Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
COMPUSOFT: An International Journal of Advanced Computer Technology
Current
Archives
Announcements
About
About the Journal
Submissions
Privacy Statement
Contact
Search
Register
Login
Home
/
Archives
/
Vol. 3 No. 06 (2014): June
Vol. 3 No. 06 (2014): June
Published:
2024-02-26
Original Research Article
A process to improve the accuracy of voice recognition system by using word correction system
Islam N, Ranga KK
822-824
PDF
Outlier free Real Estate Predictive Model
Banerji G, Saxena K
831-835
PDF
QR code based user friendly online bazaar - eTradeWind
Sharma S, Pancholi V, Krishnan SSR
836-839
PDF
Implementation of Web Page Suggestion in Web mining
Gupta AN, Karandikar AM
840-844
PDF
Design and Testing Analysis of Requirement Prioritizations Technique
Singh D, Gaba T
845-853
PDF
Data Derivation Investigation
Kadam SS, Kumbharkar PB
854-859
PDF
Virtual Machine Introspection
Rachana SC, Guruprasad HS
860-867
PDF
Intelligent Anti-Money Laundering System for Money Service Business
Kumar HS, GR R
868-872
PDF
Separable Encrypted Data Embedding in Encrypted Image with Large Data Embedding Capacity
Sonawane S, Shahane NM
873-878
PDF
Firewall policy anomaly detection and resolution
Darade RV, Kumbharkar PB
879-883
PDF
A Comparative Study on Resource Allocation Policies in Cloud Computing Environment
BH Bhavani, Guruprasad HS
893-899
PDF
Comprehensive study on load balancing techniques in cloud
Rajeshwari BS, Dakshayini M
900-907
PDF
A Novel Technique for Components Retrieval from Repositories
Sandhu K, Gaba T
912-920
PDF
Detection of Clone Nodes in Wireless Sensor Networks Using RED and Chord Algorithm
Sindoori R, Mahalakshmi S, Sowkarthika T, Imavathy S, Pravinkumar K
921-924
PDF
Throughput Maximization for Wireless Multimedia Sensor Networks in Industrial Applications
Markco M, Radha D
925-931
PDF
Dynamic Auditing Protocol for Efficient and Secure Data Storage in Cloud Computing
Ameen JN, Mohamed JJ, Begam NN
932-937
PDF
Efficient Authentication Scheme Using PCCP
Ameen JN, Mohamed JJ, Begam NN
938-951
PDF
Evaluation of Iceberg Query Using Vector alignment
Mahalakshmi S, Sowkarthika T, Sindoori R
952-956
PDF
Performance Analysis of Mobile Ad-Hoc Network Routing Protocols using Network Simulator – 2
Manikandan S, Kumaran KM
957-960
PDF
Role of Data mining in Insurance Industry
Umamaheswari K, Janakiraman S
961-966
PDF
Secured Resource Sharing in Cloud Storage using Policy based Access Control
Imavathy S, Uma Mahes wari R
967-972
PDF
Virtual Network Connection using Mobile Phones
S Haripriya, R Indumathi, Manikandan S
980-984
PDF
Selective Forwarding Scheme for V2V Communications
Krishnan SM, Anandhi A
985-993
PDF
A methodical and adaptive framework for Data Warehouse of Salary Management System
Ahmad M
994-998
PDF
Sentiment Analysis of Feedback Information in Hospitality Industry
Ahmad M
999-1001
PDF
Secure Reversible Data Hiding in Encrypted Images by Allocating Memory before Encryption via Security keys
Jambhulkar P, Pardhi PR
1002-1006
PDF
Review Article
Grid scheduling: Comparative study of MACO & TABU search
Sewaiwar A, Sharma U
825-830
PDF
The Influence Of Network Coding On The Performance Of Wireless Networks: A Survey
Vineeth N, Guruprasad HS
884-892
PDF
Lung Cancer Early Diagnosis Using Some Data Mining Classification Techniques: A Survey
P Thangaraju , G Barkavi
908-911
PDF
Mash up Candidate Prediction: A Survey on Mashup Techniques, Tools and Framework
Suganya P, Lavanya S, Vijayavani E, Elakiya E
973-979
PDF
Current Issue
Information
For Readers
For Authors
For Librarians
Make a Submission
Make a Submission
Make a Submission