Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.8, No.6
Publisher: ZAIN Publications
Publishing Date: 2019-06-30
- A SECURE BOMB DIFFUSAL SPY ROBOT CONTROLLED USING ANDROID APPAuthors: Rushikesh Uphad; Vaibhav Kharat; Priyanka Said; Supriya Shinde
- Algorithmic Trading using Mean Reversion IndicatorsAuthors: Madhu B R; Harshavardhan P; Madhumathi M; Y Achyuth Reddy; Nikitha Chowdary K
- Couple of Ways to Predict and Hypnotize People by Online GamesAuthors: Amir Reza Shahbazkia
- Patient Monitoring In Hospital Using Li-FiAuthors: Vaishnavi Bhope; Aishwarya Naikwadi; Snehal Gilbile; Supriya Shinde
- PERFORMANCE OF STUDENT PREDICTIONAuthors: Mohammed Afzal Ahamed; Prayuk Chaisanit; Mahesh T R
- AN OVERVIEW OF VISIBLE LIGHT COMMUNICATION SYSTEMSAuthors: Sayf ALBAYATI
- Comparative Analysis of Various Uninformed Searching Algorithms in AIAuthors: Gayathri R
- VIRTUAL REALITY SIMULATIONAuthors: Tummala Charan Reddy; Gudivada Rupesh; Rajani Shree
- MOBILE-BASED PYTHON TUTOR FOR HIGH SCHOOL STUDENTSAuthors: Luka Micah; Gideon Dadik Bibu
- Internet of Things (IOT) FOR AGRICULTUREAuthors: P S Vineeth; Shreyas K; Vanishree V Nayak; T Charan Reddy; Vivek.V
- Multi Biometric Recognition SystemAuthors: Sahana J S; Tarun R R; Manjunath C R
- SECURE DATA SHARING ON CLOUD USING TRANSPARENCY SERVICE MODELAuthors: Madhu B R; M Sindhu; H A Aravinda; Aishwarya S; Nesara A M
- BEACON TECHNOLOGYAuthors: Akshay Jayraj Suvarna; Avaneesh Pratap Singh; Asst. Shashikala H K
- Using Color Image as a Stego-Media to Hide Short Secret MessagesAuthors: Rushdi Abu Zneit; Jamil Al-Azzeh; Ziad Alqadi; Belal Ayyoub; Ahmad Sharadqh
- A Review on Search Based Software EngineeringAuthors: Divya K V
- A Survey on Post Quantum Digital Signature Schemes for BlockchainAuthors: M Shanmugam Shoba
- Crime Analysis for Multistate Network using Naive Bayes ClassifierAuthors: Mrinalini Jangra; Shaveta Kalsi
- Hospital IT One Task But Many ChallengesAuthors: Deepak Tripathee
- A Comparative Study of Hash Algorithms in CryptographyAuthors: Prashant P. Pittalia
- Superimposed Rule-Based Classification Algorithm in IoTAuthors: Ivy Kim D. Machica; Bobby D. Gerardo; Ruji P. Medina
- EMOTION DETECTION USING MACHINE LEARNINGAuthors: Animesh Nema; Nishant Ragate; Avaneesh Pratap Singh; Asst. Shashikala H K
- Hierarchal Polynomial Coding of Grayscale Lossless Image CompressionAuthors: Ghadah Al-Khafaji; Abdullah Abdulhussain; Uhood S. Al-hasani
- EMOTION DETECTION FROM FACE USING PCA, GLCM, GMM and SVMAuthors: Pankaj; Er. Sumit Dalal
- Analysis of Various Encryption Schemes of Cloud ComputingAuthors: Satmeer Kaur; Inderdeep Kaur
- PROTOTYPE-INCORPORATED EMOTIONAL NEURAL NETWORKAuthors: P. Sai Vineeth; Vanishree V Nayak; Shilpa Das
- OPTIMAL STATE FEEDBACK CONTROLLER FOR SEPARATELY-EXCITED DC MOTORAuthors: Yasin. A. Al Shiboul; Ali S. Dalabeeh; Khalid M. Al Shehhi