Cloud Based Automated Identification and Development to Provide Compatibility and Security for Cross Browser in Web Application

Authors

  • Roshne MK Department of Computer Science, East West Institute of Technology, Bengaluru, India
  • Shaikh Afreen Md Sardar Department of Computer Science, East West Institute of Technology, Bengaluru, India
  • Tulsi K Department of Computer Science, East West Institute of Technology, Bengaluru, India
  • Dayanidhi VS Department of Computer Science, East West Institute of Technology, Bengaluru, India
  • vinod H Department of Computer Science, East West Institute of Technology, Bengaluru, India

Keywords:

Cloud computing, Cross browser compatibility, Data security

Abstract

A good Website is more than just something to look at, it is functional interactive and flawless. As technologies are becoming smart so we need to be smarter enough to utilize them. With the rapid evolution of web technologies, the complexity of web applications has also grown up. Specially making a web application that works well with cross browser is a great challenge. Clearly, cross-browser means something works with all versions of all browsers to have existed since the web began. By this paper we have pointed out some reasons why applications behave or appear differently in different browsers because if you know the cause, you can get a solution.

References

[1] S. Willium, “Network Security and Communication”, IEEE Transaction, Vol.31, Issue.4, pp.123-141, 2012. For Journal

[2] R. Solanki, “Principle of Data Mining”, McGraw-Hill Publication, India, pp. 386-398, 1998. For Book

[3] M. Mohammad, “Performance Impact of Addressing Modes on Encryption Algorithms”, In the Proceedings of the 2001 IEEE International Conference on Computer Design (ICCD 2001), Indore, USA, pp.542-545, 2001. For Conference

[4] S.K. Sharma, “Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks”, International Journal of Scientific Research in Network Security and Communication, Vol.1, No.5, pp.1-4, 2013.

[5] S.L. Mewada, “Exploration of Efficient Symmetric AES Algorithm”, International Journa of Computer Sciences and Engineering, Vol.4, Issue.11, pp.111-117, 2015.

[6] A. Mardin, T. Anwar, B. Anwer, “Image Compression: Combination of Discrete Transformation and Matrix Reduction”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.1-6, 2017.

[7] H.R. Singh, “Randomly Generated Algorithms and Dynamic Connections”, International Journal of Scientific Research in Network Security and Communication, Vol.2, Issue.1, pp.231-238, 2014.

[8] Thomas L., “A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.1-6, 2017.

[9] C.T. Lee, A. Girgensohn, J. Zhang, “Browsers to support awareness and Social Interaction,” Computer Graphics and Applications, Journal of IEEE Access , Vol.24, Issue.10, pp.66-75, 2012. doi: 10.1109/MCG.2004.24

[10] Lin C., Lee B., “Exploration of Routing Protocols in Wireless Mesh Network”, In the Proceedings of the 2015 IEEE Symposium on Colossal Big Data Analysis and Networking Security, Canada, pp.111-117, 2015.

[11] S. Tamilarasan, P.K. Sharma, “A Survey on Dynamic Resource Allocation in MIMO Heterogeneous Cognitive Radio Networks based on Priority Scheduling”, International Journal of Computer Sciences and Engineering, Vol.5, No.1, pp.53-59, 2017.

Downloads

Published

2025-11-26

How to Cite

[1]
R. MK, S. A. M. Sardar, T. K, V. C. Dayanidhi, and vinod H, “Cloud Based Automated Identification and Development to Provide Compatibility and Security for Cross Browser in Web Application”, Int. J. Comp. Sci. Eng., vol. 7, no. 15, pp. 144–147, Nov. 2025.