 |
|
Development of Android Based Appication ASKResults
|
|
Gopika G., K. K. Gayathri Ramesh, Kripa M. L., Likitha U. B., Shasidhara, Alwyn Edison Mendonca
|
|
pp.
15-18
|
|
DOI:
10.5923/j.ac.20170702.01 3865 Views 2165 Downloads
|
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
 |
|
Behavioral Malware Detection for Bus Ticket Booking
|
|
Arpana L. Shetty, Sunitha Guruprasad
|
|
pp.
19-22
|
|
DOI:
10.5923/j.ac.20170702.02 5709 Views 2376 Downloads
|
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
 |
|
Protection of Password using Distributed Clustered Division and Encryption
|
|
Aminath Haneena, Supreetha R.
|
|
pp.
23-27
|
|
DOI:
10.5923/j.ac.20170702.03 5115 Views 3026 Downloads
|
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
 |
|
Survey on Various Load Balancing Techniques in Cloud Computing
|
|
Athokpam Bikramjit Singh, Sathyendra Bhat J., Ragesh Raju, Rio D’Souza
|
|
pp.
28-34
|
|
DOI:
10.5923/j.ac.20170702.04 8925 Views 3949 Downloads
|
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
 |
|
Connectify- A Social Networking Website
|
|
Sharyl Cutinha, Sonalia Rodrigues, Sanjay P., Supreetha R.
|
|
pp.
35-39
|
|
DOI:
10.5923/j.ac.20170702.05 4891 Views 2500 Downloads
|
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
 |
|
Theft Detector
|
|
Rashmi J. Nayak, Numreen, Salma Ahlam, Meera Savaliya, Vijetha U.
|
|
pp.
40-43
|
|
DOI:
10.5923/j.ac.20170702.06 8028 Views 3286 Downloads
|
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
 |
|
Teledroid Anti-Theft Application for Android Devices
|
|
Rekha Rao, Sahana B., Sahana V. Prabhu, Shamitha Ammanna, Chaithra
|
|
pp.
44-47
|
|
DOI:
10.5923/j.ac.20170702.07 8078 Views 3122 Downloads
|
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
 |
|
Mobile Based LAN Control
|
|
Aleena Abraham, Deeksha Alva, Hezil Anisha Dsouza, Jasmine Crasta, Kavyashree
|
|
pp.
48-50
|
|
DOI:
10.5923/j.ac.20170702.08 8002 Views 2938 Downloads
|
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
 |
|
Improving TORA Protocol using Ant Colony Optimization Algorithm
|
|
Merril Roshini Mathias, Rayan Rahul D’Souza, Sanjana Bhat H., Savina Jassica Colaco, Renuka Tantry
|
|
pp.
51-57
|
|
DOI:
10.5923/j.ac.20170702.09 6169 Views 3813 Downloads
|
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
 |
|
Multi Keyword Search over Encrypted Cloud
|
|
M. Ambika Ganguli, Mariyammal Safana M., Prajna S. Maddodi, Seemashree, Sridevi Saralaya
|
|
pp.
58-61
|
|
DOI:
10.5923/j.ac.20170702.10 8169 Views 2763 Downloads
|
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
|