ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.8, No.1

Publisher: IJCSMC Publishing Team

Publishing Date: 2019-01-30

  1. Survey the Impact of the Virtual Reality in the Fitness Science and Trainer’s Performance

    Authors: Turki Hilal Kadhim; Salman Hekmat Salman; Sanaa Khaled Khazaal; Saja Salim Mohammed; Abbas Fadhil Hammad; Waseem Saad Nsaif

  2. Analysis of Educational Data Mining Techniques

    Authors: Akarshita Tripathi; Amit Kumar

  3. An Analysis and Survey of Security Techniques for Cloud Computing

    Authors: Manish Kumar; Shivani Chauhan; Ajay Singh

  4. Survey on Challenges and Future Scope of IOT in Healthcare and Agriculture

    Authors: Shruthi B S; K B Manasa; Lakshmi R

  5. WEB BASED EVENT ORGANIZER DATA MANAGEMENT INFORMATION SYSTEM (Case Study: PT. REPUBLIKA MEDIA MANDIRI)

    Authors: Rangga Pratama Surya Wahyudi; Riad Sahara S.SI. MT

  6. SURVEY OF CO-EXTRACTING OPINION TARGETS AND OPINION WORDS FROM ONLINE REVIEWS BASED

    Authors: Malathi.M; Antony Selvadoss Thanamani

  7. Security Testing of Web Applications Using Threat Modeling: A Systematic Review

    Authors: Sanjukta Mohanty; Arup Abhinna Acharya; Deepti Bala Mishra; Namita Panda

  8. Analysis of Node Localization Techniques of Underwater Acoustic Networks

    Authors: Manjeet Singh; Mandeep Sharma

  9. A Review Paper on Healthcare and Hospital Monitoring System Using Wireless Sensor Network

    Authors: Nupur Parihar

  10. HINIGARAN COMMUNITY EMERGENCY ASSISTANCE SYSTEM APPLICATION

    Authors: Jennifer Padilla-Juaneza

  11. Web Based Resource Management System Application

    Authors: Glean Likis Mamengko; Riad Sahara S.SI. MT

  12. Energy Efficient and Load Balancing Scheme of DSR Protocol (EELB-DSR)

    Authors: Kadry Sayed Mohamed; Sayed Abd El Hady Nouh; Abdelhady M. Naguib

  13. YOUTH’S ATTITUDE TOWARDS INTERNET CRIME: SOCIAL FACTORS, CAUSES AND EFFECTS

    Authors: Gbenga T. Omoniyi; Shahrudin Awang Nor; Nor Iadah Yusop; Rotimi-Williams Bello

  14. Three-Factor User Authentication Scheme for WSN

    Authors: Mercy Jeba Malar P; Senthil Kumar

  15. PERFORMANCE COMPARISON OF ROBUST SPEECH RECOGNITION USING DIFFERENT FEATURE EXTRACTION TECHNIQUES

    Authors: Divya Gupta; Poonam Bansal; Kavita Choudhary

  16. A Survey of Cybercrimes, Investigations and Penal Laws Imposed on the Criminals

    Authors: Wisam Shakir Hussain; Nebras Jalel Ibrahim

  17. A Comparative Study of the Growth of Electronic Sports in the World and the Important Global E-Sports Achievements

    Authors: Basim Khudhair Abbas; Israa Asaad Jasim; Waseem Saad Nsaif

  18. DNS TUNNELING EFFECT ON DNS PACKET SIZES

    Authors: Ugur Tanik GUDEKLI; Bunyamin CIYLAN