1 | 2011-08-31 | 1-1 | | Animation In J2ee Projects - An Overview | tjprcabs43.pdf | Mr. S. Manivannan & Dr. S. Balasubramanian | 10-25 |
2 | 2011-08-31 | 1-1 | | Improve System Performance Using Hibernate | tjprcabs44.pdf | Sharayu Lokhande & Rushali Patil | 26-39 |
3 | 2011-08-31 | 1-1 | | Intelligent Widget Reconfiguration For Mobile Phones | tjprcabs45.pdf | Peter K.K. Loh, C.T. Lau & B.H. Chan | 40-71 |
4 | 2011-08-31 | 1-1 | | Serial And Parallel Implementation Of Shortest Path Algorithm In The Optimization Of Public Transport Travel | tjprcabs46.pdf | Guruprasad Nagraj & Dr. Y S Kumaraswamy | 72-87 |
5 | 2011-08-31 | 1-1 | | Data Protection In A Virtualized Environment - Issues And Solutions | tjprcabs47.pdf | S. Manivannan & Dr. S. Balasubramanian | 1-9 |
6 | 2011-12-31 | 1-2 | | Analyze The Medical Image By, Fuzzy Clustering Algorithms Through Edge Detection Methods | tjprcabs132.pdf | Mr.Papendra Kumar And Mr. Suresh Kumar | 1-8 |
7 | 2011-12-31 | 1-2 | | Design Of An Information Intelligent System Based On Web Data Mining | tjprcabs133.pdf | Lect. Ramesh A. Medar And Prof. A. H. Kulkarni | 9-21 |
8 | 2011-12-31 | 1-2 | IJCSEITRDEC20113 | The Use of Wiki as Collaborative Website in E-Learning Context for University Students | --1450938325-ABS - 4. Comp Sci IJCSEITR - THE USE OF WIKI AS COLLABORATIVE WEBSITE IN E-LEARNING.pdf | Dhaval Gandhi & Abdullah Al-Mamun | 22-40 |
9 | 2011-12-31 | 1-2 | | Optimizing Website Size To Improve Usability Of Website | tjprcabs135.pdf | Dr. G. Sreedhar | 41-49 |
10 | 2011-12-31 | 1-2 | | Software Piracy | tjprcabs136.pdf | D.Seetha Mahalaxmi, Dr. S. Viswanatha Raju &Dr. A. Vinay Babu, | 50-53 |
11 | 2011-12-31 | 1-2 | | The Web Search Engine | tjprcabs137.pdf | Mr.G. Hanumantha Rao | 54-60 |
12 | 2011-12-31 | 1-2 | | Data Mining Application Using Decision Tree And Ann For Predicting Surface Roughness Of End Milling Manufacturing Process | tjprcabs138.pdf | Mr.Vijay Kumar Jha, Dr. Sanjay Kumar Jha & Mr.Prashant Prakash | 61-68 |
13 | 2011-12-31 | 1-2 | | A Review On Various Security Issues And Approaches In Cloud Computing | tjprcabs139.pdf | Mr.Hiren B. Patel & Mr.Dhiren R. Patel | 69-80 |
14 | 2011-12-31 | 1-2 | | Efficient Methodology Of Improving The CDIS For Text Retrievals With An Effective Algorithm For Detection Of Spam Mails Using Thread-Clusters | 2-14-1323165941-abs EFFICIENT METHODOLOGY OF IMPROVING THE CDIS FOR TEXT RETRIEVALS WITH AN EFFECTIVE ALGORITHM FOR DETECTIO.docx | Mr.M. Basavaraju , Dr. R. Prabhakar | 81-136 |
15 | 2011-12-31 | 1-2 | | Image Compression On Scanning Techniques | tjprcabs146.pdf | T. Arumuga Maria Devi, Student, K.K Sherin & Mariadas Ronnie C.P | 137-151 |
16 | 2011-12-31 | 1-2 | | Proposed Model For Requirements Of Epayment Gateways | tjprcabs147.pdf | Prof. Gopi Krishna &
Dr. R. Siva Ram Prasad | 152-168 |
17 | 2011-12-31 | 1-2 | | Video Compression System Based On Joint Predictive Coding | tjprcabs148.pdf | Asst. Prof. T. Arumuga Maria Devi, Ms. C. Eben Exceline, Ms. K.K Sherin & Mr. Mariadas Ronnie C.P | 169-178 |
18 | 2011-12-31 | 1-2 | | Congestion Control With Congestion Free Routers Using Network Border Patrol | tjprcabs149.pdf | Mr.Padmadhar Mishra, Prof. Abha Choubey & Prof. Siddharth Choubey | 179-188 |
19 | 2012-03-31 | 2-1 | | Cloud Computing-Software as Service | tjprcabs224.pdf | Gurudatt Kulkarni, Jayant Gambhir & Rajnikant Palwe | 1-10 |
20 | 2012-03-31 | 2-1 | | Developing Metrics To Optimize Contents Of Website | tjprcabs225.pdf | G. Sreedhar | 11-26 |
21 | 2012-03-31 | 2-1 | | Simplified Coupling Metrics for Object-Oriented Software | tjprcabs362.pdf | V.S.Bidve & Akhil Khare | 27-40 |
22 | 2012-03-31 | 2-1 | | The Role of Digital Certificates in Contemporary Government Systems: The Case of UAE Identity Authority | tjprcabs363.pdf | Ali M. Al-Khouri | 41-55 |
23 | 2012-03-31 | 2-1 | | IAAS - Improving Utilization of Infrastructure Clouds | tjprcabs364.pdf | Sreelatha Mutyala & K. Rajani Devi | 56-68 |
24 | 2012-03-31 | 2-1 | | Medical Image Retrieval System Based on Interactive Genetic Algorithm with User Relevance Feedback | tjprcabs365.pdf | V. Ramachandran & Y. Sowjanya Kumari | 69-90 |
25 | 2012-03-31 | 2-1 | | A Comprehensive Radiographic Database Image Retrieval System for A Computer Aided Diagnosis | tjprcabs367.pdf | V.Ramachandran & E.Srinivasa Reddy | 91-103 |
26 | 2012-03-31 | 2-1 | | Blocking Misbehaving Users in Anonymizing Networks Using Nymble | tjprcabs368.pdf | Lakshmeswari Chennagiri & K. Rajani Devi | 104-114 |
27 | 2012-03-31 | 2-1 | | PKI Technology: A Government Experience | tjprcabs369.pdf | Ali M. Al-Khouri | 115-141 |
28 | 2012-03-31 | 2-1 | | Estimation of Web Proxy Server Cache Size Using G/G/1 Queuing Model | tjprcabs370.pdf | Riktesh Srivastava
| 142-160 |
29 | 2012-06-30 | 2-2 | | A Prototype Large-Scale Hyper Textual Web Search Engine | tjprcabs484.pdf | Megha Mishra, V. K. Mishra & H. R. Sharma | 1-9 |
30 | 2012-06-30 | 2-2 | | Alleviation of Application Layer DDOS Attacks Using Data Specification Module | tjprcabs485.pdf | R. Saravanan, K.Vigneswari, M.Rajalakshmi & S.Suria | 10-17 |
31 | 2012-06-30 | 2-2 | | BOTNET: An Army of Darkness and its Multifaceted Control | tjprcabs486.pdf | Farheen K. Siddiqui & Richa Srivastava | 18-24 |
32 | 2012-06-30 | 2-2 | | Memory Resident Multi-Tree Distributed Database Architecture for Location Independent Personal Telecommunication Number (PTN) | tjprcabs487.pdf | Prachi Shori & Neelabh Sao | 25-32 |
33 | 2012-06-30 | 2-2 | | Named Entity Recognition using Maximum Entropy Model and Hidden Markov Model From Normal Text Documents | tjprcabs488.pdf | A Suresh Babu, Y Venkata Krishna Reddy, Sk Saddam Hussain & A Keerthi Priyanka | 33-39 |
34 | 2012-06-30 | 2-2 | | Real Time LSB Encoding in Audio Steganography with MP3 Decoder | tjprcabs489.pdf | Gayatri.M.Bhandari, R.S. Kawitkar & M.C.Hingane | 40-56 |
35 | 2012-06-30 | 2-2 | | Web Information Extraction using Depta | tjprcabs490.pdf | A.Suresh Babu, Sadia Naureen, M. Umamaheswara Rao & G.Sirisha | 57-63 |
36 | 2012-06-30 | 2-2 | | A DBSCAN Algorithm for Discovering Clusters in Large Spatial Databases with Noise | tjprcabs491.pdf | G T Raju, Sandhya G, Sreeja P B & Adarsh Y V | 64-75 |
37 | 2012-06-30 | 2-2 | | Web Information Extraction using Data Extraction and Label Assignment | tjprcabs492.pdf | A Suresh Babu, A Rakesh, D Bhavitha & M. Pranavi | 76-88 |
38 | 2012-06-30 | 2-2 | | Impulse Noise Reduction in Mammograms using A Combination of Median and Fuzzy Switching Median Filters | tjprcabs552.pdf | D.A. Kulkarni & G.R.Udupi | 89-95 |
39 | 2012-06-30 | 2-2 | | A Comparative Study of Partitioning Techniques in VLDB | tjprcabs571.pdf | C. Subramanian,T. Bhuvaneswari & S.P. Rajagopalan | 96-101 |
40 | 2012-09-30 | 2-3 | | A Study of Feature Selection Methods in Intrusion Detection System: A Survey | 2-14-1346479656-absA Study of feature selection methods in intrusion detection system.pdf | Amrita & P Ahmed | 1-25 |
41 | 2012-09-30 | 2-3 | | ISO 20000 and ITIL & Correlation Between Them | 2-14-1346479921-Abs ISO.pdf | Adesh Chandra | 26-45 |
42 | 2012-09-30 | 2-3 | | Low Complexity Peak Power and Ber Reduction of Ofdm Signal by Symbol Alteration Technique | 2-14-1346480062-Abs Complex power.pdf | S.L.Kotgire & S. B. Deosarkar | 46-53 |
43 | 2012-09-30 | 2-3 | | Theoretical Approaches to Address the Problem of Paying Change | 2-14-1346480197-Abs Address.pdf | Sapan H Mankad | 54-58 |
44 | 2012-09-30 | 2-3 | | Tool for Multi Model Interaction | 2-14-1346480330-Abs Tool For.pdf | Jayanthan & Lakshmi lalitha.K | 59-67 |
45 | 2012-09-30 | 2-3 | | Unstructural Multimedia Data Retrival Model Based on XML Database | 2-14-1346480503-Abs UNSTRUCTURAL.pdf | Dattatray V. Meshram & D. M. Dakhane | 68-75 |
46 | 2012-09-30 | 2-3 | | Visual Cryptography Schemes for Secret Sharing using Meaningful Covering Shares | 2-14-1346480675-Abs visul.pdf | T.Rajitha et al., | 76-85 |
47 | 2012-09-30 | 2-3 | | An Implementation of Computer Graphics as Prepress Image Enhancement Process | 2-14-1346480782-Abs An imp.pdf | Jaswinder Singh Dilawari & Shashi Kumar Dhiman | 86-92 |
48 | 2012-12-31 | 2-4 | | Estimating the Number of Generations in a Human Geneticprocess | 2-14-1354331512-ABS Estimating.pdf | Narendra Bahadur Singh | 1-4 |
49 | 2012-12-31 | 2-4 | | Enhancing User Adoption for Service Oriented Business Model through Semantically Annotated and Extended Association Rule Mining in SLAKY Composer System | 2-14-1354331614-ABS Enhancing.pdf | P. Sandhya & M. Lakshmi | 5-18 |
50 | 2012-12-31 | 2-4 | | Software Exploits of Instruction-Level Parallelism for Supercomputers | 2-14-1354331704-ABS Software.pdf | S. N. Tazi et al. | 19-38 |
51 | 2012-12-31 | 2-4 | | Color and Shape Based Image Retrieval | 2-14-1354332131-ABS Colr.pdf | Hire Dnyanda N & S. S. Katariya | 39-44 |
52 | 2012-12-31 | 2-4 | | Experimental Report to Analyse Human Thoughts on Software Engineering | 2-14-1354332307-ABS Experimental.pdf | Prakrit Trivedi, Anil Kumar Dubey & Vipul Sharma | 45-52 |
53 | 2012-12-31 | 2-4 | | Virtual Machine Development On Core-i7 Using Vmware Workstation | 2-14-1354332454-ABS Virtual.pdf | Tarun Goyal, Ajit Singh & Aakanksha Agrawal | 53-56 |
54 | 2012-12-31 | 2-4 | | Academic Performance Evaluation Using Fuzzy C-Means | 2-14-1354332902-ABS Academic.pdf | Ramjeet Singh Yadav & P. Ahmed | 57-86 |
55 | 2012-12-31 | 2-4 | | Analysis of Hybrid System with ANN Component and Conceptualization of Feasibility for Neural Expert System for Evaluating Motivational Strategies | 2-14-1354333248-ABS Analysis.pdf | Viral Nagori | 87-92 |
56 | 2012-12-31 | 2-4 | | Simulation Based Design of Robotic Arm and Omni Directional Drive Mechanism of Dexto:Eka | --1354524528-abs Simulation.pdf | Sulabh Kumra, Shilpa Mehta & Rajat Saxena | 93-102 |
57 | 2012-12-31 | 2-4 | | Information Technology as a Facilitator for Green Initiatives- A Sectoral Analysis | 2-14-1354690971-ABS Information.pdf | Rekha Mishra | 103-111 |
58 | 2013-03-31 | 3-1 | | LabVIEW Based Realtime Integrated Safety Parameters Monitoring of UAV | 2-14-1355465251-ABS Labview.pdf | Amiya Ranjan Panda, Angshuman Roy, Utpal Mandal & Hare Krishna Ratha | 1-10 |
59 | 2013-03-31 | 3-1 | | Stock Market Trends Prediction Using Neural Network Based Hybrid Model | 2-14-1355736915-ABS Stock.pdf | Asif Ullah Khan & Bhupesh Gour
| 11-18 |
60 | 2013-03-31 | 3-1 | | Qualitative Comparative Study of Various Contrast Enhancement Techniques | 2-14-1355814777-ABS Qualitative.pdf | Ashamdeep Singh & Navdeep Kanwal | 19-24 |
61 | 2013-03-31 | 3-1 | | A Novel Secured Mechanism for Authentication Cookie | 2-14-1355978695-ABS Novel secured.pdf | J. N. V. R. Swarup Kumar & V. Anantharamaiah | 25-30 |
62 | 2013-03-31 | 3-1 | | Empirical Report to Evaluate and Analysis Actual Defect of System | 2-14-1355978913-ABS Empirical.pdf | Prakash Kawar Asawat & Krishan Kant Lavania | 31-38 |
63 | 2013-03-31 | 3-1 | | Efficient Clustering of Dataset Based on Particle Swarm Optimization | --1356009595-ABS Efficient.pdf | Suresh Chandra Satapathy& Anima Naik | 39-48 |
64 | 2013-03-31 | 3-1 | | Amalgamation of Cryptography with Neuro Fuzzy System | 2-14-1356008902-ABS Amalgation.pdf | S. Saravanakumar et al. | 49-60 |
65 | 2013-03-31 | 3-1 | | A Computer Aided Diagnostic System for Classification of Brain Tumors Using Texture Features and Probabilistic Neural Network | 2-14-1356498867-ABS Computer.pdf | Sonali Patil & V. R. Udupi
| 61-66 |
66 | 2013-03-31 | 3-1 | | Image Encryption Techniques: A Critical Comparison | 2-14-1356499631-ABS Image.pdf | Ravi Shanker Yadav, Mhd. Rizwan Beg & Manish Madhava Tripathi
| 67-74 |
67 | 2013-03-31 | 3-1 | | Decision Tree Classifiers with GA Based Feature Selection | 2-14-1357557869-ABS Decision.pdf | Shanta Rangaswamy et al. | 75-84 |
68 | 2013-03-31 | 3-1 | | Design of an Academic Web Portal Providing E-Facilities | 2-14-1357567866-ABS Design of academic.pdf | Pratibha S. Yalagi & Chaitrali S. Dangare | 85-90 |
69 | 2013-03-31 | 3-1 | | Privacy Preserving Data Mining by New “Two Phase SVD Matrix Factorization Model” | 2-14-1357720891-ABS Privacy.pdf | Bhupesh Gour, Asif Ullah Khan& Priyank Jain
| 91-94 |
70 | 2013-03-31 | 3-1 | | Prediction of Student Success that are going to Enroll in the Higher Technical Education | --1364470697-ABS Prediction.pdf | Shiv Kumar Gupta, Sonal Gupta & Ritu Vijay | 95-108 |
71 | 2013-03-31 | 3-1 | | Image Compression Using Clustering Techniques | 2-14-1357809524-ABS Image Compression.pdf | Divya Mohan & Nisha Joseph | 109-116 |
72 | 2013-03-31 | 3-1 | | Quality of Services (QoS) Evaluation in Adhoc Networks using Source-Initiated On-Demand Routing Algorithms | 2-14-1358407697-ABS Quality.pdf | Paramjit Singh, Ajay K Sharma & T S Kamal | 117-122 |
73 | 2013-03-31 | 3-1 | | A Web Search Approach for Binary String in XML Data | 2-14-1358839615-ABS A Web.pdf |
B. A. Jadhawar, A. S. Tamboli & S. S. Palkar
| 123-132 |
74 | 2013-03-31 | 3-1 | | Cloud Based Collaboration System | 2-14-1358839683-ABS Cloud.pdf | | 133-142 |
75 | 2013-03-31 | 3-1 | | Analysis of a Dynamic Load Balancing in Multiprocessor System | 2-14-1358840382-ABS Analysis.pdf | Mohammad Haroon & Mohammad Husain | 143-148 |
76 | 2013-03-31 | 3-1 | | Cloud Computing with Real Life Case Studies and a New Approach of Solving Security Issues and Putting Data in Cloud | 2-14-1358944419-ABS Cloud computing.pdf | Saurabh Srivastava et al. | 149-154 |
77 | 2013-03-31 | 3-1 | | An Efficient Technique to Enhance Mammogram Image Using Curvelet Transform | 2-14-1359117294-ABS An efficient.pdf | T. A. Sangeetha & A. Saradha | 155-164 |
78 | 2013-03-31 | 3-1 | | Implementation and Evaluation of K-Means, KOHONEN-SOM, and HAC Data Mining Algorithms Based on Clustering | 2-14-1359535932-ABS Implementation.pdf | Kapil Sharma & Richa Dhiman
| 165-174 |
79 | 2013-03-31 | 3-1 | | A Scientific Computation on a Peculiar Case of Game Theory in Operations Research | 2-14-1359619285-ABS A Scientific.pdf | K. V. L. N. Acharyulu & Maddi. N. Murali Krishna | 175-190 |
80 | 2013-03-31 | 3-1 | | Implementation and Evaluation of Rule Induction Algorithms in Terms of Accurate and Optimal Results in Data Mining | 2-14-1359714198-ABS Implementation and evaluation.pdf | Kapil Sharma & Heena Sharma
| 191-200 |
81 | 2013-03-31 | 3-1 | | Detection of DDos Attacks Using Source IP Based Entropy | 2-14-1359957531-ABS Detection.pdf | Jaswinder Singh, Monika Sachdeva& Krishan Kumar | 201-210 |
82 | 2013-03-31 | 3-1 | | Partial Decompression Using SAX in XML | 2-14-1360159873-ABS Pzrtial.pdf | Vijay Gulhane & M. S. Ali | 211-216 |
83 | 2013-03-31 | 3-1 | | E-Procurement - A Continuing E-Governance Journey of the State of Andhra Pradesh - towards Cost-Saving & Transparency in Government’s Procurement | 2-14-1360302901-ABS E-Procurement.pdf | Challa Radhakumari | 217-232 |
84 | 2013-03-31 | 3-1 | IJCSEITRMAR201327 | Different Security Issues over MANET | --1424347651-ABS - 27.Comp Sci - IJCSEITR - Different security - Pratik Gite.pdf | Pratik Gite & Sanjay Thakur | 233-238 |
85 | 2013-03-31 | 3-1 | | A Study on Clinical Prediction Using Data Mining Techniques | --1360569488-ABS A Study.pdf | V. Krishnaiah, G. Narsimha & N. Subhash Chandra | 239-248 |
86 | 2013-03-31 | 3-1 | | Applications of Rewriting Cyclic Normal Automata in Adaptive Signal Processing | 2-14-1360936200-ABS - 28. Comp Sci- Application.pdf | U. M. Fernandes Dimlo & E. G. Rajan
| 249-256 |
87 | 2013-03-31 | 3-1 | | Generation and Allocation of Subscriber Numbers for Telecommunication | --1361623819-ABS Generation.pdf | A.S. Syed Fiaz et al. | 257-266 |
88 | 2013-03-31 | 3-1 | | Data De-Identification Tool for Privacy Preserving Data Mining | --1361789321-ABS Data deidentification.pdf | Snehal M. Nargundi & Rashmi Phalnikar | 267-276 |
89 | 2013-03-31 | 3-1 | | Audio Encryption and Image Watermarking in Video | 2-14-1361801207-ABS Audio.pdf | Amit R. Dengre, A. D. Gawande & A. B. Deshmukh
| 277-284 |
90 | 2013-03-31 | 3-1 | | Business Intelligent Model for Managing and Controlling Police Patrols Energy | 2-14-1361855806-ABS Business.pdf | Ben Bella S. Tawfik, Abdel-Fatah A. Hegazy & Hany M. Fawzy Ibrahim | 285-292 |
91 | 2013-03-31 | 3-1 | | Image Enhancement Processing Using Anisotropic Diffusion | --1362133493-ABS Image enhancement.pdf | Qasima Abbas Kazmi, Krishna Kant Agrawal & Vimal Upadhyay | 293-300 |
92 | 2013-03-31 | 3-1 | | A New Approach for Despeckling of Medical Ultrasound Images | 2-14-1361882453-ABS A New Approach.pdf | Neha Sharma & Sukhpreet Kaur | 301-306 |
93 | 2013-03-31 | 3-1 | | Neutrosophic Filters | 2-14-1361883728-ABS Neutroscopic filters.pdf | A. A. Salama & H. Alagamy | 307-312 |
94 | 2013-03-31 | 3-1 | | Discovery and Analysis of Web Usage Mining | 2-14-1362378853-ABS Discovery.pdf | Marathe Dagadu Mitharam | 313-320 |
95 | 2013-03-31 | 3-1 | | Application of Simulation and Intelligent Agents to Solve Project Management Problem | 2-14-1362398378-ABS Application of.pdf | K. A. Aksyonov & A. S. Antonova | 321-330 |
96 | 2013-03-31 | 3-1 | | Effective Implementation of Distance Education Using Data Mining | 2-14-1362556317-ABS Effective implementation.pdf | Jatinderpal Singh et al. | 331-340 |
97 | 2013-03-31 | 3-1 | | Filepro: File Protection on File ServersUsing Linux Kernel Module | 2-14-1362652226-ABS Filepro.pdf | Waiel M. Youssif & Noureldien A. Noureldien | 341-350 |
98 | 2013-03-31 | 3-1 | | Adaptive Fault Tolerant Service Provisioning [AFTSP] Strategy for Cloud Environment | 2-14-1362829941-ABS Adaptive fault.pdf | M Dakshayini, P Jayarekha & H S Guruprasad | 351-360 |
99 | 2013-03-31 | 3-1 | | Modern Software Design Relating to Vitruvius | 2-14-1363154686-ABS Modern Software.pdf | Josh Siemanowicz | 361-368 |
100 | 2013-06-30 | 3-2 | | New Image Steganography Method by Matching Secret Message with Pixels of Cover Image (SMM) | --1364018908-ABS New image.pdf | Abdelmgeid Amin Ali & Al – Hussien Seddik Saad | 1-10 |
101 | 2013-06-30 | 3-2 | | Advanced Encoding Technique for Scanned Multifaceted Manuscripts Using Clustering Techniques | 2-14-1363952286-ABS Advanced encoding.pdf | Nisha Joseph & Divya Mohan | 11-18 |
102 | 2013-06-30 | 3-2 | | Analyzing EEG Data for Cognitive Behaviour Using EEGLAB through Data Mining | 2-14-1364035019-ABS Analysing EEG Data.pdf | Parneet Kaur & Sheveta Vashisht | 19-26 |
103 | 2013-06-30 | 3-2 | | Analysis of Different Clustering Techniques for Detecting Human Emotions Variation through Data Mining | 2-14-1364197909-ABS Analysis of different.pdf | Jaskaran Kaur & Sheveta Vashish | 27-36 |
104 | 2013-06-30 | 3-2 | | A Questionnaire Based Tool for Evaluating the Impact of Privacy Decisions in Cloud Computing | 2-14-1364313190-ABS A Questionnaire.pdf | Ishan Rastogi, Adesh Chandra & Anurag Singh | 37-46 |
105 | 2013-06-30 | 3-2 | | Evaluation of Intrusion Detection Techniques and Algorithms in Terms of Performance and Efficiency through Data Mining | 2-14-1364458219-ABS Evaluation of intrusion.pdf | Prabhdeep Kaur & Sheveta Vashisht | 47-54 |
106 | 2013-06-30 | 3-2 | | A Significant Approach on a Special Case of Game Theory | 2-14-1364458311-ABS A Significant.pdf | K. V. L. N. Acharyulu et al. | 55-78 |
107 | 2013-06-30 | 3-2 | | Design and Development of Online Hospital Management Information System | 2-14-1364466960-ABS Design and development.pdf | Harpreet Kaur & Dinesh Grover | 79-88 |
108 | 2013-06-30 | 3-2 | | A Comparative Survey on Various Route Recovery Schemes in MANET | 2-14-1364554664-ABS A Comparative study.pdf | Pooja & Ajay Dureja | 89-96 |
109 | 2013-06-30 | 3-2 | | A Spatial Domain Image Superresolution Approach for Soybean Leaf Diseased Image | 2-14-1364557272-ABS A Spatial.pdf | Sanket B.Kasturiwala & S.A.Ladhake | 97-106 |
110 | 2013-06-30 | 3-2 | | Detection and Extraction of Text in Video - A Survey | 2-14-1364902636-ABS Detection and extraction.pdf | Megha Khandelwal, Bhupendra Kumar & Tushar Patnaik | 107-112 |
111 | 2013-06-30 | 3-2 | | Comparison of Clustering Based on Search Engine Dataset Using Tanagra and Weka | 2-14-1364977182-abs Comparison of clustering.pdf | Preeti Bansal & Md. Ezaz Ahmed | 113-122 |
112 | 2013-06-30 | 3-2 | | Analysis of Web Server Log by Web Usage Mining for Extracting Users Patterns | --1365401767-ABS Analysis of web server.pdf | Om Kumar C.U. & P. Bhargavi | 123-136 |
113 | 2013-06-30 | 3-2 | | SOM (System on Module) Based Count Down Time Distribution and Reception Unit | 2-14-1364985025-ABS SOM Based.pdf | Amit Sardar, Amiya Ranjan Panda & Biswajit Biswas | 137-142 |
114 | 2013-06-30 | 3-2 | | Clustering of Web Usage Data Using Fuzzy Tolerance Rough Set Similarity and Table Filling Algorithm | 2-14-1364991396-ABS Clustering of web usage.pdf | T. Vijaya Kumar & H. S. Guruprasad | 143-152 |
115 | 2013-06-30 | 3-2 | | An Overview of Biometric System | 2-14-1365406842-ABS An overview.pdf | A. M. Bojamma, B. Nithya & Prasad. C. N | 153-160 |
116 | 2013-06-30 | 3-2 | | Natural Language to SQL Conversion System | 2-14-1365407872-ABS Natural language.pdf | Anil M. Bhadgale et al. | 161-166 |
117 | 2013-06-30 | 3-2 | | Fingerprint Indexing and Verification | 2-14-1365675061-Abs - 16. Comp - Fingerprint - Lalhmingliana.pdf | Lalhmingliana, D K Bhattacharyya & KSH Robert Singh | 167-176 |
118 | 2013-06-30 | 3-2 | | Data Mining Techniques for Financial Data | 2-14-1365763481-ABS Data mining techniques.pdf | Sonalika Papneja, Sanjeev Tomar & S. P. Singh | 177-182 |
119 | 2013-06-30 | 3-2 | | Memetic Algorithm a Metaheuristic Approach to Solve RTSP | 2-14-1365858899-ABS Memetic algorithm.pdf | Nitesh M Sureja & Bharat V Chawda | 183-186 |
120 | 2013-06-30 | 3-2 | | Distortion Free Fragile Watermarking Technique for Medical Images | 2-14-1366011270-ABS Distrotion free frgile.pdf | Shaik. Basheera, P. V. Naganjaneyulu & N. Renuka | 187-192 |
121 | 2013-06-30 | 3-2 | | Data Mining for Credit Card Risk Analysis: A Review | 2-14-1366011459-ABS Data mining -credit.pdf | Smriti Srivastava & Anchal Garg | 193-200 |
122 | 2013-06-30 | 3-2 | | A Novel Method of Estimating Facial Features Using Taalamana System | 2-14-1366033653-ABS A Novel method.pdf | Manimala S & C.N. Ravi Kumar | 201-208 |
123 | 2013-06-30 | 3-2 | | Resolving Multiple Travelling Salesman Problem Using Genetic Algorithms | 2-14-1366260370-ABS Resolving multiple.pdf | Harpreet Singh & Ravreet Kaur | 209-212 |
124 | 2013-06-30 | 3-2 | | Survey on Incentive Mechanism | 2-14-1366350268-ABS A Survey on incentive.pdf | Priyanker Shipley & Vinay Kumar | 213-218 |
125 | 2013-06-30 | 3-2 | | Using Web Technology for Collaborative Learning in Engineering Education | 2-14-1367217984-ABS Using web technology.pdf | B. Maruthu Kannan & B. G. Barki | 219-226 |
126 | 2013-06-30 | 3-2 | | A New Approach for Improving Performance of Distributed Data Clustering | 2-14-1367656787-ABS A New approach.pdf | Kamakshi Pundir, Sunita Sangwan & Aman Dureja | 227-234 |
127 | 2013-06-30 | 3-2 | | Performance Comparison of Αlpha-Βeta-Gamma Filter and Kalman Filter for Tracking Targets Using Radar Measurements | 2-14-1367658287-ABS Performance comparison ..pdf | S. M. Sahoo et al. | 235-242 |
128 | 2013-06-30 | 3-2 | | A Data Mining Approach for Association Rule from XML Data Uisng Xquery | 2-14-1367668512-ABS A Data mining.pdf | Padmavalli Mesa | 243-252 |
129 | 2013-06-30 | 3-2 | | Introduction to the Implementation of Database through Universal Networking Language Structure | 2-14-1367673535-ABS Introduction to the.pdf | Khaled Bin Yousuf et al. | 253-260 |
130 | 2013-06-30 | 3-2 | | MDVMI: A System for Analyzing and Visualizing Multidimensional Relational Database for Medical Images | 2-14-1367826562-ABS MDVM 1.pdf | Jagbir Singh Gill & Kulvinder Singh Mann | 261-272 |
131 | 2013-06-30 | 3-2 | | Categorization of Music by Extracting Features from Affective Audio through Data Mining | 2-14-1367848756-ABS Categorization of.pdf | Meenu &Sheveta Vashisht | 273-282 |
132 | 2013-06-30 | 3-2 | | Estimating Reliability of Software System Using Object-Oriented Metrics | 2-14-1367992414-ABS Estimating reliability.pdf | Johny Antony P & Harsh Dev | 283-294 |
133 | 2013-06-30 | 3-2 | | High Compaction Coarse Grained Job Scheduling in Grid Computing | 2-14-1368006140-ABS High compaction.pdf | Abhinav Srivastava, Rituraj Rathore & Raksha Sharma | 295-302 |
134 | 2013-06-30 | 3-2 | | E- Janraj- Smart Governance at Municipal Level | 2-14-1368186962-ABS E-Janraj.pdf | Ridhima Jain & Tarun Shrimali | 303-316 |
135 | 2013-06-30 | 3-2 | | Cloud Computing in Rural Educational Sector:Enlightening Benefits and Challenges | 2-14-1368255307-Abs-Cloud.pdf | Sumit K. Bide & Manoj B. Patil | 317-322 |
136 | 2013-06-30 | 3-2 | | Software Copy Protection by Using Monotone Digital Signatures | 2-14-1368256026-Abs-Software copy.pdf | Abhishek Tripathy & Shiv Singh Sarangdevot | 323-328 |
137 | 2013-06-30 | 3-2 | | Content-Based Image Retrieval (CBIR) System Aided Tumor Detection | 2-14-1368256652-Abs-Content based.pdf | Shahira M. Habashy | 329-340 |
138 | 2013-06-30 | 3-2 | | A Survey on GIS Based Decision Support Systems | 2-14-1368697498-ABS A Survey on GIS.pdf | Banita Chadha, Neha Agarwal & Umanath Vishwakarma | 341-350 |
139 | 2013-06-30 | 3-2 | | Review of the Journey from DES to AES | 2-14-1368704430-ABS Review of the journey.pdf | Neeta Wadhwa, Syed Zeeshan Hussain & S. A. M Rizvi | 351-366 |
140 | 2013-06-30 | 3-2 | | Analysis of the Factors Affecting the Distribution of Chimney Emissions to the Atmosphere – Simulation Approach | 2-14-1368706734-ABS Analysis of the factors.pdf | Ben Bella S. Tawfik & M. M. El-Gazar | 367-378 |
141 | 2013-06-30 | 3-2 | | Semantics Based Distributed Document Clustering: Proposal | 2-14-1368860320-ABS Semantics based.pdf | Neepa Shah & Sunita Mahajan | 379-388 |
142 | 2013-06-30 | 3-2 | | Intrusion Detection System and its Types in MANET | 2-14-1369044007-ABS Intrusion Detection.pdf | Himanshu & Parveen Bano | 389-394 |
143 | 2013-06-30 | 3-2 | | Enhancement of Security Feature in Graphical Password Authentication | 2-14-1369051341-ABS Enhancement of security.pdf | Lovey Rana & Om Pal | 395-402 |
144 | 2013-06-30 | 3-2 | | A Review Report on Fingerprint Image Enhancement Filter | 2-14-1369310830-ABS A Review Report.pdf | Dinesh Kumar Misra, S. P. Tripathi & Dipak Misra | 403-416 |
145 | 2013-06-30 | 3-2 | | Selection and Prioritization of Test Cases in Regression Testing of Web Services | --1370002375-ABS Selection and prioritization.pdf | Neha Agarwal & Manali Gupta | 417-424 |
146 | 2013-06-30 | 3-2 | | Securing Published Data in Cloud Using Data Incognito | 2-14-1369403608-ABS Securing published data.pdf | Vivek Bhushan & Subhash Chand Gupta | 425-438 |
147 | 2013-06-30 | 3-2 | | A Survey on Testing Tools for Web Services | 2-14-1369462116-ABS A Survey on testing.pdf | Yogesh M. Gajmal & Vandana M. Gaikwad | 439-448 |
148 | 2013-06-30 | 3-2 | | ESOA: A Web-Based Expert System for Online Assessment: Prototype Design and Implementation | 2-14-1370415018-ABS ESOA.pdf | Ridip Dev Choudhury, Khurshid Alam Borbora & Shikhar Kumar Sarma | 449-458 |
149 | 2013-08-31 | 3-3 | | Metaphorical Study of Different Techniques for Security System Using Mobile Cloud Computing | 2-14-1370415090-ABS Metaphorical study.pdf | Satyam Gupta, Shailendra Jain & Aparajit Shrivastava | 1-6 |
150 | 2013-08-31 | 3-3 | | Improved Load Efficiency Algorithm in Cloud | 2-14-1370415138-ABS Improved Load efficiency.pdf | Aarti Khetan & Subhash Chand Gupta | 7-14 |
151 | 2013-08-31 | 3-3 | | Automation of Data Validation Testing for QA in the Project of DB Migration | 2-14-1370415186-ABS Automation of data validation.pdf | Priyanka Paygude & P. R. Devale | 15-22 |
152 | 2013-08-31 | 3-3 | | MRI Brain Image Analysis for Tumor Detection Using Optimization Technique | 2-14-1370415222-ABS MRI Brain.pdf | P. Suresh Babu & B. Savitha | 23-28 |
153 | 2013-08-31 | 3-3 | | Assessment of Maintainability Factor | 2-14-1370415259-ABS Assessment of maintainability.pdf | P. Chitti Babu & K. C. K. Bharathi | 29-42 |
154 | 2013-08-31 | 3-3 | | Implementation of Agent-Based Composition of Semantic Web Services with WSIG for MANET | 2-14-1370502982-ABS Implementation of agent.pdf | Monika, Yashpal Singh & S. Niranjan | 43-56 |
155 | 2013-08-31 | 3-3 | | Implementation of Honeypot as an Intrusion Detection System for Wireless Network | 2-14-1370516976-ABS Implementation of honeypot.pdf | Pushpa, Yashpal Singh & S. Niranjan | 57-64 |
156 | 2013-08-31 | 3-3 | | Efficient Approach for Extracting Frequent Pattern and Association Rules with Periodic Constraints | 2-14-1370585710-ABS Efficeint approach.pdf | Varsha Mashoria & Anju Singh | 65-78 |
157 | 2013-08-31 | 3-3 | | Cloud and its Security Concerns | 2-14-1370684223-11.ABS-Computer-Cloud-Neha Bishnoi.pdf | Neha Bishnoi & Anupma Sehrawat
| 79-84 |
158 | 2013-08-31 | 3-3 | | An Identification of Wheat Rust Diseases in Digital Images: A Review | 2-14-1370928240-ABS An identification of wheat.pdf | Hiteshwari Sabrol & Satish Kumar | 85-94 |
159 | 2013-08-31 | 3-3 | | Deterministic Traffic Models Using One Dimensional Cellular Automata | 2-14-1371135772-ABS Deterministic traffic.pdf | Aravindan Anbarasu | 95-100 |
160 | 2013-08-31 | 3-3 | | Resource Monitoring and Utilization in SaaS | 2-14-1371200644-ABS Resource monitoring.pdf | Praveen Reshmalal & S. H. Patil | 101-108 |
161 | 2013-08-31 | 3-3 | | Removal of Noise in the Chili Pepper Images Using Weighted 4-Connected Median Filter | 2-14-1371385104-ABS Removal of noise.pdf | M. Rajalakshmi & P. Subashini | 109- 118 |
162 | 2013-08-31 | 3-3 | | Tracking Vehicle in Aerial Surveillance Using DBN | 2-14-1371465186-ABS Tracking Vehicle.pdf | Harsha C, Rekha B. S & G. N. Srinivasan | 119-126 |
163 | 2013-08-31 | 3-3 | | Empirical Analysis of Test Case Prioritization Techniques in Regression Testing | --1371561487-ABS Empirical Analysis.pdf | K. Kalaivani, A. Saritha & K. Ulagapriya | 127-134 |
164 | 2013-08-31 | 3-3 | | Pose Invariant Face Recognition – A New Technique | 2-14-1371724291-ABS Pose invariant.pdf | S. Muruganantham | 135-140 |
165 | 2013-08-31 | 3-3 | | Removal of Noise in the Chili Pepper Images Using Weighted 4-Connected Median Filter | 2-14-1371891149-ABS Removal of noise in chilli.pdf | M. Rajalakshmi & P. Subashini | 141-150 |
166 | 2013-08-31 | 3-3 | | A Metaheuristic Algorithm ACO of Handwritten Arabic Characters Recognition | 2-14-1372058000-ABS Metaheuristic algorithm.pdf | Majida Ali Abed | 151-168 |
167 | 2013-08-31 | 3-3 | | Medical Decision Support System Using Data Mining Techniques | 2-14-1372060610-ABS Medical decision.pdf | Moheb R. Girgis, Tarek M Mahmoud & Entesar H. Eliwa | 169-184 |
168 | 2013-08-31 | 3-3 | | Secured Steganography Approach Using AES | 2-14-1372154968-ABS Secured Stenography.pdf | Manoj Ramaiya, Naveen Hemrajani & Anil Kishore Saxena | 185-192 |
169 | 2013-08-31 | 3-3 | | Algorithm for Efficient Data Placement in Blobseer Architecture | 2-14-1372228205-ABS Algorithm for efficient.pdf | Madhury Mohandas & Dhanya P M | 193-200 |
170 | 2013-08-31 | 3-3 | | Iris Recognition System Based on DCT Matrix | 2-14-1372941641-ABS Iris recognition.pdf | Sukhwinder Singh & Ajay Jatav | 201-208 |
171 | 2013-08-31 | 3-3 | | A Novel Recommendation System using Rough Set Clustering and Closed Sequential Pattern Mining | --1373288224-ABS A Novel recommendation.pdf | Mitchell D’Silva & Deepali Vora | 209-216 |
172 | 2013-08-31 | 3-3 | | E-Configuration and E-Management of Power Server through Scalable Web-Based Technology | --1373440382-ABS E-Configuration and E-Management.pdf | Dakshayini M, Anil B. S. & Radhika.K.R | 217-226 |
173 | 2013-08-31 | 3-3 | | One-Dimensional Cutting Stock Problem (1D-CSP) with First Order Sustainable Trim: A Practical Approach | 2-14-1373542731-ABS One dimensional.pdf | P. L. Powar et al. | 227-240 |
174 | 2013-08-31 | 3-3 | | Impact of G.P on Networks - A Computational Study on Case (II) | 2-14-1374054329-ABS Impact of G.P.pdf | K. V. L. N. Acharyulu & Nagu Vadlana | 241-250 |
175 | 2013-08-31 | 3-3 | | Trend Analysis in Spatio-Temporal Using SOFM | 2-14-1374301826-ABS Trend Analysis.pdf | Archana Yadav & Archana Lala | 251-258 |
176 | 2013-08-31 | 3-3 | | Scheduling Approach for Load Balancing in Grid Computation System | --1374316961-ABS Scheduling approach.pdf | Prakash Kumar, Pradeep Kumar & Vikas Kumar | 259-266 |
177 | 2013-08-31 | 3-3 | | Human Tracking and Pose Estimation in Video Surveillance System | 2-14-1374318126-ABS Human tracking.pdf | Neelam V. Puri & P. R. Devale | 267-274 |
178 | 2013-08-31 | 3-3 | | Face Recognition : A Comparative Study of Principal Component Analysis and Difference Component Analysis | 2-14-1374647126-ABS Face recognition.pdf | Shamna P, Tripti C & Paul Augustine | 275-282 |
179 | 2013-08-31 | 3-3 | | Video Watermarking – Embedding Grayscale Messages Using Singular Value Decomposition | 2-14-1374648390-ABS Videomarking.pdf | Ashish M. Kothari & Ved Vyas Dwivedi | 283-292 |
180 | 2013-08-31 | 3-3 | | A Novel Model for Text Document Representation: Application on Opinion Mining Datasets | 2-14-1375094938-ABS A Novel Model.pdf | Asmaa Mountassir, Houda Benbrahim & Ilham Berrada | 293-304 |
181 | 2013-08-31 | 3-3 | | Research in Cloud Security: Problems and Prospects | 2-14-1375100443-ABS Research in cloud.pdf | Vaishali Singh & S. K. Pandey | 305-314 |
182 | 2013-08-31 | 3-3 | | Making the MANET More Efficient in Energy by Topology Control | 2-14-1375103024-ABS Making the Manet.pdf | Bhavana S. Pansare & Rajesh B. Singh | 315-326 |
183 | 2013-08-31 | 3-3 | | Software Reliability Using Software Metrics and Software Fault Analysis | 2-14-1375163940-ABS Software reliability.pdf | Indu Sharma & Parveen Bano | 327-340 |
184 | 2013-08-31 | 3-3 | | A Novel Technique for Tampering Detection | 2-14-1375684839-ABS A Novel technique.pdf | Nirupma Tiwari, Naveen Hemrajani & Manoj Kumar Ramaiya | 341-346 |
185 | 2013-08-31 | 3-3 | | Software Piracy Control by the Combination of Smart Card, HOSTID and Permanent Processor Name with Cryptography | 2-14-1375691833-ABS Software piracy.pdf | Sk. Abdul Kareem, A. Janardhana Rao & B. Tarakeswar Rao | 347-354 |
186 | 2013-08-31 | 3-3 | | Clustering Based Similarity Measurement Model for Recent Biased Time Series Databases | 2-14-1375855391-ABS Clustering based.pdf | D. Muruga Radha Devi & P. Thambidurai | 355-362 |
187 | 2013-10-31 | 3-4 | | A Complete Preprocessing Methodology for WUM | --1375882315-ABS A Compleye Preprocessing.pdf | Neelambike S et al. | 1-8 |
188 | 2013-10-31 | 3-4 | | A Systematic Approach for Despeckling of Medical Ultrasound Images | 2-14-1376113593-ABS A Systematic approach.pdf | Neha Sharma & Yogesh Kumar | 9-12 |
189 | 2013-10-31 | 3-4 | | Cloud Computing Architecture to Aid Telemedicine | 2-14-1376396547-ABS Cloud computing.pdf | Neha Bishnoi & Anupma Sehrawat | 13-18 |
190 | 2013-10-31 | 3-4 | | Application of Spline Approximation Method to Obtain Locally Minimal Approximate Trim Loss for One-Dimensional Cutting Stock Problem (1D-CSP) | --1377331820-ABS Application of spline.pdf | P. L. Powar, Vinit Jain, Manish Saraf & Ravi Vishwakarma | 19-36 |
191 | 2013-10-31 | 3-4 | | Iris-An Emergent Biometric Technology for Personal Authentication | 2-14-1377509470-ABS Iris an emergent.pdf | Kezia R Badhiti & Sudha Thatimakula | 37-48 |
192 | 2013-10-31 | 3-4 | | Optimized Content Based Image Retrieval Using Genetic Algorithm with Relevance Feedback Technique | --1377589212-ABS Optimized content.pdf | Anita Nanasaheb Ligade & Manisha R. Patil | 49-54 |
193 | 2013-10-31 | 3-4 | | Soft Computing Approaches for Hand Gesture Recognition | 2-14-1377511172-ABS Soft computing.pdf | Manisha Lad, V. V. Shete & S. B. Somani | 55-58 |
194 | 2013-10-31 | 3-4 | | A Model of Measures that Affect Ease of Use of Emerging Technologies in Teaching and Learning in Ghanaian Public Universities | 2-14-1378208905-ABS A Model of measures.pdf | Afia Nyarko Boakye | 59-66 |
195 | 2013-10-31 | 3-4 | | A Study on Association Rules | 2-14-1378273593-ABS A Study on association.pdf | Padmavalli Mesa & Dr.K. Sreenivasa Rao | 67-74 |
196 | 2013-10-31 | 3-4 | | Implementation and Evaluation of Optimal Algorithms Based on Decision Tree & Clustering Algorithms | 2-14-1378278516-ABS Implementation and evaluation.pdf | Satwant Kaur, Rishma Chawla & Varinderjit Kaur | 75-80 |
197 | 2013-10-31 | 3-4 | | Novel Approach for Multimodal Biometric System Using Compressive Sensing Theroy Based Watermarking | --1378450309-ABS Novel approach.pdf | Rohit M. Thanki & Komal R. Borisagar | 81-90 |
198 | 2013-10-31 | 3-4 | | Effective Load Balancing in Cloud Computing Using Genetic Algorithm | 2-14-1378809864-13. Abs Comp Sci - IJCSEITR -Effective - SATYENDRA.pdf | Satyendra Singh Rawat & Umesh Bindal | 91-98 |
199 | 2013-10-31 | 3-4 | | Applying Data Analytics in Increasing Efficiency of Public Distribution Systems | --1378992771-ABS Applying data analytics.pdf | Sheetal Mahajan | 99-104 |
200 | 2013-10-31 | 3-4 | | Data Hiding for Binary Image by Connectivity-Preserving | 2-14-1379508188-ABS Data Hiding.pdf | A. R. Chandekar | 105-112 |
201 | 2013-10-31 | 3-4 | | The BPO Country Competency Model (CCM): A Model Establishing the Relationship and the Degree of Significance of Factors that Drive Competence in the Business Process Outsourcing (BPO) | 2-14-1379594708-ABS The BPO Country.pdf | Ben Ocra & Benjamin Aggrey Ntim | 113-120 |
202 | 2013-10-31 | 3-4 | | Opinion Mining from Text in Movie Domain | 2-14-1379682970-ABS Opinion mining.pdf | Nidhi Mishra & C. K. Jha | 121-128 |
203 | 2013-10-31 | 3-4 | | Face Recognition Using Incremental Principal Components Analysis-Independent Component Analysis (IPCA-ICA) Algorithm | 2-14-1379749952-ABS Face recognition.pdf | P P Rewagad & P S Desai | 129-136 |
204 | 2013-10-31 | 3-4 | | Object Tracking System Using Image Processing | 2-14-1379767747-ABS Object Tracking.pdf | S. P. Rasal, Harsha Ingale & V. S. Shelar | 137-142 |
205 | 2013-10-31 | 3-4 | | Cluster Analysis – An Overview | 2-14-1380090152-ABS Cluster analysis.pdf | Anuradha Bhatia & Gaurav Vaswani | 143-150 |
206 | 2013-10-31 | 3-4 | | Selection of Master Station and Synchronization of Transmission in Quantum Cryptography: A Novel Approach | 2-14-1380091362-ABS Selection of master.pdf | Moloy Dhar, Sandip Tigga, Sourish Mitra & Sayani Chandra | 151-158 |
207 | 2013-10-31 | 3-4 | | Classification of Deforestation Factors Using Data Mining Techniques | 2-14-1380527539-ABS Classification of deforestation.pdf | S. Jyothi, K. Saritha & K. R. Manjula | 159-172 |
208 | 2013-10-31 | 3-4 | | Multiple Regression: A Data Mining Approach for Predicting the Stock Market Trends Based on Open, Close and High Price of the Month | 2-14-1380705947-ABS Multiple regression.pdf | Sachin Kamley, Shailesh Jaloree, R. S. Thakur | 173-180 |
209 | 2013-10-31 | 3-4 | | Preventing Wormhole Attack in Multicast Routing Protocols for MANET | 2-14-1380783705-ABS Preventing wormhole.pdf | Mohanavel S, Suntharam A, Pranev Ram B R & Sashank S | 181-186 |
210 | 2013-10-31 | 3-4 | | Marker Based Watershed Transformation for Image Segmentation | 2-14-1380962129-ABS Marker based.pdf | Aman Kumar Sharma & Anju Bala | 187-192 |
211 | 2013-10-31 | 3-4 | | Secure Data Communication over Network Based on DNA Cryptography | 2-14-1381143788-ABS Secure data.pdf | Atanu Majumder, Tanusree Podder, Subir Saha & Nirmalya Kar | 193-202 |
212 | 2013-10-31 | 3-4 | | Enhanced Document Formatting Using LaTeX Software | 2-14-1381232129-ABS Enhanced document.pdf | Pratik P. Narole et al. | 203-208 |
213 | 2013-10-31 | 3-4 | | An Analysis of Hepatitis C Virus Prediction Using Different Data Mining Techniques | 2-14-1381236626-ABS An analysis of hepatitis.pdf | Ahmed A. A. Radwan, Tarekabd-El-Hafeez & Heba Mamdouh | 209-220 |
214 | 2013-10-31 | 3-4 | | A Perusal on Hadoop Small File Problem | 2-14-1381324008-ABS A Perusual.pdf | Bincy P Andrews & Binu A | 221-226 |
215 | 2013-10-31 | 3-4 | | Optical Character Recognition Using Template Matching(Alphabets & Numbers) | 2-14-1381407981-ABS Optical character.pdf | Rachit Virendra Adhvaryu | 227-232 |
216 | 2013-12-31 | 3-5 | | An Efficient Debugging Tool for Object Oriented System | --1381744136-ABS An efficient debugging.pdf | D. M. Thakore & Tanveer S Beg | 1-10 |
217 | 2013-12-31 | 3-5 | | Image Encryption Using Henon Chaotic Map with Byte Sequence | --1382092835-ABS Image encryption.pdf | N. S. Raghava & Ashish Kumar | 11-18 |
218 | 2013-12-31 | 3-5 | | Cloud Computing: A Data Security Framework | --1382341279-ABS Cloud computing.pdf | Aman Kumar Sharma, Anita Ganpati & Anju Bala | 19-26 |
219 | 2013-12-31 | 3-5 | | Case Study: Scaling Agile Methods Using Retrospective Reviews Process | 2-14-1382106586-ABS Case study.pdf | Saravana K. M, G. N. Basavaraj, Rajkumar & H G Chandrakanth | 27-42 |
220 | 2013-12-31 | 3-5 | | Bisecting Collinear Clustering Algorithm | 2-14-1382349556-ABS Bisecting collinear.pdf | Terence Johnson | 43-46 |
221 | 2013-12-31 | 3-5 | | Survey of Image Segmentation and Classification Using Markov Random Field | 2-14-1382351912-ABS Survey of image.pdf | Vivek Kumar Jain & A. K. Saxena | 47-56 |
222 | 2013-12-31 | 3-5 | | A Novel System for Lossless Modified Compression on Medical Application on DICOM CT Images | --1382519970-ABS A Novel system.pdf | Alka Sharma, Gagangeet Singh Aujla & Jagbir Singh Gill | 57-64 |
223 | 2013-12-31 | 3-5 | | Efficient Intrusion Classification in Network Using Supervised Data Mining Techniques | 2-14-1382944077-ABS Efficient intrusion.pdf | Sushil Kumar Chaturvedi & Anand Jawdekar | 65-76 |
224 | 2013-12-31 | 3-5 | | Live Capturing and Video Tracking | --1383138957-ABS Live capturing.pdf | Anuradha Bhatia & Sachin Bojewar | 77-84 |
225 | 2013-12-31 | 3-5 | | An Efficient Mechanism for Secure Authentication | --1383223003-8._Abs_-_Comp_Sci_-_IJCSEITR_-AN_EFFICIENT_MECHANISM__-_Shrikala_M._Deshmukh_-_OPaid-1.pdf | Shrikala M. Deshmukh & P. R. Devale | 85-94 |
226 | 2013-12-31 | 3-5 | | Name Entity Recognition on Punjabi Language | 2-14-1383725199-9._Abs_-_Comp_Sci_-_IJCSEITR_-NAME_ENTITY_RECOGNITION_-_Kuljot_Singh_-_OPaid.pdf | Kuljot Singh | 95-102 |
227 | 2013-12-31 | 3-5 | | Enabling, Efficient Ranked Keyword Search, Encrypted Files and Uploading on Outsourced Cloud Data | 2-14-1383984882-ABS Enabling efficient.pdf | Doaa Mohsin Majeed, W. Jeberson & I. B.Rajwade | 103-114 |
228 | 2013-12-31 | 3-5 | | Reverse Engineering of Clinical Software and Types of Hazard | 2-14-1384172538-ABS Reverse engineering.pdf | Lalita M. Lokhande & N. V. Kalyankar | 115-128 |
229 | 2013-12-31 | 3-5 | | Routing Scheme Development for Firewall Security in Wireless Ad Hoc Network Using Election Algorithm | 2-14-1384349881-ABS Routing scheme.pdf | Purnima & Aman Singh | 129-138 |
230 | 2013-12-31 | 3-5 | | Selecting Base Stocks for Stock Price Prediction Using Minimum Spanning Tree and Mahalanobis Distance Criteria | 2-14-1384353928-ABS Selecting base stocks.pdf | Vaishnavi Kamat | 139-146 |
231 | 2013-12-31 | 3-5 | | A Comprehensive Analysis of Social Network Mining | 2-14-1384431726-ABS A Comprehensive analysis.pdf | Dipesh P. Joshi & Kamal K. Sutaria | 147-152 |
232 | 2013-12-31 | 3-5 | | Secure and Fast Data Transfer: With Network Coding | 2-14-1384517977-ABS Secure and fast.pdf | Ashvini Jadhav & Shriniwas Gadage | 153-164 |
233 | 2013-12-31 | 3-5 | | A Novel Technique for DWT-SVD Based Secured Image Watermarking | 2-14-1385113860-ABS A Novel technique.pdf | Manoj Kumar Ramaiya, Nirupma Tiwari, Naveen Hemrajani & Richa Mishra | 165-170 |
234 | 2013-12-31 | 3-5 | | An Efficient Structure to Find New Evasion Techniques on Network Intrusion Detection System | 2-14-1385212300-16._Abs_-_Comp_Sci_-_IJCSEITR_-AN_EFFICIENT_STRUCTURE_-_Rutuja_Patil__-_OPaid.pdf | Rutuja R. Patil & P. R. Devale | 171-176 |
235 | 2013-12-31 | 3-5 | | QoS Based Analysis of MDART Using AODV and AOMDV | --1385966294-ABS QOS based.pdf | Jaspreet Singh and Sandeep Singh Kang | 177-184 |
236 | 2013-12-31 | 3-5 | | Integration of GIS Based Decision Support System for Management of Operations and Maintenance of water Network | --1386064862-ABS Integration of GIS.pdf | Vidya Gavekar & V. D. Nandavadekar | 185-194 |
237 | 2013-12-31 | 3-5 | | Performance Analysis of AODV, DSR and OLSR Routing Techniques for Ad-Hoc Mobile Networks | 2-14-1385978107-Abs_-_r_Comp_Sci_-_IJCSEITR_-PERFORMANCE_ANALYSIS_OF_-_Sukhwinder_Kaur_-_Paid.pdf | Sukhwinder Kaur, R K Bansal & Savina Bansal | 195-200 |
238 | 2013-12-31 | 3-5 | | Implimentation of an Efficient Mechanism for Secure Authentication | --1386245835-ABS Implimentation.pdf | Shrikala M. Deshmukh &. P. R. Devale | 201-210 |
239 | 2013-12-31 | 3-5 | | A Comparative Study of Cost Benefit Analysis of Traditional and E-Governance System in Pune City | 2-14-1386063311-ABS A Comparative study.pdf | Manisha A. Kumbhar & Vilas D. Nandavadekar | 211-216 |
240 | 2013-12-31 | 3-5 | | Evaluating Audio Descriptors for Timbre Analysis in Singer Identification Process | 2-14-1386233457-ABS Evaluating audio.pdf | Harshada W. Nikam | 217-222 |
241 | 2013-12-31 | 3-5 | | Develop Object Based Debugging Tool Technique for Improving the Performance of Object Oriented Softwares | --1386251108-ABS Develop object.pdf | D.M.Thakore & Tanveer S Beg | 223-232 |
242 | 2014-02-28 | 4-1 | | Performance Evaluation of Data Classification Using Conventional Classifiers | 2-14-1386760034-ABS Performance evaluation.pdf | S. V. S. Ganga Devi | 1-6 |
243 | 2014-02-28 | 4-1 | | User Satisfaction over Query Result Ranking in Web Database Systems | 2-14-1387008864-ABS USER SATISFACTION OVER.pdf | Pramod Kumar Ghadei & S. Sridhar | 7-16 |
244 | 2014-02-28 | 4-1 | | Digital Watermarking Based on Entropy Calculation & Reverse Biorthogonal DWT | --1387866535-ABS DIGITAL WATERMARKING.pdf | Rohini Sharma & Pallavi Thakur | 17-24 |
245 | 2014-02-28 | 4-1 | | Performance Analysis of Turbo Coded OFDM: Subjected to Different Channels | 2-14-1387358107-ABS Perforamance analysis.pdf | Priti Subramanium & Rajeshree D. Raut | 25-34 |
246 | 2014-02-28 | 4-1 | | A Novel Approach for Fake Access Point Detection and Prevention in Wireless Network | --1387890050-ABS A NOVEL APPROACH FOR FAKE ACCESS.pdf | Sandip S. Thite, Sandeep Vanjale & P. B. Mane | 35-42 |
247 | 2014-02-28 | 4-1 | | An Adaptive Design Pattern to Build Multi-Modal System Architecture in Distributed Environ | --1388060731-ABS 6.cs AN ADAPTIVE.pdf | Ashish Patil, Manjusha Joshi, S. D. Joshi & R. M. Jalnekar | 43-56 |
248 | 2014-02-28 | 4-1 | | Different Operator Using in Edge Detection for Image Processing | 2-14-1388652957-ABS Different operator.full.pdf | Mohini Pandey | 57-62 |
249 | 2014-02-28 | 4-1 | | Pinterest Attraction between Users and Spammers | --1389102053-ABS Pinterst attraction.pdf | Ahmed A. Radwan, Harsha V. Madhyastha, Fatma Omara, Tarek Mahmoud & Enas Elgeldawi | 63-72 |
250 | 2014-02-28 | 4-1 | | Comparative Evaluation for Performance of ANN Techniques in Breast Cancer Detection: An Investigative Approach to Improvement | 2-14-1389165558-ABS Comparative evaluation.pdf | G Anjan Babu & G Sumana | 73-82 |
251 | 2014-02-28 | 4-1 | | Impact of Telecommuting as an Alternative Work Arrangement on Job Satisfaction: A Study in Indian IT and ITEs Organisations | --1390040116-ABS Impact of tele commuting.pdf | Sarit Prava Das, Parna Mishra & Preeti Narendra | 83-94 |
252 | 2014-02-28 | 4-1 | | Acoustic and Phonological Analysis of Homophones of Punjabi Language | --1390045404-ABS Acoustic.pdf | Shipra J. Arora & Rishipal Singh | 95-102 |
253 | 2014-02-28 | 4-1 | | Fingerprint Recognition System Using Support Vector Machine and Neural Network | 2-14-1390373888-ABS Finger print.pdf | Sozan Abdulla Mahmood | 103-110 |
254 | 2014-02-28 | 4-1 | | Distributed Computing & EMR: A Literature Survey | 2-14-1390473177-ABS Distributed computing.pdf | Priti B Kalode & Ashish Sasankar | 111-114 |
255 | 2014-02-28 | 4-1 | | Hybrid Filter with Impulse Detector for Noisy Grey Scale Images | 2-14-1390996878-ABS Hybrid filter.pdf | Sukhwinder Singh & Neelam Rup Prakash | 115-124 |
256 | 2014-02-28 | 4-1 | IJCSEIERDFEB201415 | Improve the Technique of Relevance Feedback for Content-Based Multimedia Archiving by Using Apriori Algorithm | --1392620305-ABS Improve the technique.pdf | Aasma Mujawar & S.P.Kosbatwar | 125-132 |
257 | 2014-02-28 | 4-1 | | Intelligent Recommendation System Using Clustering and Closed Sequential Pattern Mining | 2-14-1391414214-ABS Intelligent recommendations.pdf | Mitchell R. D’Silva & Deepali Vora | 133-140 |
258 | 2014-02-28 | 4-1 | | Angle Based Computation with Cut-Off Algorithm for Moving Target | 2-14-1391685495-ABS Angle based.pdf | R. K. Patra, S. Kaity, J. S. Bharti & J. Ekka | 141-150 |
259 | 2014-02-28 | 4-1 | IJCSEITRFEB201483 | Iterative Algorithm for Extraction and Data Visualization of Hl7 Data | --1392454972-ABS ITERATIVE ALGORITHM FOR EXTRACTION AND DATA.pdf | Mohanjit Kaur, Hardeep Singh Kang & K. S Maan | 151-160 |
260 | 2014-02-28 | 4-1 | IJCSEITRFEB20144 | SOM Based Count Down Time Dissemination System Along with QT Based Count Down Time Reader Application over Ethernet | 2-14-1392304447-ABS SOM based.pdf | Amiya Ranjan Panda, Amit Sardar& Hare Krishna Ratha | 161-166 |
261 | 2014-04-30 | 4-2 | IJCSEITRAPR20142 | Cryptography Using Arithmetic Coding | --1392967329-1. ABS CRYPTOGRAPHY USING ARITHMETIC CODING.pdf | Mayuri V. Chaudhari, Vrushali Choudhari & Krantish Pol | 1-4 |
262 | 2014-04-30 | 4-2 | IJCSEITRAPR20143 | Intrusion Detection System Using Optimal C4.5 Algorithm | --1392975952-2. ABS INTRUSION DETECTION SYSTEM USING OPTIMAL C4.pdf | Sachin Prakash Gavhane & Vijay Maruti Shelake | 5-14 |
263 | 2014-04-30 | 4-2 | IJCSEITRAPR20144 | Human Eye Gadget with New Technology | 2-14-1392973536-3. ABS HUMAN EYE GADGET WITH NEW TECHNOLOGY.pdf | Amol Yadav & Vilas Jadhav | 15-20 |
264 | 2014-04-30 | 4-2 | IJCSEITRAPR20145 | Offline Signature Verification Using Hu’s Moment and Gabor Wavelet Transform | 2-14-1392980087-4. ABS OFFLINE SIGNATURE VERIFICATION USING HU.pdf | Priyanka Bagul & Leena Ragha | 21-30 |
265 | 2014-04-30 | 4-2 | IJCSEITRAPR20146 | Performance Analysis of Computational Imaging | 2-14-1392985645-5. ABS PERFORMANCE ANALYSIS OF COMPUTATIONAL IMAGING.pdf | Nandita Singh & Manoj Sabnis | 31-36 |
266 | 2014-04-30 | 4-2 | IJCSEITRAPR20147 | Simulating the Cooking Processes by Using Simulation and Modelling Technology | 2-14-1392986483-6. ABS SIMULATING THE COOKING PROCESSES BY USING SIMULATION.pdf | Ashwini Lad & Priya Rupchandani | 37-42 |
267 | 2014-04-30 | 4-2 | IJCSEITRAPR20148 | Preventing Botnets by Spot Filter Method | 2-14-1392989957-7. ABS PREVENTING BOTNETS BY SPOT FILTER METHOD.pdf | Dnyaneshwar Shinde & Prashant Sawant | 43-50 |
268 | 2014-04-30 | 4-2 | IJCSEITRAPR20149 | Advanced Approach in Query Refinement Using Refinement Filters from Knowledge Base | --1393395519-8. ABS ADVANCED APPROACH IN QUERY REFINEMENT USING REFINEMENT FILTERS FROM KNOWLEDGE BASE.Pdf | Ralla Suresh & Bikash Chandra Rout | 51-58 |
269 | 2014-04-30 | 4-2 | IJCSEITRAPR201410 | Dashboard Technology Based Solution to Decision Making | 2-14-1393506474-ABS Dashboard technology.Pdf | Mohamed Abd-Elfattah, Turki Alghamdi & Eslam Amer | 59-70 |
270 | 2014-04-30 | 4-2 | IJCSEITRAPR201411 | Image Steganography Using Mandelbrot Fractal | --1393657174-10. ABS IMAGE STEGANOGRAPHY USING MANDELBROT FRACTAL.Pdf | Hardikkumar V. Desai & Apurva A. Desai | 71-80 |
271 | 2014-04-30 | 4-2 | IJCSEITRAPR201412 | Recognition Isolated Word Speech System using HTK | --1393670673-11. ABS ISOLATED WORD SPEECH RECOGNITION SYSTEM USING HTK.Pdf | Shanthi Therese S & Chelpa Lingam | 81-86 |
272 | 2014-04-30 | 4-2 | IJCSEITRAPR20141312 | Disaster Recovery of Exchange Server 2010 Database | --1393668200-12. ABS DISASTER RECOVERY OF EXCHANGE SERVER 2010 DATABASE.Pdf | Suresh L & Nirmala S Guptha | 87-96 |
273 | 2014-04-30 | 4-2 | IJCSEITRAPR201413 | Design and Development of Software Inspection Tool | --1393668813-13. ABS DESIGN AND DEVELOPMENT OF SOFTWARE INSPECTION TOOL.Pdf | Rakhee Kundu & Umesh Kulkarni | 97-108 |
274 | 2014-04-30 | 4-2 | IJCSEITRAPR201414 | Web-Scale Information Extraction from Unstructured and Ungrammatical Data Sources | --1393669981-14 ABS WEB (1).Pdf | Madhavi. K. Sarjare & S. L. Vaikole | 109-114 |
275 | 2014-04-30 | 4-2 | IJCSEITRAPR201415 | Video Copy Detection Using Finger Printing with Fast Image Processing | 2-14-1393683110-ABS Video copy.Pdf | Laxmi Gupta, M. B Limkar, Sanjay M Hundiwale & Sonali Jadhav | 115-126 |
276 | 2014-04-30 | 4-2 | IJCSEITRAPR201416 | About Parallel Computers | 2-14-1393855603-About parallel.Pdf | Zhangissina Gulnur D,Zholymbet B.SH,Shaikhanova A,Baiseitov D,Pavlikov R.V. Magister,Tursinova M. Magister | 127-132 |
277 | 2014-04-30 | 4-2 | IJCSEITRAPR201418 | Identity-Based Cryptography for Secure Mobile Communication | 2-14-1394786445-ABS Identity based.Pdf | Rushikesh Madhukar Bage & Gaurav Digambar Doiphode | 133-142 |
278 | 2014-04-30 | 4-2 | IJCSEITRAPR201419 | Secure Image Sharing with Encryption of Blowfish, AES and RC4 Hybrid Algorithm with Hash Function | --1394891309-ABS Secure image.Pdf | Ravinder Kaur, Pankaj Sharma & Meenakshi Sharma | 143-148 |
279 | 2014-04-30 | 4-2 | IJCSEITRAPR201420 | Frames Filtering with Random Pixel’s Increment and Decrement Approach in an Video Enhancement | 2-14-1395147932-ABS Frames filtering.Pdf | Rupeshwari Rangari & S. D. Deshpande | 149-156 |
280 | 2014-04-30 | 4-2 | IJCSEITRAPR201421 | Brain Controlled Wheelchair for Disabled | 2-14-1395662085-ABS Brain controlled.Pdf | Anupama. H. S, N. K. Cauvery & Lingaraju. G. M | 157-166 |
281 | 2014-04-30 | 4-2 | IJCSEITRAPR201422 | Performance Enhancement of the System through Cloud Computing | 2-14-1395827478-ABS Performance enhancement.Pdf | Shashi Kant Gupta & Neeraj Vimal | 167-176 |
282 | 2014-04-30 | 4-2 | IJCSEITRAPR201424 | A New Modulo n Multiplication Algorithm with Moderate Factors of (2n+2) And (2n+6) | --1396264064-absA NEW MODULO n MULTIPLICATION ALGORITHM WITH MODERATE FACTORS OF (1).Pdf | A. Uma Maheswari & Prabha Durairaj | 177-184 |
283 | 2014-04-30 | 4-2 | IJCSEITRAPR201424 | Hybrid COFI Algorithm for Data Mining | --1396433652-absHYBRID COFI ALGORITHM FOR DATA MINING.pdf | Amol Yadav, Vilas Jadhav, Ankush Pawar & Mohil Pandey | 185-196 |
284 | 2014-04-30 | 4-2 | IJCSEITRAPR201425 | Review of License Plate Recognition (LPR) Using Edge Detection | 2-14-1396436156-ABS Review of license.Pdf | Arun Mittal & Sukhwinder Singh | 197-204 |
285 | 2014-04-30 | 4-2 | IJCSEITRAPR201426 | Study and Comparison of Cryptographic Methods for Cloud Security | --1396606687-ABS - Comp Sci - Study and Comparison - Ashwini Bangar.pdf | Ashwini Bangar & Swapnil Shinde | 205-212 |
286 | 2014-04-30 | 4-2 | IJCSEITRAPR201428 | Espy & Allay of Security Vulnerabilities in Web-Applications based on Java Platform | 2-14-1396680583-ABS ESPY.Pdf | Mohil Pandey, Umesh Kulkarni, Sumit Bhattacharjee & Amol Yadav | 213-222 |
287 | 2014-04-30 | 4-2 | IJCSEITRAPR201430 | Intrusion Protection against SQL Injection Attack and Cross Scripting Attack Using a Hybrid Method | 2-14-1396693155-abs INTRUSION PROTECTION.Pdf | Ashwini Lokare & S. B. Waykar | 189-198 |
288 | 2014-04-30 | 4-2 | IJCSEITRAPR201431 | A Content Based Image Retrieval Using Statistical Technique | --1396701459-absA CONTENT BASED IMAGE RETRIEVAL USING STATISTICAL TECHNIQUE.Pdf | Navneet Kaur, Meenakshi Sharma & Er. Pankaj Sharma | 199-202 |
289 | 2014-04-30 | 4-2 | IJCSEITRAPR201432 | Determining and Blocking of Sybil Users on Online Social Network | 2-14-1396702559-ABS DETERMINING AND BLOCKING.Pdf | Mahendra Eknath Pawar & B. W. Balkhande | 203-210 |
290 | 2014-04-30 | 4-2 | IJCSEITRAPR201432 | Cryptography Combined with Steganography for Encryption: Study and Comparison | 2-14-1396705119-ABS Cryptography.Pdf | Manali Tawde, Heena Parulekar & Swapnil Shinde | 211-218 |
291 | 2014-04-30 | 4-2 | IJCSEITRAPR201433 | ‘Anuvadak’ English to Hindi Text Translator | --1397221443-ABS -CSE- Anuvadak- Sudhir D Bagul.Pdf | Sudhir D Bagul & Uday B Joshi | 219-224 |
292 | 2014-04-30 | 4-2 | IJCSEITRAPR201434 | Development of an Automated Framework to Resolve Software Testing Issues | --1396945701-ABS - 12. Comp Sci - IJCSEITR -Development of an Automated Framework - Manoj Someswar.pdf | Chittineni Aruna & R. Siva Ram Prasad | 225-242 |
293 | 2014-04-30 | 4-2 | IJCSEITRFEB201437 | A Comparative Study on Image Filters for Noise Reduction in Lung CT Scan Images | 2-14-1397181668-absA COMPARATIVE STUDY ON IMAGE FILTERS FOR NOISE REDUCTION IN LUNG CT SCAN IMAGES.pdf | S. Sivakumar & C. Chandrasekar | 243-250 |
294 | 2014-04-30 | 4-2 | IJCSEITRFEB201436 | Speech Recognition of Hindi Phenomes Using MFCC and Bhattacharrya Histogram Distance | 2-14-1397182540-absSPEECH RECOGNITION OF HINDI PHENOMES USING MFCC AND BHATTACHARRYA HISTOGRAM DISTANCE.pdf | Sandeep Kaur, Meenakshi Sharma & Sukhbeer Singh | 251-256 |
295 | 2014-04-30 | 4-2 | IJCSEITRAPR201435 | Cloud Based E-Governance Management System | --1397551530-absCLOUD BASED E.pdf | Awfa Hasan Dakheel & P. Stanley | 257-266 |
296 | 2014-04-30 | 4-2 | IJCSEITRAPR201436 | Survey on Mobility of Sink in Geographic Routing | 2-14-1397807233-absSURVEY ON MOBILITY OF SINK IN GEOGRAPHIC ROUTING.pdf | Shivanka (Priyanka Chugh), H. Abinaya, Rupali Tyagi, Rachita Khurana & Manvi Walia | 267-274 |
297 | 2014-04-30 | 4-2 | IJCSEITRAPR201437 | Dual Congruent Integer Cryptographic Algorithm to Secure Sensitive Information Transient | 2-14-1397819909-absDUAL CONGRUENT INTEGER CRYPTOGRAPHIC ALGORITHM TO SECURE SENSITIVE INFORMATION TRANSIENT.pdf | Yahia S. Al-Halabi | 275-286 |
298 | 2014-06-30 | 4-3 | IJCSEITRJUN20141 | Enhancement of X-Ray Image: A Review | 2-14-1397824078-absENHANCEMENT OF X.pdf | T P Mithun, Sudarshan B G & Abhilashagouda Karigoudar | 1-6 |
299 | 2014-06-30 | 4-3 | IJCSEITRJUN20142 | Studies of Prominent DoS Attacks in the Internet: Their Causes, Preventions and Case Studies | 2-14-1499749364-Abs.2.IJCSEITRJUN20142.pdf | Jovi D’Silva, Kukatlapalli Pradeep Kumar & Balachandran | 7-14 |
300 | 2014-06-30 | 4-3 | IJCSEITRJUN20143 | Fuzzy TOPSIS and Fuzzy VIKOR Methods Using the Triangular Fuzzy Hesitant Sets | --1399040007-absFUZZY TOPSIS AND FUZZY VIKOR METHODS USING THE TRIANGULAR.pdf | A. Umamaheswari & P. Kumari | 15-24 |
301 | 2014-06-30 | 4-3 | IJCSEITRJUN20144 | SPSUC: Slice, Pattern & Style of Ubiquitous Computing | --1399039487-absSPSUC.pdf | A. K. Dubey, Khushbu Gulabani, Rohit Saxena & Rakesh Rathi | 25-38 |
302 | 2014-06-30 | 4-3 | IJCSEITRJUN20145 | Indemnifying the Confidentiality Concern of Cloud Computing through Implementation of a Cipher Cloud | 2-14-1398669495-absINDEMNIFYING THE CONFIDENTIALITY CONCERN OF CLOUD COMPUTING THROUGH IMPLEMENTATION OF A CIPHER CLOUD.pdf | Gurpreet Kaur & Sushil Kamboj | 39-46 |
303 | 2014-06-30 | 4-3 | IJCSEITRJUN20146 | Study on Orphan Processes in the Distributed Systems Environments | 2-14-1398768890-absA STUDY ON ORPHAN PROCESSES IN THE DISTRIBUTED SYSTEMS ENVIRONMENTS.pdf | Limi Kalita & Lakshmi Prasad Saikia | 47-54 |
304 | 2014-06-30 | 4-3 | IJCSEITRJUN20147 | Development of Embedded System Based Colorimeter for the Analysis of Nickel: An Algorithmic Approach | 2-14-1399314113-absDEVELOPMENT OF EMBEDDED SYSTEM BASED COLORIMETER FOR THE ANALYSIS OF NICKEL.pdf | Pravin K. Bhadane, Suchita P. Bhangale & Ranjana P. Bhadane | 55-64 |
305 | 2014-06-30 | 4-3 | IJCSEITRJUN20148 | Clustering Concepts Using for Separated Random Data and MATLAB | 2-14-1399619170-absCLUSTERING CONCEPTS USING FOR SEPARATED RANDOM DATA AND MATLAB.pdf | Pooja Shrivastava & Manoj Shukla | 65-74 |
306 | 2014-06-30 | 4-3 | IJCSEITRJUN20149 | Character and Numerical Recognition System Using Feed Forward and Back Propagation Neural Network | 2-14-1399629135-absCHARACTER AND NUMERICAL RECOGNITION SYSTEM USING FEED FORWARD AND BACK PROPAGATION NEURAL NETWORK.pdf | Bharath Kumar M R & S. Ganeshmoorthy | 75-82 |
307 | 2014-06-30 | 4-3 | IJCSEITRJUN20150 | A Comparative Analysis of the Performance of Cloud Computing with Java and Hadoop | 2-14-1399905039-ABS - Comp Sci - IJCSEITR -A COMPARATIVE ANALYSIS OF THE PERFORMANCE - Dalya Raad Abbas.pdf | Dalya Raad Abbas & Sanjay T. Singh | 83-92 |
308 | 2014-06-30 | 4-3 | IJCSEITRJUN201410 | IDS (Intrusion Detection System) for Multitier Web Application | 2-14-1400238311-ABS - Comp Sci - IJCSEITR -IDS_INTRUSION DETECTION SYSTEM_ for - N A Pawar.pdf | N. A. Pawar & Y. C. Kulkarni | 93-98 |
309 | 2014-06-30 | 4-3 | IJCSEITRJUN201413 | Automatic Metadata Harvesting from Digital Content | 2-14-1400646109-absAUTOMATIC METADATA HARVESTING FROM DIGITAL CONTENT.pdf | Rushabh D. Doshi & Girish H Mulchandani | 99-102 |
310 | 2014-06-30 | 4-3 | IJCSEITRJUN201414 | Fine Grain Level Trust Enhancement between CU and CSP in Replication Jobs | 2-14-1400851879-absFINE GRAIN LEVEL TRUST ENHANCEMENT BETWEEN CU AND CSP IN REPLICATION JOBS.pdf | Sandeep Singh Kang & Hardeep Kaur | 103-112 |
311 | 2014-06-30 | 4-3 | IJCSEITRJUN201415 | A Review of One Time Password Mobile Verification | 2-14-1401024125-absA REVIEW OF ONE TIME PASSWORD MOBILE VERIFICATION.pdf | Shally & Gagangeet Singh Aujla | 113-118 |
312 | 2014-06-30 | 4-3 | IJCSEITRJUN201416 | Data Oriented Perceptual Discontinuity Smoothing Algorithm | 2-14-1401174667-absDATA ORIENTED PERCEPTUAL DISCONTINUITY SMOOTHING ALGORITHM.pdf | Chandra Sekhram Bondu & Ramakrishna S | 119-128 |
313 | 2014-06-30 | 4-3 | IJCSEITRJUN201417 | High Speed Real Time Video Access over Web Sockets | 2-14-1401535383-absHIGH SPEED REAL TIME VIDEO ACCESS OVER WEB SOCKETS.pdf | Shweta Thakur & V. A. Gulhane | 129-138 |
314 | 2014-06-30 | 4-3 | IJCSEITRJUN201419 | Comparative Study of Collaborative Attacks & Security Mechanisms in MANET | 2-14-1401615048-absCOMPARATIVE STUDY OF COLLABORATIVE ATTACKS.pdf | Ajay Dureja & Vandna Dahiya | 139-148 |
315 | 2014-06-30 | 4-3 | IJCSEITRJUN201420 | Secured Steganography Model Using Genetic Algorithm | 2-14-1402035087-absSECURED STEGANOGRAPHY MODEL USING GENETIC ALGORITHM.pdf | Akanksha Gaur, Priyanka Wadhwani & Vipin Jain | 149-158 |
316 | 2014-06-30 | 4-3 | IJCSEITRJUN201421 | Digital Data Encryption Using Modified Method for Point Operations in ECC Using MATLAB | 2-14-1402046908-absDIGITAL DATA ENCRYPTION USING MODIFIED METHOD FOR POINT OPERATIONS IN ECC USING MATLAB.pdf | Mohammed F. Albrawy, Rasheed M. El-Awady & Ali E. Taki El_Deen | 159-170 |
317 | 2014-06-30 | 4-3 | IJCSEITRJUN201422 | Google Glass and Glassware Development Using Rest Architecture | 2-14-1402464766-absGOOGLE GLASS AND GLASSWARE DEVELOPMENT USING REST ARCHITECTURE.pdf | Rohit Saxena, Vipul Kumar, Ashish Guwalani, Anil Dubey & Rakesh Rathi | 171-178 |
318 | 2014-06-30 | 4-3 | IJCSEITRJUN201423 | Detecting Attacks and Prevent Static and Dynamic Websites from those Types of Attack | 2-14-1402723390-absDETECTING ATTACKS AND PREVENT STATIC AND DYNAMIC WEBSITES FROM THOSE TYPES OF ATTACK.pdf | N. A. Pawar & Y. C. Kulkarni | 179-186 |
319 | 2014-08-31 | 4-4 | IJCSEITRAUG20141 | Analyzing Large-Scaled Applications in Cloud Computing Environment | --1403864820-absANALYZING LARGE.pdf | Deepti Singh, Deepti Saraswat & N S Raghava | 1-8 |
320 | 2014-08-31 | 4-4 | IJCSEITRAUG20142 | An Efficient Approach for Job Scheduling in Cloud Computing | 2-14-1403944436-absAN EFFICIENT APPROACH FOR JOB SCHEDULING IN CLOUD COMPUTING11.pdf | Deepti Saraswat, Deepti Singh & N. S. Raghava | 9-14 |
321 | 2014-08-31 | 4-4 | IJCSEITRAUG20143 | A Novel Algorithm for Cleanical Routine Using System Integration of PACS and CBIR | 2-14-1404132229-absA NOVEL ALGORITHM FOR CLEANICAL ROUTINE USING SYSTEM INTEGRATION OF PACS AND CBIR.pdf | Navjot Kaur & K. S. Mann | 15-20 |
322 | 2014-08-31 | 4-4 | IJCSEITRAUG20144 | Control Overhead Energy Efficient Cluster Based Routing Algorithm in MANET | 2-14-1404208269-ABS CONTROL OVERHEAD ENERGY EFFICIENT CLUSTER.Pdf | Ankita Singh Kushwah & Nitin Manjhi | 21-32 |
323 | 2014-08-31 | 4-4 | IJCSEITRAUG20145 | A Survey on Application of Nature Inspired Algorithms | 2-14-1404735737-ABS - 4. Comp Sci - IJCSEITR -A survey On Application Of - Akansha Jain.pdf | S. N. Tazi, Mukesh Gupta & Akansha Jain | 33-40 |
324 | 2014-08-31 | 4-4 | IJCSEITRAUG20146 | Entropy and Interpolation Based Digital Watermarking | 2-14-1404892807-ABS - Comp Sci - IJCSEITR -Entropy and Interpolation - Ruchi Kashyap.pdf | Ruchi Kashyap & Karan Mahajan | 41-46 |
325 | 2014-08-31 | 4-4 | IJCSEITRAUG20147 | A Novel Approach for Multimedia Encryption Based on Confusion and Chaotic Logistic Map | 2-14-1404905032-ABS - Comp Sci -A Novel Approach -Brijesh Kumar Patel.pdf | Brijesh Kumar Patel & N. S. Raghava | 47-58 |
326 | 2014-08-31 | 4-4 | IJCSEITRAUG20148 | A New Approach Towards Information Security Based on DNA Cryptography | 2-14-1405150372-ABS - 7. Comp Sci - IJCSEITR - A NEW APPROACH TOWARDS INFORMATION -ABHISHEK MAJUMDAR.pdf | Abhishek Majumdar & Meenakshi Sharma | 59-68 |
327 | 2014-08-31 | 4-4 | IJCSEITRAUG20149 | A New Approach of Multiagent and Multilevel IDS | 2-14-1405275156-ABS - Comp Sci - IJCSEITR -A NEW APPROACH OF MULTIAGENT - ARPITA BISWAS.pdf | Arpita Biswas & Meenakshi Sharma
| 69-76 |
328 | 2014-08-31 | 4-4 | IJCSEITRAUG201410 | Optimized Fault Tolerance in Real Time Cloud Computing | 2-14-1405416499-ABS - 10. Comp Sci - IJCSEITR - OPTIMIZED FAULT TOLERANCE - Jatinder Kaur.pdf | Jatinder Kaur & Meenakshi Sharma
| 77-84 |
329 | 2014-08-31 | 4-4 | IJCSEITRAUG201411 | Simulation and Optimization of Container Terminal Operations: A Case Study | 2-14-1405417489-ABS - 11. Comp Sci - IJCSEITR -Simulation and Optimization of - GAMAL ABD EL-NASSER A. SAID.pdf | Gamal Abd El-Nasser A. Said, Abeer M. Mahmoud & El-Sayed M. El-Horbaty | 85-94 |
330 | 2014-08-31 | 4-4 | IJCSEITRAUG201412 | Design and Implementation of a Multiple-Valued Logic Fpga Based on Convert–Coded-Collect (Ccci) Space Theory | 2-14-1406379145-ABS - 12. Comp Sci - IJCSEITR -Design and Implementation of A Multiple -Valued - Hisham.pdf | Hisham L. Swady & Dhafer R. Zaghar | 95-102 |
331 | 2014-08-31 | 4-4 | IJCSEITRAUG201413 | Penetration Testing in Wi-Fi Networks | 2-14-1406541329-ABS - 13. Comp Sci - IJCSEITR - Penetration Testing - Shorunke Muyiwa Musaddiq.pdf | Shorunke Muyiwa Musaddiq | 103-120 |
332 | 2014-08-31 | 4-4 | IJCSEITRAUG201414 | Design and Implementation of Dyadic Shift and Graphical Inverse of String Sequences Using Rewriting Cyclic Normal Automaton | 2-14-1406698274-ABS - 14. Comp Sci - IJCSEITR -DESIGN AND IMPLEMENTATION OF DYADIC SHIFT - U.M.FERNANDES DIMLO.pdf | U. M. Fernandes Dimlo & E. G. Rajan | 121-126 |
333 | 2014-08-31 | 4-4 | IJCSEITRAUG201415 | Realization of Arithmetic Operations on Signal Sequences Using Normal Algorithms and Rewriting Cyclic Normal Automaton | 2-14-1406801382-ABS - 15. Comp Sci - IJCSEITR -REALIZATION OF ARITHMETIC OPERATIONS - U.M.FERNANDES DIMLO.pdf | U. M. Fernandes Dimlo & E. G. Rajan | 127-134 |
334 | 2014-10-31 | 4-5 | IJCSEITROCT20141 | A Review on Optimal Methods for Iris Recognition | 2-14-1408342236-ABS - 1. Comp Sci - IJCSEITR - A REVIEW ON OPTIMAL METHODS - Shally.pdf | Shally& Gagangeet Singh Aujla | 1-8 |
335 | 2014-10-31 | 4-5 | IJCSEITROCT20142 | Sentence Level Sentiment Classification Using Hmm with the Help of Part of Speech Tagging | 2-14-1408454427-ABS - 2. Comp Sci - IJCSEITR - SENTENCE LEVEL SENTIMENT - Anurag Mulkalwar.pdf | Anurag Mulkalwar& Kavita Kelkar | 9-12 |
336 | 2014-10-31 | 4-5 | IJCSEITROCT20143 | Implementation of a Convergent B-CVA Based ML Decoder Using Convolutional Tail Biting Trellis | 2-14-1408603971-ABS - 3. Comp Sci - IJCSEITR - Implementation of a Convergent - Momina Kouser.pdf | Momina Kouser & Chandrakala. V | 13-22 |
337 | 2014-10-31 | 4-5 | IJCSEITROCT20144 | Autonomic Brokering for Minimization of Service Level Agreement Violations in Cloud Computing | 2-14-1408708765-ABS -4. Comp Sci - IJCSEITR -Autonomic Brokering-Manpreet Kaur.pdf | Manpreet Kaur, Jaspreet Kaur & Sahil Vashist | 23-30 |
338 | 2014-10-31 | 4-5 | IJCSEITROCT20145 | Efficient Virtual Machines Migration in Cloud Computing | 2-14-1408790053-ABS - 5. Comp Sci - IJCSEITR - EFFICIENT VIRTUAL MACHINES - Jaspreet Kaur.pdf | Jaspreet Kaur, Manpreet Kaur & Sahil Vashist | 31-36 |
339 | 2014-10-31 | 4-5 | IJCSEITROCT20146 | Future Prospects in Community Detection | 2-14-1409137248-ABS - 6. Comp Sci - IJCSEITR - Future Prospects in Community - MINI SINGH AHUJA.pdf | Mini Singh Ahuja& Jatinder Singh | 37-48 |
340 | 2014-10-31 | 4-5 | IJCSEITROCT20147 | A Unique Biometric Combination of Iris and Textual Password Using ICA | 2-14-1409393023-ABS - 7. Comp Sci - IJCSEITR - A UNIQUE BIOMETRIC COMBINATION - Shally.pdf | Shally & Gagangeet Singh Aujla | 49-56 |
341 | 2014-10-31 | 4-5 | IJCSEITROCT20148 | The Development of Binocular Disparity Technique for Printed Circuit Board Defect Inspection | 2-14-1410266705-ABS - 8. Comp Sci - IJCSEITR - The Development of Binocular - Wen-Tzong Lee.pdf | Wen-Tzong Lee & Shyh-Shin Hwang | 57-64 |
342 | 2014-10-31 | 4-5 | IJCSEITROCT20149 | Fingerprint Verification Using Qualitative Reckon to Raise the Effectualness | 2-14-1410428011-ABS - 8. Comp Sci - IJCSEITR - FINGERPRINT VERIFICATION USING - JASLEEN K.SIDHU.pdf | Jasleen K. Sidhu & Gagandeep Singh | 65-72 |
343 | 2014-10-31 | 4-5 | IJCSEITROCT201410 | Optimization and Performance Analysis of TCP Over Various Routing Algorithms in UMTS WCDMA Networks | 2-14-1410785209-ABS - 10. Comp Sci - IJCSEITR - OPTIMIZATION AND PERFORMANCE ANALYSIS OF - NEETU SHARMA.pdf | Neetu Sharma, Vijay Singh Rathore | 73-82 |
344 | 2014-10-31 | 4-5 | IJCSEITROCT201411 | TCP Congestion Control Protocols Over UMTS WCDMA Network | 2-14-1410871007-ABS - 11. Comp Sci - IJCSEITR - TCP CONGESTION CONTROL - NEETU SHARMA.pdf | Neetu Sharma & Vijay Singh Rathore | 83-90 |
345 | 2014-10-31 | 4-5 | IJCSEITROCT201412 | The Effect of Similarity Measures on Genetic Algorithm-based Information Retrieval | 2-14-1411111151-ABS - 12. Comp Sci - IJCSEITR - The Effect of Similarity Measures on Genetic - FATIMA MOHY ELDIN AZZAM.pdf | Moheb Ramzy Girgis, Abdelmgeid Amin Aly & Fatima Mohy Eldin Azzam | 91-100 |
346 | 2014-10-31 | 4-5 | IJCSEITROCT201413 | A Hybrid Method of De-Duplication to Improve Speed and Efficiency | 2-14-1411711077-ABS - 13. Comp Sci - IJCSEITR -A hybrid method of - Preetika Singh.pdf | Preetika Singh & Meenakshi Sharma | 101-106 |
347 | 2014-10-31 | 4-5 | IJCSEITROCT201414 | Security Concern for Virtualization in Cloud Computing | 2-14-1411724023-ABS - 14. Comp Sci - IJCSEITR - Security Concern For Virtualization - Gayatri S KAPADIA.Pdf | Gayatri Shitanshu Kapadia & Ravi M. Gulati | 107-116 |
348 | 2014-10-31 | 4-5 | IJCSEITROCT201415 | HRV Analysis for the Study of Neurological and Cardiac Effects of Alcohol on Youth of India | 2-14-1412168377-ABS - 15. Comp Sci - IJCSEITR-HRV ANALYSIS FOR THE STUDY-D. Mahesh Kumar.pdf | D Mahesh Kumar, Prasanna Kumar S. C, B. G Sudarshan & Yadhuraj S. R | 117-124 |
349 | 2014-10-31 | 4-5 | IJCSEITROCT201416 | An Algorithm of Calculating Insolation for Planets of the Solar System without the Account of Atmospheric Envelope | 2-14-1412678779-ABS - 16. Comp Sci - IJCSEITR -An algorithm of calculating insolation - Khujaev.pdf | Khujaev J. I | 125-132 |
350 | 2014-12-31 | 4-6 | IJCSEITRDEC20141 | Multi-Histogram Equalization Using Error Back Propogation Network (MHEBPN) | 2-14-1415259074-ABS - 1.Comp Sci - IJCSEITR - MULTI-HISTOGRAM EQUALIZATION - Umesh Kumar Sharma.pdf | Umesh Kumar Sharma & Kapil Kumawat | 1-14 |
351 | 2014-12-31 | 4-6 | IJCSEITRDEC20142 | An Algorithm to Detect and Terminate Orphan Process in a Distributed System | 2-14-1416401996-ABS - 2. Comp Sci - IJCSEITR - An Algorithm to Detect and Terminate - Limi Kalita.pdf | Limi Kalita | 15-22 |
352 | 2014-12-31 | 4-6 | IJCSEITRDEC20143 | Highly Secure Images Steganography Techniques Based on LSB, X-Box Mapping and Huffman Encoding | 2-14-1416467431-ABS - 3. Comp Sci - IJCSEITR -Highly Secure Images Steganography - Nitin Kanzaria.pdf | Kanzariya Nitin K, Nimavat Ashish V & Jadeja Vijaysinh K | 23-34 |
353 | 2014-12-31 | 4-6 | IJCSEITRDEC201404 | An Effective Guidance Method for Web Service Selection Using PSO and MA | 2-14-1417004607-ABS - 4. Comp Sci - IJCSEITR -An Effective Guidance Method for - Vijayalaxmi Jeure.pdf | Vijayalaxmi S Jeure & Y. C. Kulkarni | 35-40 |
354 | 2014-12-31 | 4-6 | IJCSEITRDEC20145 | A Novel Analysis for Stability and Performance of Network Resource Allocation and Num Problem in Large Scale Networks | 2-14-1417157514-ABS - 5. Comp Sci - IJCSEITR -A NOVEL ANALYSIS FOR STABILITY - Boopathi.pdf | Sai Ashwin Parakkal, Prasanna Balasubramanian & T. Saravanan | 41-50 |
355 | 2014-12-31 | 4-6 | IJCSEITRDEC20146 | Heterogeneous Multiprocessor Task Scheduling Using Genetic and Simulated Annealing Algorithms and Their Hybridization | 2-14-1417253632-6. ABS - Comp Sci - IJCSEITR - Heterogeneous Multiprocessor Task Scheduling Using Genetic and Simulated Annealing Algorithms and their hybridization.pdf | Moheb R. Girgis, Ahmed A. A. Radwan, Alaa I. El-Nashar & Hagar M. Azzam | 51-62 |
356 | 2014-12-31 | 4-6 | IJCSEITRDEC20147 | A Survey on Bandwidth Aggregation for Speedy Data Uploading in Twitter Trend Analysis Using Hadoop | 2-14-1417688807-ABS - 7. Comp Sci - IJCSEITR - A Survey on Bandwidth Aggregation - Gaurav Rajurkar.pdf | Gaurav D. Rajurkar & Rajeshwari M. Goudar | 63-68 |
357 | 2014-12-31 | 4-6 | IJCSEITRDEC20148 | Fingerprint Image Denoising Using Wave Atom Transform | 2-14-1418023337-ABS - 8. Comp Sci - IJCSEITR - FINGERPRINT IMAGE DENOISING - Subba Reddy (1).Pdf | Subba Reddy Borra, G. Jagadeeswar Reddy & E. Sreenivasa Reddy | 69-76 |
358 | 2014-12-31 | 4-6 | IJCSEITRDEC20149 | Wavelet Based Color Image Watermarking | 2-14-1418292380-ABS - 9. Comp Sci - IJCSEITR -WAVELET BASED COLOR IMAGE - Krinjal Chhotulal Patil.pdf | Krinjal Chhotulal Patil & S. P. Patil | 77-84 |
359 | 2015-02-28 | 5-1 | IJCSEITRFEB20151 | Is Valuation of Flipkart at $5 Billion Justified? | 2-14-1418635983-ABS - 1. Comp Sci - IJCSEITR - Is Valuation of Flipkart - Pratima das.Pdf | Shruti Mallick & Sailesh Mallick | 1-6 |
360 | 2015-02-28 | 5-1 | IJCSEITRFEB20152 | Automated Evaluation of Breast Cancer Detection Using SVM Classifier | --1423888973-ABS - 2. Comp Sci - IJCSEITR - AUTOMATED EVALUATION OF BREAST - Basavaraj Hiremath.pdf | Basavaraj Hiremath & SC Prasannakumar | 7-16 |
361 | 2015-02-28 | 5-1 | IJCSEITRFEB20153 | Influence of Tropical Cyclone Baaz and Fanoos on Phytoplankton Blooms (Chlorophyll-A) Over Bay of Bengal: A Satellite Based Observation | --1423889030-ABS - 3. Comp Sci - IJCSEITR - INFLUENCE OF TROPICAL CYCLONE BAAZ - Rakesh Mandal.pdf | Rakesh Mandal | 17-26 |
362 | 2015-02-28 | 5-1 | IJCSEITRFEB20154 | XVSGC Tool of Qurable Data Compression in XML Datasets | --1423889062-ABS - 4. Comp Sci - IJCSEITR -XVSGC_TOOL_OF_QURABLE_DATA_COMPRESSION_IN_XML_DATASETS - Vijay Gulhane.pdf | Vijay Gulhane & M. S. Ali | 27-34 |
363 | 2015-02-28 | 5-1 | IJCSEITRFEB201505 | Interactive Image Retrieval with Advanced Clustering Strategy | --1423891264-ABS - 5. Comp Sci - IJCSEITR -INTERACTIVE IMAGE RETRIEVAL WITH - Anuja a. khodaskar.pdf | Anuja Khodasakr & Siddharth Ladhake | 35-42 |
364 | 2015-02-28 | 5-1 | IJCSEITRFEB201506 | Assessment of ANS Using HRV Data in Diseased Condition | --1423891335-ABS - 6. Comp Sci - IJCSEITR -ASSESSMENT OF ANS USING HRV DATA - Mahesh Kumar.pdf | D Mahesh Kumar, Prasanna Kumar S. C, B. G Sudarshan,Yadhuraj S. R & Hemanth Kumar | 43-54 |
365 | 2015-02-28 | 5-1 | IJCSEITRFEB20157 | Multi-Secure Binder for Dismissal in OS - Level Virtual Machines Environment | --1423889381-ABS - 7. Comp Sci - IJCSEITR -Multi-Secure Binder for Dismissal in OS - Level - Girish Wadhwa.pdf | Girish Wadhwa | 55-62 |
366 | 2015-02-28 | 5-1 | IJCSEITRFEB20158 | Securing Stack Overflow Vulnerabilities by Memory Access Virtualization and Automatic Patches | --1423889421-ABS - 8. Comp Sci - IJCSEITR - Securing Stack Overflow Vulnerabilities - Jai Lalwani.pdf | Lalwani Jai | 63-66 |
367 | 2015-02-28 | 5-1 | IJCSEITRFEB20159 | Enhanced Unified Authentication and Authorization Architecture Based on Desktop Virtualization | --1423889476-ABS - 9. Comp Sci - IJCSEITR -ENHANCED UNIFIED AUTHENTICATION AND - Chetan Patel.pdf | Kirankumar Gaikwad, Rupali Nikhare & Rahul Jiwane | 67-74 |
368 | 2015-02-28 | 5-1 | IJCSEITRFEB201510 | POLVM: Parallel Optimized Live VM Migration | --1427285471-ABS - 10. Comp Sci - IJCSEITR - POLVMParallel Optimized Live VM Migration - Jayasree P.pdf | Jayasree P & Meenakshisharma | 75-90 |
369 | 2015-02-28 | 5-1 | IJCSEITRFEB201511 | Hybrid Approach for Web Mashup Security Framework | --1423889555-ABS - 11. Comp Sci - IJCSEITR -HYBRID APPROACH FOR WEB - Chetan Patel.pdf | Vinod Sapkal & Ravi Randale | 91-98 |
370 | 2015-02-28 | 5-1 | IJCSEITRFEB201512 | A Proposed Security Framework for Network Management Based on Common Object Request Broker Architecture (CORBA) Using Mobile Agent | --1423889652-ABS - 12. Comp Sci - IJCSEITR - A PROPOSED SECURITY FRAMEWORK - Rajesh Kumar.pdf | Rajesh Kumar & S Niranjan | 99-110 |
371 | 2015-02-28 | 5-1 | IJCSEITRFEB201513 | Information Technology in Supply Chain Management | --1423889691-ABS - 13. Comp Sci - IJCSEITR - INFORMATION TECHNOLOGY IN SUPPLY CHAIN MANAGEMENT - Syed Afsar.pdf | Pandu Ranga Reddy, Syed Afsar , Goverdhan Nadendla, Dinesh Kesaboina & Tirumalesh Chandramahanty | 111-116 |
372 | 2015-02-28 | 5-1 | IJCSEITRFEB201514 | A Fast Factorization Algorithm for Composite Integers of the Form N = P X Q, Where P and Q Are Primes and N Mod 6= + 1 | --1423889731-ABS - 14. Comp Sci- IJCSEITR - A Fast Factorization Algorithm for - Noureldien A. Noureldien.pdf | Noureldien A. Noureldien & Ebtisam Abaker | 117-126 |
373 | 2015-02-28 | 5-1 | IJCSEITRFEB201515 | Congestion Control by Modified TCP TAHOE for WCDMA UMTS Network | --1423889320-ABS - 15. Comp Sci - IJCSEITR -CONGESTION cONTROL BY MODIFIED TCP TAHOE OVER - Neetu Sharma.pdf | Neetu Sharma & Vijay Singh Rathore | 127-134 |
374 | 2015-04-30 | 5-2 | IJCSEITRAPR20151 | Seccloud Using Multi-Dimensional Access: A Survey | 2-14-1424501984-1. ABS - Comp Sci - IJCSEITR - SECCLOUD USING MULTI.pdf | Ahire Rahul, Tempe Bhushan Kumar, Kelgane Girish & Gauribhagat | 1-6 |
375 | 2015-04-30 | 5-2 | IJCSEITRAPR20152 | Automated Bluetooth Attendance Management System | 2-14-1425301237-2. ABS - Comp Sci - IJCSEITR - AUTOMATED BLUETOOTH ATTENDANCE MANAGEMENT SYSTEM.pdf | Sourabh Gavade, Pinkey Atwal, Zubin Khan, Vishnu Raj Pillai & Bilkis Chandargi | 7-14 |
376 | 2015-04-30 | 5-2 | IJCSEITRAPR20153 | Performance Evaluation of Queuing Discipline in UMTS WCDMA Networks | 2-14-1425303571-3. ABS - Comp Sci - IJCSEITR - PERFORMANCE EVALUATION OF QUEUING DISCIPLINE.pdf | Neetu Sharma & Vijay Singh Rathore | 15-24 |
377 | 2015-04-30 | 5-2 | IJCSEITRAPR20154 | Alphanumeric Characters Detection on License Plate Using Image Processing | 2-14-1425450798-4. ABS - Comp Sci - IJCSEITR - ALPHANUMERIC CHARACTERS DETECTION ON.pdf | Moluguri Kiran Kumar | 25-30 |
378 | 2015-04-30 | 5-2 | IJCSEITRAPR20155 | Generating Positive-Negative Rules Using Fuzzy FP-Growth & Naïve Bayes | 2-14-1426165154-5. ABS - Comp Sci - IJCSEITR -GENERATING POSITIVE.pdf | Shipra Khare & Vivek Jain | 31-40 |
379 | 2015-04-30 | 5-2 | IJCSEITRAPR20156 | Opinion Mining of Reviews Distributed Over E-Commerce Sites | 2-14-1426249626-6. ABS - Comp Sci - IJCSEITR - OPINION MINING OF REVIEWS DISTRIBUTED OVER E.pdf | Rekha More & Ekta Ukey | 41-52 |
380 | 2015-04-30 | 5-2 | IJCSEITRAPR20157 | Evaluation of Wavelet Transformations in Different Bands by Applying Noise | 2-14-1426330916-1. ABS - Comp Sci - IJCSEITR - EVALUATION OF WAVELET TRANSFORMATIONS IN.pdf | K.Sunitha &T.Sudha | 53-58 |
381 | 2015-04-30 | 5-2 | IJCSEITRAPR20158 | Enhancement of Semantic Matchmaking in Web Services | 2-14-1426831913-8. ABS - Comp Sci - IJCSEITR - ENHANCEMENT OF SEMANTIC MATCHMAKING IN WEB SERVICES.pdf | Savan M. Patel & Gaurav K. Patel | 59-70 |
382 | 2015-04-30 | 5-2 | IJCSEITRAPR20159 | A Graph Clustering Approach to Identify Key Genes from Microarray Gene Expression Data | 2-14-1426854232-9. ABS -Comp Sci - IJCSEITR - A GRAPH CLUSTERING APPROACH -Jahiruddi.pdf | Jahiruddin | 71-78 |
383 | 2015-04-30 | 5-2 | IJCSEITRAPR201510 | A New Approach for Person Verification System Based on Finger-Knuckle Print Biometric and MLP Neural Network | 2-14-1427263503-ABS - 10. Comp Sci - IJCSEITR - A New Approach for Person Verification - A D Bhople.pdf | A. D. Bhople | 79-88 |
384 | 2015-04-30 | 5-2 | IJCSEITRAPR201511 | An Advanced Research Framework on Dental Health Care Information Eco-System for Enhanced Services by Leveraging Big Data Analytics | 2-14-1427543978-11. ABS - Comp Sci - IJCSEITR - AN ADVANCED RESEARCH FRAMEWORK ON DENTAL HEALTH CARE INFORMATION ECO.pdf | V. V. R. Maheswara Rao & V. Valli Kumari | 89-96 |
385 | 2015-04-30 | 5-2 | IJCSEITRAPR201512 | TOR Prevent DNS Leak through Honeypot | 2-14-1427548165-12. ABS - Comp Sci - IJCSEITR - TO PREVENT DNS LEAK THROUGH HONEYPOT.pdf | Suman Gautam, Nitesh Gupta & Sini Shibu | 97-102 |
386 | 2015-04-30 | 5-2 | IJCSEITRAPR201513 | Prevention of Physical Disabilities Through ORI Technique | --1429530492-13. ABS - Comp Sci -IJCSEITR -PREVENTION OF PHYSICAL DISABILITIES THROUGH ORI TECHNIQUE.pdf | Ashish Guwalani, A. K. Dubey& Rakesh Rathi | 103-112 |
387 | 2015-04-30 | 5-2 | IJCSEITRAPR201514 | Tapping the Power of Social Network in Dairy Industry | 2-14-1428320142-ABS - 13. Comp Sci - IJCSEITR -Tapping the Power of Social - KAMANI KRUNAL.pdf | Krunalkamani & Ashish Makwana | 113-118 |
388 | 2015-06-30 | 5-3 | IJCSEITRJUN20151 | Information and Communication Technology & Its Impact in Improving the Teaching and Learning of English Language | 2-14-1429336509-ABS - 1. Comp Sci - IJCSEITR -Information and Communication Technology - Nischal Chavda.pdf | Pankaj S. Parsania, Nischal M. Chavda & Krunal C. Kamani | 1-6 |
389 | 2015-06-30 | 5-3 | IJCSEITRJUN20152 | A Software Architecture for Implementation of ERP in Higher Education Institution | 2-14-1429362676-ABS - 2. Comp Sci - IJCSEITR -A Software Architecture for Implementation - Suprihanto.pdf | Suprihanto & Transmissia Semiawan | 7-12 |
390 | 2015-06-30 | 5-3 | IJCSEITRJUN20153 | A Novel Approach for Iris Recognition System Based on DCT Features | --1430567888-ABS - 2. Comp Sci - IJCSEITR - A NOVEL APPROACH FOR IRIS - Heena.pdf | Heena & Ravi Kant Jaiswal | 13-22 |
391 | 2015-06-30 | 5-3 | IJCSEITRJUN20154 | Automatic Extraction of Top-K Lists From the Web Pages | 2-14-1430568485-ABS - 4. Comp Sci - IJCSEITR -Automatic Extraction of Top-k - Ashish Dwivedi.pdf | Ashish Dwivedi | 23-30 |
392 | 2015-06-30 | 5-3 | IJCSEITRJUN20155 | Modeling of TIAV Multimedia System | 2-14-1430569078-ABS - 5. Comp Sci - IJCSEITR -Modeling of TIAV Multimedia - Beknazarova_S.pdf | Beknazarova Saida Safibullayevna | 31-36 |
393 | 2015-06-30 | 5-3 | IJCSEITRJUN20156 | Big Data: Opportunities & Challenges | 2-14-1432559270-6. ABS - Comp Sci - IJCSEITR - BIG DATA.pdf | Sonal Chawla, Neetika Goswami & Priyanka Narwal | 37-42 |
394 | 2015-06-30 | 5-3 | IJCSEITRJUN20157 | Improving Accuracy in Spatial Images Classification | 2-14-1433239506-7. ABS -Comp Sci - IJCSEITR - IMPROVING ACCURACY IN SPATIAL IMAGES CLASSIFICATION.pdf | K. Leelavathi & T. Sudha | 43-48 |
395 | 2015-08-31 | 5-4 | IJCSEITRAUG20151 | Fighting Cybercrime: A Comparison of the Cybercrime Laws in Saudi Arabia and the United States | 2-14-1434178755-ABS - 1. Comp Sci - Fighting Cybercrime - Abdullah Almuqrin.pdf | Abdullah Almuqrin, Konnie Kustron, Jd | 1-8 |
396 | 2015-08-31 | 5-4 | IJCSEITRAUG20152 | Effective Methodology for Location Measurement in Ubiquitous Environment | 2-14-1434774308-2. ABS - Comp Sci - IJCSEITR -EFFECTIVE METHODOLOGY FOR LOCATION MEASUREMENT IN.pdf | Rohit Saxena, Urvashi Udhwani, Anil Dubey,Amara Ram Saini& Rakesh Rathi | 9-16 |
397 | 2015-08-31 | 5-4 | IJCSEITRAUG20153 | Video Segmentation for Moving Object Detection & Tracking- A Review | 2-14-1435147219-3. ABS - Comp Sci - IJCSEITR - VIDEO SEGMENTATION FOR MOVING OBJECT.pdf | Priya Gupta, Nivedita Kumari & Shikha Gupta | 17-34 |
398 | 2015-08-31 | 5-4 | IJCSEITRAUG20154 | A Systematic Review of Efficient Data Dissemination in Wireless Sensor Network Based on Mobile Sink | 2-14-1435235888-4. ABS -Comp Sci - IJCSEITR - A SYSTEMATIC REVIEW OF EFFICIENT DATA DISSEMINATION.pdf | Nivedita Kumari, Priya Gupta & Neetu Sharma | 35-54 |
399 | 2015-08-31 | 5-4 | IJCSEITRAUG20155 | Web Server Profiling: Approach to Webserver Security | 2-14-1435811871-5. ABS - Comp Sci - IJCSEITR - WEB SERVER PROFILING.pdf | Jyoti Pandey & Manoj Jain | 55-62 |
400 | 2015-08-31 | 5-4 | IJCSEITRAUG20156 | Index Based Detection of File Level Clone for High Level Clonin | 2-14-1436513072-ABS - 6. Comp Sci - IJCSEITR - INDEX BASED DETECTION OF FILE LEVEL -Manu Singh.pdf | Manu Singh & Vidushi Sharma | 63-70 |
401 | 2015-08-31 | 5-4 | IJCSEITRAUG20157 | Using Histogram Specification in a Hybrid Preprocessing Technique for Segmentation of Malignant Skin Lesions from Dermoscopic Images | 2-14-1436868131-ABS - 7. Comp Sci - IJCSEITR-Using Histogram Specification-Sonali Atulkumar Patil.pdf | Sonali Patil & V R Udupi | 71-82 |
402 | 2015-08-31 | 5-4 | IJCSEITRAUG20158 | An Enhanced Facial Expression Classification System Using Emotional Back Propagation Artificial Neural Network with DCT Approach | 2-14-1439520728-ABS - 8. Computer Sci - IJCSEITR - An Enhanced Facial Expression Classification.pdf | Vedantham Ramachandran, E. Srinivasa Reddy & B. Sivaiah | 83-94 |
403 | 2015-10-31 | 5-5 | IJCSEITROCT20151 | An Optimized Approach for Symmetric Face Recognition Using Eigen Faces | 2-14-1440828841-ABS - 1. Comp Sci - IJCSEITR - An optimized approach for symmetric.pdf | A. D. Chitra & P. Ponmuthuramalingam | 1-10 |
404 | 2015-10-31 | 5-5 | IJCSEITROCT20152 | Design of a Generic Workflow Management System | --1442340828-ABS - 2.Comp Sci - IJCSEITR - Design of a Generic Workflow Management.pdf | Er. Harpreet Kaur & Er. Lokesh Jain | 11-16 |
405 | 2015-10-31 | 5-5 | IJCSEITROCT20153 | Image Encryption and Compression System using Haar, Daubechies and Coiflet Wavelets | --1443091756-ABS - 3. Comp Sci - IJCSEITR - IMAGE ENCRYPTION AND COMPRESSION SYSTEM.pdf | Jaspreet Singh & Prabhjot Kaur | 17-26 |
406 | 2015-10-31 | 5-5 | IJCSEITROCT20154 | Analysis of Buying Behaviour of Customers in Supermarkets Using Data Mining TRFM Model | 2-14-1442666337-ABS.4-Comp-ANALYSIS OF BUYING BEHAVIOUR OF CUSTOMERS IN SUPERMARKETS USING DATA MINING TRFM MODEL.pdf | Aarati Joshi, Vipul Vekariya & Daxa Vekariya | 27-34 |
407 | 2015-10-31 | 5-5 | IJCSEITROCT20155 | Classification of Mammographic Breast Density Using Grey Level Difference Statistics and Fourier Power Spectrum Features | 2-14-1443258906-5. ABS -Comp Sci - IJCSEITR-CLASSIFICATION OF MAMMOGRAPHIC.pdf | Vipul Sharma & Lokesh Jain | 35-42 |
408 | 2015-10-31 | 5-5 | IJCSEITROCT20156 | Performance Comparison of Path Loss Sensitive Routing Protocol and Multipath Routing Protocol for Manets | 2-14-1444042945-ABS - 6. Computer Science- IJCSEITR-PERFORMANCE COMPARISON OF PATH LOSS-Chintan Bhavsar.pdf | Chintan Bhavsar & Sonal Belani | 43-52 |
409 | 2015-12-31 | 5-6 | IJCSEITRDEC20151 | Analysis of Enhanced HOP by HOP Feedback Based Hierarchical MPLS Protocol | 2-14-1446055895-ABS - 1. Comp Sci - IJCSEITR - ANALYSIS OF ENHANCED HOP BY HOP FEEDBACK BASED HIERARCHICAL MPLS PROTOCOL.pdf | Ankur Dumka & Hardwari Lal Mandoria | 1-6 |
410 | 2015-12-31 | 5-6 | IJCSEITRDEC20152 | Knowledge, Attitude and Perception (KAP) of Farmers for using Information and Communication Technology in Agriculture in Punjab, India | 2-14-1498548565-ABS-2.IJCSEITRDEC20152.pdf | Gagandeep Kaur Grewal & Kiran Jyoti | 7-12 |
411 | 2015-12-31 | 5-6 | IJCSEITRDEC20153 | Fingerprint Image Enhancement Technique and Its Qualitative Analysis | 2-14-1448100175-ABS - 3. IJCSEITR-Fingerprint Image Enhancement Techniques and its Statistical Analysis.pdf | Dinesh Kumar Misra et al., | 13-22 |
412 | 2015-12-31 | 5-6 | IJCSEITRDEC20154 | A Review on Criteria Based Softwae Component Selection Techniques | 2-14-1448503561-ABS - 4. IJCSEITR -A REVIEW ON CRITERIA BASED SOFTWAE.pdf | Neha Bansal & Jagdeep Kaur | 23-30 |
413 | 2015-12-31 | 5-6 | IJCSEITRDEC20155 | Intrusion Detection System and Prevention System in Cloud Computing using Snort | 2-14-1448697953-ABS - 5. IJCSEITR - INTRUSION DETECTION SYSTEM AND PREVENTION SYSTEM IN CLOUD.pdf | Sunita Kumawat et al., | 31-40 |
414 | 2015-12-31 | 5-6 | IJCSEITRDEC20156 | Knowledge Empowered Society through Digital India Programme 2015 | 2-14-1449898756-ABS - 6. IJCSEITR - KNOWLEDGE EMPOWERED SOCIETY THROUGH DIGITAL.pdf | Shabana, Jyoti Singhal et al., | 41-48 |
415 | 2016-02-29 | 6-1 | IJCSEITRFEB20161 | Optimization of Zone Routing Protocol | 2-14-1451130424-ABS - 1. IJCSEITR - OPTIMIZATION OF ZONE ROUTING PROTOCOL.pdf | Anupriya Rastogi | 1-8 |
416 | 2016-02-29 | 6-1 | IJCSEITRFEB201602 | Achieving Privacy Preserving Clustering in Images through Multidimensional Scaling | 2-14-1528888816-ABS-2.IJCSEITRFEB20162.pdf | P. Nagendra Kumar et al., | 9-18 |
417 | 2016-02-29 | 6-1 | IJCSEITRFEB20163 | Comparative Study of Dimensionality Reduction Techniques in the Context of Clustering | 2-14-1528888737-ABS-3.IJCSEITRFEB20163.pdf | P. Nagendrakumar et al., | 19-28 |
418 | 2016-02-29 | 6-1 | IJCSEITRFEB20164 | An Effective Watermarking Scheme for 3d Medical Images | --1458727419-ABS - 4. IJCSEITR - AN EFFECTIVE WATERMARKING SCHEME.pdf | Manish Madhav Tripathi & S P Tripathi | 29-34 |
419 | 2016-02-29 | 6-1 | IJCSEITRFEB20165 | Dynamic Load Balancing in Distributed Systems by Ai Agent | 2-14-1452158743-ABS - 5. IJCSEITR - DYNAMIC LOAD BALANCING IN DISTRIBUTED.pdf | Mohammad Haroon et al., | 35-42 |
420 | 2016-02-29 | 6-1 | IJCSEITRFEB20166 | An Evaluation on Modern Spatial Domain Image Steganographic Algorithms | 2-14-1453355051-ABS - 6. IJCSEITR - An Evaluation on Modern Spatial Domain Image Steganographic.pdf | S. Deepa & R. Umarani | 43-52 |
421 | 2016-02-29 | 6-1 | IJCSEITRFEB20167 | Evaluation Model for Estimating Reusability Parameter Using Metrices | --1453381134-ABS - 7. IJCSEITR -EVALUATION MODEL FOR ESTIMATING.pdf | Ashwin Tomar & V M Thakare | 53-68 |
422 | 2016-02-29 | 6-1 | IJCSEITRFEB20168 | FOSSICK: An Implementation of Federated Search Engine | 2-14-1453714189-ABS - 8. IJCSEITR - FOSSICK AN IMPLEMENTATION OF FEDERATED.pdf | Devji Chhanga et al., | 69-78 |
423 | 2016-02-29 | 6-1 | IJCSEITRFEB20169 | Secure and Efficient Multi-Keyword Ranked Search Over Encrypted Cloud Data with Recently Updated Results | 2-14-1453880876-ABS - 9. IJCSEITR - Secure and efficient multi-keyword ranked search over.pdf | Preethi Mathew | 79-86 |
424 | 2016-02-29 | 6-1 | IJCSEITRFEB201610 | QoS Based Routing Protocols - A Review | 2-14-1454404398-ABS - 10. IJCSEITR - QoS Based Routing Protocols.pdf | Swati Arya et al., | 87-94 |
425 | 2016-04-30 | 6-2 | IJCSEITRAPR20161 | A Novel Image Watermarking System Utilizing HMM in Wavelet Domain | 2-14-1455865103-ABS - 1. IJCSEITR - A NOVEL IMAGE WATERMARKING SYSTEM UTILIZING HMM IN WAVLET DOMAIN.pdf | B. Gopi & T. Sudha | 1-10 |
426 | 2016-04-30 | 6-2 | IJCSEITRAPR201602 | Privacy Preserving Clustering by Adding Different Noise Components Generated from Progressions to Different Confidential Attributes | 2-14-1528888891-ABS-2.IJCSEITRAPR201602.pdf | T. Sudha & P. Nagendra Kumar | 11-16 |
427 | 2016-04-30 | 6-2 | IJCSEITRAPR20163 | Image Enhancement by Suppressing Wrinkles Using L0 Norm and ACO | 2-14-1456902487-ABs - 3. IJCSEITR - IMAGE ENHANCEMENT BY SUPPRESSING WRINKLES.pdf | Shreya Goyal et al., | 17-22 |
428 | 2016-04-30 | 6-2 | IJCSEITRAPR20164 | National University of Uzbekistan on the Threshold to Smart University | --1469105788-ABS - 4. IJCSEITR - NATIONAL UNIVERSITY OF UZBEKISTAN ON THE THRESHOLD.pdf | Sirojiddinovsh.S. & Elov B.B. | 23-28 |
429 | 2016-04-30 | 6-2 | IJCSEITRAPR20165 | Barriers to the Adoption of Cloud Computing in Ghana: The Case of Selected Public Tertiary Institutions | --1458214655-ABS - 5. IJCSEITR - Barriers to the Adoption of Cloud Computing in Ghana.pdf | Benjamin T. K. Boison et al., | 29-40 |
430 | 2016-04-30 | 6-2 | IJCSEITRAPR20166 | Pupil Dilations Detect Iris Liveness Detection | 2-14-1458715580-ABs - 6. IJCSEITR - PUPIL DILATIONS DETECT IRISLIVENESS DETECTION.pdf | Pasupuleti LP Bharati et al., | 41-50 |
431 | 2016-06-30 | 6-3 | IJCSEITRJUN20161 | A Survey on Various Text Detection and Extraction Techniques from Videos and Images | 2-14-1465463521-ABS - 1. IJCSEITR - A SURVEY ON VARIOUS TEXT DETECTION AND EXTRACTION.pdf | Sonal Paliwal et al., | 1-10 |
432 | 2016-06-30 | 6-3 | IJCSEITRJUN201602 | Study of Different Transformation Algorithms in Digital Image Watermarking | 2-14-1465463596-ABS --2. IJCSEITR - Study of different Transformation Algorithm.pdf | Ravish Kumar Dubey & H.L. Mandoria | 11-18 |
433 | 2016-06-30 | 6-3 | IJCSEITRJUN201603 | Design and Realization of On-Line, Real Time Web Usage Data Mining and Recommendation System using Bayesian Classification Method | 2-14-1465463679-ABS - 3. IJCSEITR - Design and Realization of On-Line, Real Time.pdf | Adeniyi, D.A, Wei, Z & Yongquan, Y | 19-38 |
434 | 2016-06-30 | 6-3 | IJCSEITRJUN201604 | Improved Algorithm for Dynamic Memory Allocation in Cloud Computing | 2-14-1465463768-ABS - 4. IJCSEITR - IMPROVED ALGORITHM FOR DYNAMIC MEMORY ALLOCATION.pdf | Abhinav et al., | 39-46 |
435 | 2016-06-30 | 6-3 | IJCSEITRJUN201605 | A Comprehensive Study of Various Kinds of Frauds & It’s Impact | 2-14-1465463842-ABS - 5. IJCSEITR - A COMPREHENSIVE STUDY OF VARIOUS KINDS OF FRAUDS.pdf | Navneet Kr. Kashyap et al., | 47-58 |
436 | 2016-04-30 | 6-2 | IJCSEITRAPR20167 | Face Recognition System using Bio Metrics & Security | 2-14-1465548420-ABS - 7. IJCSEITR - FACE RECOGNITION SYSTEM USING BIO METRICS.pdf | V.S.Manjula | 51-62 |
437 | 2016-08-31 | 6-4 | IJCSEITRAUG20161 | Using Storyboard To Improve Video Retarget Quality by Pattern Matching Method | 2-14-1468241049-ABs - 1. IJCSEITR - Using Storyboard to Improve Video Retarget Quality1.pdf | Wen-Pinn Fang et al., | 1-8 |
438 | 2016-08-31 | 6-4 | IJCSEITRAUG20162 | Task Scheduling in Cloud Computing using Genetic Algorithm | --1468400036-ABS - 2. IJCSEITR - Task scheduling in cloud computing using.pdf | Sonali Jain | 9-22 |
439 | 2016-08-31 | 6-4 | IJCSEITRAUG20163 | Indoor Wi-Fi Based Positioning System using Signal Fingerprinting | 2-14-1468479784-ABS - 3. IJCSEITR - Indoor Wi-Fi Based Positioning System using signal.pdf | Xanar Fernandes et al., | 23-32 |
440 | 2016-08-31 | 6-4 | IJCSEITRAUG20164 | Efficient Image Compression Using Kekre’s Transforms | --1468841399-ABS - 4. IJCSEITR - Efficient Image Compression Using Kekre’s Transforms.pdf | Terence Johnson et al., | 33-44 |
441 | 2016-08-31 | 6-4 | IJCSEITRAUG20165 | A New Approach of Graphical Password with Integration of Audio Signature Combination of Recall and Recognition | 2-14-1469257678-ABS - 5. IJCSEITR -A NEW APPROACH OF GRAPHICAL PASSWORD WITH INTEGRATION.pdf | Salim Istyaq | 45-50 |
442 | 2016-08-31 | 6-4 | IJCSEITRAUG20166 | Thermal Aware Routing Protocol for Body Area Networks: A Survey | 2-14-1470292338-ABS - 6. IJCSEITR - THERMAL AWARE ROUTING PROTOCOL FOR BODY AREA NETWORKS.pdf | Mercy Amrita. C et al., | 51-60 |
443 | 2016-08-31 | 6-4 | IJCSEITRAUG20167 | Cyber Security and Online Shopping Perceptive Security of Flexible and Cashless Transactions | 2-14-1470636946-ABS - 7. IJCSEITR - Cyber Security and Online Shopping.pdf | M. V. Chandramathi et al., | 61-68 |
444 | 2016-10-31 | 6-5 | IJCSEITROCT20161 | Improvement in the Quality of Shaky Camera Images | 2-14-1473490460-ABS - 1. IJCSEITR- IMPROVEMENT IN THE QUALITY OF SHAKY CAMERA IMAGES.pdf | Kiran Wasudeo Sarate et al., | 1-8 |
445 | 2016-10-31 | 6-5 | IJCSEITROCT20162 | Face Recognition System Using PCA, LDA, Kernel PCA And Kernel LDA | 2-14-1473756709-ABS - 2. IJCSEITR- FACE RECOGNITION SYSTEM USUNG PCA , LDA , KERNEL PCA AND KERNEL LDA.pdf | Esra Jasem Harfash | 9-20 |
446 | 2016-10-31 | 6-5 | IJCSEITROCT20163 | Free and Open Source Software: Educational Framework for Ghana | 2-14-1473851172-ABS - 3. IJCSEITR-Free and Open Source Software Educational Framework for Ghana_Rephrased.pdf | Nana Kwame Gyamfi et al., | 21-28 |
447 | 2016-10-31 | 6-5 | IJCSEITROCT20164 | Cooperative Leases Using Improved Delaunay Triangulation for Data Consistency In Content Delivery Networks | 2-14-1474017952-ABS - 4. Comp Sci - IJCSEITR-COOPERATIVE LEASES USING IMPROVED.pdf | Gadiraju Mahesh et al., | 29-36 |
448 | 2016-10-31 | 6-5 | IJCSEITROCT20165 | Component Based Selelction Technique Using Clustering | 2-14-1474524727-ABS - 5. IJCSEITR - COMPONENT BASED SELELCTION TECHNIQUE USING.pdf | Neha Bansal et al., | 37-52 |
449 | 2016-10-31 | 6-5 | IJCSEITROCT20166 | Protein Structure Comparison using Fuzzy Image Processing | 2-14-1475497187-ABS - 6. Comp Sci - IJCSEITR-Protein Structure Comparison using Fuzzy Image Processing.pdf | K. Himabindu et al., | 53-58 |
450 | 2016-10-31 | 6-5 | IJCSEITROCT20167 | A Statistical Analysis on the Impact of Speech Enhancement Techniques on the Feature Vectors of Noisy Speech Signals for Speech Recognition | 2-14-1475583667-ABS - 7. IJCSEITR-A STATISTICAL ANALYSIS ON THE IMPACT OF SPEECH ENHANCEMENT TECHNIQUES.pdf | Swapnanil Gogoi et al., | 59-66 |
451 | 2016-10-31 | 6-5 | IJCSEITROCT20168 | A Study of Fuzzy Based Approach for Securing Information in PPDM | 2-14-1476359902-ABS - 8. IJCSEITR-A study of Fuzzy Based Approach for Securing Information in PPDM.pdf | Shrikant Zade et al., | 67-74 |
452 | 2016-10-31 | 6-5 | IJCSEITROCT20169 | Analysis and Enhancement of Process Model Using Scoring for Customer Relationship Management | 2-14-1476361205-ABS - 9. IJCSEITR-Analysis and Enhancement of process model using scoring for Customer Relationship Management.pdf | Rekha Arun et al., | 75-84 |
453 | 2016-10-31 | 6-5 | IJCSEITROCT201610 | Data Classification using Min-Max Neural Network with Pruning | 2-14-1476444779-ABS - 10. IJCSEITR-DATA CLASSIFICATION USING MIN-MAX NEURAL NETWORK WITH PRUNING.pdf | Alok Kumar Mishra et al., | 85-92 |
454 | 2016-12-31 | 6-6 | IJCSEITRDEC20161 | The Scope of E-Learning in the Computer Science & Technologies | 2-14-1477391669-ABS - 1. IJCSEITR-The Scope of E-Learning in the Computer Science & Technologies.pdf | Mudassir Khan | 1-6 |
455 | 2016-12-31 | 6-6 | IJCSEITRDEC20162 | Predicting Customer Sentimental Analysis in Online Shopping using Multilayer Perception | 2-14-1480139982-ABS - 2. IJCSEITR-Predicting customer sentimental analysis in on-line shopping using multi-layer perception..pdf | R. Shanthi et al., | 7-18 |
456 | 2017-02-28 | 7-1 | IJCSEITRFEB20171 | “Design a Model and Algorithm for Four Gesture Images Comparison and Analysis using Histogram Graph” | 2-14-1486017616-1.ABS-IJCSEITRFEB20171.pdf | Shashank Vishwakarma et al., | 1-8 |
457 | 2017-02-28 | 7-1 | IJCSEITRFEB20172 | An Approach to Construct MDRT to Produce Qualitative Ratings for E-Commerce Websites | 2-14-1486017666-2.ABS-IJCSEITRFEB20172.pdf | D. R Kumar Raja et al., | 9-14 |
458 | 2017-02-28 | 7-1 | IJCSEITRFEB20173 | To Study & Analyze the Impact of Cloud Computing Technology on Enterprises Productivity, Cost and Securities in India | 2-14-1486017720-3.ABS-IJCSEITRFEB20173.pdf | Priya Vij et al., | 15-20 |
459 | 2017-02-28 | 7-1 | IJCSEITRFEB20174 | Inheritance in Object Oriented Programming Easiest Way to Teach and Learn Inheritance in C++ | 2-14-1485336245-ABS - 4. Comp Sci - IJCSEITR-Inheritance in Object Oriented Programming Easiest way to teach.pdf | Twinkle Patel | 21-34 |
460 | 2017-02-28 | 7-1 | IJCSEITRFEB20175 | Median First Tournament Sort | 2-14-1485941175-ABS-IJCSEITRFEB20175.pdf | Mukesh Soni et al., | 35-52 |
461 | 2017-02-28 | 7-1 | IJCSEITRFEB20176 | A Framework for Keeping Data Safe in Cloud Transmissions | 2-14-1486025935-6.ABS-IJCSEITRFEB20176.pdf | D Usha | 53-58 |
462 | 2017-02-28 | 7-1 | IJCSEITRFEB20177 | Reconstruction of HV-Convex Binary Images with Diagonal and Anti-Diagonal Projections using Simulated Annealing Technique | 2-14-1486123642-7.ABS-IJCSEITRFEB20177.pdf | Shelja Sehdev et al., | 59-68 |
463 | 2017-04-30 | 7-2 | IJCSEITRAPR20171 | Smart Motif Discovery on ECG Signal using Autocorrelation and Variable Threshold | 2-14-1487225463-1.ABS-IJCSEITRAPR20171.pdf | Harjeet Kaur | 1-10 |
464 | 2017-04-30 | 7-2 | IJCSEITRAPR20172 | An Approach to Detect Text in Video | 2-14-1487588922-2.ABS-IJCSEITRAPR20172.pdf | Megha Khandelwal | 11-16 |
465 | 2017-04-30 | 7-2 | IJCSEITRAPR20173 | An Approach to Email Categorization for Telecommunication Corpus | 2-14-1488617774-3.ABS-IJCSEITRAPR20173.pdf | Rajwant Kaur et al., | 17-24 |
466 | 2017-04-30 | 7-2 | IJCSEITRAPR20174 | An Efficient Resource Scheduling Algorithm using Knapsack | 2-14-1489476355-4.ABS-IJCSEITRAPR20174.pdf | Rashmi Kumari et al., | 25-28 |
467 | 2017-04-30 | 7-2 | IJCSEITRAPR20175 | Association Rule Mining using Modified BPSO | 2-14-1490786100-5.ABS-IJCSEITRAPR20175.pdf | Amit Kumar Chandanan et al., | 29-36 |
468 | 2017-04-30 | 7-2 | IJCSEITRAPR20176 | An Efficient Round Robin Algorithm using Improved Time Quantum | 2-14-1491222556-6.ABS-IJCSEITRAPR20176.pdf | Himanshu Bhagwani et al., | 37-42 |
469 | 2017-06-30 | 7-3 | IJCSEITRJUN20171 | Evolution of New Efficient Load Balancer Algorithm for Large Data Sets | 2-14-1492077489-1.Abs-IJCSEITRJUN20171.pdf | Nuka Santosh Kumar et.al., | 1-10 |
470 | 2017-06-30 | 7-3 | IJCSEITRJUN20172 | Model and Simulation to Minimize Empty Space Left with Laff Method in the Loading of Cargo System | 2-14-1492775773-2.ABS_IJCSEITRJUN20172.pdf | Andrias Rusli & Friska Natalia Ferdinand | 11-18 |
471 | 2017-06-30 | 7-3 | IJCSEITRJUN20173 | Data Mining Analysis for National Security | 2-14-1495195380-3.Abs-IJCSEITRJUN20173.pdf | R. E. Okonigene et.al., | 19-32 |
472 | 2017-06-30 | 7-3 | IJCSEITRJUN20174 | Design of Simulation Techniques for Data Prediction in Public Transportation | 2-14-1495617879-4.ABS_IJCSEITRJUN20174.pdf | Gregorius Viko & Friska Natalia Ferdinand | 33-38 |
473 | 2017-06-30 | 7-3 | IJCSEITRJUN20175 | Breast Cancer Image Segmentation using Ekstrap and FCS Algorithm | 2-14-1496146814-ABS-5.IJCSEITRJUN20175.pdf | Deepshri Hebbalkar et al., | 39-48 |
474 | 2017-06-30 | 7-3 | IJCSEITRJUN20176 | Detection of Brain Tumor Using Enhanced K-Strange Points Clustering and Morphological Filtering | 2-14-1497610762-ABS-6.IJCSEITRJUN20176.pdf | Nora Naik et al., | 49-58 |
475 | 2017-08-31 | 7-4 | IJCSEITRAUG20171 | Study of Knowledge Sharing on Onion Crops Among the Farmers in Perambalur District | 2-14-1499234593-Abs.IJCSEITRAUG20171.pdf | J. Nithya Jayaseeli & T. Devi | 1-6 |
476 | 2017-08-31 | 7-4 | IJCSEITRAUG20172 | Mining Rating of University Performance in Academic Programs and Services | 2-14-1499321530-Abs.IJCSEITRAUG20172.pdf | Jasmin D. Niguidula et al., | 7-18 |
477 | 2017-08-31 | 7-4 | IJCSEITRAUG20173 | Database Migration Analysis for Data Assurance Using D2Loader | 2-14-1499852570-Abs3.IJCSEITRAUG20173.pdf | Alvin Jason A. Virata et al., | 19-24 |
478 | 2017-08-31 | 7-4 | IJCSEITRAUG20174 | Secure and Faster Key Management of Elliptical Curve Cryptography in Vanets | 2-14-1499851033-Abs4.IJCSEITRAUG20174.pdf | Ekta Narwal & Sumeet Gill | 25-30 |
479 | 2017-08-31 | 7-4 | IJCSEITRAUG20175 | Efficient Traffic Management with Intermediate Data Partition for Big Data Applications | 2-14-1500701179-Abs5.IJCSEITRAUG20175.pdf | Naveen Wal et al., | 31-36 |
480 | 2017-08-31 | 7-4 | IJCSEITRAUG20176 | Image Processing Color Model Techniques and Sensor Networking in Identifying Fire from Video Sensor Node | 2-14-1500548775-Abs6.IJCSEITRAUG20176.pdf | S. R. Vijayalakshmi et al., | 37-46 |
481 | 2017-08-31 | 7-4 | IJCSEITRAUG20177 | Local Binary Patterns Based Detection of Rust Disease of Lentils (Lens culinaris) Using k-NN Classification System | 2-14-1500549313-Abs7.IJCSEITRAUG20177.pdf | Kuldeep Singh et al., | 47-52 |
482 | 2017-08-31 | 7-4 | IJCSEITRAUG20178 | Automatic Product Review Sentiment Analysis Using Vader and Feature Visulaization | 2-14-1501663690-Abs.8.IJCSEITRAUG20178.pdf | Harish Rao M & Shashikumar D.R | 53-66 |
483 | 2017-08-31 | 7-4 | IJCSEITRAUG20179 | Review Paper on Decision Tree Data Mining Algorithms to Improve Accuracy in Identifying Classified Instances using Large Dataset | 2-14-1501572932-Abs9.IJCSEITRAUG20179.pdf | Gurpreet Singh et al., | 67-70 |
484 | 2017-08-31 | 7-4 | IJCSEITRAUG201710 | Dual-Compression Based Model Using the Active Object Detection Model | 2-14-1501576408-Abs.10.IJCSEITRAUG201710.pdf | Hardeep Kaur & Damanpreet Kaur | 71-80 |
485 | 2017-08-31 | 7-4 | IJCSEITRAUG201711 | Neural Network Based Signature Verification Model for Bank Cheques with Three Specimen Signatures | 2-14-1502107699-Abs.11.IJCSEITRAUG201711.pdf | S.Dhandapani | 81-92 |
486 | 2017-08-31 | 7-4 | IJCSEITRAUG201712 | E2TBR: Energy Efficient Transmission Based Routing for IoT Networks | 2-14-1502167083-Abs.12.IJCSEITRAUG201712.pdf | Santiago. S & Arockiam. L | 93-100 |
487 | 2017-10-31 | 7-5 | IJCSEITROCT20171 | The Performance Analysis of Edge Detection Algorithms for Image Processing in Presence of Noise | 2-14-1503053467-ABS.1.IJCSEITROCT20171.pdf | Munwar Ali Shaik et al., | 1-8 |
488 | 2017-10-31 | 7-5 | IJCSEITROCT20172 | Hybrid Kernel Fuzzy Clustering with Feed Lion Neural Network for Missing Data Imputation and Classification | 2-14-1507022651-abs2.IJCSEITROCT20172.pdf | R Rajani et al., | 9-28 |
489 | 2017-10-31 | 7-5 | IJCSEITROCT20173 | Insight of Various Pos Tagging Techniques for Hindi Language | 2-14-1507899024-Abs3.IJCSEITROCT20173.pdf | Simpal Jain & Nidhi Mishra | 29-34 |
490 | 2017-12-31 | 7-6 | IJCSEITRDEC20171 | DJIKSTRA Algorithm Based Approach to Shortest Path Model in Public Bus Transportation | 2-14-1510556203-Abs.1.IJCSEITRDEC20171.pdf | Deandrha agusta et al., | 1-8 |
491 | 2018-02-28 | 8-1 | IJCSEITRFEB20181 | Approaches to Image Processing using the Tools of Fuzzy Sets | 2-14-1514532788-abs1.IJCSEITRFEB20181.pdf | R. KH. Khamdamov & E. A. Saliyev | 1-12 |
492 | 2018-02-28 | 8-1 | IJCSEITRFEB20182 | Pest Management using Machine Learning Algorithms: A Review | 2-14-1520578301-Abs.2.IJCSEITRFEB20182.pdf | R. P. L. Durgabai et al., | 13-22 |
493 | 2018-06-30 | 8-2 | IJCSEITRJUN20181 | Analysis and Comparison of Loan Sanction Prediction Model using Python | 2-14-1525751508-abs.1.IJCSEITRJUN20181.pdf | Srishti Srivastava et al., | 1-8 |
494 | 2018-06-30 | 8-2 | IJCSEITRJUN20182 | Review on Smart Healthcare Systems using Cloud and Big Data Analysis | 2-14-1525751713-abs.2.IJCSEITRJUN20182.pdf | Prachi. D. Junwale et al., | 9-14 |
495 | 2018-06-30 | 8-2 | IJCSEITRJUN20183 | A Case Study Of Existing Quality Model Based On Defects & Tests Management Of Embedded Software System | 2-14-1528954964-abs.3.IJCSEITRJUN20183.pdf | Abhishek Anurag et al., | 15-30 |
496 | 2018-06-30 | 8-2 | IJCSEITRJUN20184 | Multisite Software Development with Ontology: A Review | 2-14-1525752677-abs.04.IJCSEITRJUN20184.pdf | Hemant H. Patel & Nitesh M. Sureja | 31-36 |
497 | 2018-06-30 | 8-2 | IJCSEITRJUN20185 | Particles Swarm Optimization Techniques : Principle, Comparison & Application | 2-14-1525753073-abs.5.IJCSEITRJUN20185.pdf | P. Sanyasi Naidu et al., | 37-48 |
498 | 2018-06-30 | 8-2 | IJCSEITRJUN20186 | The Development of Earthquake Visualization Data Mapping in Indonesia Period 2014 - 2016 | 2-14-1525754140-abs.6.IJCSEITRJUN20186.pdf | Hendy Tandi & Friska Natalia | 49-60 |
499 | 2018-06-30 | 8-2 | IJCSEITRJUN20187 | Nature Inspired Algorithms for Test Suite Optimization for Regression Testing: An Investigation | 2-14-1525926827-abs.7.IJCSEITRJUN20187.pdf | Chetan J. Shingadiya et al., | 61-68 |
500 | 2018-06-30 | 8-2 | IJCSEITRJUN20188 | The Effectiveness of Data Mining in Query Optimization | 2-14-1526637134-abs.8.IJCSEITRJUN20188.pdf | Hassanien Mohammed Naji et al., | 69-76 |
501 | 2018-06-30 | 8-2 | IJCSEITRJUN20189 | Enhanced K Strange Points Clustering Using BAT Inspired Algorithm | 2-14-1527567415-abs.9.IJCSEITRJUN20189.pdf | Terence Johnson et al., | 77-82 |
502 | 2018-06-30 | 8-2 | IJCSEITRJUN201810 | Evolutionary Computation based Optimization Technique For Minimum Vertex Cover | 2-14-1527075423-abs.10.IJCSEITRJUN201810.pdf | Shet Reshma Prakash | 83-90 |
503 | 2018-06-30 | 8-2 | IJCSEITRJUN201811 | Tabhouse | 2-14-1528951041-ABS.11.IJCSEITRJUN201811.pdf | Faizul haque Zeya et al., | 91-102 |
504 | 2018-08-31 | 8-3 | IJCSEITRAUG20181 | Leukemia Prediction using Random Forest Algorithm | 2-14-1530352140-abs.1.IJCSEITRAUG20181.pdf | Nora Naik & Peter Braganza et al., | 1-8 |
505 | 2018-08-31 | 8-3 | IJCSEITRAUG20182 | Securing Encrypted Shares Using Steganography | 2-14-1530850662-abs.2.IJCSEITRAUG20182.pdf | Nora Naik & Pratik Nayak et al., | 9-16 |
506 | 2018-08-31 | 8-3 | IJCSETIRAUG20183 | Search Engine Optimization Page Rank Algorithm | 2-14-1531896238-ABS.3.IJCSETIRAUG20183.pdf | Ketan Sarvakar et al., | 17-24 |
507 | 2018-08-31 | 8-3 | IJCSETIRAUG20184 | Automization of Agriculture Products Defect Detection and Grading using Image Processing System | 2-14-1532774121-abs.4.IJCSETIRAUG20184.pdf | Gauri Deepak Patne & P. A. Ghonge | 25-32 |
508 | 2018-08-31 | 8-3 | IJCSETIRAUG20185 | Intelligent Facial Recognition and Retrieval from Facial Image Databases | 2-14-1533965051-ABS.5IJCSETIRAUG20185.pdf | B. Kalaiselvi & G. S. Anandamala | 33-38 |
509 | 2018-10-31 | 8-4 | IJCSETIROCT20181 | An Adaptive Scheme Over Text Streams for Real-Time Monitoring | 2-14-1535173051-ABS.1IJCSETIROCT20181.pdf | CH. Hymavathi et al., | 1-6 |
510 | 2018-10-31 | 8-4 | IJCSEITROCT20182 | Pleasure or Displeasure: A Solution for Customers’ Satisfaction | 2-14-1536400019-abs.2.IJCSETIROCT20182.pdf | Muhammad Zumair et al., | 7-12 |
511 | 2018-10-31 | 8-4 | IJCSEITROCT20183 | Privacy Preserving for Numeric Data Query in Cloud Computing | 2-14-1537175976-abs.3.IJCSEITROCT20183.pdf | B. Spandana et al., | 13-20 |
512 | 2018-10-31 | 8-4 | IJCSEITROCT20184 | The Selection of Informative Features | 2-14-1537428139-abs.4.IJCSEITROCT20184.pdf | Mamatov N. S et al., | 21-30 |
513 | 2018-12-31 | 8-5 | IJCSEITRDEC20181 | Text-To-Speech System for Telangana State Languages | 2-14-1542274094-ABS.1.IJCSEITRDEC20181.pdf | M. Nagamani et al., | 1-6 |
514 | 2019-06-30 | 9-1 | IJCSEITRJUN20191 | The Scheme Programming Language | 2-14-1548910224-abs.1IJCSEITRJUN20191.pdf | Smita Desai et al., | 1-10 |
515 | 2019-06-30 | 9-1 | IJCSEITRJUN20192 | Implementation of Stress Detection System | 2-14-1552548894-abs2IJCSEITRJUN20192.pdf | Mrunal Sawant et al., | 11-14 |
516 | 2019-06-30 | 9-1 | IJCSEITRJUN20193 | An Energy Efficient Cluster Formation Protocol for Multi-Hop Wireless Sensor Networks Using Fuzzy Logic | 2-14-1555066091-abs3IJCSEITRJUN20193.pdf | P. Chitralingappa et al., | 15-24 |
517 | 2019-06-30 | 9-1 | IJCSEITRJUN20194 | The Impact of Computer Information Systems on the Adequacy of Institutional Work (Case Study) | 2-14-1555910495-abs.4.IJCSEITRJUN20194.pdf | Nidal Al Said | 25-30 |
518 | 2019-06-30 | 9-1 | IJCSEITRJUN20195 | The Driver for the Scull_Open Discovery Function, Read / Write Scull_Read / Scull_Write For a Protected Linux OS | 2-14-1557215541-abs5IJCSEITRJUN20195.pdf | Ochilov Nizomiddin Najmiddin Ugli | 31-42 |
519 | 2019-06-30 | 9-1 | IJCSEITRJUN20196 | An Application of Artificial Intelligence with Vector Quantization for Image Compression | 2-14-1559039870-abs6IJCSEITRJUN20196.pdf | Giridhar Sudi et al., | 43-52 |
520 | 2019-06-30 | 9-1 | IJCSEITRJUN20197 | Automated Hydroponics System using NFT System and IOT | 2-14-1559384554-abs7IJCSEITRJUN20197.pdf | Malcolm Andrew Madeira et al., | 53-62 |
521 | 2019-12-31 | 9-2 | IJCSEITRDEC20191 | Digital Voting System Using Blockchain Technology | 2-14-1560421294-abs.1.IJCSEITRDEC20191.pdf | Snehal Bhogan et al., | 1-6 |
522 | 2019-12-31 | 9-2 | IJCSEITRDEC20192 | Fault Tolerance in Defence C4I Systems | 2-14-1560493168-abs2IJCSEITRDEC20192.pdf | Sandeep Kumar et al., | 7-14 |
523 | 2019-12-31 | 9-2 | IJCSEITRDEC20193 | E-Tendering Using Blockchain | 2-14-1560494141-abs3IJCSEITRDEC20193.pdf | Snehal Bhogan et al., | 15-18 |
524 | 2019-12-31 | 9-2 | IJCSEITRDEC20194 | Detection and Classification of Brain Tumor Using Naïve Bayes and J48 | 2-14-1561107515-abs.4.IJCSEITRDEC20194.pdf | Nora Naik et al., | 19-28 |
525 | 2019-12-31 | 9-2 | IJCSEITRDEC20195 | The Design and Developement of Decentralized Digilocker using Blockchain | 2-14-1561632900-ABS.5.IJCSEITRDEC20195.pdf | Amrita B. Chavan & Dr. K. Rajeswari | 29-36 |
526 | 2019-12-31 | 9-2 | IJCSEITRDEC20196 | Marksheet Verification Using Blockchain | 2-14-1562241602-abs.6.IJCSEITRDEC20196.pdf | Nora Naik et al., | 37-46 |
527 | 2019-12-31 | 9-2 | IJCSEITRDEC20197 | Fuzzy Logic Approach to Petroleum Products buying Decision in Ghana (A Case of Private Car Owners in Accra, Ghana) | 2-14-1569493147-abs.7.IJCSEITRDEC20197.pdf | John Bosco K. Damnyag et al., | 47–56 |
528 | 2019-12-31 | 9-6 | IJCSEITRDEC20198 | Analytical Survey of Architecture, Features & Functionality of Data Centers in India | 2-14-1573643321-abs.8.IJCSEITRDEC20198.pdf | Hardiksinh Rayjada & Dr. Vaishali Parsania | 57–66 |
529 | 2020-06-30 | 10–1 | IJCSEITRJUN20201 | Regulatory Considerations of Small Satellite Projects: Improving the International Small Satellite Regulatory Framework | 2-14-1578115871-abs1IJCSEITRJUN20201.pdf | Abdourahmane Raimy et al., | 1-8 |
530 | 2020-06-30 | 10–1 | IJCSEITRJUN20202 | Apache Spark in Big Data Analytics | 2-14-1581140045-abs2IJCSEITRJUN20202.pdf | Geetika Mathur | 9-18 |
531 | 2020-06-30 | 10–1 | IJCSEITRJUN20203 | Big Data with Deep Learning (Supervised Vs. Unsupervised): A Survey | 2-14-1583127769-ABS3IJCSEITRJUN20203.pdf | Abeer Anwar Al-Qassab et al., | 19–30 |
532 | 2020-06-30 | 10–1 | IJCSEITRJUN20204 | A Genetic Algorithm for Test Suite Optimization | 2-14-1589343788-abs4IJCSEITRJUN20204.pdf | Chetan J. Shingadiya et al., | 31–36 |
533 | 2020-06-30 | 10–1 | IJCSEITRJUN20205 | Malware Detection using Honeypot based on Machine Learning | 2-14-1590739484-abs5IJCSEITRJUN20205.pdf | GK. Chakravarthy et al., | 37–44 |
534 | 2020-06-30 | 10–1 | IJCSEITRJUN20206 | A Framework for Protecting Multimedia Content Over Public Cloud from Pirating | 2-14-1590738704-abs.IJCSEITRJUN20206.pdf | T. S. Srinivas et al., | 45-60 |
535 | 2020-06-30 | 10–3 | IJCSEITRJUN20207 | An Efficient and Secure Otp Enabled File Sharing Service Over Big Data Environment | 2-14-1591003181-abs.IJCSEITRJUN20207.pdf | Chetan Balaji et al., | 61-80 |
536 | 2020-06-30 | 10–3 | IJCSEITRJUN20208 | Tracking and Tracing of Fake News: using Machine Learning | 2-14-1592632475-abs.IJCSEITRJUN20208.pdf | Svarna Kothari et al., | 81-90 |
537 | 2020-12-31 | 10–2 | IJCSEITRDEC20201 | Employing the Orthogonal Local Preserving Projection for the Framework of Spam Classification | 2-14-1594382178-abs.IJCSEITRDEC20201.pdf | B. Bala Krishnudu et al., | 1-18 |
538 | 2020-12-31 | 10–2 | IJCSEITRDEC20202 | E-Learning - A Boon During Covid 19 | 2-14-1599547673-2-14-1595241344-IJCSEITRDEC20202.pdf | Shilpi Gupta et al., | 19-26 |
539 | 2020-12-31 | 10–2 | IJCSEITRDEC20203 | Literature Review and Simulation of Robot for Path Planning Obstacle Avoidance (RPPOA) Model in Homeland Environment | 2-14-1603259897-ABS3IJCSEITRDEC20203.pdf | Nisha P. Zode et al., | 27–38 |
540 | 2020-12-31 | 10–2 | IJCSEITRDEC20204 | Development of IoT based Smart Sensing System for The Detection of Soil Nutrients and Environmental Condition towards Precision Agriculture | 2-14-1605587181-abs4IJCSEITRDEC20204.pdf | J. S. Vasanth et al., | 39–50 |
541 | 2020-12-31 | 10–2 | IJCSEITRDEC20205 | A Comparative Overview of Different Image Segmentation Techniques | 2-14-1605933688-abs5IJCSEITRDEC20205.pdf | Priyanka Boolchandani et al., | 51–58 |
542 | 2020-12-31 | 10–2 | IJCSEITRDEC20206 | Predicting Covid-19 Intensive Zones in Delhi Using Neighbourhood Clustering | 2-14-1606111078-abs6IJCSEITRDEC20206.pdf | Anand Gangadharan | 59–66 |
543 | 2020-12-31 | 10–2 | IJCSEITRDEC20207 | Line and Word Segmentation for Arabic Handwritten Text | 2-14-1607597681-abs.IJCSEITRDEC20207.pdf | Iskandarova Sayyora Nurmamatovna | 67-78 |
544 | 2020-12-31 | 10–2 | IJCSEITRDEC20208 | Comparative Study of Different Tools use for Offline Signature Verification System | 2-14-1608814989-abs.IJCSEITRDEC20208.pdf | Syed Ibad Ali et al., | 79-88 |
545 | 2020-12-31 | 10–2 | IJCSEITRDEC20209 | Employee Salary Prediction using Multi Model Machine Learning Techniques: A Comparative Analysis | 2-14-1608968631-abs9IJCSEITRDEC20209.pdf | Krishna Sai et al., | 89–104 |
546 | 2021-06-30 | 11-1 | IJCSEITRJUN20211 | Knowledge Based Expert System for Medical Disease Diagnosis | 2-14-1612433114-abs.IJCSEITRJUN20211.pdf | Diksikumari Suthar | 1-10 |
547 | 2021-06-30 | 11–1 | IJCSEITRJUN20212 | The Process of Multilevel Filtering on Spam Mail | 2-14-1614059744-abs2IJCSEITRJUN20212.pdf | B. Bala Krishnudu* et al., | 11–24 |
548 | 2017-10-31 | 7-5 | IJCSEITROCT20174 | Recovery of Scattered Data Using Neural Network Approach | 2-14-1615359783-abs4IJCSEITROCT20174.pdf | Mary Jaya V J | 35–46 |
549 | 2021-06-30 | 11–1 | IJCSEITRJUN20213 | An Efficient Supervised Machine Learning Model Approach for Forecasting of Renewable Energy to Tackle Climate Change | 2-14-1615800902-ABS3IJCSEITRJUN20213.pdf | Drumil Joshi et al., | 25–32 |
550 | 2021-06-30 | 11–1 | IJCSEITRJUN20214 | Decision Tree Classifier for a Secure Configuration for the Classification of E-Mails | 2-14-1616569995-abs.IJCSEITRJUN20214.pdf | B. Bala Krishnudu et al., | 33-44 |
551 | 2019-06-30 | 9–1 | IJCSEITRJUN20198 | Numerical Analysis of Slab with Different Shapes of Openings | 2-14-1617003139-abs8IJCSEITRJUN20198.pdf | Pritpal Kaur et al., | 63–70 |
552 | 2018-06-30 | 8-2 | IJCSEITRJUN201812 | Fuzzy Comprehensive Evaluation on the Basic ICT Education | 2-14-1617096256-abs12IJCSEITRJUN201812.pdf | Nityashree Nadar et al., | 103–112 |
553 | 2018-06-30 | 8-2 | IJCSEITRJUN201813 | Heterogeneous Communication in Between Two Wireless Techniques: Bluetooth and Wi-Fi | 2-14-1617101429-absIJCSEITRJUN201813.pdf | Sojwal A. Patil | 113–122 |
554 | 2021-06-30 | 11–1 | IJCSEITRJUN20215 | Internet of Things: Case Study on Fire Detection System | 2-14-1617175492-abs.IJCSEITRJUN20215.pdf | Ch. Hephzibah et al., | 45-52 |
555 | 2021-06-30 | 11–1 | IJCSEITRJUN20216 | A Study on the 5th Generation of Cellular Technology (5G) Era in Internet of Things | 2-14-1619775664-abs6IJCSEIERDJUN20216.pdf | Raghu Ram Chowdary Velevela et al., | 53–74 |
556 | 2021-06-30 | 11–1 | IJCSEITRJUN20217 | Improving Mobile Web Application for College Management System | 2-14-1620020427-abs.IJCSEITRJUN20217.pdf | Magdy Shayboub A. Mahmoud | 75-90 |
557 | 2021-06-30 | 11–1 | IJCSEITRJUN20218 | Malware Detection Using Stacking Algorithm | 2-14-1620470157-ABS8IJCSEITRJUN20218.pdf | Ganesh S. et al., | 91–94 |
558 | 2021-06-30 | 11–1 | IJCSEITRJUN20219 | Telugu Optical Character Recognition Using Cloud Computing And Python | 2-14-1620639380-abs9IJCSEITRJUN20219.pdf | Mahesha C | 95–106 |
559 | 2021-06-30 | 11–1 | IJCSEITRJUN202110 | Vocational Training | 2-14-1621053749-abs10IJCSEITRJUN202110.pdf | Sonu Kumar Suman et al., | 107-110 |
560 | 2021-06-30 | 11–1 | IJCSEITRJUN202111 | College Events Dissemination System | 2-14-1621058251-abs.IJCSEITRJUN202111.pdf | Rishabh Kedia et al., | 111-118 |
561 | 2021-06-30 | 11–1 | IJCSEITRJUN202112 | CNN Model for Image Classification using ResNet | 2-14-1622524305-abs.IJCSEITRJUN202112.pdf | Dr. Senbagavalli M et al., | 119-128 |
562 | 2021-06-30 | 11–1 | IJCSEITRJUN202113 | Back Propagation Algorithm - A Review | 2-14-1623153937-abs.IJCSEITRJUN202113.pdf | Mrinalini Smita et al., | 129-134 |
563 | 2021-12-31 | 11–2 | IJCSEITRDEC20211 | Access Control Lists and Network Address Translation in Network Security | 2-14-1624526448-abs1IJCSEITRDEC20211.pdf | Moulya D M et al., | 1–8 |
564 | 2021-12-31 | 11–2 | IJCSEITRDEC20212 | Semantic Search over Wikipedia Documents Meaning of Queries Based Pre-Trained Language Model | 2-14-1625200161-ABS2IJCSEITRDEC20212.pdf | Tharun P | 9–18 |
565 | 2021-12-31 | 11–2 | IJCSEITRDEC20213 | Advance Technique for Early Detection of Breast Cancer Using Textual Analysis from Digital Mammogram | 2-14-1625459785-abs3IJCSEITRDEC20213.pdf | Shawni Dutta et al., | 19–28 |
566 | 2021-12-31 | 11–2 | IJCSEITRDEC20214 | Nail Deformities Detection and Classification Using Image Processing Technique | 2-14-1625480757-abs4IJCSEITRDEC20214.pdf | Kambar Priyanka et al., | 29–36 |
567 | 2021-12-31 | 11–2 | IJCSEITRDEC20215 | Education and Investigation in Computational Science Engineering | 2-14-1626246270-abs.IJCSEITRDEC20215.pdf | Dr. Noohi Khan | 37-44 |
568 | 2021-12-31 | 11–2 | IJCSEITRDEC20216 | Adhering Agile Methodology in Covid-19 | 2-14-1626341467-abs6IJCSEITRDEC20216.pdf | Anjali Singhal | 45–50 |
569 | 2021-12-31 | 11–2 | IJCSEITRDEC20217 | GPRS Based Vehicle Tracker in Network System | 2-14-1626415527-abs.IJCSEITRDEC20217.pdf | Dr. Yogesh Kumar Sharma et al., | 51-56 |
570 | 2021-12-31 | 11–2 | IJCSEITRDEC20218 | Automation of the Education Portal | 2-14-1631008544-abs8IJCSEITRDEC20218.pdf | T. Yamini Devi et al., | 57– 64 |
571 | 2021-12-31 | 11–2 | IJCSEITRDEC20219 | The Android App for Women's Security with Sms Alert | 2-14-1631011302-abs9IJCSEITRDEC20219.pdf | V. Hima Bindu et al., | 65–70 |
572 | 2021-12-31 | 11–2 | IJCSEITRDEC202110 | National Service Scheme (NSS) for Aknu | 2-14-1631855782-abs10IJCSEITRDEC202110.pdf | T. Hemanth Rahul et al., | 71–80 |
573 | 2021-12-31 | 11–2 | IJCSEITRDEC202111 | Online and Offline Signature Verification with Performance Evaluation | 2-14-1632726804-abs11IJCSEITRDEC202111.pdf | Dr. Kusuma Kumari B. M et al., | 81– 86 |
574 | 2022-06-30 | 12–1 | IJCSEITRJUN20221 | An Automatic Personality Recognition System Using Time Distributed CNN | 2-14-1639035342-abs1IJCSEITRJUN20221.pdf | Nishanth N et al., | 1-12 |
575 | 2022-06-30 | 12–1 | IJCSEITRJUN20222 | Covid-19 Detection using Deep Learning with Transfer Learning | 2-14-1639036310-abs2IJCSEITRJUN20222.pdf | Laxmi Narayana Pondhu et al., | 13–18 |
576 | 2022-06-30 | 12–1 | IJCSEITRJUN20223 | Prediction of Diabetes using Random Forest and Xgboost Classifiers | 2-14-1641274183-abs3IJCSEITRJUN20223.pdf | Ankush Ghosh | 19–28 |
577 | 2022-06-30 | 12–1 | IJCSEITRJUN20224 | Augmented Reality Restaurant Menu | 2-14-1642425994-abs4IJCSEITRJUN20224.pdf | Maddimsetty Bullaiaha Tej et al., | 29–40 |
578 | 2022-06-30 | 12–1 | IJCSEITRJUN20225 | Process-Oriented Approach for Security Metric – A Proposal for Security Evaluation Model | 2-14-1643802223-abs5IJCSEITRJUN20225.pdf | Suganthy A | 41–46 |
579 | 2022-06-30 | 12–1 | IJCSEITRJUN20226 | Deep Learning Algorithms for Convolutional Neural Networks (CNN) Using an Appropriate Cell-Segmentation Method | 2-14-1644215241-abs6IJCSEITRJUN20226.pdf | Jalawi Alshudukhi | 47–60 |
580 | 2022-06-30 | 12–1 | IJCSEITRJUN20227 | Techniques for Indoor Location-Based on Bluetooth Fingerprinting using Artificial Intelligence Algorithms | 2-14-1644217426-AbsIJCSEITRJUN20227.pdf | Khalid Twarishalhamazani | 61-70 |
581 | 2022-06-30 | 12–1 | IJCSEITRJUN20228 | Computation of Amazon Stock Price for the Next Decade using Arima and Sarimax Model | 2-14-1644302189-abs8IJCSEITRJUN20228.pdf | Het Trivedi et al., | 71–82 |
582 | 2022-06-30 | 12–1 | IJCSEITRJUN20229 | Blockchain Technology: A Revolutionary Solution of Big Data Challenges | 2-14-1644559360-abs9IJCSEITRJUN20229.pdf | Deepika Kirti et al., | 83–88 |
583 | 2022-06-30 | 12–1 | IJCSEITRJUN202210 | Data Retrieval System for Flower Crop Cultivation | 2-14-1649153392-abs10IJCSEITRJUN202210.pdf | Reena Rosy Thomas | 89–92 |
584 | 2022-06-30 | 12–1 | IJCSEITRJUN202211 | Question Bank Management System using Artificial Intelligence (Ai) | 2-14-1651060833-abs11IJCSEITRJUN202211.pdf | Sangeeta Singh et al., | 93–102 |
585 | 2022-06-30 | 12–1 | IJCSEITRJUN202212 | TJPRC | 2-14-1652250287-dummy.IJMPERD.pdf | TJPRC | 103–108 |
586 | 2022-06-30 | 12–1 | IJCSEITRJUN202213 | Intellectual Modeling of Population Employment in the Labor Market | 2-14-1651833750-abs13IJCSEITRJUN202213.pdf | M. K. Nurmamatov | 109–114 |
587 | 2022-06-30 | 12–1 | IJCSEITRJUN202214 | Supply Chain Demand Forecasting using Applied Machine Learning and Feature Engineering | 2-14-1652176198-abs14IJCSEITRJUN202214.pdf | Sandeep Jala et al., | 115–122 |
588 | 2022-06-30 | 12–1 | IJCSEITRJUN202215 | Automated System of Exploratory Data Analysis | 2-14-1652790643-abs15IJCSEITRJUN202215.pdf | Srajan Kumar et al., | 123–134 |
589 | 2022-06-30 | 12–1 | IJCSEITRJUN202216 | Implementation and Comparison of Python and Flutter Based QnaChatbot with Cloud Service | 2-14-1653634089-abs16IJCSEITRJUN202216.pdf | Chandragiri Balasatish Yadav et al., | 135–142 |
590 | 2022-12-31 | 12–2 | IJCSEITRDEC20221 | Multiclass Eye Disease Classification From Fundus Images Using Deep Learning | 2-14-1662716859-abs1IJCSEITRDEC20221.pdf | Bhaskar Naik. K et al., | 1–12 |
591 | 2022-12-31 | 12–2 | IJCSEITRDEC20222 | Design Frame Work for Survey of Re-Duplication Data from Heterogeneous Data Sources In Cloud Computing Use Machine Learning Algorithms | 2-14-1667298331-abs2IJCSEITRDEC20222.pdf | B. Narsimhulu et al., | 13–18 |
592 | 2023-06-30 | 13–1 | IJCSEITRJUN20231 | A Comparative Study on Rule Based Mining with Linear Model in Automation | 2-14-1673249084-abs1IJCSEITRJUN20231.pdf | Banumathi. P | 1–6 |
593 | 2023-06-30 | 13–1 | IJCSEITRJUN20232 | tjprc | 2-14-1680606489-Blank.pdf | tjprc | 7–20 |
594 | 2023-06-30 | 13–1 | IJCSEITRJUN20233 | DEEP FAKE DETECTION USING DEEP LEARNING TECHNIQUE | 2-14-1686892764-IJCSEITRJUN20233ABT.pdf | ANKUSH GHOSH, SHASHIDHAR T & AJITH PADYANA | 21–36 |
595 | 2023-12-31 | 13–2 | IJCSEITRDEC20231 | PREDICTION OF SPECIAL LEARNING DISABILITIES IN CHILDREN USING SELF-ATTENTION BASED GENERATIVE PROGRESSIVE NETWORK | 2-14-1690882748-IJCSEITRDEC20231.pdf | YOGITA S. ALONE & Dr.G.R. BAMNOTE | 1–6 |
596 | 2023-12-31 | 13–2 | IJCSEITRDEC20232 | PERSONALIZED FASHION RECOMMENDER SYSTEM USING DEEP LEARNING MODELS | 2-14-1691834898-IJCSEITRDEC20232abt.pdf | Dr B.VEERA JYOTHI, Dr L. SURESH KUMAR, Dr RAHUL & MR V. JAIPAL REDDY | 7–14 |
597 | 2023-12-31 | 13–2 | IJCSEITRDEC20233 | EVALUATING MACHINE LEARNING MODELS FOR PREDICTING FOOD PRICE INFLATION: A GLOBAL PERSPECTIVE | 2-14-1694621175-IJCSEITRDEC20233abt.pdf | LEECHITA G , YOGESH S , VAISHNAVI JAYARAMAN & ARUN RAJ LAKSHMINARAYANAN | 15–26 |
598 | 2023-12-31 | 13–2 | IJCSEITRDEC20234 | COMPUTATIONAL INDIAN ECONOMY: 6 T’S BASED APPROACH | 2-14-1695642325-IJCSEITRDEC20234aBT.pdf | BAIDYANATH RAM & PROF.VIKASH KUMAR SINGH | 27–32 |
599 | 2023-12-31 | 13–2 | IJCSEITRDEC20235 | MACHINE LEARNING FOR HASHTAG CLUSTERING USING NLP | 2-14-1695883435-IJCSEITRDEC20235abt.pdf | R. GOWRI SHANKAR RAO, SIVA SANKARI S, YUVARAJ T & JULIET J | 33–36 |
600 | 2023-12-31 | 13–2 | IJCSEITRDEC20236 | DETECTION OF BREAST CANCER FROM MAMMOGRAM USING DEEP LEARNING TECHNIQUE | 2-14-1697707294-IJCSEITRDEC20236abt.pdf | DIVYAVARSHINI K. S. & DR. V. ANITHA | 37–56 |
601 | 2023-12-31 | 13–2 | IJCSEITRDEC20237 | OBSTACLES THAT ARE HINDERING AR/VR TECHNOLOGY FROM DEVELOPING MORE QUICKLY AND WINNING OVER CUSTOMERS | 2-14-1701080713-IJCSEITRDEC20237ABT.pdf | Amerah Ansari | 57–60 |