ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Applications IJCSMA >>

Vol.6, No.4

Publisher: ZAIN Publications

Publishing Date: 2018-04-30

  1. A Review on Worldwide Interoperability for Microwave Access (WiMAX) Networks

    Authors: P.SUDHA; A.RENGARAJAN

  2. Intelligent Road Accident Detection and Response using IoT (Internet of Things)

    Authors: Aditya Subramanian; Sanjeev Rao; Sourav Patra; Visnudharsini S

  3. Floor Planning Application using Smart Contracts

    Authors: Aditya Subramanian; Sanjeev Rao; Muthamilselvan S

  4. Anomalies Detection Using Public Auditing Scheme In Cloud Computing Environment

    Authors: Suneeta Mohanty

  5. A Survey Paper on Detection of Phishing Website by URL Technique

    Authors: Aslam Khan; Rahul Sharma

  6. Present Status and Issues of Land Record System in Satara District, Maharashtra, India

    Authors: Laxman L. Kumarwad; Rajendra D. Kumbhar

  7. A STUDY ON SPATIAL REUSABILITY TECHNIQUE IN MULTIHOP WIRELESS SENSOR NETWORKS

    Authors: S.P.Gayathri; K.Susmitha

  8. Workers Call Relation

    Authors: Muthamil Selvan S; Tharun S; Narayanan S S; Shiva S Swamy; Kaushik S G

  9. 8-Bit Computer

    Authors: Ashwin Chakravarthy K; Tharun S; Shiva S Swamy; Surjith Kumar M

  10. Dermatological Disease Detection using Image Processing and Neural Networks

    Authors: S.Kalaiarasi; Harsh Kumar; Sourav Patra

  11. A REVIEW ON VARIOUS IMAGE SEGMENTATION TECHNIQUES

    Authors: VAISHALI SHARMA; BRAHMDUTT BOHRA; SAYAR SINGH SHEKHAWAT

  12. AN EFFICIENT APPROACH OF TRAVEL RECOMMENDATION MODEL FROM HIGH DIMENSIONAL DATABASES

    Authors: S.P GAYATHRI; K. SELVA KANNU

  13. An Analysis of Different Ethnic Age Group Estimation from Facial Images

    Authors: Selva Kumar.S; Muthukumar.S; Gayathri Devi S; Pasupathi P

  14. Big Data Analytics, Integration with Cloud Computing – An Overview and Security Challenges

    Authors: Rekha Sunny T; Kshema Suku

  15. RF CONTROLLED SURVEILLANCE CAR

    Authors: Narendran M; Aindrila Samanta; Anshul Bhargava; Farheen Khan; Harsh Kumar

  16. Recommender System for Mobile Phone Selection

    Authors: Sweta Singh; Prasant Kumar Pattnaik

  17. BIOMETRIC AUTHENTICATION SYSTEM USING ELMAN NEURAL NETWORKS

    Authors: A. Elakkiya; G. Emayavaramban

  18. ENTROPY BASED METHOD TO CALCULATE WEIGHT FOR MULTI-CRITERIAN VM ALLOCATION POLICY IN COMPUTE CLOUD

    Authors: Rajeshvari Panchal; Bela Shrimali; Hiren B. Patel

  19. OPTIMIZING ENERGY CONSUMPTION IN DEPENDENT AND URGENT TASK SCENARIO IN CLOUD ENVIRONMENT

    Authors: Biral Modi; Bela Shrimali; Hiren B. Patel

  20. Semantic Approach for Travel Package and Recommendation

    Authors: Patel Jayneel Omkar; Chaudhari Akshay Jagannath; Patil Niranjan Ambalal; Sawale Ganesh Ravindra; Kotkar Pavan; Shezad.H Shaikh

  21. Leakage Power Minimization in ST-SRAM Cell Using Adaptive Reverse Body Bias Technique

    Authors: Kananbala Ray; B. Shivalal Patro

  22. Development in Advancement of a Green Appoint Mechanism for Vitality Investment Funds in Cloud Gauge

    Authors: Pooja Yadav; Praveen Yadav

  23. Automatic Speech Recognition of Plosive Phonetic Class Words in Malayalam Language

    Authors: Cini Kurian

  24. UBIQUITOUS COMPUTING: ADVANTAGES AND CHALLENGES

    Authors: Shahnaz Fatima

  25. Information Security through Compression and Cryptography Techniques

    Authors: R. SRIDEVI; SOWMIYA P R