ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Computing - IJCSMC >>

Vol.9, No.3

Publisher: ZAIN Publications

Publishing Date: 2020-03-30

  1. ENHANCED PRIVACY AND SECURITY IN OTP GENERATION TECHNIQUE AGAINST OTP STEALING ATTACK

    Authors: B.SATHYABAMA; M.VINOTHKUMAR

  2. Deep Analysis of Intrusion Detection System for Mobile Devices with Networking System

    Authors: Sonu Devi; Anuj Kumar Sharma

  3. Understanding of Intrusion Detection System for Cloud Computing with Networking System

    Authors: Sonu Devi; Anuj Kumar Sharma

  4. ENERGY CONSUMPTION AND END-TO-END DELAY CONSTRAINED PROBLEMS IN SENSOR NETWORKS

    Authors: P.Chitti Babu; D.J.Samatha Naidu; V.Sailabhanu

  5. Mining and Analyzing Implicit Dataset of Domestic Load Consumption using Neural Network

    Authors: B Shamreen Ahamed; Aarthi M; Akram Khan M; Akshaya K

  6. TO IMPROVE NETWORK PERFORMANCE MEASUREMENT USING INCREMENTAL COUNTER ESTIMATION BROADCAST ALGORITHM

    Authors: P.Chitti Babu; D.J.Samatha Naidu; A.Syam Prasad

  7. MULTIPLE ROUTING FLOW ALGORITHM TO PREVENT NETWORK FLOW PROBLEMS

    Authors: P.Chitti Babu; D.J.Samatha Naidu; Y.Chinnaiah

  8. A Trust Based Approach for Avoidance of Wormhole Attack in MANET

    Authors: Ashok Panwar; Bhavana Panwar; D. Srinivasa Rao; G. Sriram

  9. PROTECTING SECRET FILES IN MOBILE FROM MALICIOUS APP

    Authors: B.SATHYABAMA; D.VINOTHKUMAR

  10. Android Malware Analysis

    Authors: Neelam; Charanjiv Singh Saroa; Gaurav Gupta

  11. CHATBOT FOR RETAIL SHOP EVALUATION

    Authors: N.Ganitha Aarthi; G.Keerthana; A.Pavithra; K.Pavithra

  12. ANDROID – BLOOD BANK APPLICATION

    Authors: Sejal Rana; Simran Kaur

  13. A STUDY OF ONLINE TRADING SYSTEM

    Authors: A.Ganesan; S.Vijay; N.Revathy

  14. A REVIEW ON DISASTER RESCUE SYSTEM

    Authors: N.Revathy; A.Gowtham

  15. Blockchain in Supply Chain Traceability

    Authors: Priya Vijay; Surabhi Ojha; Sriram V; Nanthiniannal.J

  16. Lossless Compression for Text Document Using Huffman Encoding, Run Length Encoding, and Lempel-Ziv Welch Coding Algorithms

    Authors: Divya M S; J. Chandrashekhara; Vinay .S; A. Ramadevi

  17. Pattern Recognition in Stock Market

    Authors: D. Sorna Shanthi; T. Aarthi; A.K. Bhuvanesh; RA. Chooriya Prabha

  18. An Improved Model for Birth Rate Monitoring Information System in Nigeria

    Authors: Ubani Tochukwu Iheajuru; Onuodu Friday Eleonu

  19. A Web-Based Screening Model for Youth Empowerment and Career Development

    Authors: Udoh Chimereze; Onuodu Friday Eleonu

  20. An Enhanced Fake News Tracking System for Community Policing Using Hybridized Detection Algorithm (HDA)

    Authors: Maikarfi Ephraim; Onuodu Friday Eleonu

  21. Features Analysis of RGB Color Image based on Wavelet Packet Information

    Authors: Ziad Alqadi; Amjad Hindi; Majed Omar Dwairi; Mohammad S. Khrisat

  22. Accessibility Analysis of Bangladesh Government Websites Based on WCAG 2.0

    Authors: Mostak Ahmed; Zhijun Yan; Shariful Islam; Md Mehedi Hasan Sunny

  23. HIGHWAY ACCIDENT DETECTION AND NOTIFICATION USING MACHINE LEARNING

    Authors: Nancy.P; Dilli Rao.D; Babuaravind.G; Bhanushree.S

  24. My Choice My Career

    Authors: Bhuvaneswaran.B; Akshaya.N; Akshaya.S; Devesh.M

  25. QR Code Scanner Based Student Analysis System

    Authors: Santhiya M; Adarsh N G; Aktchaya Kumar R; Aravindh S

  26. Brand Perception Using Social Media Analysis

    Authors: Aksheya Suresh; Dinesh Kumar P; Azar Mahmoodh Y; Delliganesh S

  27. Women Safety System Using Emotional VGGNet

    Authors: Bhuvaneswaran.B; Abishek.A; Deepthi Vasudevan; Devipriya.H

  28. SMART RAILWAY GATE OBSTACLE DETECTION AND WARNING SYSTEM

    Authors: Praveena; P.Keerthipriya; S.Vaijynthi; D.Arvind

  29. A Survey on Chatbot Implementation in Health Care using NLTK

    Authors: J. Jinu Sophia; D. Arun Kumar; M. Arutselvan; S. Barath Ram

  30. Review of Cryptography in Cloud Computing

    Authors: Samar Zaineldeen; Abdelrahim Ate

  31. GUI BASED PREDICTION OF CRIME RATE USING MACHINE LEARNING APPROACH

    Authors: Prithi S; Aravindan S; Anusuya E; Ashok Kumar M

  32. Trend Analysis of Breast Cancer Stages using Supervised Machine Learning Algorithm

    Authors: Abirami J; Balaji S; Aashish M; Anubharathi.B.U

  33. Separable Reversible Data Hiding in Encrypted Image Using Dual Data Embedding with Histogram Shifting

    Authors: Anusha S; Arul Mozhi P; Elakkiya N; Vijayakumar R

  34. Automated Attendance Management using OneShot Learning

    Authors: Arvind Vignesh K; Suresh Kumar S