ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.9, No.1

Publisher: ZAIN Publications

Publishing Date: 2020-01-30

  1. A NOVEL APPROACH FOR DATA ANALYSIS BASED ON SIMULTANEOUS DATA TYPES TEXT, IMAGE, AND NUMBER

    Authors: Udhayakumarapandian; Srinethe S

  2. A Highly Secure and Accurate Method for RGB Image Encryption

    Authors: Ziad AlQadi

  3. HOME APPLIANCES CONTROL AUTHENTICATION USING NODEMCU

    Authors: ABHAY V BELAGODU; AMOGH BABU K A

  4. Study and Analysis of Different Feature Extraction Methods in Digital Image Processing

    Authors: Anupam Baruah; Lakshmi Prasad Saikia

  5. ANALYSIS AND DESIGN OF FIRE EMERGENCY APPLICATION (FEAP)

    Authors: Mubarak Albarka Umar; Abdullahi Saheed Salahudeen; Jimoh Ehi Okoh; Mahmoud Siddig Mohamed

  6. A Study of 2.5D Face Recognition for Forensic Analysis

    Authors: Ahmed Hamid Mohsin; Israa Mohammed Rahi; Rasha Awad Hussain

  7. Knowledge Discovery in Heart Dataset using Classification Techniques

    Authors: Suresh Kumar Pandey; Bharat Mishra; S.S.Gautam

  8. A REVIEW OF ASPECT ORIENTED PROGRAMMING FOR ENHANCED PROGRAM MODULARITY

    Authors: Nnaa Sunday Barikui; Ojekudo Nathaniel Akpofure

  9. Evaluation of Fuzzy and C_mean Clustering Methods used to Generate Voiceprint

    Authors: Yousif Eltous; Ghazi M. Qaryouti; Mohammad Abuzalata; Ziad Alqadi

  10. Odd Posts Identification through the Vocabulary by Semantic Sentiment Analysis Using Machine Learning Algorithm

    Authors: Mohammed Ali Alzahrani

  11. Quality Recognition of Banana Images using Classifiers

    Authors: A.Anushya

  12. Customers Churn Prediction Model Comprising of Clustering and Classification: An Application of Improvised Kmeans Clustering Algorithm and Non Linear Support Vector Machine

    Authors: Anuradha; Shaveta Kalsi

  13. Privacy-Preserving Healthcare Architecture Using Blockchain

    Authors: V.Devi; V.Sabareshwaran; R.Saravana Kumar; M.Sivasankar

  14. A SECURE ERASURE CODE-BASED CLOUD STORAGE SYSTEM WITH SECURED DATA FORWARDING

    Authors: G.Suganya; S.Hariharan; S.Jeeva; J.Nandhakumar; M.Nirmal

  15. PREVENTION OF CARJACKING USING FACE RECOGNITION

    Authors: K.Dilli Babu; K.Aishwarya; B.Akilya; B.Gowsalya; J.Reena

  16. DENSITY BASED TRAFFIC CONTROL USING IoT

    Authors: Mohan Raj A; Gayathri K; Navidharshini G; Renita Praisy S; Srimathi W

  17. Identity-Based Authentication with Efficient Traceable System in Cloud Storage

    Authors: R.Prabhu; G.Haripriya; V.S.Janasathyaa; M.Keerthika; T.Pushpalatha

  18. Hiding Data in Video Sequences using RC6 Algorithm

    Authors: V.Yamini Priya; K.Priyadharshini; K.Sowndharya; S.Swathi; K.Swetha

  19. Detecting Intruders in the Web Using CNN RNN Algorithms in Deep Learning

    Authors: R.Ramya; M.Pearline Joy Kiruba; A.Lathika; P.Grupsgaya; N.Deepa

  20. Online Voting System Using Aadhaar Card and Biometric

    Authors: Dinesh Kumar P; Akshay Hareendran; Askar Ali S; Bharanidharan K