Malicious Codes in Mobile Phones
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 2, Issue 12
Abstract
In this paper a survey study is made on various issues of mobile malicious codes. Spreading pattern of different mobile viruses is discussed to make a collective analysis of concerned problem and various approaches are also discussed to solve those problems.
Authors and Affiliations
Ankur Singh Bist
REALIZATION OF THERMOELECTRIC GENERATOR USING A PELTIER CHIP
This paper provides a thorough description of the experimental set up and the procedure that was conformed to in order to test the hypothesis of generating electricity from the temperature difference of an automot...
COMPARISON OF MICROSTRUCTURE OF AL-CU ALLOYS CAST IN CALCITE INVESTMENT SHELL AND DRY SAND MOULDS
The investment shell moulds were fabricated with ceramic slurry containing calcite as a filler material and colloidal silica binder. The shell characteristics in terms of hot bending strength, thermal expansion an...
Optimal Placement of FACTS Devices in a Typical Power System
This paper presents an approach for the optimal placement of FACTS devices. The devices considered are Static Var Compensator (SVC) and Thyristor Controller Series Capacitor (TCSC). Optimal location of TCSC is id...
Curriculum Design for Technical Institutions -An Expert System Approach
This paper presents the development of expert system to assist technical institutes, universities curriculum developers, experts to analysis the gap between competencies developed in student through existing curriculum...
Critical Event Monitoring in WSNS using Level-By-Level Offset Based Wake up Pattern
This paper proposed to monitor a critical event in wireless sensor networks. Whenever a critical event occurs, the critical event is detected by the nearby sensor nodes. Immediately these sensor nodes should broad...