ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Applications IJCSMA >>

Vol.5, No.10

Publisher: ZAIN Publications

Publishing Date: 2017-10-30

  1. Usability Testing Methods for Mobile Learning Applications

    Authors: Priyanka Mathur Swati V. Chande

  2. A Survey on Security Attacks for VANET

    Authors: Venkatamangarao Nampally M. Raghavender Sharma

  3. SENTIMENT ANALYSIS OF TWEETS USING SUPPORT VECTOR MACHINE

    Authors: Suman Rani Jaswinder Singh

  4. EFFECTIVENESS OF OPENMP FOR ALGORITHM PARALLELIZATION

    Authors: Rahul Dadhich Prakash Choudhary Neha Mahala P K Bhagat

  5. An Analysis of Database from Traditional Database Towards Hana in Business Environment

    Authors: Suchitra B Kanimozhi.N Valarmathi.V

  6. Online Attendance Management System Using RFID with Object Contradict

    Authors: Pranav Patil Swapnil Ghansham Chaudhari

  7. Study of Time Management Technique to Manage Stress among Software Professionals

    Authors: Pranav Patil Jitendra Machindra Patil

  8. Challenges & Essential of Mobile Banking in India

    Authors: Pranav Patil Sagar Madan Saitwal

  9. A Study on Multimodal Biometrics System

    Authors: D.Shobana A.Logeshwari S.Uma Maheswari

  10. SHIELDING NETWORK VIRTUALIZATION USING CBC-MAC FOR IMMINENT INTERCONNECTED NETWORKS

    Authors: Reshmi. S Kirthika. B Deepa. B

  11. STEPWISE REGRESSION BASED SUPPORT VECTOR MACHINE FOR STABLE AND CONSISTENT DATA DELIVERY IN WSN

    Authors: A.SRIDHAR C.CHANDRASEKAR

  12. Augmented Reality Based Mobile App for a University Campus

    Authors: Eman Yaser Daraghmi

  13. A Survey on Early Detection of Liver Cancer for Preventive Health Care using Image Processing

    Authors: Meenu Sharma Rafat Parveen

  14. MICROARRAY USING ADVANCED REGRESSION FOR FIXING LOST DATA

    Authors: K.Lakshmipriya R.Manickachezian

  15. FRAUD DETECTION USING REDDIT RANKING ALGORITHM

    Authors: Janani.S R.Manickachezian

  16. ENHANCED CROSS DOMAIN SENTIMENTAL CLASSIFICATION USING PATTERN RECOGNITION

    Authors: S.Maguda Gowreeswari R.Manickachezian

  17. Big Data Landscape: State of the Art, Trend Analysis and Potential Challenges

    Authors: Gurtej Singh Ubhi Jaspreet Kaur Sahiwal

  18. SECURITY ENHANCEMENT AND MINIMIZED DELAY OF NEIGHBOUR DEFENCE TECHNIQUE FOR AODV (NDTAODV) ROUTING PROTOCOL BY VARYING NETWORK SIZE IN MANETS

    Authors: Nirbhay Kumar Chaubey

  19. A Design Approach to Secure Data Transmission in Network Centric Warfare Systems

    Authors: K. Madhavi Aruna Varanasi

  20. Performance Analysis of Modified Blowfish Algorithm towards Cloud Security

    Authors: K.Kavitha

  21. Vulnerability Assessment Policies and Tools in Enterprise Networks

    Authors: Madhavi Dhingra

  22. Determination and Analysis of Automated Fruits Grading System Using Machine Learning Method

    Authors: Amrita Parashar

  23. CONTENT BASED IMAGE RETRIEVAL SYSTEM USING SVM CLASSIFICATION AND EVOLUTIONARY ALGORITHMS

    Authors: M Ekambaram Naidu Ravi Kumar Chandu