e-ISSN:0976-5166
p-ISSN:2231-3850


INDIAN JOURNAL OF COMPUTER SCIENCE AND ENGINEERING

Call for Papers 2024

Feb 2024 - Volume 15, Issue 1
Deadline: 15 Jan 2024
Publication: 20 Feb 2024

Apr 2024 - Volume 15, Issue 2
Deadline: 15 Mar 2024
Publication: 20 Apr 2024

More

 

 

VOLUME 8 ISSUE 3 Jun-Jul 2017

e-ISSN:0976-5166 p-ISSN:2231-3850
Vol. 8, No. 3

Article # Article Title & Authors (Volume 8 Number 3 Jun - Jul 2017) Page
1. ANALYSIS AND DESIGN OF PROTOCOL FOR ENHANCED SELFISH ROUTING SCHEME
Raman Kumar
Abstract | PDFIconPDF
192-200
2. PROTECTING PRIVACY OF BIG DATA IN PRESENCE OF UNTRUSTED MAPPER AND REDUCER
N. Madhusudhana Reddy, Dr. C. Naga Raju, Dr. A. Ananda Rao
Abstract | PDFIconPDF
201-209
3. Application of Pre-processing and Segmentation Methods on Cardiac MR Images
G. N. Beena Bethel, Prof. T. V. Rajinikanth, Prof. S. Viswanadha Raju
Abstract | PDFIconPDF
210-217
4. RANKING OF ROUTER-BASED CONGESTION CONTROL APPROACHES FOR HIGH SPEED NETWORKS USING AHP
Vandana Kushwaha, Ratneshwer
Abstract | PDFIconPDF
218-234
5. A LITERATURE REVIEW ON IMPACT OF INFORMATION AND COMMUNICATION TECHNOLOGY TOOLS ON RURAL SOCIETY OF INDIA
Atul D. Newase, Dr. Jitendra Sheetlani, Dr. Ranjit D. Patil
Abstract | PDFIconPDF
235-240
6. AUTOMATION OF PRE-PROCESSING OF STUDENTS DATA
Sridevi Bonthu, B V Prasanthi, K Himabindu
Abstract | PDFIconPDF
241-245
7. QUEST OF ROGUE ACCESS POINT IN BLUETOOTH NETWORKS USING NEURAL NETWORK
Menal Dahiya
Abstract | PDFIconPDF
246-248
8. Review on Feature Extraction methods of Image based Sign Language Recognition system
Hemina Bhavsar, Dr. Jeegar Trivedi
Abstract | PDFIconPDF
249-259
9. Hybridized Combinational Feature Selection Framework for Network Intrusion Detection System (HCFSF)
Shivangi Seth, Rajni Ranjan Singh Makwana, Manish Dixit
Abstract | PDFIconPDF
260-267
10. SECURE IMAGE PROCESSING USING AES ALGORITHM
Bhavana Verma, Sona Malhotra
Abstract | PDFIconPDF
268-273
11. STUDENT FINAL GRADE PREDICTION BASED ON LINEAR REGRESSION
Mahesh Gadhavi, Dr. Chirag Patel
Abstract | PDFIconPDF
274-279
12. Enhancing Data Security in cloud using Encryption Techniques
Tannu, Dr. Karambir
Abstract | PDFIconPDF
280-284
13. MEASURING PERFORMANCE OF VARIANTS OF TCP CONGESTION CONTROL PROTOCOLS
Harjinder Kaur, Dr. Gurpreet Singh
Abstract | PDFIconPDF
285-296
14. Analysis of Some Software Reliability Growth Models Using Failure Data of Real Time Control System
Javaid Iqbal
Abstract | PDFIconPDF
297-305
15. AN EFFICIENT SERVICE ALLOCATION & VM MIGRATION IN CLOUD ENVIRONMENT
Puneet Dahiya, Jitender Kumar
Abstract | PDFIconPDF
306-312
16. WEB DATA MINING IN E-SERVICES – CONCEPTS AND APPLICATIONS
Sunil, Prof. M. N. Doja
Abstract | PDFIconPDF
313-318
17. Review of the Teaching Learning Based Optimization Algorithm
Aruna, Dr. Sheetal Kalra
Abstract | PDFIconPDF
319-323
18. A STUDY ON QR CODE BASED PUBLIC CLOUD DATA PROTECTION
Srikanth Bharadwaj
Abstract | PDFIconPDF
324-332
19. THE ROLE OF FUZZY LOGIC IN CASE-BASED REASONING: A SURVEY
Nabanita Choudhury, Dr. Shahin Ara Begum
Abstract | PDFIconPDF
333-340
20. A Technique for Design Patterns Detection
Manjari Gupta
Abstract | PDFIconPDF
341-345
21. FIREFLY OPTIMIZATION BASED DIMENSIONALITY REDUCTION FOR IMPROVING ACCURACY IN JOB HUNTING
Dr. D. Asir Antony Gnana Singh, B. Krishna Kumari, Dr. E. Jebamalar Leavline
Abstract | PDFIconPDF
346-357
22. Automatic estimation of crowd size and target detection using Image processing
Asst Prof. Avinash Rai, Rahul Meshram
Abstract | PDFIconPDF
358-362
23. A LIGHTWEIGHT WIRELESS INTRUSION DETECTION SYSTEM FOR IEEE 802.11 BASED WIRELESS SENSOR NETWORK
Siva Balaji Yadav C, R Seshadri
Abstract | PDFIconPDF
363-374
24. BIG DATA CHALLENGES AND ISSUES: REVIEW ON ANALYTIC TECHNIQUES
Saritha K, Sajimon Abraham
Abstract | PDFIconPDF
375-382
25. SEMANTIC WEB MINING: OPTIMUM APPROACH
Mamta, Dr. Vijay Rana
Abstract | PDFIconPDF
383-388
26. DESIGN AND ANALYSIS OF OPTICAL PATTERNS USING BACTERIAL FORAGING OPTIMIZATION ALGORITHM FOR OPTIMIZED ILLUMINATION
Namrata Karlupia, Pawanesh Abrol, Parveen Lehana
Abstract | PDFIconPDF
389-394
27. AN AUTOMATED SEGMENTATION OF HUMAN IRIS FOR BIOMETRIC IDENTIFICATION
P. Kalavathi, S. Naganandhini, G. Sabari Durga, S. Boopathiraja
Abstract | PDFIconPDF
395-399
28. In Depth Analysis of Semantic Similarity for Context Attributes in Recommender Systems
PallabDutta, Dr. A. Kumaravel
Abstract | PDFIconPDF
400-413
29. FEATURE SUBSET SELECTION AND CLASSIFICATION USING HYBRID IMPROVED SVM
P.Arumugam, P.Jose
Abstract | PDFIconPDF
414-423
30. 16 BIT IMPLEMENTATION OF ASYNCHRONOUS TWOS COMPLEMENT ARRAY MULTIPLIER USING MODIFIED BAUGH-WOOLEY ALGORITHM AND ARCHITECTURE.
AditiPandey, AvinashRai
Abstract | PDFIconPDF
424-430
31. A REVIEW OF DATA PRIVACY AND SECURITY IN CLOUD COMPUTING
Sugandh Bhatia, Rajinder Singh Virk, JyoteeshMalhotra
Abstract | PDFIconPDF
431-435
32. Performance Enhancement of MANET using Multi Criteria Algorithm (M.C.A)
Narinder Kumar, Prof. Jahid Ali
Abstract | PDFIconPDF
436-447
33. Graphic Integer Sequence as canopy of Trees
Krishnendu Basuli
Abstract | PDFIconPDF
448-451
34. ARTIFICIAL INTELLIGENCE AND ANT COLONY OPTIMIZATION BASED WIRELESS SENSOR NETWORKS TO MINIMIZE ENERGY OF NETWORK
Sneha S. More, Prof. Mininath K. Nighot
Abstract | PDFIconPDF
452-462
35. Enhanced Ad-hoc On-Demand Distance Vector Routing Algorithm
Nidhi Beniwal, Mamta Mittal, Lalit Mohan Goyal, Monika
Abstract | PDFIconPDF
463-469
36. Analysis of Scalable and Energy Aware Multicast Routing Protocols for MANETs
Dinesh Chander, Dr. Rajneesh Kumar
Abstract | PDFIconPDF
470-478
37. TЕST AUTOMATION AS FRAMЕWORK FOR WЕB APPLICATIONS
Suman Madan, Aakriti Kakkar
Abstract | PDFIconPDF
479-486