Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.8, No.1
Publisher: ZAIN Publications
Publishing Date: 2019-01-30
- Survey the Impact of the Virtual Reality in the Fitness Science and Trainer’s PerformanceAuthors: Turki Hilal Kadhim; Salman Hekmat Salman; Sanaa Khaled Khazaal; Saja Salim Mohammed; Abbas Fadhil Hammad; Waseem Saad Nsaif
- Analysis of Educational Data Mining TechniquesAuthors: Akarshita Tripathi; Amit Kumar
- An Analysis and Survey of Security Techniques for Cloud ComputingAuthors: Manish Kumar; Shivani Chauhan; Ajay Singh
- Survey on Challenges and Future Scope of IOT in Healthcare and AgricultureAuthors: Shruthi B S; K B Manasa; Lakshmi R
- WEB BASED EVENT ORGANIZER DATA MANAGEMENT INFORMATION SYSTEM (Case Study: PT. REPUBLIKA MEDIA MANDIRI)Authors: Rangga Pratama Surya Wahyudi; Riad Sahara S.SI. MT
- SURVEY OF CO-EXTRACTING OPINION TARGETS AND OPINION WORDS FROM ONLINE REVIEWS BASEDAuthors: Malathi.M; Antony Selvadoss Thanamani
- Security Testing of Web Applications Using Threat Modeling: A Systematic ReviewAuthors: Sanjukta Mohanty; Arup Abhinna Acharya; Deepti Bala Mishra; Namita Panda
- Analysis of Node Localization Techniques of Underwater Acoustic NetworksAuthors: Manjeet Singh; Mandeep Sharma
- A Review Paper on Healthcare and Hospital Monitoring System Using Wireless Sensor NetworkAuthors: Nupur Parihar
- HINIGARAN COMMUNITY EMERGENCY ASSISTANCE SYSTEM APPLICATIONAuthors: Jennifer Padilla-Juaneza
- Web Based Resource Management System ApplicationAuthors: Glean Likis Mamengko; Riad Sahara S.SI. MT
- Energy Efficient and Load Balancing Scheme of DSR Protocol (EELB-DSR)Authors: Kadry Sayed Mohamed; Sayed Abd El Hady Nouh; Abdelhady M. Naguib
- YOUTH’S ATTITUDE TOWARDS INTERNET CRIME: SOCIAL FACTORS, CAUSES AND EFFECTSAuthors: Gbenga T. Omoniyi; Shahrudin Awang Nor; Nor Iadah Yusop; Rotimi-Williams Bello
- Three-Factor User Authentication Scheme for WSNAuthors: Mercy Jeba Malar P; Senthil Kumar
- PERFORMANCE COMPARISON OF ROBUST SPEECH RECOGNITION USING DIFFERENT FEATURE EXTRACTION TECHNIQUESAuthors: Divya Gupta; Poonam Bansal; Kavita Choudhary
- A Survey of Cybercrimes, Investigations and Penal Laws Imposed on the CriminalsAuthors: Wisam Shakir Hussain; Nebras Jalel Ibrahim
- A Comparative Study of the Growth of Electronic Sports in the World and the Important Global E-Sports AchievementsAuthors: Basim Khudhair Abbas; Israa Asaad Jasim; Waseem Saad Nsaif
- DNS TUNNELING EFFECT ON DNS PACKET SIZESAuthors: Ugur Tanik GUDEKLI; Bunyamin CIYLAN