Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.8, No.5
Publisher: ZAIN Publications
Publishing Date: 2019-05-30
- Analysis of Iris Detection Technique in Image ProcessingAuthors: Ankur Sharma; Anurag Rana; Gagandeep Kaur
- Analysis of Various Credit Card Fraud Detection TechniquesAuthors: Geetika; Gaurav Gupta
- Prediction Analysis Techniques of Data Mining: A ReviewAuthors: Himani Rani; Gaurav Gupta
- A Review Paper on Cloud Computing & Security IssueAuthors: Manisha Thakur; Neeru Bhardwaj
- ANALYSIS OF TECHNIQUES USED TO DISCOVER PATTERNS FROM DATASET FOR DISEASE PREDICTIONAuthors: Anurag Rana; Ankur Sharma; Disha Pathania
- Investigation of ANN Used to Solve MLR ProblemAuthors: Ziad A. AlQadi; Eng. Ahmad S. AlOthman; Eng. Mahmoud O. Alleddawi; Eng. Mohammad Ali Al-Hiary; Eng. Osama T. Ghazal; Eng. Sameh S. Salman
- A Review Paper on Analysis of Security Techniques of VANETAuthors: Aaditya Barak; Vikas Sindhu
- REQUIREMENT OF SECURITY FOR FOG BASED CLOUD ENVIRONMENT: A REVIEWAuthors: Manesh; Renu Malik
- Service Selection by Predicting Website Attender by Using AstrologyAuthors: Amir Reza Shahbazkia
- Service Selection (Negotiating Users to Our Goal) by Predicting Users’ Psychological Manner (Iridology); Computer Position Next to UsersAuthors: Amir Reza Shahbazkia
- Hypnotization by Online Internet GamesAuthors: Amir Reza Shahbazkia
- Analysis of Energy Efficient Techniques for Wireless Sensor NetworksAuthors: Chirag Malik; Vikas Sindhu
- A Survey on Technique Used for Deblurring Licence Plate of Fast Moving Vehicles Using Sparse RepresentationAuthors: Anusha G K; Rashmi M; Shobha Chandra K
- Development of Verification Environment for I2C Controller Using System Verilog and UVMAuthors: Mohamed Azheruddin; Anand M J
- Recognition of Human Facial Expression using Machine Learning AlgorithmAuthors: Lamia Zuha A; Anand M J
- PREDICTING THE PRESENCE OF HEART DISEASE USING MACHINE LEARNINGAuthors: Akshay Jayraj Suvarna; Arvind Kumar M; Ajay Billav; Muthamma K M; Asst. Gadug Sudhamsu
- DIABETIC RETINOPATHY DETECTION USING DEEP NEURAL NETWORKAuthors: Akhila T; Ambarish A; Unnikrishnan S Kumar
- SMS SECURITY SYSTEM USING ENCRYPTION TECHNIQUESAuthors: Jitha P V; Unnikrishnan S Kumar
- SMART AGRICULTURE USING IOTAuthors: Sweksha Goyal; Unnathi Mundra; Sahana Shetty
- NEW GENERATION SMART CARDAuthors: Jeet Thakar; Rishabh Jain; Manjunath CR
- Comparative Analysis of Detection of DDOS Attack in WSNAuthors: Ankur Sharma; Anurag Rana; Gourav Tandon
- IMPLEMENTATION OF AES CODE AND SPLITTER TO SECURE THE FOG BASED CLOUD ENVIRONMENTAuthors: Manesh; Renu Malik
- Analysis of MRI Image De-noising TechniqueAuthors: Pinkal Jain; Aabhas Mathur; Hemant Dhabhai
- COMPARATIVE ANALYSIS BETWEEN FIRST-COME-FIRST-SERVE (FCFS) AND SHORTEST-JOB-FIRST (SJF) SCHEDULING ALGORITHMSAuthors: Gideon Dadik Bibu; Gloria Chizoba Nwankwo
- REVIEW ANALYSIS ON IMPORTANCE OF SWARM INTELLIGENCE AND ROBOTICSAuthors: GOPI BATTINENI; NALINI CHINTALAPUDI; GETUGAMO SAGARO; FRANCESCO AMENTA
- Analysis of Sybil Attack Isolation Technique in VANETAuthors: Sudha; Kamal Kumar; Rahul Malhotra
- CONTEXT BASED SENTIMENT ANALYSIS OF TWITTER USING HADOOP FRAMEWORKAuthors: Tarun R R; Sahana J S; Sadvik B S; Shashank S; Mahesh T R
- A Novel Protocol for Two-Tiered Sensor Networks for Preserving Privacy and IntegrityAuthors: Archana N; Megha J
- A MOBILE BASED MEDICAL APPOINTMENT AND CONSULTATION (MMAC) SYSTEMAuthors: AJAYI Olusola Olajide; AKINRUJOMU Oluwatobiloba Samuel; DASO Olugbenga Samuel; AKINNIYI Olufunmilayo Paulina
- Implementing a Mobile Cloud Computing Framework with an Optimized Computational Offloading AlgorithmAuthors: Raji Babatunde O.; Ajayi Olusola O.
- Analysis of Density Based Clustering Techniques in Data MiningAuthors: Anjali Soni; Gaurav Kumar Srivastav
- Detection and Prevention of Black-Hole Attack in MANETSAuthors: Richa Sheokand; Meenakshi Gupta
- Big Data Prediction Framework for Weather Temperature Based on Map-Reduce AlgorithmAuthors: Abhishek Kumar; Savita Shivani
- ESP32 Based Data LoggerAuthors: Ibrahim Al Abbas
- Robust Image Watermarking Algorithm DWT-SVD-AES for Telemedicine ApplicationAuthors: Nancy Kumari; S.P.S. Chauhan