 |
Development of Android Based Appication ASKResults
|
Gopika G., K. K. Gayathri Ramesh, Kripa M. L., Likitha U. B., Shasidhara, Alwyn Edison Mendonca
|
pp.
15-18
|
DOI:
10.5923/j.ac.20170702.01 3693 Views 2051 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Behavioral Malware Detection for Bus Ticket Booking
|
Arpana L. Shetty, Sunitha Guruprasad
|
pp.
19-22
|
DOI:
10.5923/j.ac.20170702.02 5440 Views 2189 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Protection of Password using Distributed Clustered Division and Encryption
|
Aminath Haneena, Supreetha R.
|
pp.
23-27
|
DOI:
10.5923/j.ac.20170702.03 4631 Views 2636 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Survey on Various Load Balancing Techniques in Cloud Computing
|
Athokpam Bikramjit Singh, Sathyendra Bhat J., Ragesh Raju, Rio D’Souza
|
pp.
28-34
|
DOI:
10.5923/j.ac.20170702.04 8394 Views 3538 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Connectify- A Social Networking Website
|
Sharyl Cutinha, Sonalia Rodrigues, Sanjay P., Supreetha R.
|
pp.
35-39
|
DOI:
10.5923/j.ac.20170702.05 4464 Views 2179 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Theft Detector
|
Rashmi J. Nayak, Numreen, Salma Ahlam, Meera Savaliya, Vijetha U.
|
pp.
40-43
|
DOI:
10.5923/j.ac.20170702.06 7574 Views 2912 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Teledroid Anti-Theft Application for Android Devices
|
Rekha Rao, Sahana B., Sahana V. Prabhu, Shamitha Ammanna, Chaithra
|
pp.
44-47
|
DOI:
10.5923/j.ac.20170702.07 7543 Views 2687 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Mobile Based LAN Control
|
Aleena Abraham, Deeksha Alva, Hezil Anisha Dsouza, Jasmine Crasta, Kavyashree
|
pp.
48-50
|
DOI:
10.5923/j.ac.20170702.08 7486 Views 2542 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Improving TORA Protocol using Ant Colony Optimization Algorithm
|
Merril Roshini Mathias, Rayan Rahul D’Souza, Sanjana Bhat H., Savina Jassica Colaco, Renuka Tantry
|
pp.
51-57
|
DOI:
10.5923/j.ac.20170702.09 5625 Views 3391 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|
 |
Multi Keyword Search over Encrypted Cloud
|
M. Ambika Ganguli, Mariyammal Safana M., Prajna S. Maddodi, Seemashree, Sridevi Saralaya
|
pp.
58-61
|
DOI:
10.5923/j.ac.20170702.10 7971 Views 2635 Downloads
|
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
|
|