Archived Papers for Journal
International Journal of Computer Science and Mobile Applications IJCSMA >>
Vol.5, No.10
Publisher: ZAIN Publications
Publishing Date: 2017-10-30
- Usability Testing Methods for Mobile Learning ApplicationsAuthors: Priyanka Mathur Swati V. Chande
- A Survey on Security Attacks for VANETAuthors: Venkatamangarao Nampally M. Raghavender Sharma
- SENTIMENT ANALYSIS OF TWEETS USING SUPPORT VECTOR MACHINEAuthors: Suman Rani Jaswinder Singh
- EFFECTIVENESS OF OPENMP FOR ALGORITHM PARALLELIZATIONAuthors: Rahul Dadhich Prakash Choudhary Neha Mahala P K Bhagat
- An Analysis of Database from Traditional Database Towards Hana in Business EnvironmentAuthors: Suchitra B Kanimozhi.N Valarmathi.V
- Online Attendance Management System Using RFID with Object ContradictAuthors: Pranav Patil Swapnil Ghansham Chaudhari
- Study of Time Management Technique to Manage Stress among Software ProfessionalsAuthors: Pranav Patil Jitendra Machindra Patil
- Challenges & Essential of Mobile Banking in IndiaAuthors: Pranav Patil Sagar Madan Saitwal
- A Study on Multimodal Biometrics SystemAuthors: D.Shobana A.Logeshwari S.Uma Maheswari
- SHIELDING NETWORK VIRTUALIZATION USING CBC-MAC FOR IMMINENT INTERCONNECTED NETWORKSAuthors: Reshmi. S Kirthika. B Deepa. B
- STEPWISE REGRESSION BASED SUPPORT VECTOR MACHINE FOR STABLE AND CONSISTENT DATA DELIVERY IN WSNAuthors: A.SRIDHAR C.CHANDRASEKAR
- Augmented Reality Based Mobile App for a University CampusAuthors: Eman Yaser Daraghmi
- A Survey on Early Detection of Liver Cancer for Preventive Health Care using Image ProcessingAuthors: Meenu Sharma Rafat Parveen
- MICROARRAY USING ADVANCED REGRESSION FOR FIXING LOST DATAAuthors: K.Lakshmipriya R.Manickachezian
- FRAUD DETECTION USING REDDIT RANKING ALGORITHMAuthors: Janani.S R.Manickachezian
- ENHANCED CROSS DOMAIN SENTIMENTAL CLASSIFICATION USING PATTERN RECOGNITIONAuthors: S.Maguda Gowreeswari R.Manickachezian
- Big Data Landscape: State of the Art, Trend Analysis and Potential ChallengesAuthors: Gurtej Singh Ubhi Jaspreet Kaur Sahiwal
- SECURITY ENHANCEMENT AND MINIMIZED DELAY OF NEIGHBOUR DEFENCE TECHNIQUE FOR AODV (NDTAODV) ROUTING PROTOCOL BY VARYING NETWORK SIZE IN MANETSAuthors: Nirbhay Kumar Chaubey
- A Design Approach to Secure Data Transmission in Network Centric Warfare SystemsAuthors: K. Madhavi Aruna Varanasi
- Performance Analysis of Modified Blowfish Algorithm towards Cloud SecurityAuthors: K.Kavitha
- Vulnerability Assessment Policies and Tools in Enterprise NetworksAuthors: Madhavi Dhingra
- Determination and Analysis of Automated Fruits Grading System Using Machine Learning MethodAuthors: Amrita Parashar
- CONTENT BASED IMAGE RETRIEVAL SYSTEM USING SVM CLASSIFICATION AND EVOLUTIONARY ALGORITHMSAuthors: M Ekambaram Naidu Ravi Kumar Chandu