Open Access   Article Go Back

Cloud Based Automated Identification and Development to Provide Compatibility and Security for Cross Browser in Web Application

Roshne M K1 , Shaikh Afreen Md Sardar2 , Tulsi K3 , Varshini Dayanidhi C4 , Vinod H5

Section:Review Paper, Product Type: Journal Paper
Volume-07 , Issue-15 , Page no. 144-147, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si15.144147

Online published on May 16, 2019

Copyright © Roshne M K, Shaikh Afreen Md Sardar, Tulsi K, Varshini Dayanidhi C, Vinod H . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Roshne M K, Shaikh Afreen Md Sardar, Tulsi K, Varshini Dayanidhi C, Vinod H, “Cloud Based Automated Identification and Development to Provide Compatibility and Security for Cross Browser in Web Application,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.144-147, 2019.

MLA Style Citation: Roshne M K, Shaikh Afreen Md Sardar, Tulsi K, Varshini Dayanidhi C, Vinod H "Cloud Based Automated Identification and Development to Provide Compatibility and Security for Cross Browser in Web Application." International Journal of Computer Sciences and Engineering 07.15 (2019): 144-147.

APA Style Citation: Roshne M K, Shaikh Afreen Md Sardar, Tulsi K, Varshini Dayanidhi C, Vinod H, (2019). Cloud Based Automated Identification and Development to Provide Compatibility and Security for Cross Browser in Web Application. International Journal of Computer Sciences and Engineering, 07(15), 144-147.

BibTex Style Citation:
@article{K_2019,
author = { Roshne M K, Shaikh Afreen Md Sardar, Tulsi K, Varshini Dayanidhi C, Vinod H},
title = {Cloud Based Automated Identification and Development to Provide Compatibility and Security for Cross Browser in Web Application},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {15},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {144-147},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1216},
doi = {https://doi.org/10.26438/ijcse/v7i15.144147}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i15.144147}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1216
TI - Cloud Based Automated Identification and Development to Provide Compatibility and Security for Cross Browser in Web Application
T2 - International Journal of Computer Sciences and Engineering
AU - Roshne M K, Shaikh Afreen Md Sardar, Tulsi K, Varshini Dayanidhi C, Vinod H
PY - 2019
DA - 2019/05/16
PB - IJCSE, Indore, INDIA
SP - 144-147
IS - 15
VL - 07
SN - 2347-2693
ER -

           

Abstract

A good Website is more than just something to look at, it is functional interactive and flawless. As technologies are becoming smart so we need to be smarter enough to utilize them. With the rapid evolution of web technologies, the complexity of web applications has also grown up. Specially making a web application that works well with cross browser is a great challenge. Clearly, cross-browser means something works with all versions of all browsers to have existed since the web began. By this paper we have pointed out some reasons why applications behave or appear differently in different browsers because if you know the cause, you can get a solution.

Key-Words / Index Term

Cloud computing ,Cross browser compatibility, Data security

References

[1] S. Willium, “Network Security and Communication”, IEEE Transaction, Vol.31, Issue.4, pp.123-141, 2012. For Journal
[2] R. Solanki, “Principle of Data Mining”, McGraw-Hill Publication, India, pp. 386-398, 1998. For Book
[3] M. Mohammad, “Performance Impact of Addressing Modes on Encryption Algorithms”, In the Proceedings of the 2001 IEEE International Conference on Computer Design (ICCD 2001), Indore, USA, pp.542-545, 2001. For Conference
[4] S.K. Sharma, “Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks”, International Journal of Scientific Research in Network Security and Communication, Vol.1, No.5, pp.1-4, 2013.
[5] S.L. Mewada, “Exploration of Efficient Symmetric AES Algorithm”, International Journa of Computer Sciences and Engineering, Vol.4, Issue.11, pp.111-117, 2015.
[6] A. Mardin, T. Anwar, B. Anwer, “Image Compression: Combination of Discrete Transformation and Matrix Reduction”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.1-6, 2017.
[7] H.R. Singh, “Randomly Generated Algorithms and Dynamic Connections”, International Journal of Scientific Research in Network Security and Communication, Vol.2, Issue.1, pp.231-238, 2014.
[8] Thomas L., “A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.1-6, 2017.
[9] C.T. Lee, A. Girgensohn, J. Zhang, “Browsers to support awareness and Social Interaction,” Computer Graphics and Applications, Journal of IEEE Access , Vol.24, Issue.10, pp.66-75, 2012. doi: 10.1109/MCG.2004.24
[10] Lin C., Lee B., “Exploration of Routing Protocols in Wireless Mesh Network”, In the Proceedings of the 2015 IEEE Symposium on Colossal Big Data Analysis and Networking Security, Canada, pp.111-117, 2015.
[11] S. Tamilarasan, P.K. Sharma, “A Survey on Dynamic Resource Allocation in MIMO Heterogeneous Cognitive Radio Networks based on Priority Scheduling”, International Journal of Computer Sciences and Engineering, Vol.5, No.1, pp.53-59, 2017.