Volume 5

November 2014, Volume 5, Number 6

Cloud-Based Development of Smart and Connected Data in Healthcare Application
S.Naisha Sultana, Gandikota Ramu and B.Eswara Reddy, JNTUA College of Engineering, India

September 2014, Volume 5, Number 5

Management of Context-Aware Software Resources Deployed in a Cloud Environment For Improving Quality of Mobile
Cloud Services

Sohame Mohammadi, Kamran Zamanifar and Sayed Mehran Sharafi, Islamic Azad University, Iran

Scalable Frequent Itemset Mining Using Heterogeneous Computing : parApriori Algorithm
V.B.Nikam and B B.Meshram, Veermata Jijabai Technological Institute, India

July 2014, Volume 5, Number 4

On the Fly Porn Video Blocking Using Distributed Multi-Gpu and Data Mining Approach
Urvesh Devani, Valmik B. Nikam and B.B. Meshram, Veermata Jijabai Technological Institute, India

A Novel Way of Integrating Voice Recognition and one Time Passwords to Prevent Password Phishing Attacks
K Marimuthu, D Ganesh Gopal, Harshita Mehta, Aditya Rajan and P Boominathan, VIT University, India

Review on Mobile Threats and Detection Techniques
Lovi Dua and Divya Bansal, PEC University of Technology, India

May 2014, Volume 5, Number 1/2/3

Lock-Free Parallel Access Collections
Bruce P. Lester, Maharishi University of Management, USA

Spectrum Requirement Estimation for IMT Systems in Developing Countries
Md Sohel Rana and Een-Kee Hong, Kyung Hee University, Republic of Korea

Derivative Threshold Actuation for Single Phase Wormhole Detection With Reduced False Alarm Rate
K.Aathi Dharshini1, C.Susil Kumar2 E.Babu Thirumangai Alwar3, 1,2Velammal College of Engineering & Technology,
India and 3Hindusthan Institute of Technology, India

Implementing Database Lookup Method in Mobile Wimax for Location Management Area Based Mbs Zone
S.Sivaranjani1, T.S.Supriya2 and B.Sridevi3, 1Theni Kammavar Sangam College of Technology, India, 2SCAD Institute of Technology, India and 3Velammal College of Engineering & Technology, India

An Effective Search on Web Log from Most Popular Downloaded Content
Brindha.S and Sabarinathan.P, Pavendar Bharathidasan College of Engineering and Technology, India

Robust Encryption Algorithm Based Sht in Wireless Sensor Networks
Uma.G and Sriram.G, Parisutham Institute of Technology, India

Multilevel Priority Packet Scheduling Scheme for Wireless Networks
R.Arasa Kumar and K.Madhu Varshini, Velammal College of Engineering and Technology, India

Crypto Multi Tenant: An Environment of Secure Computing Using Cloud Sql
Parul Kashyap and Rahul Singh, Shri Ramswaroop Memorial College of Engineering and Management, India

Survey: Comparison Estimation of Various Routing Protocols in Mobile Ad-Hoc Network
Priyanshu and Ashish Kumar Maurya, Shri Ramswaroop Memorial University, India