International Journal of Computer Science and Mobile Applications IJCSMA >>
Vol.5, No.10
Publisher: ZAIN Publications
Publishing Date: 2017-10-30
- Usability Testing Methods for Mobile Learning Applications
Authors: Priyanka Mathur Swati V. Chande
- A Survey on Security Attacks for VANET
Authors: Venkatamangarao Nampally M. Raghavender Sharma
- SENTIMENT ANALYSIS OF TWEETS USING SUPPORT VECTOR MACHINE
Authors: Suman Rani Jaswinder Singh
- EFFECTIVENESS OF OPENMP FOR ALGORITHM PARALLELIZATION
Authors: Rahul Dadhich Prakash Choudhary Neha Mahala P K Bhagat
- An Analysis of Database from Traditional Database Towards Hana in Business Environment
Authors: Suchitra B Kanimozhi.N Valarmathi.V
- Online Attendance Management System Using RFID with Object Contradict
Authors: Pranav Patil Swapnil Ghansham Chaudhari
- Study of Time Management Technique to Manage Stress among Software Professionals
Authors: Pranav Patil Jitendra Machindra Patil
- Challenges & Essential of Mobile Banking in India
Authors: Pranav Patil Sagar Madan Saitwal
- A Study on Multimodal Biometrics System
Authors: D.Shobana A.Logeshwari S.Uma Maheswari
- SHIELDING NETWORK VIRTUALIZATION USING CBC-MAC FOR IMMINENT INTERCONNECTED NETWORKS
Authors: Reshmi. S Kirthika. B Deepa. B
- STEPWISE REGRESSION BASED SUPPORT VECTOR MACHINE FOR STABLE AND CONSISTENT DATA DELIVERY IN WSN
Authors: A.SRIDHAR C.CHANDRASEKAR
- Augmented Reality Based Mobile App for a University Campus
Authors: Eman Yaser Daraghmi
- A Survey on Early Detection of Liver Cancer for Preventive Health Care using Image Processing
Authors: Meenu Sharma Rafat Parveen
- MICROARRAY USING ADVANCED REGRESSION FOR FIXING LOST DATA
Authors: K.Lakshmipriya R.Manickachezian
- FRAUD DETECTION USING REDDIT RANKING ALGORITHM
Authors: Janani.S R.Manickachezian
- ENHANCED CROSS DOMAIN SENTIMENTAL CLASSIFICATION USING PATTERN RECOGNITION
Authors: S.Maguda Gowreeswari R.Manickachezian
- Big Data Landscape: State of the Art, Trend Analysis and Potential Challenges
Authors: Gurtej Singh Ubhi Jaspreet Kaur Sahiwal
- SECURITY ENHANCEMENT AND MINIMIZED DELAY OF NEIGHBOUR DEFENCE TECHNIQUE FOR AODV (NDTAODV) ROUTING PROTOCOL BY VARYING NETWORK SIZE IN MANETS
Authors: Nirbhay Kumar Chaubey
- A Design Approach to Secure Data Transmission in Network Centric Warfare Systems
Authors: K. Madhavi Aruna Varanasi
- Performance Analysis of Modified Blowfish Algorithm towards Cloud Security
Authors: K.Kavitha
- Vulnerability Assessment Policies and Tools in Enterprise Networks
Authors: Madhavi Dhingra
- Determination and Analysis of Automated Fruits Grading System Using Machine Learning Method
Authors: Amrita Parashar
- CONTENT BASED IMAGE RETRIEVAL SYSTEM USING SVM CLASSIFICATION AND EVOLUTIONARY ALGORITHMS
Authors: M Ekambaram Naidu Ravi Kumar Chandu