ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.8, No.5

Publisher: IJCSMC Publishing Team

Publishing Date: 2019-05-30

  1. Analysis of Iris Detection Technique in Image Processing

    Authors: Ankur Sharma; Anurag Rana; Gagandeep Kaur

  2. Analysis of Various Credit Card Fraud Detection Techniques

    Authors: Geetika; Gaurav Gupta

  3. Prediction Analysis Techniques of Data Mining: A Review

    Authors: Himani Rani; Gaurav Gupta

  4. A Review Paper on Cloud Computing & Security Issue

    Authors: Manisha Thakur; Neeru Bhardwaj

  5. ANALYSIS OF TECHNIQUES USED TO DISCOVER PATTERNS FROM DATASET FOR DISEASE PREDICTION

    Authors: Anurag Rana; Ankur Sharma; Disha Pathania

  6. Investigation of ANN Used to Solve MLR Problem

    Authors: Ziad A. AlQadi; Eng. Ahmad S. AlOthman; Eng. Mahmoud O. Alleddawi; Eng. Mohammad Ali Al-Hiary; Eng. Osama T. Ghazal; Eng. Sameh S. Salman

  7. A Review Paper on Analysis of Security Techniques of VANET

    Authors: Aaditya Barak; Vikas Sindhu

  8. REQUIREMENT OF SECURITY FOR FOG BASED CLOUD ENVIRONMENT: A REVIEW

    Authors: Manesh; Renu Malik

  9. Service Selection by Predicting Website Attender by Using Astrology

    Authors: Amir Reza Shahbazkia

  10. Service Selection (Negotiating Users to Our Goal) by Predicting Users’ Psychological Manner (Iridology); Computer Position Next to Users

    Authors: Amir Reza Shahbazkia

  11. Hypnotization by Online Internet Games

    Authors: Amir Reza Shahbazkia

  12. Analysis of Energy Efficient Techniques for Wireless Sensor Networks

    Authors: Chirag Malik; Vikas Sindhu

  13. A Survey on Technique Used for Deblurring Licence Plate of Fast Moving Vehicles Using Sparse Representation

    Authors: Anusha G K; Rashmi M; Shobha Chandra K

  14. Development of Verification Environment for I2C Controller Using System Verilog and UVM

    Authors: Mohamed Azheruddin; Anand M J

  15. Recognition of Human Facial Expression using Machine Learning Algorithm

    Authors: Lamia Zuha A; Anand M J

  16. PREDICTING THE PRESENCE OF HEART DISEASE USING MACHINE LEARNING

    Authors: Akshay Jayraj Suvarna; Arvind Kumar M; Ajay Billav; Muthamma K M; Asst. Gadug Sudhamsu

  17. DIABETIC RETINOPATHY DETECTION USING DEEP NEURAL NETWORK

    Authors: Akhila T; Ambarish A; Unnikrishnan S Kumar

  18. SMS SECURITY SYSTEM USING ENCRYPTION TECHNIQUES

    Authors: Jitha P V; Unnikrishnan S Kumar

  19. SMART AGRICULTURE USING IOT

    Authors: Sweksha Goyal; Unnathi Mundra; Sahana Shetty

  20. NEW GENERATION SMART CARD

    Authors: Jeet Thakar; Rishabh Jain; Manjunath CR

  21. Comparative Analysis of Detection of DDOS Attack in WSN

    Authors: Ankur Sharma; Anurag Rana; Gourav Tandon

  22. IMPLEMENTATION OF AES CODE AND SPLITTER TO SECURE THE FOG BASED CLOUD ENVIRONMENT

    Authors: Manesh; Renu Malik

  23. Analysis of MRI Image De-noising Technique

    Authors: Pinkal Jain; Aabhas Mathur; Hemant Dhabhai

  24. COMPARATIVE ANALYSIS BETWEEN FIRST-COME-FIRST-SERVE (FCFS) AND SHORTEST-JOB-FIRST (SJF) SCHEDULING ALGORITHMS

    Authors: Gideon Dadik Bibu; Gloria Chizoba Nwankwo

  25. REVIEW ANALYSIS ON IMPORTANCE OF SWARM INTELLIGENCE AND ROBOTICS

    Authors: GOPI BATTINENI; NALINI CHINTALAPUDI; GETUGAMO SAGARO; FRANCESCO AMENTA

  26. Analysis of Sybil Attack Isolation Technique in VANET

    Authors: Sudha; Kamal Kumar; Rahul Malhotra

  27. CONTEXT BASED SENTIMENT ANALYSIS OF TWITTER USING HADOOP FRAMEWORK

    Authors: Tarun R R; Sahana J S; Sadvik B S; Shashank S; Mahesh T R

  28. A Novel Protocol for Two-Tiered Sensor Networks for Preserving Privacy and Integrity

    Authors: Archana N; Megha J

  29. A MOBILE BASED MEDICAL APPOINTMENT AND CONSULTATION (MMAC) SYSTEM

    Authors: AJAYI Olusola Olajide; AKINRUJOMU Oluwatobiloba Samuel; DASO Olugbenga Samuel; AKINNIYI Olufunmilayo Paulina

  30. Implementing a Mobile Cloud Computing Framework with an Optimized Computational Offloading Algorithm

    Authors: Raji Babatunde O.; Ajayi Olusola O.

  31. Analysis of Density Based Clustering Techniques in Data Mining

    Authors: Anjali Soni; Gaurav Kumar Srivastav

  32. Detection and Prevention of Black-Hole Attack in MANETS

    Authors: Richa Sheokand; Meenakshi Gupta

  33. Big Data Prediction Framework for Weather Temperature Based on Map-Reduce Algorithm

    Authors: Abhishek Kumar; Savita Shivani

  34. ESP32 Based Data Logger

    Authors: Ibrahim Al Abbas

  35. Robust Image Watermarking Algorithm DWT-SVD-AES for Telemedicine Application

    Authors: Nancy Kumari; S.P.S. Chauhan