ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.8, No.6

Publisher: ZAIN Publications

Publishing Date: 2019-06-30

  1. A SECURE BOMB DIFFUSAL SPY ROBOT CONTROLLED USING ANDROID APP

    Authors: Rushikesh Uphad; Vaibhav Kharat; Priyanka Said; Supriya Shinde

  2. Algorithmic Trading using Mean Reversion Indicators

    Authors: Madhu B R; Harshavardhan P; Madhumathi M; Y Achyuth Reddy; Nikitha Chowdary K

  3. Couple of Ways to Predict and Hypnotize People by Online Games

    Authors: Amir Reza Shahbazkia

  4. Patient Monitoring In Hospital Using Li-Fi

    Authors: Vaishnavi Bhope; Aishwarya Naikwadi; Snehal Gilbile; Supriya Shinde

  5. PERFORMANCE OF STUDENT PREDICTION

    Authors: Mohammed Afzal Ahamed; Prayuk Chaisanit; Mahesh T R

  6. AN OVERVIEW OF VISIBLE LIGHT COMMUNICATION SYSTEMS

    Authors: Sayf ALBAYATI

  7. Comparative Analysis of Various Uninformed Searching Algorithms in AI

    Authors: Gayathri R

  8. VIRTUAL REALITY SIMULATION

    Authors: Tummala Charan Reddy; Gudivada Rupesh; Rajani Shree

  9. MOBILE-BASED PYTHON TUTOR FOR HIGH SCHOOL STUDENTS

    Authors: Luka Micah; Gideon Dadik Bibu

  10. Internet of Things (IOT) FOR AGRICULTURE

    Authors: P S Vineeth; Shreyas K; Vanishree V Nayak; T Charan Reddy; Vivek.V

  11. Multi Biometric Recognition System

    Authors: Sahana J S; Tarun R R; Manjunath C R

  12. SECURE DATA SHARING ON CLOUD USING TRANSPARENCY SERVICE MODEL

    Authors: Madhu B R; M Sindhu; H A Aravinda; Aishwarya S; Nesara A M

  13. BEACON TECHNOLOGY

    Authors: Akshay Jayraj Suvarna; Avaneesh Pratap Singh; Asst. Shashikala H K

  14. Using Color Image as a Stego-Media to Hide Short Secret Messages

    Authors: Rushdi Abu Zneit; Jamil Al-Azzeh; Ziad Alqadi; Belal Ayyoub; Ahmad Sharadqh

  15. A Review on Search Based Software Engineering

    Authors: Divya K V

  16. A Survey on Post Quantum Digital Signature Schemes for Blockchain

    Authors: M Shanmugam Shoba

  17. Crime Analysis for Multistate Network using Naive Bayes Classifier

    Authors: Mrinalini Jangra; Shaveta Kalsi

  18. Hospital IT One Task But Many Challenges

    Authors: Deepak Tripathee

  19. A Comparative Study of Hash Algorithms in Cryptography

    Authors: Prashant P. Pittalia

  20. Superimposed Rule-Based Classification Algorithm in IoT

    Authors: Ivy Kim D. Machica; Bobby D. Gerardo; Ruji P. Medina

  21. EMOTION DETECTION USING MACHINE LEARNING

    Authors: Animesh Nema; Nishant Ragate; Avaneesh Pratap Singh; Asst. Shashikala H K

  22. Hierarchal Polynomial Coding of Grayscale Lossless Image Compression

    Authors: Ghadah Al-Khafaji; Abdullah Abdulhussain; Uhood S. Al-hasani

  23. EMOTION DETECTION FROM FACE USING PCA, GLCM, GMM and SVM

    Authors: Pankaj; Er. Sumit Dalal

  24. Analysis of Various Encryption Schemes of Cloud Computing

    Authors: Satmeer Kaur; Inderdeep Kaur

  25. PROTOTYPE-INCORPORATED EMOTIONAL NEURAL NETWORK

    Authors: P. Sai Vineeth; Vanishree V Nayak; Shilpa Das

  26. OPTIMAL STATE FEEDBACK CONTROLLER FOR SEPARATELY-EXCITED DC MOTOR

    Authors: Yasin. A. Al Shiboul; Ali S. Dalabeeh; Khalid M. Al Shehhi