Vol 4, No 5 (2016)

September- October

Table of Contents


A different approach for improved Privacy of User Data and Images on Content Sharing Sites using (A3P) PDF [Full Text]
Hoora Mohammed, Md. Amanatulla 326-329
A different Approach on Detecting Malicious Face-book Applications (FRAppE) PDF [Full Text]
Fathima Sultana, Md. Imran 330-333
Artificial Intelligence Inspired Intrusion Detection System PDF [Full Text]
Raheel Hussain, Maqsood Hayat, Nigar Fida, Mohammad Sohail, Muhammad Noman Hayat 334-341
Elimination of the CCD under-sampled spectra overlapping by the Application of the Optical Grating PDF [Full Text]
Mohammad Sohail, Haroon Khan, Muhammad Noman Hayat, Qamar Jabeen 342-348
Face Recognition using Principle Component Analysis Based feature selection Feature Vector PDF [Full Text]
Zaheer Ullah Khan, Mohammad Sohail, Muhammad Noman Hayat, Haroon Khan 349-354
Architecture, Units, Types and Applications of Wireless Sensor Network(WSN) PDF [Full Text]
Irfan Ullah, Shaheen Ahmad, Wajid Iqbal, Faheem Numan 354-357
Fuzzy logic and its Application : A Review PDF [Full Text]
P. N. V . Prasada Rao 358-362
Effective Bug Triage And Using Techniques In Bug Data Reduction And Data Management In Bug Repositories PDF [Full Text]
Ch. Kiranmai, K. Sobhana 363-366
Open Systems Interconnection model Seven Layers of Computer Networks PDF [Full Text]
Inam Ullah Khan, Faheem Numan, Shaheen Ahmad 367-370
Integrity Auditing And Group User Revocation For Shared Dynamic Cloud Data Access PDF [Full Text]
K. Udaya Sree, M. Sambasiva Rao 371-375

Copyright © 2012, All rights reserved.| ijmca.org

Creative Commons License
International Journal of Mechanical Engineering and Computer Applications by chief editor is licensed under a Creative Commons Attribution 3.0 Unported License.Permissions beyond the scope of this license may be available at www.ijmca.org.