The first image in a slideshow demo.
Announcements
ijmcs  IJMCS

Volume-5 & Issue-4 Published (Acceptance Ratio=47.36%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-3 Published (Acceptance Ratio=38.88%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-2 Published (Acceptance Ratio=25%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Submit your Paper Last date 20th June 2017 http://www.ijmcs.info/submit_your_paper

ijmcs  IJMCS

Submit your paper @ Free of Cost http://www.ijmcs.info/publication_fee...

ijmcs  IJMCS

Volume-5 & Issue-1 Published (Acceptance Ratio=28.94%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-5 Published (Acceptance Ratio=41.42%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-4 Published (Acceptance Ratio=54.02%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-3 Published (Acceptance Ratio=48.05%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-2 Published (Acceptance Ratio=44%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-1 Published (Acceptance Ratio=50%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-3 & Issue-2 Published (Acceptance Ratio=34%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Submit your Paper Last date 10th October 2015 http://www.ijmcs.info/submit_your_paper

ijmcs  IJMCS

Volume-2 & Issue-6 Published (Acceptance Ratio=69.56%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS October

Volume-2 & Issue-5 Published (Acceptance Ratio=45.94%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS 15 August

Upcoming Isuue: Volume-2 & Issue-6 http://www.ijmcs.info/next_issue

ijmcs  IJMCS

Volume-2 & Issue-4 Published (Acceptance Ratio=25%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS

National Conference on (Advances in Modern Computing and Application Trends) Organised By Acharya Institute of Technology Bangalore, India

  • For More Detail Click Here
  • http://www.acharya.ac.in/Techman_2014.pdf

    Volume-1 Issue-1 (February 2013)
    Title: Investigate Performance Analysis of Routing Protocols Using RPGM Mobility Model
    Authors: Sohail Abid, Imran Shafi and Shahab Khan
    Abstract: Today MANET (Mobile Ad-hoc Network) is a surprisingly impressively changing or growing technology, because of its exclusive nature of distributed nodes and self-motivated topology. The modern and innovative applications based on wireless network are being created in the commercial sectors. The routing protocol follows some standards in wireless MANETís. These standards control the number of hosts that come to a harmony in such a way that routing packets between all the hosts in the network. The energy efficiency, network stability, security and performance analysis etc are lot of challenges which are facing wireless MANETs. Today MANETís gain much more attraction due to its use in everywhere in our daily life. Therefore researchers proposed many good routing protocols. In this research article, we investigate performance analysis of some well known wireless routing protocols on the basis of PDR (Packet Delivery Ratio), ROH (Routing Over head), end-to-end delay and throughput. The wireless networks have rapidly become an essential part of our daily life due to its benefits like accessibility everywhere and any time. The experts and professionals utilize this useful change and increase their work efficiency as well as reducing costs. We give brief introduction about wireless networks and discuss the problems and challenges regarding the performance analysis. We choose three different routing protocols and simulate them in NS-2.34 and investigate different performance related issues. We simulate some well known proactive and reactive routing protocols and finally we have analyzed the results and found the best routing protocol in wireless environments.
    Click Here to Download Pdf
    Title: Enterprises Really Ready to Move into the Cloud but Security is Major Issue
    Authors: Mihir H Rajyaguru
    Abstract: Many businesses are interested in finding out how they can benefit from the cloud computing hot wave. Cloud based services such as Saas, Paas and Iaas, are supposed to bring in customer the benefits including economies of scale, on-demand and cost savings. The pay-peruse model is really attractive, because it means companies can plan for the future without huge initial investment on the infrastructure. It is apparently compelling that the cloud computing industry forums need to define the standards and procedures for security, privacy, data moving and service recovery, in order to boost the public confidence on the cloud. Without necessary regulatory and industry standards, the acceptance of cloud based services would be still "cloudy".
    Click Here to Download Pdf
    Title: Application Virtualization to Accelerate Testing
    Authors: Shubhra Banerji
    Abstract:In our day to day work, we often face situations that hinder our ability to deliver at the right time with the estimated cost as agreed upon by the customer. The reasons of the same may be many, one of the major reasons being constraints in the development and test environment. Organizations are constantly working to reduce costs and improve quality, while adapting to new technologies and practices. [1] In this paper, we have discussed about Application Virtualization for providing development and test teams with 24/7 environment availability without the need to depend on back-end systems and data stores. Thus this technique enables testing teams with the ability to test more thoroughly throughout the lifecycle without worrying about data or service availability. It also helps to shorten release cycles, reduce risks, and eliminate critical development and testing constraints by virtualizing resources. [2]
    Click Here to Download Pdf
    Title: Overview of Weighted Association Rule Mining and its Applications
    Authors: Anand Singh
    Abstract:Association Rule Mining has been an area of active research in the field of data mining. Association rule mining is used to examine large transaction databases which reveal implicit relationship among the data attributes. In real life different items and transactions may have different importance. To reflect them, the way of drawing weight to items and using of weight association rules can solve the problem. The assignment of weight to items is performed in two ways. First assigning weight to the items by domain expert. Second, the weights can be derived from the dataset itself rather than being given by domain expert. The weighted association rule mining has numerous practical applications, including cross marketing, classification, text mining, web log analysis, share market and recommendation systems [1]. In this paper a literature survey of various algorithms of weighted association rule mining with or without preassigned weights has been presented.
    Click Here to Download Pdf
    Title: Visual Cryptography Scheme: Model Generation for Security Data Hiding in Biometrics Applications
    Authors: Prof. Sanket Trivedi and Prof. (Dr.) Jayesh M Patel
    Abstract:Visual cryptography is a perfectly secure encryption mechanism, and the decryption process is done by the human visual system. The ciphertext is a printed page, and the key is a printed transparency of the same size. When the two are stacked and aligned together the plain text is revealed. Knowing just one of these two shares does not reveal any new information about the plaintext. This encryption scheme can be also considered as 2-out-of-2 secret sharing scheme (the two shares being the ciphertext and the key), and it can be generalized to a k out of n secret sharing scheme. There has been considerable interest in visual cryptography, including suggestions which improve the contrast of the resulting image or add color to the image. In this paper protecting image by decomposing it into two independent host images, such that the original image can be reconstructed only when both the images are available.
    Click Here to Download Pdf
    Title: Mobile Application for Disabled People
    Authors: Sohail Abid, Shahid Abid and Tafzeel Ahmed
    Abstract:There are many types of disabilities in people like deaf, blind and mental disorder etc. Smart phones and mobile phones are rapidly becoming the necessity of our daily routine. In this article it has been proposed that how the mobile phone is useful for disabled people. The use of mobile devices is rapidly growing. Today when a layman is using advantages of these devices. The use of these devices is also vital for disabled people. Parents and guardians are worried about their disabled relative, how to protect from danger. In this article we have introduced how we can make smart phone useful and safe for disabled people. In this paper we proposed an application for disabled persons which help and monitor their activities. In this article we have also introduced how we can create useful applications for disabled people with the use of sensors and mobile. Collectively by use of mobile sensors we can create wide variety of applications for disabled people. This is an open area and it requires more research. In this research paper a critical review of existing technologies has been presented and many issues of disabled peoples and mobile phone have been pointed out for further improvement. In this paper, we have present dynamic, mobile application for the severe need and security of disabled persons. Moreover, the proposed method could achieve better performance and efficiency.
    Click Here to Download Pdf

    QR Code

    IJMCS