ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.8, No.7

Publisher: IJCSMC Publishing Team

Publishing Date: 2019-07-30

  1. Development of Text Recognition Prototype with Classification of Neural Networks AND Text-To-Speech in Javanese Scripts Using Incremental Methods

    Authors: Ifan Prihandi; Indra Ranggadara; Boy Yuliandi

  2. Color Image Compression of Inter-Prediction Base

    Authors: Ghadah Al-Khafaji; Marwa Bassim

  3. Ubiquitous Virtual Reality: The State-of-the-Art

    Authors: Bernadetta Kwintiana Ane; Dieter Roller; Jagadish Lolugu

  4. Automated Bell Pepper Harvesting using Robotic Vision System

    Authors: Silpa Ajith Kumar; Nikhila.S; J. Satheesh Kumar

  5. A Novel PSO Algorithm Based on Lossless Image Compression with Optimized DWT

    Authors: P.RAVI

  6. Security Aspects of MANETs: A Review

    Authors: Zakki Ul Rehman Khan; Ankita Sharma

  7. Multiple Sequence Alignment Based Method for Construction of Phylogenetic Trees

    Authors: Priyanka Shaktawat; Parvati Bhurani

  8. Selection of Optimal Materialized Views in Data Warehouse Using Hybrid Technique

    Authors: Wesal Adeeb Abdullah; Naji Mutar Sahib; Jamal Mustafa Al-Tuwaijari

  9. Analysis of Various Plant Disease Detection Techniques Using KNN Classifier

    Authors: RAKSHA; MANJU MATHUR

  10. Tableau Big Data Visualization Tool in the Higher Education Institutions for Sustainable Development Goals

    Authors: Ahmed M. Amer; Mohamed M. EL-Hadi

  11. COMPARATIVE STUDY OF GENETIC AND RANDOM FOREST ALGORITHM ON BONE MARROW GENE SEQUENCES

    Authors: M.Mayilvaganan; S.Sowmya

  12. PERFORMANCE COMPARISION OF DATA CLASSIFICATION ALGORITHM FOR ANALYSIS LUNG CANCER DATASETS

    Authors: M.Mayilvaganan; N.Thamaraikannan

  13. Student–Alumni Job Portal

    Authors: Mahalakshmi K; Sujilatha T

  14. Detecting Digital Forgery Using Image Processing in Zero Day Attack

    Authors: L. Haider Hameed Razzaq; Ghadah Al-Khafaji

  15. TEXTURE FEATURE ANALYSIS ALGORITHM for COPY-MOVE FORGERY DETECTION in IMAGE PROCESSING

    Authors: Sakshi Sharma; Amanpreet S. Dhillon

  16. Classification Approach for Brain Tumor Detection

    Authors: Mansha; Kiranpreet Kaur

  17. Classification Approach for Diabetic Retinopathy Detection

    Authors: Shilpa Mehta; Amanpreet S. Dhillon

  18. Circular Hough Transformation Approach for Iris Detection

    Authors: Nisha Mattu; Kiranpreet Kaur

  19. Secure Cloud Resources Using GLCM Based Watermarking Technique

    Authors: Vaishali; Apneet Kaur

  20. Clustering Techniques of Data Mining- A Review

    Authors: Ranbir Gagat; Sikander Singh

  21. Fruit Quality Assessment Techniques: A Review

    Authors: Kavita Komal; Sonia Goyal

  22. Handwritten Character Recognition Using SIFT Algorithm

    Authors: Bhupinder Kaur; Prabhjot Kaur

  23. Development of a Centralized Sim Registration System

    Authors: Omotosho Oluyinka I; Omidiora Elijah O.

  24. A Survey on Searchable Symmetric Encryption and Approach for Multi-Keyword Search Over Encrypted Data on Cloud Server

    Authors: Supriya V. Joshi; Abhijit A. Rajaguru

  25. Review of Brain Tumor Detection Techniques

    Authors: Rashmi Bajaj; Shadab Ali

  26. A Non-Invasive Approach to Detect and Mitigate Hardware Trojan in Network on Chip

    Authors: Musharraf Hussain; Naveed Khan Baloach; Aamir Anwar