Cloud Based Automated Identification and Development to Provide Compatibility and Security for Cross Browser in Web Application
Roshne M K1 , Shaikh Afreen Md Sardar2 , Tulsi K3 , Varshini Dayanidhi C4 , Vinod H5
Section:Review Paper, Product Type: Journal Paper
Volume-07 ,
Issue-15 , Page no. 144-147, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.144147
Online published on May 16, 2019
Copyright © Roshne M K, Shaikh Afreen Md Sardar, Tulsi K, Varshini Dayanidhi C, Vinod H . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Roshne M K, Shaikh Afreen Md Sardar, Tulsi K, Varshini Dayanidhi C, Vinod H, “Cloud Based Automated Identification and Development to Provide Compatibility and Security for Cross Browser in Web Application,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.144-147, 2019.
MLA Style Citation: Roshne M K, Shaikh Afreen Md Sardar, Tulsi K, Varshini Dayanidhi C, Vinod H "Cloud Based Automated Identification and Development to Provide Compatibility and Security for Cross Browser in Web Application." International Journal of Computer Sciences and Engineering 07.15 (2019): 144-147.
APA Style Citation: Roshne M K, Shaikh Afreen Md Sardar, Tulsi K, Varshini Dayanidhi C, Vinod H, (2019). Cloud Based Automated Identification and Development to Provide Compatibility and Security for Cross Browser in Web Application. International Journal of Computer Sciences and Engineering, 07(15), 144-147.
BibTex Style Citation:
@article{K_2019,
author = { Roshne M K, Shaikh Afreen Md Sardar, Tulsi K, Varshini Dayanidhi C, Vinod H},
title = {Cloud Based Automated Identification and Development to Provide Compatibility and Security for Cross Browser in Web Application},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {15},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {144-147},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1216},
doi = {https://doi.org/10.26438/ijcse/v7i15.144147}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i15.144147}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1216
TI - Cloud Based Automated Identification and Development to Provide Compatibility and Security for Cross Browser in Web Application
T2 - International Journal of Computer Sciences and Engineering
AU - Roshne M K, Shaikh Afreen Md Sardar, Tulsi K, Varshini Dayanidhi C, Vinod H
PY - 2019
DA - 2019/05/16
PB - IJCSE, Indore, INDIA
SP - 144-147
IS - 15
VL - 07
SN - 2347-2693
ER -
Abstract
A good Website is more than just something to look at, it is functional interactive and flawless. As technologies are becoming smart so we need to be smarter enough to utilize them. With the rapid evolution of web technologies, the complexity of web applications has also grown up. Specially making a web application that works well with cross browser is a great challenge. Clearly, cross-browser means something works with all versions of all browsers to have existed since the web began. By this paper we have pointed out some reasons why applications behave or appear differently in different browsers because if you know the cause, you can get a solution.
Key-Words / Index Term
Cloud computing ,Cross browser compatibility, Data security
References
[1] S. Willium, “Network Security and Communication”, IEEE Transaction, Vol.31, Issue.4, pp.123-141, 2012. For Journal
[2] R. Solanki, “Principle of Data Mining”, McGraw-Hill Publication, India, pp. 386-398, 1998. For Book
[3] M. Mohammad, “Performance Impact of Addressing Modes on Encryption Algorithms”, In the Proceedings of the 2001 IEEE International Conference on Computer Design (ICCD 2001), Indore, USA, pp.542-545, 2001. For Conference
[4] S.K. Sharma, “Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks”, International Journal of Scientific Research in Network Security and Communication, Vol.1, No.5, pp.1-4, 2013.
[5] S.L. Mewada, “Exploration of Efficient Symmetric AES Algorithm”, International Journa of Computer Sciences and Engineering, Vol.4, Issue.11, pp.111-117, 2015.
[6] A. Mardin, T. Anwar, B. Anwer, “Image Compression: Combination of Discrete Transformation and Matrix Reduction”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.1-6, 2017.
[7] H.R. Singh, “Randomly Generated Algorithms and Dynamic Connections”, International Journal of Scientific Research in Network Security and Communication, Vol.2, Issue.1, pp.231-238, 2014.
[8] Thomas L., “A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.1-6, 2017.
[9] C.T. Lee, A. Girgensohn, J. Zhang, “Browsers to support awareness and Social Interaction,” Computer Graphics and Applications, Journal of IEEE Access , Vol.24, Issue.10, pp.66-75, 2012. doi: 10.1109/MCG.2004.24
[10] Lin C., Lee B., “Exploration of Routing Protocols in Wireless Mesh Network”, In the Proceedings of the 2015 IEEE Symposium on Colossal Big Data Analysis and Networking Security, Canada, pp.111-117, 2015.
[11] S. Tamilarasan, P.K. Sharma, “A Survey on Dynamic Resource Allocation in MIMO Heterogeneous Cognitive Radio Networks based on Priority Scheduling”, International Journal of Computer Sciences and Engineering, Vol.5, No.1, pp.53-59, 2017.