ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.8, No.2

Publisher: IJCSMC Publishing Team

Publishing Date: 2019-02-28

  1. A New Distributed Denial-of-Service (DDoS) Attacks Detection System Combining Multistage Auto-Encoders with Radial Basis Function (RBF)

    Authors: Sefer Kurnaz; Ansam Khalid

  2. Privacy-Preserving Knowledge Discovery in Distributed Databases

    Authors: Sefer Kurnaz; Hanaa Khudhur Obaid

  3. Support Vector Machine (SVM) Based on Wavelet Transform (WT) for Intrusion Detection System (IDS)

    Authors: Sefer Kurnaz; Israa Abed Obaid

  4. Performance Analysis of Artificial Neural Networks used for Color Image Recognition and Retrieving

    Authors: Jamil Al-Azzeh; Ziad Alqadi; Mohammed Abuzalata

  5. Mobile Devices and People with Learning Disabilities: A Literature Review

    Authors: Peter Williams; Sidharth Shekhar

  6. STOCK MARKET PREDICTION USING MACHINE LEARNING TECHNIQUE

    Authors: C.CHANDANA; K.VIJITHA

  7. Routing Aspects of MANETs: A Review

    Authors: Navdeep Kaur; Arshdeep Singh

  8. OBSTACLES OF THE E-MANAGEMENT IN IRAQ

    Authors: ZAHRAA DAWOOD SALMAN; OSAMA IBRAHEM ASHOOR; Assoc.Prof.Oğuz Bayat

  9. Wireless Sensor Network (WSN) Predictable Weather Station

    Authors: Sefer Kurnaz; Laith Mohamned Salim

  10. Comparison of Manet Routing Protocols

    Authors: Aastha Mishra; Shweta Singh; Arun Kumar Tripathi

  11. Analysis of Various Sentiment Analysis Techniques

    Authors: Neha Rajput; Shivani Chauhan

  12. Smart Grid’s Big Data Wireless Computing

    Authors: Asst. Sefer Kurnaz; Baraa Adil Mahmood Mahmood

  13. QoS-Aware Load Balancing Approach (QALBA) for Task Scheduling and Resource Selection using Enriched-Look ahead HEFT (E-LHEFT) Algorithm

    Authors: K. Mohamed Sathik

  14. Modified Inverse LSB Method for Highly Secure Message Hiding

    Authors: Mohammed Abuzalata; Ziad Alqadi; Jamil Al-Azzeh; Qazem Jaber

  15. DETECTION OF WILD ELEPHANTS USING IMAGE PROCESSING ON RASPBERRY PI3

    Authors: SAILESH.K; HARSHA VARDHAN BALINA; SIVAKUMAR.T; VIJAYA POOJITHA.P

  16. A Neural Network Model for Estimation Having Reusable Components in Software Development

    Authors: Jyoti Mahajan

  17. AN ANDROID BASED INTELLIGENT ROBOT FOR BORDER SECURITY

    Authors: B. Ramesh; Yuvaraj B V; Shankarnag M; Pavan M K; Satwik J

  18. Translating Ambiguous Arabic Words Using Text Mining

    Authors: Omer Awad Mohammed; Ahmed Salah