ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.6, No.11

Publisher: IJCSMC Publishing Team

Publishing Date: 2017-11-15

  1. Foreign Investments in Romania on Mobile Market

    Authors: Dragos Ionut ONESCU

  2. A Survey on Protection of Multimedia Content in Cloud Computing

    Authors: K.Sai Manoj Mrudula Kudaravalli K Phani Srinivas

  3. ANDROID BASED CAMPUS SOLUTION FOR COLLEGE MANAGEMENT SYSTEM

    Authors: Niharika Dedhia V. C. Kotak

  4. Security in Vehicular Ad-hoc Network using LiFi

    Authors: Prakash Tripathi

  5. Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

    Authors: S.M. MOHIDUL ISLAM ALTAB HOSSIN RAJEEV KUMAR SHAH PRAKASH KUMAR BIPIN

  6. Performance Analysis and Validation of Fuzzy based Secure LAR Routing Protocol in MANETs using NN Tool

    Authors: Y.V.S.Sai Pragathi S.P.Setty

  7. An Analysis on Removal of Duplicate Records using Different Types of Data Mining Techniques: A Survey

    Authors: P. Selvi

  8. I-LEACH for Energy Efficient Wireless Sensor Network

    Authors: M.Sasikala

  9. ENHANCED EDGE DETECTION TECHNIQUES FOR IDENTIFICATION OF FISH THROUGH ITS MORPHOLOGICAL FEATURES

    Authors: G.T.Shrivakshan

  10. Comparison of Big Data and Data Mining

    Authors: D.Sasirega

  11. An Inventive Approach for Image Scaling using Data Compression with Wavelet Transform Techniques

    Authors: Prabhsharan Kaur Jagdeep Kaur

  12. An Approach for Combination of Technique Spatial-Orientation Trees Wavelet (STW) and Adaptively Scanned Wavelet Difference Reduction (ASWDR)

    Authors: Prabhsharan Kaur Sukhdeep Kaur

  13. Survey on Web Video Semantic Analysis

    Authors: P.Santhanalakshmi

  14. A Review on Fuzzy Rule Based Expert System To Diagnose Human Diseases

    Authors: Gurpreet Kaur Prabhsharan Kaur

  15. ASSESSMENT OF DYSARTHRIC SPEECH USING MFCC

    Authors: Usha.M

  16. A COMPARATIVE STUDY ON K-MEDOIDS ALGORITHM WITH DENCLUE-IM APPROACH FOR BIG DATA

    Authors: A.P Christopher Arokiaraj

  17. CYBER SPACE TECHNOLOGY: CYBER CRIME, CYBER SECURITY AND MODELS OF CYBER SOLUTION, A CASE STUDY OF NIGERIA

    Authors: DAMBO ITARI; EZIMORA OKEZIE ANTHONY; NWANYANWU MERCY