Archived Papers for Journal
International Journal of Computer Science and Mobile Computing - IJCSMC >>
Vol.9, No.1
Publisher: ZAIN Publications
Publishing Date: 2020-01-30
- A NOVEL APPROACH FOR DATA ANALYSIS BASED ON SIMULTANEOUS DATA TYPES TEXT, IMAGE, AND NUMBERAuthors: Udhayakumarapandian; Srinethe S
- A Highly Secure and Accurate Method for RGB Image EncryptionAuthors: Ziad AlQadi
- HOME APPLIANCES CONTROL AUTHENTICATION USING NODEMCUAuthors: ABHAY V BELAGODU; AMOGH BABU K A
- Study and Analysis of Different Feature Extraction Methods in Digital Image ProcessingAuthors: Anupam Baruah; Lakshmi Prasad Saikia
- ANALYSIS AND DESIGN OF FIRE EMERGENCY APPLICATION (FEAP)Authors: Mubarak Albarka Umar; Abdullahi Saheed Salahudeen; Jimoh Ehi Okoh; Mahmoud Siddig Mohamed
- A Study of 2.5D Face Recognition for Forensic AnalysisAuthors: Ahmed Hamid Mohsin; Israa Mohammed Rahi; Rasha Awad Hussain
- Knowledge Discovery in Heart Dataset using Classification TechniquesAuthors: Suresh Kumar Pandey; Bharat Mishra; S.S.Gautam
- A REVIEW OF ASPECT ORIENTED PROGRAMMING FOR ENHANCED PROGRAM MODULARITYAuthors: Nnaa Sunday Barikui; Ojekudo Nathaniel Akpofure
- Evaluation of Fuzzy and C_mean Clustering Methods used to Generate VoiceprintAuthors: Yousif Eltous; Ghazi M. Qaryouti; Mohammad Abuzalata; Ziad Alqadi
- Odd Posts Identification through the Vocabulary by Semantic Sentiment Analysis Using Machine Learning AlgorithmAuthors: Mohammed Ali Alzahrani
- Quality Recognition of Banana Images using ClassifiersAuthors: A.Anushya
- Customers Churn Prediction Model Comprising of Clustering and Classification: An Application of Improvised Kmeans Clustering Algorithm and Non Linear Support Vector MachineAuthors: Anuradha; Shaveta Kalsi
- Privacy-Preserving Healthcare Architecture Using BlockchainAuthors: V.Devi; V.Sabareshwaran; R.Saravana Kumar; M.Sivasankar
- A SECURE ERASURE CODE-BASED CLOUD STORAGE SYSTEM WITH SECURED DATA FORWARDINGAuthors: G.Suganya; S.Hariharan; S.Jeeva; J.Nandhakumar; M.Nirmal
- PREVENTION OF CARJACKING USING FACE RECOGNITIONAuthors: K.Dilli Babu; K.Aishwarya; B.Akilya; B.Gowsalya; J.Reena
- DENSITY BASED TRAFFIC CONTROL USING IoTAuthors: Mohan Raj A; Gayathri K; Navidharshini G; Renita Praisy S; Srimathi W
- Identity-Based Authentication with Efficient Traceable System in Cloud StorageAuthors: R.Prabhu; G.Haripriya; V.S.Janasathyaa; M.Keerthika; T.Pushpalatha
- Hiding Data in Video Sequences using RC6 AlgorithmAuthors: V.Yamini Priya; K.Priyadharshini; K.Sowndharya; S.Swathi; K.Swetha
- Detecting Intruders in the Web Using CNN RNN Algorithms in Deep LearningAuthors: R.Ramya; M.Pearline Joy Kiruba; A.Lathika; P.Grupsgaya; N.Deepa
- Online Voting System Using Aadhaar Card and BiometricAuthors: Dinesh Kumar P; Akshay Hareendran; Askar Ali S; Bharanidharan K
- Design and Analysis of Compact Multiband Patch Antennas Using Electromagnetic Band GapAuthors: B. Venkateshwar Rao; Sunita Panda