for Data Plane Resources
M. Ramya, K. Kowsalya, V. Ramesh
 Vol 7, No 5 (2016), Pagination: 2876-2881
ABSTRACT |  PDF Abstract Views: 165  |  PDF Views: 2
A Comparative Study on Serial and Parallel Web Content Mining
Binayak Panda, Satya Narayan Tripathy, Nilambar Sethi, Om Prakash Samantray
 Vol 7, No 5 (2016), Pagination: 2882-2886
ABSTRACT |  PDF Abstract Views: 295  |  PDF Views: 3
Review of Security Issues in Mobile Wireless Sensor Networks
Aarti Singh, Kavita Gupta
 Vol 7, No 5 (2016), Pagination: 2887-2892
ABSTRACT |  PDF Abstract Views: 164  |  PDF Views: 2
Performance Analysis of Different WSN Based Systems in Precision Farming
G. H. Raghunandan, A. K. Akshata, C. S. Hemika
 Vol 7, No 5 (2016), Pagination: 2893-2898
ABSTRACT |  PDF Abstract Views: 181  |  PDF Views: 4
Multi Owner Data Sharing and Outsourced Revocation Using Identity Based Encryption on Cloud
K. Kowsalya, V. Ramesh
 Vol 7, No 5 (2016), Pagination: 2899-2903
ABSTRACT |  PDF Abstract Views: 167  |  PDF Views: 5