ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.7, No.6

Publisher: ZAIN Publications

Publishing Date: 2018-06-30

  1. Partial Gray Scale Image Encryption Based on DNA Encoding Technique

    Authors: Sushma M P; Jithendra P R Nayak

  2. IMPLEMENTATION TO IMPROVE QUALITY OF COMPRESSED IMAGE USING UPDATED HUFFMAN ALGORITHM

    Authors: Shashi Prabha; Rajiv Sharma

  3. A NOVEL ARCHITECTURE FOR VIDEO STEGANOGRAPHY USING PIXEL PATTERN MATCHING

    Authors: Chandini B; Ganesh Kumar M.T

  4. Medical Image De-noising and Compression via a 2-D Wavelet Transform

    Authors: Ibrahim Abdulai Sawaneh

  5. Design of Low Power and High Speed Full Adder Cell Using New 3TXNOR Gate

    Authors: Pramod Aladale

  6. IOS Based Aquascape Component Selection Application Uses a Genetic Algorithm

    Authors: Ilman Febrian; Ariyani Wardhana

  7. AN EFFICIENT WAY FOR SHAPE RECOGNITION BY USING SPEEDED-UP ROBUST FEATURE (SURF)

    Authors: Ningappa Uppal; Mangala C N

  8. ARM Based Smart Health Monitoring Using GSM Technology

    Authors: Kavya A G

  9. An Efficient Design and Verification of I2C Master Core

    Authors: Shruthi Solabappa Mugali; Meghana Kulkarni

  10. Design and Implementation of Memory Block using SRAM

    Authors: Ranjita C Patil

  11. Managing Configuration Errors in Cloud Computing Using Cluster & Node Management Techniques

    Authors: Msagha J Mbogholi; Henry O Okoyo; Okoth Sylvester J McOyowo

  12. AN ANALYSIS OF DESIGN ANDROID FOOD ORDERING APPLICATIONS AT TAICHAN KUMIS RESTAURANT

    Authors: Willy Dwi Raharjo; Ariyani Wardhana

  13. Analysis and Design of the Best Suppliers Selection Case Study: Department Store Kopetri with the Ahp and Topsis Methods

    Authors: Dara Kumala Devi; Ariyani Wardhana

  14. An Encroachment Detection and Protection Using Data Mining and Forensic Techniques

    Authors: Shamna.P; Unnikrishnan S Kumar

  15. SECURING GOOGLE PLAY STORE FROM FAKE REVIEWS AND MALWARE ATTACK BY ANALYZING THE USER BEHAVIORS

    Authors: Ali Askar K.M; Unnikrishnan S Kumar

  16. Development of Risk Management Tools in Question-Answering Based Software Design Environment

    Authors: KHANSAA AZEEZ OBAYES AL-HUSSEINI; ALI HAMZAH OBAID

  17. Design of Gesture Based HCI Modules

    Authors: Veena Durg; Mahesh B Neelagar

  18. Design of Schmitt Trigger Circuits Using VTCMOS for Sub-Threshold Circuits

    Authors: Syed Ameer Hussain

  19. A Review on Various Interactive CAPTCHA Techniques Concerning Web Security

    Authors: Deepika Rajpal; Abhigyan Tiwari

  20. ANALYSIS AND DESIGN OF KOREA MERCHANDISE SALES SYSTEM (CASE STUDY IN SUEWEETIESID)

    Authors: Eka Putri Apriliani; Indra Ranggadara

  21. Analysis and Design Rent Toys Application in the Jakarta Region Based on Web

    Authors: Yuliana Sadarudin; Ariyani Wardhana