Sl. No. Issue Date Vol - Issue Paper Id Title Abstract Author Page No
12011-08-311-1Animation In J2ee Projects - An Overviewtjprcabs43.pdf

Mr. S. Manivannan & Dr. S. Balasubramanian

10-25
22011-08-311-1Improve System Performance Using Hibernatetjprcabs44.pdf

Sharayu Lokhande  & Rushali Patil

26-39
32011-08-311-1Intelligent Widget Reconfiguration For Mobile Phonestjprcabs45.pdf

Peter K.K. Loh, C.T. Lau & B.H. Chan

40-71
42011-08-311-1Serial And Parallel Implementation Of Shortest Path Algorithm In The Optimization Of Public Transport Traveltjprcabs46.pdf

Guruprasad Nagraj   &  Dr. Y S Kumaraswamy

72-87
52011-08-311-1Data Protection In A Virtualized Environment - Issues And Solutionstjprcabs47.pdf

 S. Manivannan & Dr. S. Balasubramanian

1-9
62011-12-311-2Analyze The Medical Image By, Fuzzy Clustering Algorithms Through Edge Detection Methodstjprcabs132.pdf

Mr.Papendra Kumar And  Mr. Suresh Kumar

1-8
72011-12-311-2Design Of An Information Intelligent System Based On Web Data Miningtjprcabs133.pdf

Lect. Ramesh A. Medar  And  Prof. A. H. Kulkarni

9-21
82011-12-311-2IJCSEITRDEC20113The Use of Wiki as Collaborative Website in E-Learning Context for University Students--1450938325-ABS - 4. Comp Sci IJCSEITR - THE USE OF WIKI AS COLLABORATIVE WEBSITE IN E-LEARNING.pdf

Dhaval Gandhi & Abdullah Al-Mamun

22-40
92011-12-311-2Optimizing Website Size To Improve Usability Of Websitetjprcabs135.pdf

Dr. G. Sreedhar        

41-49
102011-12-311-2Software Piracytjprcabs136.pdf

D.Seetha Mahalaxmi, Dr. S. Viswanatha Raju &Dr. A. Vinay Babu,

50-53
112011-12-311-2The Web Search Enginetjprcabs137.pdf

Mr.G. Hanumantha Rao 

54-60
122011-12-311-2Data Mining Application Using Decision Tree And Ann For Predicting Surface Roughness Of End Milling Manufacturing Processtjprcabs138.pdf

Mr.Vijay Kumar Jha, Dr. Sanjay Kumar Jha  & Mr.Prashant Prakash

61-68
132011-12-311-2A Review On Various Security Issues And Approaches In Cloud Computingtjprcabs139.pdf

Mr.Hiren B. Patel &  Mr.Dhiren R. Patel

69-80
142011-12-311-2Efficient Methodology Of Improving The CDIS For Text Retrievals With An Effective Algorithm For Detection Of Spam Mails Using Thread-Clusters2-14-1323165941-abs EFFICIENT METHODOLOGY OF IMPROVING THE CDIS FOR TEXT RETRIEVALS WITH AN EFFECTIVE ALGORITHM FOR DETECTIO.docx

Mr.M. Basavaraju ,  Dr. R. Prabhakar

81-136
152011-12-311-2Image Compression On Scanning Techniquestjprcabs146.pdf

T. Arumuga Maria Devi, Student, K.K Sherin & Mariadas Ronnie C.P

137-151
162011-12-311-2Proposed Model For Requirements Of Epayment Gatewaystjprcabs147.pdf

Prof. Gopi Krishna &

Dr. R. Siva Ram Prasad

152-168
172011-12-311-2Video Compression System Based On Joint Predictive Codingtjprcabs148.pdf

Asst. Prof. T. Arumuga Maria Devi, Ms. C. Eben Exceline, Ms. K.K Sherin  & Mr. Mariadas Ronnie C.P

169-178
182011-12-311-2Congestion Control With Congestion Free Routers Using Network Border Patroltjprcabs149.pdf

Mr.Padmadhar Mishra, Prof. Abha Choubey & Prof. Siddharth Choubey

179-188
192012-03-312-1Cloud Computing-Software as Servicetjprcabs224.pdf

Gurudatt Kulkarni, Jayant Gambhir & Rajnikant Palwe

1-10
202012-03-312-1Developing Metrics To Optimize Contents Of Websitetjprcabs225.pdf

G. Sreedhar

11-26
212012-03-312-1Simplified Coupling Metrics for Object-Oriented Softwaretjprcabs362.pdf

V.S.Bidve  & Akhil Khare

27-40
222012-03-312-1The Role of Digital Certificates in Contemporary Government Systems: The Case of UAE Identity Authoritytjprcabs363.pdf

Ali M. Al-Khouri

41-55
232012-03-312-1IAAS - Improving Utilization of Infrastructure Cloudstjprcabs364.pdf

Sreelatha Mutyala & K. Rajani Devi  

56-68
242012-03-312-1Medical Image Retrieval System Based on Interactive Genetic Algorithm with User Relevance Feedbacktjprcabs365.pdf

V. Ramachandran &  Y. Sowjanya Kumari

69-90
252012-03-312-1A Comprehensive Radiographic Database Image Retrieval System for A Computer Aided Diagnosistjprcabs367.pdf

V.Ramachandran & E.Srinivasa Reddy

91-103
262012-03-312-1Blocking Misbehaving Users in Anonymizing Networks Using Nymbletjprcabs368.pdf

Lakshmeswari Chennagiri & K. Rajani Devi

104-114
272012-03-312-1PKI Technology: A Government Experiencetjprcabs369.pdf

Ali M. Al-Khouri 

115-141
282012-03-312-1Estimation of Web Proxy Server Cache Size Using G/G/1 Queuing Modeltjprcabs370.pdf

Riktesh Srivastava



142-160
292012-06-302-2A Prototype Large-Scale Hyper Textual Web Search Enginetjprcabs484.pdf

Megha Mishra, V. K. Mishra & H. R. Sharma

1-9
302012-06-302-2Alleviation of Application Layer DDOS Attacks Using Data Specification Module tjprcabs485.pdf

R. Saravanan, K.Vigneswari, M.Rajalakshmi &  S.Suria

10-17
312012-06-302-2BOTNET: An Army of Darkness and its Multifaceted Controltjprcabs486.pdf

Farheen K. Siddiqui  &  Richa Srivastava

18-24
322012-06-302-2Memory Resident Multi-Tree Distributed Database Architecture for Location Independent Personal Telecommunication Number (PTN)tjprcabs487.pdf

Prachi Shori & Neelabh Sao

25-32
332012-06-302-2Named Entity Recognition using Maximum Entropy Model and Hidden Markov Model From Normal Text Documents tjprcabs488.pdf

A Suresh Babu, Y Venkata Krishna Reddy,  Sk Saddam Hussain & A Keerthi Priyanka

33-39
342012-06-302-2Real Time LSB Encoding in Audio Steganography with MP3 Decodertjprcabs489.pdf

Gayatri.M.Bhandari,  R.S. Kawitkar &  M.C.Hingane

40-56
352012-06-302-2Web Information Extraction using Deptatjprcabs490.pdf

A.Suresh Babu,  Sadia Naureen, M. Umamaheswara Rao &  G.Sirisha

57-63
362012-06-302-2A DBSCAN Algorithm for Discovering Clusters in Large Spatial Databases with Noisetjprcabs491.pdf

 G T Raju, Sandhya  G, Sreeja P B & Adarsh Y V

64-75
372012-06-302-2Web Information Extraction using Data Extraction and Label Assignmenttjprcabs492.pdf

A Suresh Babu, A Rakesh, D Bhavitha  & M. Pranavi

76-88
382012-06-302-2Impulse Noise Reduction in Mammograms using A Combination of Median and Fuzzy Switching Median Filters tjprcabs552.pdf

D.A. Kulkarni & G.R.Udupi

89-95
392012-06-302-2A Comparative Study of Partitioning Techniques in VLDBtjprcabs571.pdf

C. Subramanian,T. Bhuvaneswari &  S.P. Rajagopalan

96-101
402012-09-302-3A Study of Feature Selection Methods in Intrusion Detection System: A Survey2-14-1346479656-absA Study of feature selection methods in intrusion detection system.pdf

Amrita & P Ahmed

1-25
412012-09-302-3ISO 20000 and ITIL & Correlation Between Them2-14-1346479921-Abs ISO.pdf

Adesh Chandra

26-45
422012-09-302-3Low Complexity Peak Power and Ber Reduction of Ofdm Signal by Symbol Alteration Technique2-14-1346480062-Abs Complex power.pdf

S.L.Kotgire & S. B. Deosarkar   

46-53
432012-09-302-3Theoretical Approaches to Address the Problem of Paying Change 2-14-1346480197-Abs Address.pdf

Sapan H Mankad   

54-58
442012-09-302-3Tool for Multi Model Interaction2-14-1346480330-Abs Tool For.pdf

Jayanthan & Lakshmi lalitha.K

59-67
452012-09-302-3Unstructural Multimedia Data Retrival Model Based on XML Database2-14-1346480503-Abs UNSTRUCTURAL.pdf

Dattatray V. Meshram & D. M. Dakhane

68-75
462012-09-302-3Visual Cryptography Schemes for Secret Sharing using Meaningful Covering Shares2-14-1346480675-Abs visul.pdf

T.Rajitha et al.,

76-85
472012-09-302-3An Implementation of Computer Graphics as Prepress Image Enhancement Process2-14-1346480782-Abs An imp.pdf

Jaswinder Singh Dilawari & Shashi Kumar Dhiman

86-92
482012-12-312-4Estimating the Number of Generations in a Human Geneticprocess2-14-1354331512-ABS Estimating.pdf

Narendra Bahadur Singh

1-4
492012-12-312-4Enhancing User Adoption for Service Oriented Business Model through Semantically Annotated and Extended Association Rule Mining in SLAKY Composer System2-14-1354331614-ABS Enhancing.pdf

P. Sandhya & M. Lakshmi

5-18
502012-12-312-4Software Exploits of Instruction-Level Parallelism for Supercomputers 2-14-1354331704-ABS Software.pdf

S. N. Tazi et al.

19-38
512012-12-312-4Color and Shape Based Image Retrieval 2-14-1354332131-ABS Colr.pdf

Hire Dnyanda N & S. S. Katariya

39-44
522012-12-312-4Experimental Report to Analyse Human Thoughts on Software Engineering 2-14-1354332307-ABS Experimental.pdf

Prakrit Trivedi, Anil Kumar Dubey & Vipul Sharma

45-52
532012-12-312-4Virtual Machine Development On Core-i7 Using Vmware Workstation 2-14-1354332454-ABS Virtual.pdf

Tarun Goyal, Ajit Singh & Aakanksha Agrawal

53-56
542012-12-312-4Academic Performance Evaluation Using Fuzzy C-Means 2-14-1354332902-ABS Academic.pdf

Ramjeet Singh Yadav & P. Ahmed

57-86
552012-12-312-4Analysis of Hybrid System with ANN Component and Conceptualization of Feasibility for Neural Expert System for Evaluating Motivational Strategies2-14-1354333248-ABS Analysis.pdf

Viral Nagori    

87-92
562012-12-312-4Simulation Based Design of Robotic Arm and Omni Directional Drive Mechanism of Dexto:Eka --1354524528-abs Simulation.pdf

Sulabh Kumra, Shilpa Mehta & Rajat Saxena                                                                                                              

93-102
572012-12-312-4Information Technology as a Facilitator for Green Initiatives- A Sectoral Analysis2-14-1354690971-ABS Information.pdf

Rekha Mishra

103-111
582013-03-313-1LabVIEW Based Realtime Integrated Safety Parameters Monitoring of UAV2-14-1355465251-ABS Labview.pdf

Amiya Ranjan Panda, Angshuman Roy, Utpal Mandal & Hare Krishna Ratha

1-10
592013-03-313-1Stock Market Trends Prediction Using Neural Network Based Hybrid Model2-14-1355736915-ABS Stock.pdf

Asif Ullah Khan & Bhupesh Gour

 

11-18
602013-03-313-1Qualitative Comparative Study of Various Contrast Enhancement Techniques2-14-1355814777-ABS Qualitative.pdf

Ashamdeep Singh & Navdeep Kanwal

19-24
612013-03-313-1A Novel Secured Mechanism for Authentication Cookie2-14-1355978695-ABS Novel secured.pdf

J. N. V. R. Swarup Kumar & V. Anantharamaiah

25-30
622013-03-313-1Empirical Report to Evaluate and Analysis Actual Defect of System2-14-1355978913-ABS Empirical.pdf

Prakash Kawar Asawat & Krishan Kant Lavania

31-38
632013-03-313-1Efficient Clustering of Dataset Based on Particle Swarm Optimization--1356009595-ABS Efficient.pdf

Suresh Chandra Satapathy& Anima Naik

39-48
642013-03-313-1Amalgamation of Cryptography with Neuro Fuzzy System2-14-1356008902-ABS Amalgation.pdf

S. Saravanakumar et al.

49-60
652013-03-313-1A Computer Aided Diagnostic System for Classification of Brain Tumors Using Texture Features and Probabilistic Neural Network2-14-1356498867-ABS Computer.pdf

Sonali Patil & V. R. Udupi

 

61-66
662013-03-313-1Image Encryption Techniques: A Critical Comparison2-14-1356499631-ABS Image.pdf

Ravi Shanker Yadav, Mhd. Rizwan Beg & Manish Madhava Tripathi

 

67-74
672013-03-313-1Decision Tree Classifiers with GA Based Feature Selection2-14-1357557869-ABS Decision.pdf

Shanta Rangaswamy et al.

75-84
682013-03-313-1Design of an Academic Web Portal Providing E-Facilities 2-14-1357567866-ABS Design of academic.pdf

Pratibha S. Yalagi & Chaitrali S. Dangare

85-90
692013-03-313-1Privacy Preserving Data Mining by New “Two Phase SVD Matrix Factorization Model”2-14-1357720891-ABS Privacy.pdf

Bhupesh Gour, Asif Ullah Khan& Priyank Jain

 

91-94
702013-03-313-1Prediction of Student Success that are going to Enroll in the Higher Technical Education--1364470697-ABS Prediction.pdf

Shiv Kumar Gupta, Sonal Gupta & Ritu Vijay

95-108
712013-03-313-1Image Compression Using Clustering Techniques2-14-1357809524-ABS Image Compression.pdf

Divya Mohan & Nisha Joseph 

109-116
722013-03-313-1Quality of Services (QoS) Evaluation in Adhoc Networks using Source-Initiated On-Demand Routing Algorithms2-14-1358407697-ABS Quality.pdf

Paramjit Singh, Ajay K Sharma & T S Kamal

117-122
732013-03-313-1A Web Search Approach for Binary String in XML Data2-14-1358839615-ABS A Web.pdf

B. A. Jadhawar, A. S. Tamboli & S. S. Palkar

123-132
742013-03-313-1Cloud Based Collaboration System2-14-1358839683-ABS Cloud.pdf

S. Rekha & B. Subramani 

133-142
752013-03-313-1Analysis of a Dynamic Load Balancing in Multiprocessor System2-14-1358840382-ABS Analysis.pdf

Mohammad Haroon & Mohammad Husain

143-148
762013-03-313-1Cloud Computing with Real Life Case Studies and a New Approach of Solving Security Issues and Putting Data in Cloud2-14-1358944419-ABS Cloud computing.pdf

Saurabh Srivastava et al.

149-154
772013-03-313-1An Efficient Technique to Enhance Mammogram Image Using Curvelet Transform2-14-1359117294-ABS An efficient.pdf

T. A. Sangeetha & A. Saradha

155-164
782013-03-313-1Implementation and Evaluation of K-Means, KOHONEN-SOM, and HAC Data Mining Algorithms Based on Clustering2-14-1359535932-ABS Implementation.pdf

Kapil Sharma & Richa Dhiman

 

165-174
792013-03-313-1A Scientific Computation on a Peculiar Case of Game Theory in Operations Research2-14-1359619285-ABS A Scientific.pdf

K. V. L. N. Acharyulu & Maddi. N. Murali Krishna

175-190
802013-03-313-1Implementation and Evaluation of Rule Induction Algorithms in Terms of Accurate and Optimal Results in Data Mining2-14-1359714198-ABS Implementation and evaluation.pdf

Kapil Sharma & Heena Sharma

 

191-200
812013-03-313-1Detection of DDos Attacks Using Source IP Based Entropy 2-14-1359957531-ABS Detection.pdf

Jaswinder Singh, Monika Sachdeva& Krishan Kumar

201-210
822013-03-313-1Partial Decompression Using SAX in XML 2-14-1360159873-ABS Pzrtial.pdf

Vijay Gulhane & M. S. Ali

211-216
832013-03-313-1E-Procurement - A Continuing E-Governance Journey of the State of Andhra Pradesh - towards Cost-Saving & Transparency in Government’s Procurement2-14-1360302901-ABS E-Procurement.pdf

Challa Radhakumari

217-232
842013-03-313-1IJCSEITRMAR201327Different Security Issues over MANET--1424347651-ABS - 27.Comp Sci - IJCSEITR - Different security - Pratik Gite.pdf

Pratik Gite & Sanjay Thakur

233-238
852013-03-313-1A Study on Clinical Prediction Using Data Mining Techniques--1360569488-ABS A Study.pdf

V. Krishnaiah, G. Narsimha & N. Subhash Chandra

239-248
862013-03-313-1Applications of Rewriting Cyclic Normal Automata in Adaptive Signal Processing 2-14-1360936200-ABS - 28. Comp Sci- Application.pdf

 U. M. Fernandes Dimlo & E. G. Rajan

 

249-256
872013-03-313-1Generation and Allocation of Subscriber Numbers for Telecommunication--1361623819-ABS Generation.pdf

A.S. Syed Fiaz et al.

257-266
882013-03-313-1 Data De-Identification Tool for Privacy Preserving Data Mining--1361789321-ABS Data deidentification.pdf

Snehal M. Nargundi & Rashmi Phalnikar

267-276
892013-03-313-1Audio Encryption and Image Watermarking in Video2-14-1361801207-ABS Audio.pdf

Amit R. Dengre, A. D. Gawande & A. B. Deshmukh

 

277-284
902013-03-313-1Business Intelligent Model for Managing and Controlling Police Patrols Energy2-14-1361855806-ABS Business.pdf

Ben Bella S. Tawfik, Abdel-Fatah A. Hegazy & Hany M. Fawzy Ibrahim

285-292
912013-03-313-1Image Enhancement Processing Using Anisotropic Diffusion --1362133493-ABS Image enhancement.pdf

Qasima Abbas Kazmi, Krishna Kant Agrawal & Vimal Upadhyay 

293-300
922013-03-313-1A New Approach for Despeckling of Medical Ultrasound Images2-14-1361882453-ABS A New Approach.pdf

Neha Sharma & Sukhpreet Kaur

301-306
932013-03-313-1Neutrosophic Filters2-14-1361883728-ABS Neutroscopic filters.pdf

A. A. Salama & H. Alagamy

307-312
942013-03-313-1Discovery and Analysis of Web Usage Mining2-14-1362378853-ABS Discovery.pdf

Marathe Dagadu Mitharam

313-320
952013-03-313-1Application of Simulation and Intelligent Agents to Solve Project Management Problem2-14-1362398378-ABS Application of.pdf

K. A. Aksyonov & A. S. Antonova

321-330
962013-03-313-1Effective Implementation of Distance Education Using Data Mining2-14-1362556317-ABS Effective implementation.pdf

Jatinderpal Singh et al.

331-340
972013-03-313-1Filepro: File Protection on File ServersUsing Linux Kernel Module2-14-1362652226-ABS Filepro.pdf

Waiel M. Youssif & Noureldien A. Noureldien

341-350
982013-03-313-1Adaptive Fault Tolerant Service Provisioning [AFTSP] Strategy for Cloud Environment2-14-1362829941-ABS Adaptive fault.pdf

M Dakshayini, P Jayarekha & H S Guruprasad

351-360
992013-03-313-1Modern Software Design Relating to Vitruvius2-14-1363154686-ABS Modern Software.pdf

Josh Siemanowicz

361-368
1002013-06-303-2New Image Steganography Method by Matching Secret Message with Pixels of Cover Image (SMM)--1364018908-ABS New image.pdf

Abdelmgeid Amin Ali & Al – Hussien Seddik Saad

1-10
1012013-06-303-2Advanced Encoding Technique for Scanned Multifaceted Manuscripts Using Clustering Techniques2-14-1363952286-ABS Advanced encoding.pdf

Nisha Joseph & Divya Mohan

11-18
1022013-06-303-2Analyzing EEG Data for Cognitive Behaviour Using EEGLAB through Data Mining2-14-1364035019-ABS Analysing EEG Data.pdf

Parneet Kaur & Sheveta Vashisht

19-26
1032013-06-303-2Analysis of Different Clustering Techniques for Detecting Human Emotions Variation through Data Mining2-14-1364197909-ABS Analysis of different.pdf

Jaskaran Kaur & Sheveta Vashish

27-36
1042013-06-303-2A Questionnaire Based Tool for Evaluating the Impact of Privacy Decisions in Cloud Computing2-14-1364313190-ABS A Questionnaire.pdf

Ishan Rastogi, Adesh Chandra & Anurag Singh

37-46
1052013-06-303-2Evaluation of Intrusion Detection Techniques and Algorithms in Terms of Performance and Efficiency through Data Mining2-14-1364458219-ABS Evaluation of intrusion.pdf

Prabhdeep Kaur & Sheveta Vashisht

47-54
1062013-06-303-2A Significant Approach on a Special Case of Game Theory2-14-1364458311-ABS A Significant.pdf

K. V. L. N. Acharyulu et al.

55-78
1072013-06-303-2Design and Development of Online Hospital Management Information System2-14-1364466960-ABS Design and development.pdf

Harpreet Kaur & Dinesh Grover

79-88
1082013-06-303-2A Comparative Survey on Various Route Recovery Schemes in MANET2-14-1364554664-ABS A Comparative study.pdf

Pooja & Ajay Dureja

89-96
1092013-06-303-2A Spatial Domain Image Superresolution Approach for Soybean Leaf Diseased Image2-14-1364557272-ABS A Spatial.pdf

Sanket B.Kasturiwala & S.A.Ladhake

97-106
1102013-06-303-2Detection and Extraction of Text in Video - A Survey 2-14-1364902636-ABS Detection and extraction.pdf

Megha Khandelwal, Bhupendra Kumar & Tushar Patnaik

107-112
1112013-06-303-2Comparison of Clustering Based on Search Engine Dataset Using Tanagra and Weka 2-14-1364977182-abs Comparison of clustering.pdf

Preeti Bansal & Md. Ezaz Ahmed

113-122
1122013-06-303-2Analysis of Web Server Log by Web Usage Mining for Extracting Users Patterns--1365401767-ABS Analysis of web server.pdf

Om Kumar C.U. & P. Bhargavi

123-136
1132013-06-303-2SOM (System on Module) Based Count Down Time Distribution and Reception Unit2-14-1364985025-ABS SOM Based.pdf

Amit Sardar, Amiya Ranjan Panda & Biswajit Biswas

137-142
1142013-06-303-2Clustering of Web Usage Data Using Fuzzy Tolerance Rough Set Similarity and Table Filling Algorithm2-14-1364991396-ABS Clustering of web usage.pdf

T. Vijaya Kumar & H. S. Guruprasad

143-152
1152013-06-303-2An Overview of Biometric System2-14-1365406842-ABS An overview.pdf

A. M. Bojamma, B. Nithya & Prasad. C. N

153-160
1162013-06-303-2Natural Language to SQL Conversion System2-14-1365407872-ABS Natural language.pdf

Anil M. Bhadgale et al.

161-166
1172013-06-303-2Fingerprint Indexing and Verification2-14-1365675061-Abs - 16. Comp - Fingerprint - Lalhmingliana.pdf

Lalhmingliana, D K Bhattacharyya & KSH Robert Singh

167-176
1182013-06-303-2Data Mining Techniques for Financial Data2-14-1365763481-ABS Data mining techniques.pdf

Sonalika Papneja, Sanjeev Tomar & S. P. Singh

177-182
1192013-06-303-2Memetic Algorithm a Metaheuristic Approach to Solve RTSP2-14-1365858899-ABS Memetic algorithm.pdf

Nitesh M Sureja & Bharat V Chawda

183-186
1202013-06-303-2Distortion Free Fragile Watermarking Technique for Medical Images 2-14-1366011270-ABS Distrotion free frgile.pdf

Shaik. Basheera, P. V. Naganjaneyulu & N. Renuka

187-192
1212013-06-303-2Data Mining for Credit Card Risk Analysis: A Review2-14-1366011459-ABS Data mining -credit.pdf

Smriti Srivastava & Anchal Garg

193-200
1222013-06-303-2A Novel Method of Estimating Facial Features Using Taalamana System2-14-1366033653-ABS A Novel method.pdf

Manimala S & C.N. Ravi Kumar

201-208
1232013-06-303-2Resolving Multiple Travelling Salesman Problem Using Genetic Algorithms 2-14-1366260370-ABS Resolving multiple.pdf

 Harpreet Singh & Ravreet Kaur

209-212
1242013-06-303-2Survey on Incentive Mechanism 2-14-1366350268-ABS A Survey on incentive.pdf

Priyanker Shipley & Vinay Kumar

213-218
1252013-06-303-2Using Web Technology for Collaborative Learning in Engineering Education2-14-1367217984-ABS Using web technology.pdf

B. Maruthu Kannan & B. G. Barki

219-226
1262013-06-303-2A New Approach for Improving Performance of Distributed Data Clustering2-14-1367656787-ABS A New approach.pdf

Kamakshi Pundir, Sunita Sangwan & Aman Dureja

227-234
1272013-06-303-2Performance Comparison of Αlpha-Βeta-Gamma Filter and Kalman Filter for Tracking Targets Using Radar Measurements2-14-1367658287-ABS Performance comparison ..pdf

 S. M. Sahoo et al.

235-242
1282013-06-303-2 A Data Mining Approach for Association Rule from XML Data Uisng Xquery2-14-1367668512-ABS A Data mining.pdf

Padmavalli Mesa

243-252
1292013-06-303-2Introduction to the Implementation of Database through Universal Networking Language Structure2-14-1367673535-ABS Introduction to the.pdf

Khaled Bin Yousuf et al.

253-260
1302013-06-303-2MDVMI: A System for Analyzing and Visualizing Multidimensional Relational Database for Medical Images2-14-1367826562-ABS MDVM 1.pdf

Jagbir Singh Gill & Kulvinder Singh Mann

261-272
1312013-06-303-2Categorization of Music by Extracting Features from Affective Audio through Data Mining2-14-1367848756-ABS Categorization of.pdf

Meenu &Sheveta Vashisht

273-282
1322013-06-303-2Estimating Reliability of Software System Using Object-Oriented Metrics2-14-1367992414-ABS Estimating reliability.pdf

Johny Antony P & Harsh Dev

283-294
1332013-06-303-2High Compaction Coarse Grained Job Scheduling in Grid Computing2-14-1368006140-ABS High compaction.pdf

Abhinav Srivastava, Rituraj Rathore & Raksha Sharma

295-302
1342013-06-303-2 E- Janraj- Smart Governance at Municipal Level2-14-1368186962-ABS E-Janraj.pdf

Ridhima Jain & Tarun Shrimali   

303-316
1352013-06-303-2Cloud Computing in Rural Educational Sector:Enlightening Benefits and Challenges2-14-1368255307-Abs-Cloud.pdf

Sumit K. Bide & Manoj B. Patil   

317-322
1362013-06-303-2Software Copy Protection by Using Monotone Digital Signatures2-14-1368256026-Abs-Software copy.pdf

Abhishek Tripathy & Shiv Singh Sarangdevot   

323-328
1372013-06-303-2Content-Based Image Retrieval (CBIR) System Aided Tumor Detection2-14-1368256652-Abs-Content based.pdf

Shahira M. Habashy   

329-340
1382013-06-303-2A Survey on GIS Based Decision Support Systems2-14-1368697498-ABS A Survey on GIS.pdf

Banita Chadha, Neha Agarwal & Umanath Vishwakarma

341-350
1392013-06-303-2Review of the Journey from DES to AES 2-14-1368704430-ABS Review of the journey.pdf

Neeta Wadhwa, Syed Zeeshan Hussain & S. A. M Rizvi

351-366
1402013-06-303-2Analysis of the Factors Affecting the Distribution of Chimney Emissions to the Atmosphere – Simulation Approach 2-14-1368706734-ABS Analysis of the factors.pdf

Ben Bella S. Tawfik & M. M. El-Gazar

367-378
1412013-06-303-2Semantics Based Distributed Document Clustering: Proposal 2-14-1368860320-ABS Semantics based.pdf

Neepa Shah & Sunita Mahajan

379-388
1422013-06-303-2Intrusion Detection System and its Types in MANET2-14-1369044007-ABS Intrusion Detection.pdf

Himanshu & Parveen Bano

389-394
1432013-06-303-2 Enhancement of Security Feature in Graphical Password Authentication2-14-1369051341-ABS Enhancement of security.pdf

Lovey Rana & Om Pal

395-402
1442013-06-303-2A Review Report on Fingerprint Image Enhancement Filter2-14-1369310830-ABS A Review Report.pdf

Dinesh Kumar Misra, S. P. Tripathi & Dipak Misra

403-416
1452013-06-303-2Selection and Prioritization of Test Cases in Regression Testing of Web Services--1370002375-ABS Selection and prioritization.pdf

Neha Agarwal & Manali Gupta

417-424
1462013-06-303-2Securing Published Data in Cloud Using Data Incognito2-14-1369403608-ABS Securing published data.pdf

Vivek Bhushan & Subhash Chand Gupta

425-438
1472013-06-303-2A Survey on Testing Tools for Web Services 2-14-1369462116-ABS A Survey on testing.pdf

Yogesh M. Gajmal & Vandana M. Gaikwad

439-448
1482013-06-303-2ESOA: A Web-Based Expert System for Online Assessment: Prototype Design and Implementation2-14-1370415018-ABS ESOA.pdf

Ridip Dev Choudhury, Khurshid Alam Borbora & Shikhar Kumar Sarma

449-458
1492013-08-313-3Metaphorical Study of Different Techniques for Security System Using Mobile Cloud Computing2-14-1370415090-ABS Metaphorical study.pdf

Satyam Gupta, Shailendra Jain & Aparajit Shrivastava

1-6
1502013-08-313-3Improved Load Efficiency Algorithm in Cloud2-14-1370415138-ABS Improved Load efficiency.pdf

Aarti Khetan & Subhash Chand Gupta

7-14
1512013-08-313-3Automation of Data Validation Testing for QA in the Project of DB Migration2-14-1370415186-ABS Automation of data validation.pdf

Priyanka Paygude & P. R. Devale

15-22
1522013-08-313-3MRI Brain Image Analysis for Tumor Detection Using Optimization Technique2-14-1370415222-ABS MRI Brain.pdf

P. Suresh Babu & B. Savitha

23-28
1532013-08-313-3Assessment of Maintainability Factor2-14-1370415259-ABS Assessment of maintainability.pdf

P. Chitti Babu & K. C. K. Bharathi

29-42
1542013-08-313-3Implementation of Agent-Based Composition of Semantic Web Services with WSIG for MANET2-14-1370502982-ABS Implementation of agent.pdf

Monika, Yashpal Singh & S. Niranjan

43-56
1552013-08-313-3Implementation of Honeypot as an Intrusion Detection System for Wireless Network 2-14-1370516976-ABS Implementation of honeypot.pdf

Pushpa, Yashpal Singh & S. Niranjan

57-64
1562013-08-313-3Efficient Approach for Extracting Frequent Pattern and Association Rules with Periodic Constraints2-14-1370585710-ABS Efficeint approach.pdf

Varsha Mashoria & Anju Singh

65-78
1572013-08-313-3Cloud and its Security Concerns 2-14-1370684223-11.ABS-Computer-Cloud-Neha Bishnoi.pdf

Neha Bishnoi & Anupma Sehrawat

 

79-84
1582013-08-313-3An Identification of Wheat Rust Diseases in Digital Images: A Review 2-14-1370928240-ABS An identification of wheat.pdfHiteshwari Sabrol & Satish Kumar85-94
1592013-08-313-3Deterministic Traffic Models Using One Dimensional Cellular Automata2-14-1371135772-ABS Deterministic traffic.pdf

Aravindan Anbarasu

95-100
1602013-08-313-3Resource Monitoring and Utilization in SaaS 2-14-1371200644-ABS Resource monitoring.pdf

Praveen Reshmalal & S. H. Patil

101-108
1612013-08-313-3Removal of Noise in the Chili Pepper Images Using Weighted 4-Connected Median Filter 2-14-1371385104-ABS Removal of noise.pdf

M. Rajalakshmi &  P. Subashini

109- 118
1622013-08-313-3Tracking Vehicle in Aerial Surveillance Using DBN2-14-1371465186-ABS Tracking Vehicle.pdf

Harsha C, Rekha B. S & G. N. Srinivasan

119-126
1632013-08-313-3Empirical Analysis of Test Case Prioritization Techniques in Regression Testing--1371561487-ABS Empirical Analysis.pdf

K. Kalaivani, A. Saritha & K. Ulagapriya

127-134
1642013-08-313-3Pose Invariant Face Recognition – A New Technique2-14-1371724291-ABS Pose invariant.pdf

S. Muruganantham

135-140
1652013-08-313-3Removal of Noise in the Chili Pepper Images Using Weighted 4-Connected Median Filter2-14-1371891149-ABS Removal of noise in chilli.pdf

M. Rajalakshmi  &  P. Subashini

141-150
1662013-08-313-3A Metaheuristic Algorithm ACO of Handwritten Arabic Characters Recognition 2-14-1372058000-ABS Metaheuristic algorithm.pdf

Majida Ali Abed

151-168
1672013-08-313-3Medical Decision Support System Using Data Mining Techniques 2-14-1372060610-ABS Medical decision.pdf

Moheb R. Girgis, Tarek M Mahmoud & Entesar H. Eliwa

169-184
1682013-08-313-3Secured Steganography Approach Using AES2-14-1372154968-ABS Secured Stenography.pdf

Manoj Ramaiya, Naveen Hemrajani & Anil Kishore Saxena

185-192
1692013-08-313-3Algorithm for Efficient Data Placement in Blobseer Architecture2-14-1372228205-ABS Algorithm for efficient.pdf

Madhury Mohandas & Dhanya P M

193-200
1702013-08-313-3Iris Recognition System Based on DCT Matrix2-14-1372941641-ABS Iris recognition.pdf

Sukhwinder Singh & Ajay Jatav

201-208
1712013-08-313-3A Novel Recommendation System using Rough Set Clustering and Closed Sequential Pattern Mining--1373288224-ABS A Novel recommendation.pdf

Mitchell D’Silva & Deepali Vora

209-216
1722013-08-313-3E-Configuration and E-Management of Power Server through Scalable Web-Based Technology--1373440382-ABS E-Configuration and E-Management.pdf

Dakshayini M, Anil B. S. & Radhika.K.R

217-226
1732013-08-313-3One-Dimensional Cutting Stock Problem (1D-CSP) with First Order Sustainable Trim: A Practical Approach2-14-1373542731-ABS One dimensional.pdf

P. L. Powar  et al.

227-240
1742013-08-313-3Impact of G.P on Networks - A Computational Study on Case (II)2-14-1374054329-ABS Impact of G.P.pdf

K. V. L. N. Acharyulu & Nagu Vadlana

241-250
1752013-08-313-3Trend Analysis in Spatio-Temporal Using SOFM2-14-1374301826-ABS Trend Analysis.pdf

Archana Yadav & Archana Lala

251-258
1762013-08-313-3Scheduling Approach for Load Balancing in Grid Computation System --1374316961-ABS Scheduling approach.pdf

Prakash Kumar, Pradeep Kumar & Vikas Kumar

259-266
1772013-08-313-3 Human Tracking and Pose Estimation in Video Surveillance System 2-14-1374318126-ABS Human tracking.pdf

Neelam V. Puri & P. R. Devale

267-274
1782013-08-313-3Face Recognition : A Comparative Study of Principal Component Analysis and Difference Component Analysis2-14-1374647126-ABS Face recognition.pdf

Shamna P, Tripti C & Paul Augustine

275-282
1792013-08-313-3Video Watermarking – Embedding Grayscale Messages Using Singular Value Decomposition 2-14-1374648390-ABS Videomarking.pdf

Ashish M. Kothari & Ved Vyas Dwivedi

283-292
1802013-08-313-3A Novel Model for Text Document Representation: Application on Opinion Mining Datasets2-14-1375094938-ABS A Novel Model.pdf

Asmaa Mountassir, Houda Benbrahim & Ilham Berrada

293-304
1812013-08-313-3Research in Cloud Security: Problems and Prospects2-14-1375100443-ABS Research in cloud.pdf

Vaishali Singh & S. K. Pandey

305-314
1822013-08-313-3Making the MANET More Efficient in Energy by Topology Control2-14-1375103024-ABS Making the Manet.pdf

Bhavana S. Pansare & Rajesh B. Singh

315-326
1832013-08-313-3Software Reliability Using Software Metrics and Software Fault Analysis 2-14-1375163940-ABS Software reliability.pdf

Indu Sharma & Parveen Bano

327-340
1842013-08-313-3A Novel Technique for Tampering Detection 2-14-1375684839-ABS A Novel technique.pdf

Nirupma Tiwari, Naveen Hemrajani & Manoj Kumar Ramaiya

341-346
1852013-08-313-3Software Piracy Control by the Combination of Smart Card, HOSTID and Permanent Processor Name with Cryptography 2-14-1375691833-ABS Software piracy.pdf

Sk. Abdul Kareem, A. Janardhana Rao & B. Tarakeswar Rao

347-354
1862013-08-313-3Clustering Based Similarity Measurement Model for Recent Biased Time Series Databases2-14-1375855391-ABS Clustering based.pdf

D. Muruga Radha Devi & P. Thambidurai

355-362
1872013-10-313-4 A Complete Preprocessing Methodology for WUM--1375882315-ABS A Compleye Preprocessing.pdf

 Neelambike S  et al.

1-8
1882013-10-313-4A Systematic Approach for Despeckling of Medical Ultrasound Images 2-14-1376113593-ABS A Systematic approach.pdf

Neha Sharma & Yogesh Kumar

9-12
1892013-10-313-4Cloud Computing Architecture to Aid Telemedicine 2-14-1376396547-ABS Cloud computing.pdf

Neha Bishnoi & Anupma Sehrawat

13-18
1902013-10-313-4Application of Spline Approximation Method to Obtain Locally Minimal Approximate Trim Loss for One-Dimensional Cutting Stock Problem (1D-CSP)--1377331820-ABS Application of spline.pdf

P. L. Powar, Vinit Jain, Manish Saraf & Ravi Vishwakarma

19-36
1912013-10-313-4Iris-An Emergent Biometric Technology for Personal Authentication2-14-1377509470-ABS Iris an emergent.pdf

Kezia R Badhiti & Sudha Thatimakula

37-48
1922013-10-313-4Optimized Content Based Image Retrieval Using Genetic Algorithm with Relevance Feedback Technique--1377589212-ABS Optimized content.pdf

Anita Nanasaheb Ligade & Manisha  R. Patil

49-54
1932013-10-313-4Soft Computing Approaches for Hand Gesture Recognition2-14-1377511172-ABS Soft computing.pdf

Manisha Lad, V. V. Shete & S. B. Somani

55-58
1942013-10-313-4 A Model of Measures that Affect Ease of Use of Emerging Technologies in Teaching and Learning in Ghanaian Public Universities2-14-1378208905-ABS A Model of measures.pdf

Afia Nyarko Boakye

59-66
1952013-10-313-4A Study on Association Rules2-14-1378273593-ABS A Study on association.pdf

Padmavalli Mesa & Dr.K. Sreenivasa Rao

67-74
1962013-10-313-4Implementation and Evaluation of Optimal Algorithms Based on Decision Tree & Clustering Algorithms2-14-1378278516-ABS Implementation and evaluation.pdf

Satwant Kaur, Rishma Chawla & Varinderjit Kaur

75-80
1972013-10-313-4Novel Approach for Multimodal Biometric System Using Compressive Sensing Theroy Based Watermarking--1378450309-ABS Novel approach.pdf

Rohit M. Thanki & Komal R. Borisagar

81-90
1982013-10-313-4Effective Load Balancing in Cloud Computing Using Genetic Algorithm2-14-1378809864-13. Abs Comp Sci - IJCSEITR -Effective - SATYENDRA.pdf

Satyendra Singh Rawat & Umesh Bindal

91-98
1992013-10-313-4Applying Data Analytics in Increasing Efficiency of Public Distribution Systems--1378992771-ABS Applying data analytics.pdf

Sheetal Mahajan

99-104
2002013-10-313-4Data Hiding for Binary Image by Connectivity-Preserving2-14-1379508188-ABS Data Hiding.pdf

A. R. Chandekar

105-112
2012013-10-313-4The BPO Country Competency Model (CCM): A Model Establishing the Relationship and the Degree of Significance of Factors that Drive Competence in the Business Process Outsourcing (BPO)2-14-1379594708-ABS The BPO Country.pdf

Ben Ocra & Benjamin Aggrey Ntim

113-120
2022013-10-313-4Opinion Mining from Text in Movie Domain2-14-1379682970-ABS Opinion mining.pdf

Nidhi Mishra & C. K. Jha

121-128
2032013-10-313-4Face Recognition Using Incremental Principal Components Analysis-Independent Component Analysis (IPCA-ICA) Algorithm2-14-1379749952-ABS Face recognition.pdf

P P Rewagad & P S Desai

129-136
2042013-10-313-4Object Tracking System Using Image Processing2-14-1379767747-ABS Object Tracking.pdf

S. P. Rasal, Harsha Ingale & V. S. Shelar

137-142
2052013-10-313-4Cluster Analysis – An Overview2-14-1380090152-ABS Cluster analysis.pdf

Anuradha Bhatia & Gaurav Vaswani

143-150
2062013-10-313-4 Selection of Master Station and Synchronization of Transmission in Quantum Cryptography: A Novel Approach2-14-1380091362-ABS Selection of master.pdf

Moloy Dhar, Sandip Tigga, Sourish Mitra & Sayani Chandra

151-158
2072013-10-313-4Classification of Deforestation Factors Using Data Mining Techniques2-14-1380527539-ABS Classification of deforestation.pdf

S. Jyothi, K. Saritha & K. R. Manjula

159-172
2082013-10-313-4Multiple Regression: A Data Mining Approach for Predicting the Stock Market Trends Based on Open, Close and High Price of the Month2-14-1380705947-ABS Multiple regression.pdf

Sachin Kamley, Shailesh Jaloree, R. S. Thakur

173-180
2092013-10-313-4Preventing Wormhole Attack in Multicast Routing Protocols for MANET2-14-1380783705-ABS Preventing wormhole.pdf

Mohanavel S, Suntharam A, Pranev Ram B R & Sashank S

181-186
2102013-10-313-4Marker Based Watershed Transformation for Image Segmentation2-14-1380962129-ABS Marker based.pdf

Aman Kumar Sharma & Anju Bala

187-192
2112013-10-313-4Secure Data Communication over Network Based on DNA Cryptography2-14-1381143788-ABS Secure data.pdf

Atanu Majumder, Tanusree Podder, Subir Saha & Nirmalya Kar

193-202
2122013-10-313-4Enhanced Document Formatting Using LaTeX Software2-14-1381232129-ABS Enhanced document.pdf

Pratik P. Narole et al.

203-208
2132013-10-313-4An Analysis of Hepatitis C Virus Prediction Using Different Data Mining Techniques2-14-1381236626-ABS An analysis of hepatitis.pdf

Ahmed A. A. Radwan, Tarekabd-El-Hafeez & Heba Mamdouh

209-220
2142013-10-313-4A Perusal on Hadoop Small File Problem2-14-1381324008-ABS A Perusual.pdf

Bincy P Andrews & Binu A

221-226
2152013-10-313-4Optical Character Recognition Using Template Matching(Alphabets & Numbers)2-14-1381407981-ABS Optical character.pdf

Rachit Virendra Adhvaryu

227-232
2162013-12-313-5An Efficient Debugging Tool for Object Oriented System--1381744136-ABS An efficient debugging.pdf

D. M. Thakore & Tanveer S Beg

1-10
2172013-12-313-5Image Encryption Using Henon Chaotic Map with Byte Sequence--1382092835-ABS Image encryption.pdf

N. S. Raghava & Ashish Kumar

11-18
2182013-12-313-5Cloud Computing: A Data Security Framework--1382341279-ABS Cloud computing.pdf

Aman Kumar Sharma, Anita Ganpati & Anju Bala

19-26
2192013-12-313-5Case Study: Scaling Agile Methods Using Retrospective Reviews Process2-14-1382106586-ABS Case study.pdf

Saravana K. M, G. N. Basavaraj, Rajkumar & H G Chandrakanth

27-42
2202013-12-313-5Bisecting Collinear Clustering Algorithm2-14-1382349556-ABS Bisecting collinear.pdf

Terence Johnson

43-46
2212013-12-313-5Survey of Image Segmentation and Classification Using Markov Random Field2-14-1382351912-ABS Survey of image.pdf

Vivek Kumar Jain & A. K. Saxena

47-56
2222013-12-313-5A Novel System for Lossless Modified Compression on Medical Application on DICOM CT Images--1382519970-ABS A Novel system.pdf

Alka Sharma, Gagangeet Singh Aujla & Jagbir Singh Gill

57-64
2232013-12-313-5Efficient Intrusion Classification in Network Using Supervised Data Mining Techniques 2-14-1382944077-ABS Efficient intrusion.pdf

Sushil Kumar Chaturvedi & Anand Jawdekar

65-76
2242013-12-313-5Live Capturing and Video Tracking--1383138957-ABS Live capturing.pdf

Anuradha Bhatia & Sachin Bojewar

77-84
2252013-12-313-5An Efficient Mechanism for Secure Authentication--1383223003-8._Abs_-_Comp_Sci_-_IJCSEITR_-AN_EFFICIENT_MECHANISM__-_Shrikala_M._Deshmukh_-_OPaid-1.pdf

Shrikala M. Deshmukh & P. R. Devale

85-94
2262013-12-313-5Name Entity Recognition on Punjabi Language 2-14-1383725199-9._Abs_-_Comp_Sci_-_IJCSEITR_-NAME_ENTITY_RECOGNITION_-_Kuljot_Singh_-_OPaid.pdf

Kuljot Singh

95-102
2272013-12-313-5Enabling, Efficient Ranked Keyword Search, Encrypted Files and Uploading on Outsourced Cloud Data2-14-1383984882-ABS Enabling efficient.pdf

Doaa Mohsin Majeed, W. Jeberson & I. B.Rajwade

103-114
2282013-12-313-5Reverse Engineering of Clinical Software and Types of Hazard2-14-1384172538-ABS Reverse engineering.pdf

Lalita M. Lokhande & N. V. Kalyankar

115-128
2292013-12-313-5Routing Scheme Development for Firewall Security in Wireless Ad Hoc Network Using Election Algorithm2-14-1384349881-ABS Routing scheme.pdf

Purnima & Aman Singh

129-138
2302013-12-313-5Selecting Base Stocks for Stock Price Prediction Using Minimum Spanning Tree and Mahalanobis Distance Criteria2-14-1384353928-ABS Selecting base stocks.pdf

Vaishnavi Kamat

139-146
2312013-12-313-5 A Comprehensive Analysis of Social Network Mining2-14-1384431726-ABS A Comprehensive analysis.pdf

Dipesh P. Joshi & Kamal K. Sutaria

147-152
2322013-12-313-5Secure and Fast Data Transfer: With Network Coding2-14-1384517977-ABS Secure and fast.pdf

Ashvini Jadhav & Shriniwas Gadage

153-164
2332013-12-313-5A Novel Technique for DWT-SVD Based Secured Image Watermarking2-14-1385113860-ABS A Novel technique.pdf

Manoj Kumar Ramaiya, Nirupma Tiwari, Naveen Hemrajani & Richa Mishra

165-170
2342013-12-313-5An Efficient Structure to Find New Evasion Techniques on Network Intrusion Detection System2-14-1385212300-16._Abs_-_Comp_Sci_-_IJCSEITR_-AN_EFFICIENT_STRUCTURE_-_Rutuja_Patil__-_OPaid.pdf

Rutuja R. Patil & P. R. Devale

171-176
2352013-12-313-5QoS Based Analysis of MDART Using AODV and AOMDV--1385966294-ABS QOS based.pdf

Jaspreet Singh and Sandeep Singh Kang

177-184
2362013-12-313-5Integration of GIS Based Decision Support System for Management of Operations and Maintenance of water Network--1386064862-ABS Integration of GIS.pdf

Vidya Gavekar & V. D. Nandavadekar

185-194
2372013-12-313-5Performance Analysis of AODV, DSR and OLSR Routing Techniques for Ad-Hoc Mobile Networks2-14-1385978107-Abs_-_r_Comp_Sci_-_IJCSEITR_-PERFORMANCE_ANALYSIS_OF_-_Sukhwinder_Kaur_-_Paid.pdf

Sukhwinder Kaur, R K Bansal & Savina Bansal

195-200
2382013-12-313-5Implimentation of an Efficient Mechanism for Secure Authentication--1386245835-ABS Implimentation.pdf

Shrikala M. Deshmukh &. P. R. Devale

201-210
2392013-12-313-5A Comparative Study of Cost Benefit Analysis of Traditional and E-Governance System in Pune City2-14-1386063311-ABS A Comparative study.pdf

Manisha A. Kumbhar & Vilas D. Nandavadekar

211-216
2402013-12-313-5Evaluating Audio Descriptors for Timbre Analysis in Singer Identification Process2-14-1386233457-ABS Evaluating audio.pdf

Harshada W. Nikam

217-222
2412013-12-313-5Develop Object Based Debugging Tool Technique for Improving the Performance of Object Oriented Softwares --1386251108-ABS Develop object.pdf

D.M.Thakore & Tanveer S Beg

223-232
2422014-02-284-1Performance Evaluation of Data Classification Using Conventional Classifiers2-14-1386760034-ABS Performance evaluation.pdf

S. V. S. Ganga Devi

1-6
2432014-02-284-1User Satisfaction over Query Result Ranking in Web Database Systems2-14-1387008864-ABS USER SATISFACTION OVER.pdf

Pramod Kumar Ghadei & S. Sridhar

7-16
2442014-02-284-1Digital Watermarking Based on Entropy Calculation & Reverse Biorthogonal DWT--1387866535-ABS DIGITAL WATERMARKING.pdf

Rohini Sharma & Pallavi Thakur

17-24
2452014-02-284-1Performance Analysis of Turbo Coded OFDM: Subjected to Different Channels2-14-1387358107-ABS Perforamance analysis.pdf

Priti Subramanium & Rajeshree D. Raut

25-34
2462014-02-284-1A Novel Approach for Fake Access Point Detection and Prevention in Wireless Network--1387890050-ABS A NOVEL APPROACH FOR FAKE ACCESS.pdf

Sandip S. Thite, Sandeep Vanjale & P. B. Mane

35-42
2472014-02-284-1An Adaptive Design Pattern to Build Multi-Modal System Architecture in Distributed Environ--1388060731-ABS 6.cs AN ADAPTIVE.pdf

Ashish Patil, Manjusha Joshi, S. D. Joshi & R. M. Jalnekar

43-56
2482014-02-284-1Different Operator Using in Edge Detection for Image Processing2-14-1388652957-ABS Different operator.full.pdf

Mohini Pandey

57-62
2492014-02-284-1Pinterest Attraction between Users and Spammers--1389102053-ABS Pinterst attraction.pdf

Ahmed A. Radwan, Harsha V. Madhyastha, Fatma Omara, Tarek Mahmoud & Enas Elgeldawi

63-72
2502014-02-284-1Comparative Evaluation for Performance of ANN Techniques in Breast Cancer Detection: An Investigative Approach to Improvement 2-14-1389165558-ABS Comparative evaluation.pdf

G Anjan Babu & G Sumana

73-82
2512014-02-284-1Impact of Telecommuting as an Alternative Work Arrangement on Job Satisfaction: A Study in Indian IT and ITEs Organisations --1390040116-ABS Impact of tele commuting.pdf

Sarit Prava Das, Parna Mishra & Preeti Narendra

83-94
2522014-02-284-1Acoustic and Phonological Analysis of Homophones of Punjabi Language --1390045404-ABS Acoustic.pdf

Shipra J. Arora & Rishipal Singh

95-102
2532014-02-284-1Fingerprint Recognition System Using Support Vector Machine and Neural Network2-14-1390373888-ABS Finger print.pdf

Sozan Abdulla Mahmood

103-110
2542014-02-284-1Distributed Computing & EMR: A Literature Survey2-14-1390473177-ABS Distributed computing.pdf

Priti B Kalode & Ashish Sasankar

111-114
2552014-02-284-1Hybrid Filter with Impulse Detector for Noisy Grey Scale Images2-14-1390996878-ABS Hybrid filter.pdfSukhwinder Singh & Neelam Rup Prakash115-124
2562014-02-284-1IJCSEIERDFEB201415Improve the Technique of Relevance Feedback for Content-Based Multimedia Archiving by Using Apriori Algorithm--1392620305-ABS Improve the technique.pdf

Aasma Mujawar & S.P.Kosbatwar

125-132
2572014-02-284-1Intelligent Recommendation System Using Clustering and Closed Sequential Pattern Mining2-14-1391414214-ABS Intelligent recommendations.pdf

Mitchell R. D’Silva & Deepali Vora

133-140
2582014-02-284-1Angle Based Computation with Cut-Off Algorithm for Moving Target2-14-1391685495-ABS Angle based.pdf

R. K. Patra, S. Kaity, J. S. Bharti & J. Ekka

141-150
2592014-02-284-1IJCSEITRFEB201483Iterative Algorithm for Extraction and Data Visualization of Hl7 Data--1392454972-ABS ITERATIVE ALGORITHM FOR EXTRACTION AND DATA.pdf

Mohanjit Kaur, Hardeep Singh Kang & K. S Maan

151-160
2602014-02-284-1IJCSEITRFEB20144SOM Based Count Down Time Dissemination System Along with QT Based Count Down Time Reader Application over Ethernet2-14-1392304447-ABS SOM based.pdf

Amiya Ranjan Panda, Amit Sardar& Hare Krishna Ratha

161-166
2612014-04-304-2IJCSEITRAPR20142Cryptography Using Arithmetic Coding--1392967329-1. ABS CRYPTOGRAPHY USING ARITHMETIC CODING.pdf

Mayuri V. Chaudhari, Vrushali Choudhari & Krantish Pol

1-4
2622014-04-304-2IJCSEITRAPR20143Intrusion Detection System Using Optimal C4.5 Algorithm--1392975952-2. ABS INTRUSION DETECTION SYSTEM USING OPTIMAL C4.pdf

Sachin Prakash Gavhane & Vijay Maruti Shelake

5-14
2632014-04-304-2IJCSEITRAPR20144Human Eye Gadget with New Technology2-14-1392973536-3. ABS HUMAN EYE GADGET WITH NEW TECHNOLOGY.pdf

Amol Yadav & Vilas Jadhav

15-20
2642014-04-304-2IJCSEITRAPR20145Offline Signature Verification Using Hu’s Moment and Gabor Wavelet Transform2-14-1392980087-4. ABS OFFLINE SIGNATURE VERIFICATION USING HU.pdf

Priyanka Bagul & Leena Ragha

21-30
2652014-04-304-2IJCSEITRAPR20146Performance Analysis of Computational Imaging2-14-1392985645-5. ABS PERFORMANCE ANALYSIS OF COMPUTATIONAL IMAGING.pdf

Nandita Singh & Manoj Sabnis

31-36
2662014-04-304-2IJCSEITRAPR20147Simulating the Cooking Processes by Using Simulation and Modelling Technology2-14-1392986483-6. ABS SIMULATING THE COOKING PROCESSES BY USING SIMULATION.pdf

Ashwini Lad & Priya Rupchandani

37-42
2672014-04-304-2IJCSEITRAPR20148Preventing Botnets by Spot Filter Method2-14-1392989957-7. ABS PREVENTING BOTNETS BY SPOT FILTER METHOD.pdf

Dnyaneshwar Shinde & Prashant Sawant

43-50
2682014-04-304-2IJCSEITRAPR20149Advanced Approach in Query Refinement Using Refinement Filters from Knowledge Base--1393395519-8. ABS ADVANCED APPROACH IN QUERY REFINEMENT USING REFINEMENT FILTERS FROM KNOWLEDGE BASE.Pdf

Ralla Suresh & Bikash Chandra Rout

51-58
2692014-04-304-2IJCSEITRAPR201410Dashboard Technology Based Solution to Decision Making2-14-1393506474-ABS Dashboard technology.Pdf

Mohamed Abd-Elfattah, Turki Alghamdi & Eslam Amer

59-70
2702014-04-304-2IJCSEITRAPR201411Image Steganography Using Mandelbrot Fractal--1393657174-10. ABS IMAGE STEGANOGRAPHY USING MANDELBROT FRACTAL.Pdf

Hardikkumar V. Desai & Apurva A. Desai

71-80
2712014-04-304-2IJCSEITRAPR201412Recognition Isolated Word Speech System using HTK--1393670673-11. ABS ISOLATED WORD SPEECH RECOGNITION SYSTEM USING HTK.Pdf

Shanthi Therese S & Chelpa Lingam

81-86
2722014-04-304-2IJCSEITRAPR20141312Disaster Recovery of Exchange Server 2010 Database--1393668200-12. ABS DISASTER RECOVERY OF EXCHANGE SERVER 2010 DATABASE.Pdf

Suresh L & Nirmala S Guptha

87-96
2732014-04-304-2IJCSEITRAPR201413Design and Development of Software Inspection Tool--1393668813-13. ABS DESIGN AND DEVELOPMENT OF SOFTWARE INSPECTION TOOL.Pdf

Rakhee Kundu & Umesh Kulkarni

97-108
2742014-04-304-2IJCSEITRAPR201414Web-Scale Information Extraction from Unstructured and Ungrammatical Data Sources--1393669981-14 ABS WEB (1).Pdf

Madhavi. K. Sarjare & S. L. Vaikole

109-114
2752014-04-304-2IJCSEITRAPR201415Video Copy Detection Using Finger Printing with Fast Image Processing 2-14-1393683110-ABS Video copy.Pdf

Laxmi Gupta, M. B Limkar, Sanjay M Hundiwale & Sonali Jadhav

115-126
2762014-04-304-2IJCSEITRAPR201416About Parallel Computers2-14-1393855603-About parallel.Pdf

Zhangissina Gulnur D,Zholymbet B.SH,Shaikhanova A,Baiseitov D,Pavlikov R.V. Magister,Tursinova M. Magister

127-132
2772014-04-304-2IJCSEITRAPR201418Identity-Based Cryptography for Secure Mobile Communication2-14-1394786445-ABS Identity based.Pdf

Rushikesh Madhukar Bage & Gaurav Digambar Doiphode

133-142
2782014-04-304-2IJCSEITRAPR201419Secure Image Sharing with Encryption of Blowfish, AES and RC4 Hybrid Algorithm with Hash Function --1394891309-ABS Secure image.Pdf

Ravinder Kaur, Pankaj Sharma & Meenakshi Sharma

143-148
2792014-04-304-2IJCSEITRAPR201420Frames Filtering with Random Pixel’s Increment and Decrement Approach in an Video Enhancement2-14-1395147932-ABS Frames filtering.Pdf

Rupeshwari Rangari & S. D. Deshpande

149-156
2802014-04-304-2IJCSEITRAPR201421Brain Controlled Wheelchair for Disabled2-14-1395662085-ABS Brain controlled.Pdf

Anupama. H. S, N. K. Cauvery & Lingaraju. G. M

157-166
2812014-04-304-2IJCSEITRAPR201422Performance Enhancement of the System through Cloud Computing2-14-1395827478-ABS Performance enhancement.Pdf

Shashi Kant Gupta & Neeraj Vimal

167-176
2822014-04-304-2IJCSEITRAPR201424A New Modulo n Multiplication Algorithm with Moderate Factors of (2n+2) And (2n+6)--1396264064-absA NEW MODULO n MULTIPLICATION ALGORITHM WITH MODERATE FACTORS OF (1).Pdf

A. Uma Maheswari & Prabha Durairaj

177-184
2832014-04-304-2IJCSEITRAPR201424Hybrid COFI Algorithm for Data Mining--1396433652-absHYBRID COFI ALGORITHM FOR DATA MINING.pdf

Amol Yadav, Vilas Jadhav, Ankush Pawar & Mohil Pandey

185-196
2842014-04-304-2IJCSEITRAPR201425Review of License Plate Recognition (LPR) Using Edge Detection2-14-1396436156-ABS Review of license.Pdf

Arun Mittal & Sukhwinder Singh

197-204
2852014-04-304-2IJCSEITRAPR201426Study and Comparison of Cryptographic Methods for Cloud Security--1396606687-ABS - Comp Sci - Study and Comparison - Ashwini Bangar.pdf

Ashwini Bangar & Swapnil Shinde

205-212
2862014-04-304-2IJCSEITRAPR201428Espy & Allay of Security Vulnerabilities in Web-Applications based on Java Platform2-14-1396680583-ABS ESPY.Pdf

Mohil Pandey, Umesh Kulkarni, Sumit Bhattacharjee & Amol Yadav

213-222
2872014-04-304-2IJCSEITRAPR201430Intrusion Protection against SQL Injection Attack and Cross Scripting Attack Using a Hybrid Method 2-14-1396693155-abs INTRUSION PROTECTION.Pdf

Ashwini Lokare & S. B. Waykar

189-198
2882014-04-304-2IJCSEITRAPR201431A Content Based Image Retrieval Using Statistical Technique --1396701459-absA CONTENT BASED IMAGE RETRIEVAL USING STATISTICAL TECHNIQUE.Pdf

Navneet Kaur, Meenakshi Sharma & Er. Pankaj Sharma

199-202
2892014-04-304-2IJCSEITRAPR201432Determining and Blocking of Sybil Users on Online Social Network2-14-1396702559-ABS DETERMINING AND BLOCKING.Pdf

Mahendra Eknath Pawar & B. W. Balkhande

203-210
2902014-04-304-2IJCSEITRAPR201432Cryptography Combined with Steganography for Encryption: Study and Comparison2-14-1396705119-ABS Cryptography.Pdf

Manali Tawde, Heena Parulekar & Swapnil Shinde

211-218
2912014-04-304-2IJCSEITRAPR201433‘Anuvadak’ English to Hindi Text Translator--1397221443-ABS -CSE- Anuvadak- Sudhir D Bagul.Pdf

Sudhir D Bagul & Uday B Joshi

219-224
2922014-04-304-2IJCSEITRAPR201434Development of an Automated Framework to Resolve Software Testing Issues--1396945701-ABS - 12. Comp Sci - IJCSEITR -Development of an Automated Framework - Manoj Someswar.pdf

Chittineni Aruna & R. Siva Ram Prasad

225-242
2932014-04-304-2IJCSEITRFEB201437A Comparative Study on Image Filters for Noise Reduction in Lung CT Scan Images2-14-1397181668-absA COMPARATIVE STUDY ON IMAGE FILTERS FOR NOISE REDUCTION IN LUNG CT SCAN IMAGES.pdf

S. Sivakumar & C. Chandrasekar

243-250
2942014-04-304-2IJCSEITRFEB201436Speech Recognition of Hindi Phenomes Using MFCC and Bhattacharrya Histogram Distance2-14-1397182540-absSPEECH RECOGNITION OF HINDI PHENOMES USING MFCC AND BHATTACHARRYA HISTOGRAM DISTANCE.pdf

Sandeep Kaur, Meenakshi Sharma & Sukhbeer Singh

251-256
2952014-04-304-2IJCSEITRAPR201435Cloud Based E-Governance Management System--1397551530-absCLOUD BASED E.pdf

Awfa Hasan Dakheel & P. Stanley

257-266
2962014-04-304-2IJCSEITRAPR201436Survey on Mobility of Sink in Geographic Routing2-14-1397807233-absSURVEY ON MOBILITY OF SINK IN GEOGRAPHIC ROUTING.pdf

Shivanka (Priyanka Chugh), H. Abinaya, Rupali Tyagi, Rachita Khurana & Manvi Walia

267-274
2972014-04-304-2IJCSEITRAPR201437Dual Congruent Integer Cryptographic Algorithm to Secure Sensitive Information Transient2-14-1397819909-absDUAL CONGRUENT INTEGER CRYPTOGRAPHIC ALGORITHM TO SECURE SENSITIVE INFORMATION TRANSIENT.pdf

Yahia S. Al-Halabi

275-286
2982014-06-304-3IJCSEITRJUN20141Enhancement of X-Ray Image: A Review2-14-1397824078-absENHANCEMENT OF X.pdf

T P Mithun, Sudarshan B G & Abhilashagouda Karigoudar

1-6
2992014-06-304-3IJCSEITRJUN20142Studies of Prominent DoS Attacks in the Internet: Their Causes, Preventions and Case Studies2-14-1499749364-Abs.2.IJCSEITRJUN20142.pdf

Jovi D’Silva, Kukatlapalli Pradeep Kumar & Balachandran

7-14
3002014-06-304-3IJCSEITRJUN20143Fuzzy TOPSIS and Fuzzy VIKOR Methods Using the Triangular Fuzzy Hesitant Sets--1399040007-absFUZZY TOPSIS AND FUZZY VIKOR METHODS USING THE TRIANGULAR.pdf

A. Umamaheswari & P. Kumari

15-24
3012014-06-304-3IJCSEITRJUN20144SPSUC: Slice, Pattern & Style of Ubiquitous Computing--1399039487-absSPSUC.pdf

A. K. Dubey, Khushbu Gulabani, Rohit Saxena & Rakesh Rathi

25-38
3022014-06-304-3IJCSEITRJUN20145Indemnifying the Confidentiality Concern of Cloud Computing through Implementation of a Cipher Cloud2-14-1398669495-absINDEMNIFYING THE CONFIDENTIALITY CONCERN OF CLOUD COMPUTING THROUGH IMPLEMENTATION OF A CIPHER CLOUD.pdf

Gurpreet Kaur & Sushil Kamboj

39-46
3032014-06-304-3IJCSEITRJUN20146Study on Orphan Processes in the Distributed Systems Environments2-14-1398768890-absA STUDY ON ORPHAN PROCESSES IN THE DISTRIBUTED SYSTEMS ENVIRONMENTS.pdf

Limi Kalita & Lakshmi Prasad Saikia

47-54
3042014-06-304-3IJCSEITRJUN20147Development of Embedded System Based Colorimeter for the Analysis of Nickel: An Algorithmic Approach2-14-1399314113-absDEVELOPMENT OF EMBEDDED SYSTEM BASED COLORIMETER FOR THE ANALYSIS OF NICKEL.pdf

Pravin K. Bhadane, Suchita P. Bhangale & Ranjana P. Bhadane

55-64
3052014-06-304-3IJCSEITRJUN20148 Clustering Concepts Using for Separated Random Data and MATLAB2-14-1399619170-absCLUSTERING CONCEPTS USING FOR SEPARATED RANDOM DATA AND MATLAB.pdf

Pooja Shrivastava & Manoj Shukla

65-74
3062014-06-304-3IJCSEITRJUN20149Character and Numerical Recognition System Using Feed Forward and Back Propagation Neural Network2-14-1399629135-absCHARACTER AND NUMERICAL RECOGNITION SYSTEM USING FEED FORWARD AND BACK PROPAGATION NEURAL NETWORK.pdf

Bharath Kumar M R & S. Ganeshmoorthy

75-82
3072014-06-304-3IJCSEITRJUN20150A Comparative Analysis of the Performance of Cloud Computing with Java and Hadoop2-14-1399905039-ABS - Comp Sci - IJCSEITR -A COMPARATIVE ANALYSIS OF THE PERFORMANCE - Dalya Raad Abbas.pdf

Dalya Raad Abbas & Sanjay T. Singh

83-92
3082014-06-304-3IJCSEITRJUN201410IDS (Intrusion Detection System) for Multitier Web Application2-14-1400238311-ABS - Comp Sci - IJCSEITR -IDS_INTRUSION DETECTION SYSTEM_ for - N A Pawar.pdf

N. A. Pawar & Y. C. Kulkarni

93-98
3092014-06-304-3IJCSEITRJUN201413Automatic Metadata Harvesting from Digital Content2-14-1400646109-absAUTOMATIC METADATA HARVESTING FROM DIGITAL CONTENT.pdf

Rushabh D. Doshi & Girish H Mulchandani

99-102
3102014-06-304-3IJCSEITRJUN201414Fine Grain Level Trust Enhancement between CU and CSP in Replication Jobs2-14-1400851879-absFINE GRAIN LEVEL TRUST ENHANCEMENT BETWEEN CU AND CSP IN REPLICATION JOBS.pdf

Sandeep Singh Kang & Hardeep Kaur

103-112
3112014-06-304-3IJCSEITRJUN201415A Review of One Time Password Mobile Verification2-14-1401024125-absA REVIEW OF ONE TIME PASSWORD MOBILE VERIFICATION.pdf

Shally & Gagangeet Singh Aujla

113-118
3122014-06-304-3IJCSEITRJUN201416Data Oriented Perceptual Discontinuity Smoothing Algorithm2-14-1401174667-absDATA ORIENTED PERCEPTUAL DISCONTINUITY SMOOTHING ALGORITHM.pdf

Chandra Sekhram Bondu & Ramakrishna S

119-128
3132014-06-304-3IJCSEITRJUN201417High Speed Real Time Video Access over Web Sockets2-14-1401535383-absHIGH SPEED REAL TIME VIDEO ACCESS OVER WEB SOCKETS.pdf

Shweta Thakur & V. A. Gulhane

129-138
3142014-06-304-3IJCSEITRJUN201419Comparative Study of Collaborative Attacks & Security Mechanisms in MANET2-14-1401615048-absCOMPARATIVE STUDY OF COLLABORATIVE ATTACKS.pdf

Ajay Dureja & Vandna Dahiya

139-148
3152014-06-304-3IJCSEITRJUN201420Secured Steganography Model Using Genetic Algorithm2-14-1402035087-absSECURED STEGANOGRAPHY MODEL USING GENETIC ALGORITHM.pdf

Akanksha Gaur, Priyanka Wadhwani & Vipin Jain

149-158
3162014-06-304-3IJCSEITRJUN201421Digital Data Encryption Using Modified Method for Point Operations in ECC Using MATLAB2-14-1402046908-absDIGITAL DATA ENCRYPTION USING MODIFIED METHOD FOR POINT OPERATIONS IN ECC USING MATLAB.pdf

Mohammed F. Albrawy, Rasheed M. El-Awady & Ali E. Taki El_Deen

159-170
3172014-06-304-3IJCSEITRJUN201422Google Glass and Glassware Development Using Rest Architecture2-14-1402464766-absGOOGLE GLASS AND GLASSWARE DEVELOPMENT USING REST ARCHITECTURE.pdf

Rohit Saxena, Vipul Kumar, Ashish Guwalani, Anil Dubey & Rakesh Rathi

171-178
3182014-06-304-3IJCSEITRJUN201423Detecting Attacks and Prevent Static and Dynamic Websites from those Types of Attack2-14-1402723390-absDETECTING ATTACKS AND PREVENT STATIC AND DYNAMIC WEBSITES FROM THOSE TYPES OF ATTACK.pdf

N. A. Pawar & Y. C. Kulkarni

179-186
3192014-08-314-4IJCSEITRAUG20141Analyzing Large-Scaled Applications in Cloud Computing Environment--1403864820-absANALYZING LARGE.pdf

Deepti Singh, Deepti Saraswat & N S Raghava

1-8
3202014-08-314-4IJCSEITRAUG20142An Efficient Approach for Job Scheduling in Cloud Computing2-14-1403944436-absAN EFFICIENT APPROACH FOR JOB SCHEDULING IN CLOUD COMPUTING11.pdf

Deepti Saraswat, Deepti Singh & N. S. Raghava

9-14
3212014-08-314-4IJCSEITRAUG20143A Novel Algorithm for Cleanical Routine Using System Integration of PACS and CBIR2-14-1404132229-absA NOVEL ALGORITHM FOR CLEANICAL ROUTINE USING SYSTEM INTEGRATION OF PACS AND CBIR.pdf

Navjot Kaur & K. S. Mann

15-20
3222014-08-314-4IJCSEITRAUG20144Control Overhead Energy Efficient Cluster Based Routing Algorithm in MANET2-14-1404208269-ABS CONTROL OVERHEAD ENERGY EFFICIENT CLUSTER.Pdf

Ankita Singh Kushwah & Nitin Manjhi

21-32
3232014-08-314-4IJCSEITRAUG20145A Survey on Application of Nature Inspired Algorithms2-14-1404735737-ABS - 4. Comp Sci - IJCSEITR -A survey On Application Of - Akansha Jain.pdf

S. N. Tazi, Mukesh Gupta & Akansha Jain

33-40
3242014-08-314-4IJCSEITRAUG20146Entropy and Interpolation Based Digital Watermarking2-14-1404892807-ABS - Comp Sci - IJCSEITR -Entropy and Interpolation - Ruchi Kashyap.pdf

Ruchi Kashyap & Karan Mahajan

41-46
3252014-08-314-4IJCSEITRAUG20147A Novel Approach for Multimedia Encryption Based on Confusion and Chaotic Logistic Map2-14-1404905032-ABS - Comp Sci -A Novel Approach -Brijesh Kumar Patel.pdf

Brijesh Kumar Patel & N. S. Raghava

47-58
3262014-08-314-4IJCSEITRAUG20148A New Approach Towards Information Security Based on DNA Cryptography2-14-1405150372-ABS - 7. Comp Sci - IJCSEITR - A NEW APPROACH TOWARDS INFORMATION -ABHISHEK MAJUMDAR.pdf

Abhishek Majumdar & Meenakshi Sharma

59-68
3272014-08-314-4IJCSEITRAUG20149A New Approach of Multiagent and Multilevel IDS2-14-1405275156-ABS - Comp Sci - IJCSEITR -A NEW APPROACH OF MULTIAGENT - ARPITA BISWAS.pdf

 Arpita Biswas & Meenakshi Sharma

 

69-76
3282014-08-314-4IJCSEITRAUG201410Optimized Fault Tolerance in Real Time Cloud Computing2-14-1405416499-ABS - 10. Comp Sci - IJCSEITR - OPTIMIZED FAULT TOLERANCE - Jatinder Kaur.pdf

Jatinder Kaur & Meenakshi Sharma 

 

77-84
3292014-08-314-4IJCSEITRAUG201411Simulation and Optimization of Container Terminal Operations: A Case Study2-14-1405417489-ABS - 11. Comp Sci - IJCSEITR -Simulation and Optimization of - GAMAL ABD EL-NASSER A. SAID.pdf

Gamal Abd El-Nasser A. Said, Abeer M. Mahmoud & El-Sayed M. El-Horbaty

85-94
3302014-08-314-4IJCSEITRAUG201412Design and Implementation of a Multiple-Valued Logic Fpga Based on Convert–Coded-Collect (Ccci) Space Theory2-14-1406379145-ABS - 12. Comp Sci - IJCSEITR -Design and Implementation of A Multiple -Valued - Hisham.pdf

Hisham L. Swady & Dhafer R. Zaghar

95-102
3312014-08-314-4IJCSEITRAUG201413Penetration Testing in Wi-Fi Networks2-14-1406541329-ABS - 13. Comp Sci - IJCSEITR - Penetration Testing - Shorunke Muyiwa Musaddiq.pdf

Shorunke Muyiwa Musaddiq

103-120
3322014-08-314-4IJCSEITRAUG201414Design and Implementation of Dyadic Shift and Graphical Inverse of String Sequences Using Rewriting Cyclic Normal Automaton2-14-1406698274-ABS - 14. Comp Sci - IJCSEITR -DESIGN AND IMPLEMENTATION OF DYADIC SHIFT - U.M.FERNANDES DIMLO.pdf

U. M. Fernandes Dimlo & E. G. Rajan

121-126
3332014-08-314-4IJCSEITRAUG201415Realization of Arithmetic Operations on Signal Sequences Using Normal Algorithms and Rewriting Cyclic Normal Automaton2-14-1406801382-ABS - 15. Comp Sci - IJCSEITR -REALIZATION OF ARITHMETIC OPERATIONS - U.M.FERNANDES DIMLO.pdf

U. M. Fernandes Dimlo & E. G. Rajan

127-134
3342014-10-314-5IJCSEITROCT20141A Review on Optimal Methods for Iris Recognition2-14-1408342236-ABS - 1. Comp Sci - IJCSEITR - A REVIEW ON OPTIMAL METHODS - Shally.pdf

Shally& Gagangeet Singh Aujla

1-8
3352014-10-314-5IJCSEITROCT20142Sentence Level Sentiment Classification Using Hmm with the Help of Part of Speech Tagging2-14-1408454427-ABS - 2. Comp Sci - IJCSEITR - SENTENCE LEVEL SENTIMENT - Anurag Mulkalwar.pdf

Anurag Mulkalwar& Kavita Kelkar

9-12
3362014-10-314-5IJCSEITROCT20143Implementation of a Convergent B-CVA Based ML Decoder Using Convolutional Tail Biting Trellis2-14-1408603971-ABS - 3. Comp Sci - IJCSEITR - Implementation of a Convergent - Momina Kouser.pdf

Momina Kouser & Chandrakala. V

13-22
3372014-10-314-5IJCSEITROCT20144Autonomic Brokering for Minimization of Service Level Agreement Violations in Cloud Computing2-14-1408708765-ABS -4. Comp Sci - IJCSEITR -Autonomic Brokering-Manpreet Kaur.pdf

Manpreet Kaur, Jaspreet Kaur & Sahil Vashist

23-30
3382014-10-314-5IJCSEITROCT20145Efficient Virtual Machines Migration in Cloud Computing2-14-1408790053-ABS - 5. Comp Sci - IJCSEITR - EFFICIENT VIRTUAL MACHINES - Jaspreet Kaur.pdf

Jaspreet Kaur, Manpreet Kaur & Sahil Vashist

31-36
3392014-10-314-5IJCSEITROCT20146Future Prospects in Community Detection2-14-1409137248-ABS - 6. Comp Sci - IJCSEITR - Future Prospects in Community - MINI SINGH AHUJA.pdf

Mini Singh Ahuja& Jatinder Singh

37-48
3402014-10-314-5IJCSEITROCT20147A Unique Biometric Combination of Iris and Textual Password Using ICA2-14-1409393023-ABS - 7. Comp Sci - IJCSEITR - A UNIQUE BIOMETRIC COMBINATION - Shally.pdf

Shally & Gagangeet Singh Aujla

49-56
3412014-10-314-5IJCSEITROCT20148The Development of Binocular Disparity Technique for Printed Circuit Board Defect Inspection2-14-1410266705-ABS - 8. Comp Sci - IJCSEITR - The Development of Binocular - Wen-Tzong Lee.pdf

Wen-Tzong Lee & Shyh-Shin Hwang

57-64
3422014-10-314-5IJCSEITROCT20149Fingerprint Verification Using Qualitative Reckon to Raise the Effectualness2-14-1410428011-ABS - 8. Comp Sci - IJCSEITR - FINGERPRINT VERIFICATION USING - JASLEEN K.SIDHU.pdf

Jasleen K. Sidhu & Gagandeep Singh

65-72
3432014-10-314-5IJCSEITROCT201410Optimization and Performance Analysis of TCP Over Various Routing Algorithms in UMTS WCDMA Networks2-14-1410785209-ABS - 10. Comp Sci - IJCSEITR - OPTIMIZATION AND PERFORMANCE ANALYSIS OF - NEETU SHARMA.pdf

Neetu Sharma, Vijay Singh Rathore

73-82
3442014-10-314-5IJCSEITROCT201411TCP Congestion Control Protocols Over UMTS WCDMA Network2-14-1410871007-ABS - 11. Comp Sci - IJCSEITR - TCP CONGESTION CONTROL - NEETU SHARMA.pdf

Neetu Sharma & Vijay Singh Rathore

83-90
3452014-10-314-5IJCSEITROCT201412The Effect of Similarity Measures on Genetic Algorithm-based Information Retrieval2-14-1411111151-ABS - 12. Comp Sci - IJCSEITR - The Effect of Similarity Measures on Genetic - FATIMA MOHY ELDIN AZZAM.pdf

Moheb Ramzy Girgis, Abdelmgeid Amin Aly & Fatima Mohy Eldin Azzam

91-100
3462014-10-314-5IJCSEITROCT201413A Hybrid Method of De-Duplication to Improve Speed and Efficiency2-14-1411711077-ABS - 13. Comp Sci - IJCSEITR -A hybrid method of - Preetika Singh.pdf

Preetika Singh & Meenakshi Sharma

101-106
3472014-10-314-5IJCSEITROCT201414Security Concern for Virtualization in Cloud Computing2-14-1411724023-ABS - 14. Comp Sci - IJCSEITR - Security Concern For Virtualization - Gayatri S KAPADIA.Pdf

Gayatri Shitanshu Kapadia & Ravi M. Gulati

107-116
3482014-10-314-5IJCSEITROCT201415HRV Analysis for the Study of Neurological and Cardiac Effects of Alcohol on Youth of India2-14-1412168377-ABS - 15. Comp Sci - IJCSEITR-HRV ANALYSIS FOR THE STUDY-D. Mahesh Kumar.pdf

D Mahesh Kumar, Prasanna Kumar S. C, B. G Sudarshan & Yadhuraj S. R

117-124
3492014-10-314-5IJCSEITROCT201416An Algorithm of Calculating Insolation for Planets of the Solar System without the Account of Atmospheric Envelope2-14-1412678779-ABS - 16. Comp Sci - IJCSEITR -An algorithm of calculating insolation - Khujaev.pdf

Khujaev J. I

125-132
3502014-12-314-6IJCSEITRDEC20141Multi-Histogram Equalization Using Error Back Propogation Network (MHEBPN)2-14-1415259074-ABS - 1.Comp Sci - IJCSEITR - MULTI-HISTOGRAM EQUALIZATION - Umesh Kumar Sharma.pdf

Umesh Kumar Sharma & Kapil Kumawat

1-14
3512014-12-314-6IJCSEITRDEC20142An Algorithm to Detect and Terminate Orphan Process in a Distributed System2-14-1416401996-ABS - 2. Comp Sci - IJCSEITR - An Algorithm to Detect and Terminate - Limi Kalita.pdf

Limi Kalita

15-22
3522014-12-314-6IJCSEITRDEC20143Highly Secure Images Steganography Techniques Based on LSB, X-Box Mapping and Huffman Encoding2-14-1416467431-ABS - 3. Comp Sci - IJCSEITR -Highly Secure Images Steganography - Nitin Kanzaria.pdf

Kanzariya Nitin K, Nimavat Ashish V & Jadeja Vijaysinh K

23-34
3532014-12-314-6IJCSEITRDEC201404An Effective Guidance Method for Web Service Selection Using PSO and MA2-14-1417004607-ABS - 4. Comp Sci - IJCSEITR -An Effective Guidance Method for - Vijayalaxmi Jeure.pdf

Vijayalaxmi S Jeure & Y. C. Kulkarni

35-40
3542014-12-314-6IJCSEITRDEC20145A Novel Analysis for Stability and Performance of Network Resource Allocation and Num Problem in Large Scale Networks2-14-1417157514-ABS - 5. Comp Sci - IJCSEITR -A NOVEL ANALYSIS FOR STABILITY - Boopathi.pdf

Sai Ashwin Parakkal, Prasanna Balasubramanian & T. Saravanan

41-50
3552014-12-314-6IJCSEITRDEC20146Heterogeneous Multiprocessor Task Scheduling Using Genetic and Simulated Annealing Algorithms and Their Hybridization 2-14-1417253632-6. ABS - Comp Sci - IJCSEITR - Heterogeneous Multiprocessor Task Scheduling Using Genetic and Simulated Annealing Algorithms and their hybridization.pdf

Moheb R. Girgis, Ahmed A. A. Radwan, Alaa I. El-Nashar & Hagar M. Azzam

51-62
3562014-12-314-6IJCSEITRDEC20147A Survey on Bandwidth Aggregation for Speedy Data Uploading in Twitter Trend Analysis Using Hadoop2-14-1417688807-ABS - 7. Comp Sci - IJCSEITR - A Survey on Bandwidth Aggregation - Gaurav Rajurkar.pdf

Gaurav D. Rajurkar & Rajeshwari M. Goudar

63-68
3572014-12-314-6IJCSEITRDEC20148Fingerprint Image Denoising Using Wave Atom Transform2-14-1418023337-ABS - 8. Comp Sci - IJCSEITR - FINGERPRINT IMAGE DENOISING - Subba Reddy (1).Pdf

Subba Reddy Borra, G. Jagadeeswar Reddy & E. Sreenivasa Reddy

69-76
3582014-12-314-6IJCSEITRDEC20149Wavelet Based Color Image Watermarking2-14-1418292380-ABS - 9. Comp Sci - IJCSEITR -WAVELET BASED COLOR IMAGE - Krinjal Chhotulal Patil.pdf

Krinjal Chhotulal Patil & S. P. Patil

77-84
3592015-02-285-1IJCSEITRFEB20151Is Valuation of Flipkart at $5 Billion Justified?2-14-1418635983-ABS - 1. Comp Sci - IJCSEITR - Is Valuation of Flipkart - Pratima das.Pdf

Shruti Mallick & Sailesh Mallick

1-6
3602015-02-285-1IJCSEITRFEB20152 Automated Evaluation of Breast Cancer Detection Using SVM Classifier--1423888973-ABS - 2. Comp Sci - IJCSEITR - AUTOMATED EVALUATION OF BREAST - Basavaraj Hiremath.pdf

Basavaraj Hiremath & SC Prasannakumar

7-16
3612015-02-285-1IJCSEITRFEB20153Influence of Tropical Cyclone Baaz and Fanoos on Phytoplankton Blooms (Chlorophyll-A) Over Bay of Bengal: A Satellite Based Observation--1423889030-ABS - 3. Comp Sci - IJCSEITR - INFLUENCE OF TROPICAL CYCLONE BAAZ - Rakesh Mandal.pdf

Rakesh Mandal

17-26
3622015-02-285-1IJCSEITRFEB20154XVSGC Tool of Qurable Data Compression in XML Datasets--1423889062-ABS - 4. Comp Sci - IJCSEITR -XVSGC_TOOL_OF_QURABLE_DATA_COMPRESSION_IN_XML_DATASETS - Vijay Gulhane.pdf

Vijay Gulhane & M. S. Ali

27-34
3632015-02-285-1IJCSEITRFEB201505Interactive Image Retrieval with Advanced Clustering Strategy--1423891264-ABS - 5. Comp Sci - IJCSEITR -INTERACTIVE IMAGE RETRIEVAL WITH - Anuja a. khodaskar.pdf

Anuja Khodasakr & Siddharth Ladhake

35-42
3642015-02-285-1IJCSEITRFEB201506Assessment of ANS Using HRV Data in Diseased Condition--1423891335-ABS - 6. Comp Sci - IJCSEITR -ASSESSMENT OF ANS USING HRV DATA - Mahesh Kumar.pdf

D Mahesh Kumar, Prasanna Kumar S. C, B. G Sudarshan,Yadhuraj S. R & Hemanth Kumar

43-54
3652015-02-285-1IJCSEITRFEB20157Multi-Secure Binder for Dismissal in OS - Level Virtual Machines Environment--1423889381-ABS - 7. Comp Sci - IJCSEITR -Multi-Secure Binder for Dismissal in OS - Level - Girish Wadhwa.pdf

Girish Wadhwa

55-62
3662015-02-285-1IJCSEITRFEB20158Securing Stack Overflow Vulnerabilities by Memory Access Virtualization and Automatic Patches--1423889421-ABS - 8. Comp Sci - IJCSEITR - Securing Stack Overflow Vulnerabilities - Jai Lalwani.pdf

Lalwani Jai

63-66
3672015-02-285-1IJCSEITRFEB20159Enhanced Unified Authentication and Authorization Architecture Based on Desktop Virtualization--1423889476-ABS - 9. Comp Sci - IJCSEITR -ENHANCED UNIFIED AUTHENTICATION AND - Chetan Patel.pdf

Kirankumar Gaikwad, Rupali Nikhare & Rahul Jiwane

67-74
3682015-02-285-1IJCSEITRFEB201510POLVM: Parallel Optimized Live VM Migration--1427285471-ABS - 10. Comp Sci - IJCSEITR - POLVMParallel Optimized Live VM Migration - Jayasree P.pdf

Jayasree P & Meenakshisharma

75-90
3692015-02-285-1IJCSEITRFEB201511Hybrid Approach for Web Mashup Security Framework--1423889555-ABS - 11. Comp Sci - IJCSEITR -HYBRID APPROACH FOR WEB - Chetan Patel.pdf

Vinod Sapkal & Ravi Randale

91-98
3702015-02-285-1IJCSEITRFEB201512A Proposed Security Framework for Network Management Based on Common Object Request Broker Architecture (CORBA) Using Mobile Agent--1423889652-ABS - 12. Comp Sci - IJCSEITR - A PROPOSED SECURITY FRAMEWORK - Rajesh Kumar.pdf

Rajesh Kumar & S Niranjan

99-110
3712015-02-285-1IJCSEITRFEB201513Information Technology in Supply Chain Management--1423889691-ABS - 13. Comp Sci - IJCSEITR - INFORMATION TECHNOLOGY IN SUPPLY CHAIN MANAGEMENT - Syed Afsar.pdf

Pandu Ranga Reddy, Syed Afsar , Goverdhan Nadendla, Dinesh Kesaboina & Tirumalesh Chandramahanty

111-116
3722015-02-285-1IJCSEITRFEB201514A Fast Factorization Algorithm for Composite Integers of the Form N = P X Q, Where P and Q Are Primes and N Mod 6= + 1--1423889731-ABS - 14. Comp Sci- IJCSEITR - A Fast Factorization Algorithm for - Noureldien A. Noureldien.pdf

Noureldien A. Noureldien & Ebtisam Abaker

117-126
3732015-02-285-1IJCSEITRFEB201515Congestion Control by Modified TCP TAHOE for WCDMA UMTS Network--1423889320-ABS - 15. Comp Sci - IJCSEITR -CONGESTION cONTROL BY MODIFIED TCP TAHOE OVER - Neetu Sharma.pdf

Neetu Sharma & Vijay Singh Rathore

127-134
3742015-04-305-2IJCSEITRAPR20151Seccloud Using Multi-Dimensional Access: A Survey2-14-1424501984-1. ABS - Comp Sci - IJCSEITR - SECCLOUD USING MULTI.pdf

Ahire Rahul, Tempe Bhushan Kumar, Kelgane Girish & Gauribhagat

1-6
3752015-04-305-2IJCSEITRAPR20152Automated Bluetooth Attendance Management System2-14-1425301237-2. ABS - Comp Sci - IJCSEITR - AUTOMATED BLUETOOTH ATTENDANCE MANAGEMENT SYSTEM.pdf

Sourabh Gavade, Pinkey Atwal, Zubin Khan, Vishnu Raj Pillai & Bilkis Chandargi

7-14
3762015-04-305-2IJCSEITRAPR20153Performance Evaluation of Queuing Discipline in UMTS WCDMA Networks2-14-1425303571-3. ABS - Comp Sci - IJCSEITR - PERFORMANCE EVALUATION OF QUEUING DISCIPLINE.pdf

Neetu Sharma & Vijay Singh Rathore

15-24
3772015-04-305-2IJCSEITRAPR20154Alphanumeric Characters Detection on License Plate Using Image Processing2-14-1425450798-4. ABS - Comp Sci - IJCSEITR - ALPHANUMERIC CHARACTERS DETECTION ON.pdf

Moluguri Kiran Kumar

25-30
3782015-04-305-2IJCSEITRAPR20155Generating Positive-Negative Rules Using Fuzzy FP-Growth & Naïve Bayes2-14-1426165154-5. ABS - Comp Sci - IJCSEITR -GENERATING POSITIVE.pdf

Shipra Khare & Vivek Jain

31-40
3792015-04-305-2IJCSEITRAPR20156Opinion Mining of Reviews Distributed Over E-Commerce Sites2-14-1426249626-6. ABS - Comp Sci - IJCSEITR - OPINION MINING OF REVIEWS DISTRIBUTED OVER E.pdf

Rekha More & Ekta Ukey

41-52
3802015-04-305-2IJCSEITRAPR20157Evaluation of Wavelet Transformations in Different Bands by Applying Noise2-14-1426330916-1. ABS - Comp Sci - IJCSEITR - EVALUATION OF WAVELET TRANSFORMATIONS IN.pdf

K.Sunitha &T.Sudha

53-58
3812015-04-305-2IJCSEITRAPR20158Enhancement of Semantic Matchmaking in Web Services2-14-1426831913-8. ABS - Comp Sci - IJCSEITR - ENHANCEMENT OF SEMANTIC MATCHMAKING IN WEB SERVICES.pdf

Savan M. Patel & Gaurav K. Patel

59-70
3822015-04-305-2IJCSEITRAPR20159A Graph Clustering Approach to Identify Key Genes from Microarray Gene Expression Data2-14-1426854232-9. ABS -Comp Sci - IJCSEITR - A GRAPH CLUSTERING APPROACH -Jahiruddi.pdf

Jahiruddin

71-78
3832015-04-305-2IJCSEITRAPR201510A New Approach for Person Verification System Based on Finger-Knuckle Print Biometric and MLP Neural Network2-14-1427263503-ABS - 10. Comp Sci - IJCSEITR - A New Approach for Person Verification - A D Bhople.pdf

A. D. Bhople

79-88
3842015-04-305-2IJCSEITRAPR201511An Advanced Research Framework on Dental Health Care Information Eco-System for Enhanced Services by Leveraging Big Data Analytics2-14-1427543978-11. ABS - Comp Sci - IJCSEITR - AN ADVANCED RESEARCH FRAMEWORK ON DENTAL HEALTH CARE INFORMATION ECO.pdf

V. V. R. Maheswara Rao & V. Valli Kumari

89-96
3852015-04-305-2IJCSEITRAPR201512TOR Prevent DNS Leak through Honeypot2-14-1427548165-12. ABS - Comp Sci - IJCSEITR - TO PREVENT DNS LEAK THROUGH HONEYPOT.pdf

Suman Gautam, Nitesh Gupta & Sini Shibu

97-102
3862015-04-305-2IJCSEITRAPR201513Prevention of Physical Disabilities Through ORI Technique--1429530492-13. ABS - Comp Sci -IJCSEITR -PREVENTION OF PHYSICAL DISABILITIES THROUGH ORI TECHNIQUE.pdf

Ashish Guwalani, A. K. Dubey& Rakesh Rathi

103-112
3872015-04-305-2IJCSEITRAPR201514Tapping the Power of Social Network in Dairy Industry2-14-1428320142-ABS - 13. Comp Sci - IJCSEITR -Tapping the Power of Social - KAMANI KRUNAL.pdf

Krunalkamani & Ashish Makwana

113-118
3882015-06-305-3IJCSEITRJUN20151Information and Communication Technology & Its Impact in Improving the Teaching and Learning of English Language2-14-1429336509-ABS - 1. Comp Sci - IJCSEITR -Information and Communication Technology - Nischal Chavda.pdf

Pankaj S. Parsania, Nischal M. Chavda & Krunal C. Kamani

1-6
3892015-06-305-3IJCSEITRJUN20152A Software Architecture for Implementation of ERP in Higher Education Institution2-14-1429362676-ABS - 2. Comp Sci - IJCSEITR -A Software Architecture for Implementation - Suprihanto.pdf

Suprihanto & Transmissia Semiawan

7-12
3902015-06-305-3IJCSEITRJUN20153A Novel Approach for Iris Recognition System Based on DCT Features--1430567888-ABS - 2. Comp Sci - IJCSEITR - A NOVEL APPROACH FOR IRIS - Heena.pdf

Heena & Ravi Kant Jaiswal

13-22
3912015-06-305-3IJCSEITRJUN20154Automatic Extraction of Top-K Lists From the Web Pages2-14-1430568485-ABS - 4. Comp Sci - IJCSEITR -Automatic Extraction of Top-k - Ashish Dwivedi.pdf

Ashish Dwivedi

23-30
3922015-06-305-3IJCSEITRJUN20155Modeling of TIAV Multimedia System2-14-1430569078-ABS - 5. Comp Sci - IJCSEITR -Modeling of TIAV Multimedia - Beknazarova_S.pdf

Beknazarova Saida Safibullayevna

31-36
3932015-06-305-3IJCSEITRJUN20156Big Data: Opportunities & Challenges2-14-1432559270-6. ABS - Comp Sci - IJCSEITR - BIG DATA.pdf

Sonal Chawla, Neetika Goswami & Priyanka Narwal

37-42
3942015-06-305-3IJCSEITRJUN20157Improving Accuracy in Spatial Images Classification2-14-1433239506-7. ABS -Comp Sci - IJCSEITR - IMPROVING ACCURACY IN SPATIAL IMAGES CLASSIFICATION.pdf

K. Leelavathi & T. Sudha

43-48
3952015-08-315-4IJCSEITRAUG20151Fighting Cybercrime: A Comparison of the Cybercrime Laws in Saudi Arabia and the United States2-14-1434178755-ABS - 1. Comp Sci - Fighting Cybercrime - Abdullah Almuqrin.pdf

Abdullah Almuqrin, Konnie Kustron, Jd

1-8
3962015-08-315-4IJCSEITRAUG20152Effective Methodology for Location Measurement in Ubiquitous Environment2-14-1434774308-2. ABS - Comp Sci - IJCSEITR -EFFECTIVE METHODOLOGY FOR LOCATION MEASUREMENT IN.pdf

Rohit Saxena, Urvashi Udhwani, Anil Dubey,Amara Ram Saini& Rakesh Rathi

9-16
3972015-08-315-4IJCSEITRAUG20153Video Segmentation for Moving Object Detection & Tracking- A Review2-14-1435147219-3. ABS - Comp Sci - IJCSEITR - VIDEO SEGMENTATION FOR MOVING OBJECT.pdf

Priya Gupta, Nivedita Kumari & Shikha Gupta

17-34
3982015-08-315-4IJCSEITRAUG20154A Systematic Review of Efficient Data Dissemination in Wireless Sensor Network Based on Mobile Sink2-14-1435235888-4. ABS -Comp Sci - IJCSEITR - A SYSTEMATIC REVIEW OF EFFICIENT DATA DISSEMINATION.pdf

Nivedita Kumari, Priya Gupta & Neetu Sharma

35-54
3992015-08-315-4IJCSEITRAUG20155Web Server Profiling: Approach to Webserver Security2-14-1435811871-5. ABS - Comp Sci - IJCSEITR - WEB SERVER PROFILING.pdf

Jyoti Pandey & Manoj Jain

55-62
4002015-08-315-4IJCSEITRAUG20156Index Based Detection of File Level Clone for High Level Clonin2-14-1436513072-ABS - 6. Comp Sci - IJCSEITR - INDEX BASED DETECTION OF FILE LEVEL -Manu Singh.pdf

Manu Singh & Vidushi Sharma

63-70
4012015-08-315-4IJCSEITRAUG20157Using Histogram Specification in a Hybrid Preprocessing Technique for Segmentation of Malignant Skin Lesions from Dermoscopic Images2-14-1436868131-ABS - 7. Comp Sci - IJCSEITR-Using Histogram Specification-Sonali Atulkumar Patil.pdf

Sonali Patil   & V R Udupi

71-82
4022015-08-315-4IJCSEITRAUG20158An Enhanced Facial Expression Classification System Using Emotional Back Propagation Artificial Neural Network with DCT Approach2-14-1439520728-ABS - 8. Computer Sci  - IJCSEITR - An Enhanced Facial Expression Classification.pdf

Vedantham Ramachandran, E. Srinivasa Reddy & B. Sivaiah

83-94
4032015-10-315-5IJCSEITROCT20151An Optimized Approach for Symmetric Face Recognition Using Eigen Faces2-14-1440828841-ABS - 1. Comp Sci - IJCSEITR - An optimized approach for symmetric.pdf

A. D. Chitra & P. Ponmuthuramalingam

1-10
4042015-10-315-5IJCSEITROCT20152Design of a Generic Workflow Management System--1442340828-ABS - 2.Comp Sci - IJCSEITR - Design of a Generic Workflow Management.pdf

Er. Harpreet Kaur & Er. Lokesh Jain

11-16
4052015-10-315-5IJCSEITROCT20153Image Encryption and Compression System using Haar, Daubechies and Coiflet Wavelets--1443091756-ABS - 3. Comp Sci - IJCSEITR - IMAGE ENCRYPTION AND COMPRESSION SYSTEM.pdf

Jaspreet Singh & Prabhjot Kaur

17-26
4062015-10-315-5IJCSEITROCT20154Analysis of Buying Behaviour of Customers in Supermarkets Using Data Mining TRFM Model2-14-1442666337-ABS.4-Comp-ANALYSIS OF BUYING BEHAVIOUR OF CUSTOMERS IN SUPERMARKETS USING DATA MINING TRFM MODEL.pdf

Aarati Joshi, Vipul Vekariya & Daxa Vekariya

27-34
4072015-10-315-5IJCSEITROCT20155Classification of Mammographic Breast Density Using Grey Level Difference Statistics and Fourier Power Spectrum Features2-14-1443258906-5. ABS -Comp Sci - IJCSEITR-CLASSIFICATION OF MAMMOGRAPHIC.pdf

Vipul Sharma & Lokesh Jain

35-42
4082015-10-315-5IJCSEITROCT20156Performance Comparison of Path Loss Sensitive Routing Protocol and Multipath Routing Protocol for Manets2-14-1444042945-ABS - 6. Computer Science- IJCSEITR-PERFORMANCE COMPARISON OF PATH LOSS-Chintan Bhavsar.pdf

Chintan Bhavsar & Sonal Belani

43-52
4092015-12-315-6IJCSEITRDEC20151Analysis of Enhanced HOP by HOP Feedback Based Hierarchical MPLS Protocol2-14-1446055895-ABS - 1. Comp Sci - IJCSEITR - ANALYSIS OF ENHANCED HOP BY HOP FEEDBACK BASED HIERARCHICAL MPLS PROTOCOL.pdf

Ankur Dumka & Hardwari Lal Mandoria

1-6
4102015-12-315-6IJCSEITRDEC20152Knowledge, Attitude and Perception (KAP) of Farmers for using Information and Communication Technology in Agriculture in Punjab, India2-14-1498548565-ABS-2.IJCSEITRDEC20152.pdfGagandeep Kaur Grewal & Kiran Jyoti7-12
4112015-12-315-6IJCSEITRDEC20153Fingerprint Image Enhancement Technique and Its Qualitative Analysis2-14-1448100175-ABS - 3. IJCSEITR-Fingerprint Image Enhancement Techniques and its Statistical Analysis.pdf

Dinesh Kumar Misra et al.,

13-22
4122015-12-315-6IJCSEITRDEC20154A Review on Criteria Based Softwae Component Selection Techniques2-14-1448503561-ABS - 4. IJCSEITR -A REVIEW ON CRITERIA BASED SOFTWAE.pdf

Neha Bansal & Jagdeep Kaur

23-30
4132015-12-315-6IJCSEITRDEC20155Intrusion Detection System and Prevention System in Cloud Computing using Snort2-14-1448697953-ABS - 5. IJCSEITR - INTRUSION DETECTION SYSTEM AND PREVENTION SYSTEM IN CLOUD.pdf

Sunita Kumawat et al.,

31-40
4142015-12-315-6IJCSEITRDEC20156Knowledge Empowered Society through Digital India Programme 20152-14-1449898756-ABS - 6. IJCSEITR - KNOWLEDGE EMPOWERED SOCIETY THROUGH DIGITAL.pdf

Shabana, Jyoti Singhal et al.,

41-48
4152016-02-296-1IJCSEITRFEB20161Optimization of Zone Routing Protocol2-14-1451130424-ABS - 1. IJCSEITR - OPTIMIZATION OF ZONE ROUTING PROTOCOL.pdf

Anupriya Rastogi

1-8
4162016-02-296-1IJCSEITRFEB201602Achieving Privacy Preserving Clustering in Images through Multidimensional Scaling2-14-1528888816-ABS-2.IJCSEITRFEB20162.pdf

P. Nagendra Kumar et al.,

9-18
4172016-02-296-1IJCSEITRFEB20163Comparative Study of Dimensionality Reduction Techniques in the Context of Clustering2-14-1528888737-ABS-3.IJCSEITRFEB20163.pdf

P. Nagendrakumar et al.,

19-28
4182016-02-296-1IJCSEITRFEB20164An Effective Watermarking Scheme for 3d Medical Images--1458727419-ABS - 4. IJCSEITR - AN EFFECTIVE WATERMARKING SCHEME.pdf

Manish Madhav Tripathi & S P Tripathi

29-34
4192016-02-296-1IJCSEITRFEB20165Dynamic Load Balancing in Distributed Systems by Ai Agent2-14-1452158743-ABS - 5. IJCSEITR - DYNAMIC LOAD BALANCING IN DISTRIBUTED.pdf

Mohammad Haroon et al.,

35-42
4202016-02-296-1IJCSEITRFEB20166An Evaluation on Modern Spatial Domain Image Steganographic Algorithms2-14-1453355051-ABS - 6. IJCSEITR - An Evaluation on Modern Spatial Domain Image Steganographic.pdf

S. Deepa & R. Umarani

43-52
4212016-02-296-1IJCSEITRFEB20167Evaluation Model for Estimating Reusability Parameter Using Metrices--1453381134-ABS - 7. IJCSEITR -EVALUATION MODEL FOR ESTIMATING.pdf

Ashwin Tomar & V M Thakare

53-68
4222016-02-296-1IJCSEITRFEB20168FOSSICK: An Implementation of Federated Search Engine2-14-1453714189-ABS - 8. IJCSEITR - FOSSICK AN IMPLEMENTATION OF FEDERATED.pdf

Devji Chhanga et al.,

69-78
4232016-02-296-1IJCSEITRFEB20169Secure and Efficient Multi-Keyword Ranked Search Over Encrypted Cloud Data with Recently Updated Results2-14-1453880876-ABS - 9. IJCSEITR - Secure and efficient multi-keyword ranked search over.pdf

Preethi Mathew

79-86
4242016-02-296-1IJCSEITRFEB201610QoS Based Routing Protocols - A Review2-14-1454404398-ABS - 10. IJCSEITR - QoS Based Routing Protocols.pdf

Swati Arya et al.,

87-94
4252016-04-306-2IJCSEITRAPR20161A Novel Image Watermarking System Utilizing HMM in Wavelet Domain2-14-1455865103-ABS - 1. IJCSEITR - A NOVEL IMAGE WATERMARKING SYSTEM UTILIZING HMM IN WAVLET DOMAIN.pdf

B. Gopi & T. Sudha

1-10
4262016-04-306-2IJCSEITRAPR201602Privacy Preserving Clustering by Adding Different Noise Components Generated from Progressions to Different Confidential Attributes2-14-1528888891-ABS-2.IJCSEITRAPR201602.pdf

T. Sudha & P. Nagendra Kumar

11-16
4272016-04-306-2IJCSEITRAPR20163Image Enhancement by Suppressing Wrinkles Using L0 Norm and ACO2-14-1456902487-ABs - 3. IJCSEITR - IMAGE ENHANCEMENT BY SUPPRESSING WRINKLES.pdf

Shreya Goyal et al.,

17-22
4282016-04-306-2IJCSEITRAPR20164National University of Uzbekistan on the Threshold to Smart University--1469105788-ABS - 4. IJCSEITR - NATIONAL UNIVERSITY OF UZBEKISTAN ON THE THRESHOLD.pdf

Sirojiddinovsh.S. & Elov B.B.

23-28
4292016-04-306-2IJCSEITRAPR20165Barriers to the Adoption of Cloud Computing in Ghana: The Case of Selected Public Tertiary Institutions--1458214655-ABS - 5. IJCSEITR - Barriers to the Adoption of Cloud Computing in Ghana.pdf

Benjamin T. K. Boison et al.,

29-40
4302016-04-306-2IJCSEITRAPR20166Pupil Dilations Detect Iris Liveness Detection2-14-1458715580-ABs - 6. IJCSEITR - PUPIL DILATIONS DETECT IRISLIVENESS DETECTION.pdf

Pasupuleti LP Bharati et al.,

41-50
4312016-06-306-3IJCSEITRJUN20161A Survey on Various Text Detection and Extraction Techniques from Videos and Images2-14-1465463521-ABS - 1. IJCSEITR - A SURVEY ON VARIOUS TEXT DETECTION AND EXTRACTION.pdf

Sonal Paliwal et al.,

1-10
4322016-06-306-3IJCSEITRJUN201602Study of Different Transformation Algorithms in Digital Image Watermarking2-14-1465463596-ABS --2. IJCSEITR - Study of different Transformation Algorithm.pdf

Ravish Kumar Dubey & H.L. Mandoria

11-18
4332016-06-306-3IJCSEITRJUN201603Design and Realization of On-Line, Real Time Web Usage Data Mining and Recommendation System using Bayesian Classification Method2-14-1465463679-ABS - 3. IJCSEITR - Design and Realization of On-Line, Real Time.pdf

Adeniyi, D.A, Wei, Z & Yongquan, Y

19-38
4342016-06-306-3IJCSEITRJUN201604Improved Algorithm for Dynamic Memory Allocation in Cloud Computing2-14-1465463768-ABS - 4. IJCSEITR - IMPROVED ALGORITHM FOR DYNAMIC MEMORY ALLOCATION.pdf

Abhinav et al.,

39-46
4352016-06-306-3IJCSEITRJUN201605A Comprehensive Study of Various Kinds of Frauds & It’s Impact2-14-1465463842-ABS - 5. IJCSEITR - A COMPREHENSIVE STUDY OF VARIOUS KINDS OF FRAUDS.pdf

Navneet Kr. Kashyap et al.,

47-58
4362016-04-306-2IJCSEITRAPR20167Face Recognition System using Bio Metrics & Security2-14-1465548420-ABS - 7. IJCSEITR - FACE RECOGNITION SYSTEM USING BIO METRICS.pdf

V.S.Manjula

51-62
4372016-08-316-4IJCSEITRAUG20161Using Storyboard To Improve Video Retarget Quality by Pattern Matching Method2-14-1468241049-ABs - 1. IJCSEITR - Using Storyboard to Improve Video Retarget Quality1.pdf

Wen-Pinn Fang et al.,

1-8
4382016-08-316-4IJCSEITRAUG20162Task Scheduling in Cloud Computing using Genetic Algorithm--1468400036-ABS - 2. IJCSEITR - Task scheduling in cloud computing using.pdf

Sonali Jain

9-22
4392016-08-316-4IJCSEITRAUG20163Indoor Wi-Fi Based Positioning System using Signal Fingerprinting2-14-1468479784-ABS - 3. IJCSEITR - Indoor Wi-Fi Based Positioning System using signal.pdf

Xanar Fernandes et al.,

23-32
4402016-08-316-4IJCSEITRAUG20164Efficient Image Compression Using Kekre’s Transforms--1468841399-ABS - 4. IJCSEITR - Efficient Image Compression Using Kekre’s Transforms.pdf

Terence Johnson et al.,

33-44
4412016-08-316-4IJCSEITRAUG20165A New Approach of Graphical Password with Integration of Audio Signature Combination of Recall and Recognition2-14-1469257678-ABS - 5. IJCSEITR -A NEW APPROACH OF GRAPHICAL PASSWORD WITH INTEGRATION.pdf

Salim Istyaq

45-50
4422016-08-316-4IJCSEITRAUG20166Thermal Aware Routing Protocol for Body Area Networks: A Survey2-14-1470292338-ABS - 6. IJCSEITR - THERMAL AWARE ROUTING PROTOCOL FOR BODY AREA NETWORKS.pdf

Mercy Amrita. C et al.,

51-60
4432016-08-316-4IJCSEITRAUG20167Cyber Security and Online Shopping Perceptive Security of Flexible and Cashless Transactions2-14-1470636946-ABS - 7. IJCSEITR - Cyber Security and Online Shopping.pdf

M. V. Chandramathi et al.,

61-68
4442016-10-316-5IJCSEITROCT20161Improvement in the Quality of Shaky Camera Images2-14-1473490460-ABS - 1. IJCSEITR- IMPROVEMENT IN THE QUALITY OF SHAKY CAMERA IMAGES.pdf

Kiran Wasudeo Sarate et al.,

1-8
4452016-10-316-5IJCSEITROCT20162Face Recognition System Using PCA, LDA, Kernel PCA And Kernel LDA2-14-1473756709-ABS - 2. IJCSEITR- FACE RECOGNITION SYSTEM USUNG PCA , LDA , KERNEL PCA AND KERNEL LDA.pdf

Esra Jasem Harfash

9-20
4462016-10-316-5IJCSEITROCT20163Free and Open Source Software: Educational Framework for Ghana2-14-1473851172-ABS - 3. IJCSEITR-Free and Open Source Software Educational Framework for Ghana_Rephrased.pdf

Nana Kwame Gyamfi et al.,

21-28
4472016-10-316-5IJCSEITROCT20164Cooperative Leases Using Improved Delaunay Triangulation for Data Consistency In Content Delivery Networks2-14-1474017952-ABS - 4. Comp Sci - IJCSEITR-COOPERATIVE LEASES USING IMPROVED.pdf

Gadiraju Mahesh et al.,

29-36
4482016-10-316-5IJCSEITROCT20165Component Based Selelction Technique Using Clustering2-14-1474524727-ABS - 5. IJCSEITR - COMPONENT BASED SELELCTION TECHNIQUE USING.pdf

Neha Bansal et al.,

37-52
4492016-10-316-5IJCSEITROCT20166Protein Structure Comparison using Fuzzy Image Processing2-14-1475497187-ABS - 6. Comp Sci - IJCSEITR-Protein Structure Comparison using Fuzzy Image Processing.pdf

K. Himabindu et al.,

53-58
4502016-10-316-5IJCSEITROCT20167A Statistical Analysis on the Impact of Speech Enhancement Techniques on the Feature Vectors of Noisy Speech Signals for Speech Recognition2-14-1475583667-ABS - 7. IJCSEITR-A STATISTICAL ANALYSIS ON THE IMPACT OF SPEECH ENHANCEMENT TECHNIQUES.pdf

Swapnanil Gogoi et al.,

59-66
4512016-10-316-5IJCSEITROCT20168A Study of Fuzzy Based Approach for Securing Information in PPDM2-14-1476359902-ABS - 8. IJCSEITR-A study of Fuzzy Based Approach for Securing Information in PPDM.pdf

Shrikant Zade et al.,

67-74
4522016-10-316-5IJCSEITROCT20169Analysis and Enhancement of Process Model Using Scoring for Customer Relationship Management2-14-1476361205-ABS - 9. IJCSEITR-Analysis and Enhancement of process model using scoring for Customer Relationship Management.pdf

Rekha Arun et al.,

75-84
4532016-10-316-5IJCSEITROCT201610Data Classification using Min-Max Neural Network with Pruning2-14-1476444779-ABS - 10. IJCSEITR-DATA CLASSIFICATION USING MIN-MAX NEURAL NETWORK WITH PRUNING.pdf

Alok Kumar Mishra et al.,

85-92
4542016-12-316-6IJCSEITRDEC20161The Scope of E-Learning in the Computer Science & Technologies2-14-1477391669-ABS - 1. IJCSEITR-The Scope of E-Learning in the Computer Science & Technologies.pdf

Mudassir Khan

1-6
4552016-12-316-6IJCSEITRDEC20162Predicting Customer Sentimental Analysis in Online Shopping using Multilayer Perception2-14-1480139982-ABS - 2. IJCSEITR-Predicting customer sentimental analysis in on-line shopping using multi-layer perception..pdf

R. Shanthi et al.,

7-18
4562017-02-287-1IJCSEITRFEB20171“Design a Model and Algorithm for Four Gesture Images Comparison and Analysis using Histogram Graph”2-14-1486017616-1.ABS-IJCSEITRFEB20171.pdf

Shashank Vishwakarma et al.,

1-8
4572017-02-287-1IJCSEITRFEB20172An Approach to Construct MDRT to Produce Qualitative Ratings for E-Commerce Websites2-14-1486017666-2.ABS-IJCSEITRFEB20172.pdf

D. R Kumar Raja et al.,

9-14
4582017-02-287-1IJCSEITRFEB20173To Study & Analyze the Impact of Cloud Computing Technology on Enterprises Productivity, Cost and Securities in India2-14-1486017720-3.ABS-IJCSEITRFEB20173.pdf

Priya Vij et al.,

15-20
4592017-02-287-1IJCSEITRFEB20174Inheritance in Object Oriented Programming Easiest Way to Teach and Learn Inheritance in C++2-14-1485336245-ABS - 4. Comp Sci - IJCSEITR-Inheritance in Object Oriented Programming Easiest way to teach.pdf

Twinkle Patel

21-34
4602017-02-287-1IJCSEITRFEB20175Median First Tournament Sort2-14-1485941175-ABS-IJCSEITRFEB20175.pdfMukesh Soni et al.,35-52
4612017-02-287-1IJCSEITRFEB20176A Framework for Keeping Data Safe in Cloud Transmissions2-14-1486025935-6.ABS-IJCSEITRFEB20176.pdfD Usha53-58
4622017-02-287-1IJCSEITRFEB20177Reconstruction of HV-Convex Binary Images with Diagonal and Anti-Diagonal Projections using Simulated Annealing Technique2-14-1486123642-7.ABS-IJCSEITRFEB20177.pdfShelja Sehdev et al.,59-68
4632017-04-307-2IJCSEITRAPR20171Smart Motif Discovery on ECG Signal using Autocorrelation and Variable Threshold2-14-1487225463-1.ABS-IJCSEITRAPR20171.pdfHarjeet Kaur1-10
4642017-04-307-2IJCSEITRAPR20172An Approach to Detect Text in Video2-14-1487588922-2.ABS-IJCSEITRAPR20172.pdfMegha Khandelwal 11-16
4652017-04-307-2IJCSEITRAPR20173An Approach to Email Categorization for Telecommunication Corpus2-14-1488617774-3.ABS-IJCSEITRAPR20173.pdfRajwant Kaur et al.,17-24
4662017-04-307-2IJCSEITRAPR20174An Efficient Resource Scheduling Algorithm using Knapsack2-14-1489476355-4.ABS-IJCSEITRAPR20174.pdfRashmi Kumari et al.,25-28
4672017-04-307-2IJCSEITRAPR20175Association Rule Mining using Modified BPSO2-14-1490786100-5.ABS-IJCSEITRAPR20175.pdfAmit Kumar Chandanan et al.,29-36
4682017-04-307-2IJCSEITRAPR20176An Efficient Round Robin Algorithm using Improved Time Quantum2-14-1491222556-6.ABS-IJCSEITRAPR20176.pdfHimanshu Bhagwani et al.,37-42
4692017-06-307-3IJCSEITRJUN20171Evolution of New Efficient Load Balancer Algorithm for Large Data Sets2-14-1492077489-1.Abs-IJCSEITRJUN20171.pdfNuka Santosh Kumar et.al.,1-10
4702017-06-307-3IJCSEITRJUN20172Model and Simulation to Minimize Empty Space Left with Laff Method in the Loading of Cargo System2-14-1492775773-2.ABS_IJCSEITRJUN20172.pdfAndrias Rusli & Friska Natalia Ferdinand11-18
4712017-06-307-3IJCSEITRJUN20173Data Mining Analysis for National Security2-14-1495195380-3.Abs-IJCSEITRJUN20173.pdfR. E. Okonigene et.al.,19-32
4722017-06-307-3IJCSEITRJUN20174Design of Simulation Techniques for Data Prediction in Public Transportation2-14-1495617879-4.ABS_IJCSEITRJUN20174.pdfGregorius Viko & Friska Natalia Ferdinand33-38
4732017-06-307-3IJCSEITRJUN20175Breast Cancer Image Segmentation using Ekstrap and FCS Algorithm2-14-1496146814-ABS-5.IJCSEITRJUN20175.pdfDeepshri Hebbalkar et al.,39-48
4742017-06-307-3IJCSEITRJUN20176Detection of Brain Tumor Using Enhanced K-Strange Points Clustering and Morphological Filtering2-14-1497610762-ABS-6.IJCSEITRJUN20176.pdfNora Naik et al.,49-58
4752017-08-317-4IJCSEITRAUG20171Study of Knowledge Sharing on Onion Crops Among the Farmers in Perambalur District2-14-1499234593-Abs.IJCSEITRAUG20171.pdfJ. Nithya Jayaseeli & T. Devi1-6
4762017-08-317-4IJCSEITRAUG20172Mining Rating of University Performance in Academic Programs and Services2-14-1499321530-Abs.IJCSEITRAUG20172.pdfJasmin D. Niguidula et al.,7-18
4772017-08-317-4IJCSEITRAUG20173Database Migration Analysis for Data Assurance Using D2Loader2-14-1499852570-Abs3.IJCSEITRAUG20173.pdfAlvin Jason A. Virata et al.,19-24
4782017-08-317-4IJCSEITRAUG20174Secure and Faster Key Management of Elliptical Curve Cryptography in Vanets2-14-1499851033-Abs4.IJCSEITRAUG20174.pdfEkta Narwal & Sumeet Gill25-30
4792017-08-317-4IJCSEITRAUG20175Efficient Traffic Management with Intermediate Data Partition for Big Data Applications2-14-1500701179-Abs5.IJCSEITRAUG20175.pdfNaveen Wal et al.,31-36
4802017-08-317-4IJCSEITRAUG20176Image Processing Color Model Techniques and Sensor Networking in Identifying Fire from Video Sensor Node 2-14-1500548775-Abs6.IJCSEITRAUG20176.pdfS. R. Vijayalakshmi et al.,37-46
4812017-08-317-4IJCSEITRAUG20177Local Binary Patterns Based Detection of Rust Disease of Lentils (Lens culinaris) Using k-NN Classification System2-14-1500549313-Abs7.IJCSEITRAUG20177.pdfKuldeep Singh et al.,47-52
4822017-08-317-4IJCSEITRAUG20178Automatic Product Review Sentiment Analysis Using Vader and Feature Visulaization2-14-1501663690-Abs.8.IJCSEITRAUG20178.pdfHarish Rao M & Shashikumar D.R53-66
4832017-08-317-4IJCSEITRAUG20179Review Paper on Decision Tree Data Mining Algorithms to Improve Accuracy in Identifying Classified Instances using Large Dataset 2-14-1501572932-Abs9.IJCSEITRAUG20179.pdfGurpreet Singh et al.,67-70
4842017-08-317-4IJCSEITRAUG201710Dual-Compression Based Model Using the Active Object Detection Model2-14-1501576408-Abs.10.IJCSEITRAUG201710.pdfHardeep Kaur & Damanpreet Kaur71-80
4852017-08-317-4IJCSEITRAUG201711Neural Network Based Signature Verification Model for Bank Cheques with Three Specimen Signatures2-14-1502107699-Abs.11.IJCSEITRAUG201711.pdfS.Dhandapani81-92
4862017-08-317-4IJCSEITRAUG201712E2TBR: Energy Efficient Transmission Based Routing for IoT Networks2-14-1502167083-Abs.12.IJCSEITRAUG201712.pdfSantiago. S & Arockiam. L93-100
4872017-10-317-5 IJCSEITROCT20171The Performance Analysis of Edge Detection Algorithms for Image Processing in Presence of Noise2-14-1503053467-ABS.1.IJCSEITROCT20171.pdfMunwar Ali Shaik et al.,1-8
4882017-10-317-5IJCSEITROCT20172Hybrid Kernel Fuzzy Clustering with Feed Lion Neural Network for Missing Data Imputation and Classification2-14-1507022651-abs2.IJCSEITROCT20172.pdfR Rajani et al.,9-28
4892017-10-317-5IJCSEITROCT20173Insight of Various Pos Tagging Techniques for Hindi Language 2-14-1507899024-Abs3.IJCSEITROCT20173.pdfSimpal Jain & Nidhi Mishra29-34
4902017-12-317-6IJCSEITRDEC20171DJIKSTRA Algorithm Based Approach to Shortest Path Model in Public Bus Transportation2-14-1510556203-Abs.1.IJCSEITRDEC20171.pdfDeandrha agusta et al.,1-8
4912018-02-288-1IJCSEITRFEB20181Approaches to Image Processing using the Tools of Fuzzy Sets2-14-1514532788-abs1.IJCSEITRFEB20181.pdfR. KH. Khamdamov & E. A. Saliyev1-12
4922018-02-288-1IJCSEITRFEB20182Pest Management using Machine Learning Algorithms: A Review2-14-1520578301-Abs.2.IJCSEITRFEB20182.pdfR. P. L. Durgabai et al.,13-22
4932018-06-308-2IJCSEITRJUN20181Analysis and Comparison of Loan Sanction Prediction Model using Python2-14-1525751508-abs.1.IJCSEITRJUN20181.pdfSrishti Srivastava et al.,1-8
4942018-06-308-2IJCSEITRJUN20182Review on Smart Healthcare Systems using Cloud and Big Data Analysis2-14-1525751713-abs.2.IJCSEITRJUN20182.pdfPrachi. D. Junwale et al.,9-14
4952018-06-308-2IJCSEITRJUN20183A Case Study Of Existing Quality Model Based On Defects & Tests Management Of Embedded Software System 2-14-1528954964-abs.3.IJCSEITRJUN20183.pdfAbhishek Anurag et al.,15-30
4962018-06-308-2IJCSEITRJUN20184Multisite Software Development with Ontology: A Review2-14-1525752677-abs.04.IJCSEITRJUN20184.pdfHemant H. Patel & Nitesh M. Sureja31-36
4972018-06-308-2IJCSEITRJUN20185Particles Swarm Optimization Techniques : Principle, Comparison & Application2-14-1525753073-abs.5.IJCSEITRJUN20185.pdfP. Sanyasi Naidu et al.,37-48
4982018-06-308-2IJCSEITRJUN20186The Development of Earthquake Visualization Data Mapping in Indonesia Period 2014 - 20162-14-1525754140-abs.6.IJCSEITRJUN20186.pdfHendy Tandi & Friska Natalia49-60
4992018-06-308-2IJCSEITRJUN20187Nature Inspired Algorithms for Test Suite Optimization for Regression Testing: An Investigation2-14-1525926827-abs.7.IJCSEITRJUN20187.pdfChetan J. Shingadiya et al.,61-68
5002018-06-308-2IJCSEITRJUN20188The Effectiveness of Data Mining in Query Optimization2-14-1526637134-abs.8.IJCSEITRJUN20188.pdfHassanien Mohammed Naji et al.,69-76
5012018-06-308-2IJCSEITRJUN20189Enhanced K Strange Points Clustering Using BAT Inspired Algorithm2-14-1527567415-abs.9.IJCSEITRJUN20189.pdfTerence Johnson et al.,77-82
5022018-06-308-2IJCSEITRJUN201810Evolutionary Computation based Optimization Technique For Minimum Vertex Cover2-14-1527075423-abs.10.IJCSEITRJUN201810.pdfShet Reshma Prakash83-90
5032018-06-308-2IJCSEITRJUN201811Tabhouse2-14-1528951041-ABS.11.IJCSEITRJUN201811.pdfFaizul haque Zeya et al.,91-102
5042018-08-318-3IJCSEITRAUG20181Leukemia Prediction using Random Forest Algorithm2-14-1530352140-abs.1.IJCSEITRAUG20181.pdfNora Naik & Peter Braganza et al.,1-8
5052018-08-318-3IJCSEITRAUG20182Securing Encrypted Shares Using Steganography2-14-1530850662-abs.2.IJCSEITRAUG20182.pdfNora Naik & Pratik Nayak et al.,9-16
5062018-08-318-3IJCSETIRAUG20183Search Engine Optimization Page Rank Algorithm2-14-1531896238-ABS.3.IJCSETIRAUG20183.pdfKetan Sarvakar et al.,17-24
5072018-08-318-3IJCSETIRAUG20184Automization of Agriculture Products Defect Detection and Grading using Image Processing System2-14-1532774121-abs.4.IJCSETIRAUG20184.pdfGauri Deepak Patne & P. A. Ghonge25-32
5082018-08-318-3IJCSETIRAUG20185Intelligent Facial Recognition and Retrieval from Facial Image Databases2-14-1533965051-ABS.5IJCSETIRAUG20185.pdfB. Kalaiselvi & G. S. Anandamala33-38
5092018-10-318-4IJCSETIROCT20181An Adaptive Scheme Over Text Streams for Real-Time Monitoring 2-14-1535173051-ABS.1IJCSETIROCT20181.pdfCH. Hymavathi et al.,1-6
5102018-10-318-4IJCSEITROCT20182Pleasure or Displeasure: A Solution for Customers’ Satisfaction2-14-1536400019-abs.2.IJCSETIROCT20182.pdfMuhammad Zumair et al.,7-12
5112018-10-318-4IJCSEITROCT20183Privacy Preserving for Numeric Data Query in Cloud Computing2-14-1537175976-abs.3.IJCSEITROCT20183.pdfB. Spandana et al.,13-20
5122018-10-318-4IJCSEITROCT20184The Selection of Informative Features2-14-1537428139-abs.4.IJCSEITROCT20184.pdfMamatov N. S et al.,21-30
5132018-12-318-5IJCSEITRDEC20181Text-To-Speech System for Telangana State Languages 2-14-1542274094-ABS.1.IJCSEITRDEC20181.pdfM. Nagamani et al.,1-6
5142019-06-309-1IJCSEITRJUN20191The Scheme Programming Language 2-14-1548910224-abs.1IJCSEITRJUN20191.pdfSmita Desai et al.,1-10
5152019-06-309-1IJCSEITRJUN20192Implementation of Stress Detection System 2-14-1552548894-abs2IJCSEITRJUN20192.pdfMrunal Sawant et al.,11-14
5162019-06-309-1IJCSEITRJUN20193An Energy Efficient Cluster Formation Protocol for Multi-Hop Wireless Sensor Networks Using Fuzzy Logic 2-14-1555066091-abs3IJCSEITRJUN20193.pdfP. Chitralingappa et al.,15-24
5172019-06-309-1IJCSEITRJUN20194The Impact of Computer Information Systems on the Adequacy of Institutional Work (Case Study) 2-14-1555910495-abs.4.IJCSEITRJUN20194.pdfNidal Al Said25-30
5182019-06-309-1IJCSEITRJUN20195The Driver for the Scull_Open Discovery Function, Read / Write Scull_Read / Scull_Write For a Protected Linux OS2-14-1557215541-abs5IJCSEITRJUN20195.pdfOchilov Nizomiddin Najmiddin Ugli31-42
5192019-06-309-1IJCSEITRJUN20196An Application of Artificial Intelligence with Vector Quantization for Image Compression 2-14-1559039870-abs6IJCSEITRJUN20196.pdfGiridhar Sudi et al.,43-52
5202019-06-309-1IJCSEITRJUN20197Automated Hydroponics System using NFT System and IOT2-14-1559384554-abs7IJCSEITRJUN20197.pdfMalcolm Andrew Madeira et al.,53-62
5212019-12-319-2IJCSEITRDEC20191Digital Voting System Using Blockchain Technology 2-14-1560421294-abs.1.IJCSEITRDEC20191.pdfSnehal Bhogan et al.,1-6
5222019-12-319-2IJCSEITRDEC20192Fault Tolerance in Defence C4I Systems 2-14-1560493168-abs2IJCSEITRDEC20192.pdfSandeep Kumar et al.,7-14
5232019-12-319-2IJCSEITRDEC20193E-Tendering Using Blockchain 2-14-1560494141-abs3IJCSEITRDEC20193.pdfSnehal Bhogan et al.,15-18
5242019-12-319-2IJCSEITRDEC20194Detection and Classification of Brain Tumor Using Naïve Bayes and J482-14-1561107515-abs.4.IJCSEITRDEC20194.pdfNora Naik et al.,19-28
5252019-12-319-2IJCSEITRDEC20195The Design and Developement of Decentralized Digilocker using Blockchain 2-14-1561632900-ABS.5.IJCSEITRDEC20195.pdfAmrita B. Chavan & Dr. K. Rajeswari29-36
5262019-12-319-2IJCSEITRDEC20196Marksheet Verification Using Blockchain 2-14-1562241602-abs.6.IJCSEITRDEC20196.pdfNora Naik et al.,37-46
5272019-12-319-2IJCSEITRDEC20197Fuzzy Logic Approach to Petroleum Products buying Decision in Ghana (A Case of Private Car Owners in Accra, Ghana)2-14-1569493147-abs.7.IJCSEITRDEC20197.pdfJohn Bosco K. Damnyag et al.,47–56
5282019-12-319-6IJCSEITRDEC20198Analytical Survey of Architecture, Features & Functionality of Data Centers in India2-14-1573643321-abs.8.IJCSEITRDEC20198.pdfHardiksinh Rayjada & Dr. Vaishali Parsania57–66
5292020-06-3010–1IJCSEITRJUN20201Regulatory Considerations of Small Satellite Projects: Improving the International Small Satellite Regulatory Framework2-14-1578115871-abs1IJCSEITRJUN20201.pdfAbdourahmane Raimy et al.,1-8
5302020-06-3010–1IJCSEITRJUN20202Apache Spark in Big Data Analytics2-14-1581140045-abs2IJCSEITRJUN20202.pdfGeetika Mathur9-18
5312020-06-3010–1IJCSEITRJUN20203 Big Data with Deep Learning (Supervised Vs. Unsupervised): A Survey 2-14-1583127769-ABS3IJCSEITRJUN20203.pdfAbeer Anwar Al-Qassab et al.,19–30
5322020-06-3010–1IJCSEITRJUN20204A Genetic Algorithm for Test Suite Optimization2-14-1589343788-abs4IJCSEITRJUN20204.pdfChetan J. Shingadiya et al.,31–36
5332020-06-3010–1IJCSEITRJUN20205Malware Detection using Honeypot based on Machine Learning2-14-1590739484-abs5IJCSEITRJUN20205.pdfGK. Chakravarthy et al.,37–44
5342020-06-3010–1IJCSEITRJUN20206A Framework for Protecting Multimedia Content Over Public Cloud from Pirating2-14-1590738704-abs.IJCSEITRJUN20206.pdfT. S. Srinivas et al.,45-60
5352020-06-3010–3IJCSEITRJUN20207An Efficient and Secure Otp Enabled File Sharing Service Over Big Data Environment2-14-1591003181-abs.IJCSEITRJUN20207.pdfChetan Balaji et al.,61-80
5362020-06-3010–3IJCSEITRJUN20208Tracking and Tracing of Fake News: using Machine Learning2-14-1592632475-abs.IJCSEITRJUN20208.pdfSvarna Kothari et al.,81-90
5372020-12-3110–2IJCSEITRDEC20201Employing the Orthogonal Local Preserving Projection for the Framework of Spam Classification2-14-1594382178-abs.IJCSEITRDEC20201.pdfB. Bala Krishnudu et al.,1-18
5382020-12-3110–2IJCSEITRDEC20202E-Learning - A Boon During Covid 192-14-1599547673-2-14-1595241344-IJCSEITRDEC20202.pdfShilpi Gupta et al.,19-26
5392020-12-3110–2IJCSEITRDEC20203Literature Review and Simulation of Robot for Path Planning Obstacle Avoidance (RPPOA) Model in Homeland Environment 2-14-1603259897-ABS3IJCSEITRDEC20203.pdfNisha P. Zode et al.,27–38
5402020-12-3110–2IJCSEITRDEC20204Development of IoT based Smart Sensing System for The Detection of Soil Nutrients and Environmental Condition towards Precision Agriculture2-14-1605587181-abs4IJCSEITRDEC20204.pdfJ. S. Vasanth et al.,39–50
5412020-12-3110–2IJCSEITRDEC20205A Comparative Overview of Different Image Segmentation Techniques 2-14-1605933688-abs5IJCSEITRDEC20205.pdfPriyanka Boolchandani et al.,51–58
5422020-12-3110–2IJCSEITRDEC20206Predicting Covid-19 Intensive Zones in Delhi Using Neighbourhood Clustering2-14-1606111078-abs6IJCSEITRDEC20206.pdfAnand Gangadharan59–66
5432020-12-3110–2IJCSEITRDEC20207Line and Word Segmentation for Arabic Handwritten Text2-14-1607597681-abs.IJCSEITRDEC20207.pdfIskandarova Sayyora Nurmamatovna67-78
5442020-12-3110–2IJCSEITRDEC20208Comparative Study of Different Tools use for Offline Signature Verification System2-14-1608814989-abs.IJCSEITRDEC20208.pdfSyed Ibad Ali et al.,79-88
5452020-12-3110–2IJCSEITRDEC20209Employee Salary Prediction using Multi Model Machine Learning Techniques: A Comparative Analysis 2-14-1608968631-abs9IJCSEITRDEC20209.pdfKrishna Sai et al.,89–104
5462021-06-3011-1IJCSEITRJUN20211Knowledge Based Expert System for Medical Disease Diagnosis2-14-1612433114-abs.IJCSEITRJUN20211.pdfDiksikumari Suthar1-10
5472021-06-3011–1IJCSEITRJUN20212The Process of Multilevel Filtering on Spam Mail2-14-1614059744-abs2IJCSEITRJUN20212.pdfB. Bala Krishnudu* et al.,11–24
5482017-10-317-5IJCSEITROCT20174Recovery of Scattered Data Using Neural Network Approach 2-14-1615359783-abs4IJCSEITROCT20174.pdfMary Jaya V J35–46
5492021-06-3011–1IJCSEITRJUN20213An Efficient Supervised Machine Learning Model Approach for Forecasting of Renewable Energy to Tackle Climate Change2-14-1615800902-ABS3IJCSEITRJUN20213.pdfDrumil Joshi et al.,25–32
5502021-06-3011–1IJCSEITRJUN20214Decision Tree Classifier for a Secure Configuration for the Classification of E-Mails2-14-1616569995-abs.IJCSEITRJUN20214.pdfB. Bala Krishnudu et al.,33-44
5512019-06-309–1IJCSEITRJUN20198Numerical Analysis of Slab with Different Shapes of Openings 2-14-1617003139-abs8IJCSEITRJUN20198.pdfPritpal Kaur et al.,63–70
5522018-06-308-2IJCSEITRJUN201812Fuzzy Comprehensive Evaluation on the Basic ICT Education 2-14-1617096256-abs12IJCSEITRJUN201812.pdfNityashree Nadar et al.,103–112
5532018-06-308-2IJCSEITRJUN201813Heterogeneous Communication in Between Two Wireless Techniques: Bluetooth and Wi-Fi 2-14-1617101429-absIJCSEITRJUN201813.pdfSojwal A. Patil113–122
5542021-06-3011–1IJCSEITRJUN20215Internet of Things: Case Study on Fire Detection System 2-14-1617175492-abs.IJCSEITRJUN20215.pdfCh. Hephzibah et al.,45-52
5552021-06-3011–1IJCSEITRJUN20216A Study on the 5th Generation of Cellular Technology (5G) Era in Internet of Things 2-14-1619775664-abs6IJCSEIERDJUN20216.pdfRaghu Ram Chowdary Velevela et al.,53–74
5562021-06-3011–1IJCSEITRJUN20217Improving Mobile Web Application for College Management System2-14-1620020427-abs.IJCSEITRJUN20217.pdfMagdy Shayboub A. Mahmoud75-90
5572021-06-3011–1 IJCSEITRJUN20218Malware Detection Using Stacking Algorithm 2-14-1620470157-ABS8IJCSEITRJUN20218.pdfGanesh S. et al.,91–94
5582021-06-3011–1IJCSEITRJUN20219Telugu Optical Character Recognition Using Cloud Computing And Python2-14-1620639380-abs9IJCSEITRJUN20219.pdfMahesha C95–106
5592021-06-3011–1 IJCSEITRJUN202110Vocational Training 2-14-1621053749-abs10IJCSEITRJUN202110.pdfSonu Kumar Suman et al.,107-110
5602021-06-3011–1IJCSEITRJUN202111College Events Dissemination System 2-14-1621058251-abs.IJCSEITRJUN202111.pdfRishabh Kedia et al.,111-118
5612021-06-3011–1IJCSEITRJUN202112CNN Model for Image Classification using ResNet2-14-1622524305-abs.IJCSEITRJUN202112.pdfDr. Senbagavalli M et al.,119-128
5622021-06-3011–1IJCSEITRJUN202113Back Propagation Algorithm - A Review 2-14-1623153937-abs.IJCSEITRJUN202113.pdfMrinalini Smita et al.,129-134
5632021-12-3111–2IJCSEITRDEC20211Access Control Lists and Network Address Translation in Network Security2-14-1624526448-abs1IJCSEITRDEC20211.pdfMoulya D M et al.,1–8
5642021-12-3111–2IJCSEITRDEC20212Semantic Search over Wikipedia Documents Meaning of Queries Based Pre-Trained Language Model 2-14-1625200161-ABS2IJCSEITRDEC20212.pdfTharun P9–18
5652021-12-3111–2IJCSEITRDEC20213Advance Technique for Early Detection of Breast Cancer Using Textual Analysis from Digital Mammogram2-14-1625459785-abs3IJCSEITRDEC20213.pdfShawni Dutta et al.,19–28
5662021-12-3111–2IJCSEITRDEC20214Nail Deformities Detection and Classification Using Image Processing Technique2-14-1625480757-abs4IJCSEITRDEC20214.pdfKambar Priyanka et al.,29–36
5672021-12-3111–2IJCSEITRDEC20215Education and Investigation in Computational Science Engineering2-14-1626246270-abs.IJCSEITRDEC20215.pdfDr. Noohi Khan 37-44
5682021-12-3111–2IJCSEITRDEC20216Adhering Agile Methodology in Covid-19 2-14-1626341467-abs6IJCSEITRDEC20216.pdfAnjali Singhal45–50
5692021-12-3111–2IJCSEITRDEC20217GPRS Based Vehicle Tracker in Network System2-14-1626415527-abs.IJCSEITRDEC20217.pdfDr. Yogesh Kumar Sharma et al.,51-56
5702021-12-3111–2IJCSEITRDEC20218Automation of the Education Portal 2-14-1631008544-abs8IJCSEITRDEC20218.pdfT. Yamini Devi et al.,57– 64
5712021-12-3111–2IJCSEITRDEC20219The Android App for Women's Security with Sms Alert 2-14-1631011302-abs9IJCSEITRDEC20219.pdfV. Hima Bindu et al.,65–70
5722021-12-3111–2 IJCSEITRDEC202110National Service Scheme (NSS) for Aknu 2-14-1631855782-abs10IJCSEITRDEC202110.pdfT. Hemanth Rahul et al.,71–80
5732021-12-3111–2IJCSEITRDEC202111Online and Offline Signature Verification with Performance Evaluation2-14-1632726804-abs11IJCSEITRDEC202111.pdfDr. Kusuma Kumari B. M et al.,81– 86
5742022-06-3012–1IJCSEITRJUN20221An Automatic Personality Recognition System Using Time Distributed CNN2-14-1639035342-abs1IJCSEITRJUN20221.pdfNishanth N et al.,1-12
5752022-06-3012–1IJCSEITRJUN20222Covid-19 Detection using Deep Learning with Transfer Learning 2-14-1639036310-abs2IJCSEITRJUN20222.pdfLaxmi Narayana Pondhu et al.,13–18
5762022-06-3012–1IJCSEITRJUN20223Prediction of Diabetes using Random Forest and Xgboost Classifiers 2-14-1641274183-abs3IJCSEITRJUN20223.pdfAnkush Ghosh19–28
5772022-06-3012–1IJCSEITRJUN20224Augmented Reality Restaurant Menu 2-14-1642425994-abs4IJCSEITRJUN20224.pdfMaddimsetty Bullaiaha Tej et al.,29–40
5782022-06-3012–1IJCSEITRJUN20225Process-Oriented Approach for Security Metric – A Proposal for Security Evaluation Model 2-14-1643802223-abs5IJCSEITRJUN20225.pdfSuganthy A41–46
5792022-06-3012–1IJCSEITRJUN20226Deep Learning Algorithms for Convolutional Neural Networks (CNN) Using an Appropriate Cell-Segmentation Method2-14-1644215241-abs6IJCSEITRJUN20226.pdfJalawi Alshudukhi47–60
5802022-06-3012–1IJCSEITRJUN20227Techniques for Indoor Location-Based on Bluetooth Fingerprinting using Artificial Intelligence Algorithms2-14-1644217426-AbsIJCSEITRJUN20227.pdfKhalid Twarishalhamazani 61-70
5812022-06-3012–1IJCSEITRJUN20228Computation of Amazon Stock Price for the Next Decade using Arima and Sarimax Model2-14-1644302189-abs8IJCSEITRJUN20228.pdfHet Trivedi et al.,71–82
5822022-06-3012–1IJCSEITRJUN20229Blockchain Technology: A Revolutionary Solution of Big Data Challenges 2-14-1644559360-abs9IJCSEITRJUN20229.pdfDeepika Kirti et al.,83–88
5832022-06-3012–1IJCSEITRJUN202210Data Retrieval System for Flower Crop Cultivation 2-14-1649153392-abs10IJCSEITRJUN202210.pdfReena Rosy Thomas 89–92
5842022-06-3012–1IJCSEITRJUN202211Question Bank Management System using Artificial Intelligence (Ai)2-14-1651060833-abs11IJCSEITRJUN202211.pdfSangeeta Singh et al.,93–102
5852022-06-3012–1IJCSEITRJUN202212TJPRC2-14-1652250287-dummy.IJMPERD.pdfTJPRC103–108
5862022-06-3012–1IJCSEITRJUN202213Intellectual Modeling of Population Employment in the Labor Market 2-14-1651833750-abs13IJCSEITRJUN202213.pdfM. K. Nurmamatov109–114
5872022-06-3012–1IJCSEITRJUN202214Supply Chain Demand Forecasting using Applied Machine Learning and Feature Engineering 2-14-1652176198-abs14IJCSEITRJUN202214.pdfSandeep Jala et al.,115–122
5882022-06-3012–1IJCSEITRJUN202215Automated System of Exploratory Data Analysis 2-14-1652790643-abs15IJCSEITRJUN202215.pdfSrajan Kumar et al.,123–134
5892022-06-3012–1IJCSEITRJUN202216Implementation and Comparison of Python and Flutter Based QnaChatbot with Cloud Service2-14-1653634089-abs16IJCSEITRJUN202216.pdfChandragiri Balasatish Yadav et al.,135–142
5902022-12-3112–2IJCSEITRDEC20221Multiclass Eye Disease Classification From Fundus Images Using Deep Learning2-14-1662716859-abs1IJCSEITRDEC20221.pdfBhaskar Naik. K et al.,1–12
5912022-12-3112–2IJCSEITRDEC20222Design Frame Work for Survey of Re-Duplication Data from Heterogeneous Data Sources In Cloud Computing Use Machine Learning Algorithms 2-14-1667298331-abs2IJCSEITRDEC20222.pdfB. Narsimhulu et al.,13–18
5922023-06-3013–1IJCSEITRJUN20231A Comparative Study on Rule Based Mining with Linear Model in Automation2-14-1673249084-abs1IJCSEITRJUN20231.pdfBanumathi. P1–6
5932023-06-3013–1IJCSEITRJUN20232tjprc2-14-1680606489-Blank.pdftjprc7–20
5942023-06-3013–1IJCSEITRJUN20233DEEP FAKE DETECTION USING DEEP LEARNING TECHNIQUE2-14-1686892764-IJCSEITRJUN20233ABT.pdfANKUSH GHOSH, SHASHIDHAR T & AJITH PADYANA21–36
5952023-12-3113–2IJCSEITRDEC20231PREDICTION OF SPECIAL LEARNING DISABILITIES IN CHILDREN USING SELF-ATTENTION BASED GENERATIVE PROGRESSIVE NETWORK2-14-1690882748-IJCSEITRDEC20231.pdfYOGITA S. ALONE & Dr.G.R. BAMNOTE1–6
5962023-12-3113–2 IJCSEITRDEC20232PERSONALIZED FASHION RECOMMENDER SYSTEM USING DEEP LEARNING MODELS2-14-1691834898-IJCSEITRDEC20232abt.pdfDr B.VEERA JYOTHI, Dr L. SURESH KUMAR, Dr RAHUL & MR V. JAIPAL REDDY7–14
5972023-12-3113–2 IJCSEITRDEC20233EVALUATING MACHINE LEARNING MODELS FOR PREDICTING FOOD PRICE INFLATION: A GLOBAL PERSPECTIVE2-14-1694621175-IJCSEITRDEC20233abt.pdfLEECHITA G , YOGESH S , VAISHNAVI JAYARAMAN & ARUN RAJ LAKSHMINARAYANAN 15–26
5982023-12-3113–2 IJCSEITRDEC20234COMPUTATIONAL INDIAN ECONOMY: 6 T’S BASED APPROACH2-14-1695642325-IJCSEITRDEC20234aBT.pdfBAIDYANATH RAM & PROF.VIKASH KUMAR SINGH27–32
5992023-12-3113–2 IJCSEITRDEC20235MACHINE LEARNING FOR HASHTAG CLUSTERING USING NLP2-14-1695883435-IJCSEITRDEC20235abt.pdfR. GOWRI SHANKAR RAO, SIVA SANKARI S, YUVARAJ T & JULIET J33–36
6002023-12-3113–2IJCSEITRDEC20236DETECTION OF BREAST CANCER FROM MAMMOGRAM USING DEEP LEARNING TECHNIQUE2-14-1697707294-IJCSEITRDEC20236abt.pdfDIVYAVARSHINI K. S. & DR. V. ANITHA37–56
6012023-12-3113–2IJCSEITRDEC20237OBSTACLES THAT ARE HINDERING AR/VR TECHNOLOGY FROM DEVELOPING MORE QUICKLY AND WINNING OVER CUSTOMERS2-14-1701080713-IJCSEITRDEC20237ABT.pdfAmerah Ansari57–60