SN |
Paper |
1 |
Towards Identifying Optimal Quality Indicators for Evaluating De-Noising Algorithm Performance in SAR
Arundhati Ray, B Kartikeyan, S Garg
DOI: 10.090592/IJCSC.2016.001
|
2 |
Model based robust Peak Detection algorithm of Radiation Pulse Shape using limited samples
Rajendra Chhajed, Himanshu Purohit, Madhuri Bhavsar
DOI: 10.090592/IJCSC.2016.002
|
3 |
Gujarati Braille Text Recognition: A Review
Himali Parekh, Stuti Shah, Feni Patel, Hardik Vyas
DOI: 10.090592/IJCSC.2016.003
|
4 |
A Review on Strategies and Methodologies of Dynamic Power Reduction on Low Power System Design
Kamal K Mehta
DOI: 10.090592/IJCSC.2016.004
|
5 |
Simulation of Picocell Interference Scenario for Cognitive Radio
Kushwinder Singh, Pooja
DOI: 10.090592/IJCSC.2016.005
|
6 |
Analysis of EDEEC and its types using different parameters
Manjit Kaur Minhas, Er. Tripatjot Singh Panag
DOI: 10.090592/IJCSC.2016.006
|
7 |
Detection of Node Replication Attack Using XED and EDD algorithms in Wireless Sensor Networks
Manisha R. Deore, R. V. Patil
DOI: 10.090592/IJCSC.2016.007
|
8 |
Performance evaluation of counting words from files using OpenMP
Prof. Smita Agrawal, Prof. Preeti Kathiria, Atul Patel, GUNJAN ASWANI, BINDIBEN BHATT
DOI: 10.090592/IJCSC.2016.008
|
9 |
AODV Routing Algorithm with Link Prediction Model
Prashant Singh D.K. Lobiyal
DOI: 10.090592/IJCSC.2016.009
|
10 |
Wearable live streaming gadget using Raspberry pi
Akash Dhamasia, Kunal Prajapati, Prof. Parita Oza
DOI: 10.090592/IJCSC.2016.010
|
11 |
Face Detection and Tracking: A Comparative study of two algorithms
Sonia Mittal, Chirag Shivnani
DOI: 10.090592/IJCSC.2016.011
|
12 |
Empirical Performance Comparison of OODBMS over RDBMS
Deepika Shukla , Neha Singh, Nidhi Jagudaniya, Ami Nirmal
DOI: 10.090592/IJCSC.2016.012
|
13 |
A Singular Value Decomposition Based Robust Image Watermarking Scheme
Deepti Varshney
DOI: 10.090592/IJCSC.2016.013
|
14 |
AdWords : A Study of Usage and Tools
Anuja.R.Nair, Shaina Thakkar
DOI: 10.090592/IJCSC.2016.014
|
15 |
Aggregated Search-A rising need for Information Retrieval
Aashka Kotecha, Shailee Patel, Shivani Desai
DOI: 10.090592/IJCSC.2016.015
|
16 |
Fuzzy Approach to Maintain Delay in Ad Hoc Network for DSDV Protocol
SamikshaNikam, Dr.B.T.Jadhav
DOI: 10.090592/IJCSC.2016.016
|
17 |
Hybrid Approach for Inpainting Large Object
Rajkumar L. Biradar
DOI: 10.090592/IJCSC.2016.017
|
18 |
Heart Disease Prediction Using Machine learning and Data Mining Technique
Jaymin Patel, Prof. Tejal Upadhyay, Dr. Samir Patel
DOI: 10.090592/IJCSC.2016.018
|
19 |
Feature Fusion of Colour Moment and Morphological Features for Enhanced Precision in Content Based Image Retrieval Systems
Swati Jain, Tanish Zaveri
DOI: 10.090592/IJCSC.2016.019
|
20 |
Software Process Models for Mobile Application Development: A Review
Anitha Ashishdeep, Jitendra Bhatia, Krunal Varma
DOI: 10.090592/IJCSC.2016.020
|
21 |
Usability of Long Passwords in Web Application
Vipul Chudasama, Vishal Parikh, Tejas Chauhan
DOI: 10.090592/IJCSC.2016.021
|
22 |
An Efficient Checkpointing Protocol for Mobile Distributed Systems
Raman Kumar, Parveen Kumar
DOI: 10.090592/IJCSC.2016.022
|
23 |
Lie Detection based on Human facial gestures
Prof. Tejal Upadhyay, Dipendy RoyRaman Kumar, Parveen Kumar
DOI: 10.090592/IJCSC.2016.023
|
24 |
Improving Security in P2P File Sharing Based on Network Coding for DTN
Vishal Parikh, Kajol Markana, Vijay Ukani, Malaram Kumhar
DOI: 10.090592/IJCSC.2016.024
|
25 |
Various Approaches to Recognise Human Emotions
Anitha Modi, Priyanka Sharma, Dvijesh Bhatt
DOI: 10.090592/IJCSC.2016.025
|
26 |
Medical Diagnosis System Using Machine Learning
Dhaval Raval, Dvijesh Bhatt, Malaram K Kumhar, Vishal Parikh, Daiwat Vyas
DOI: 10.090592/IJCSC.2016.026
|
27 |
Mobile Ad-Hoc Network: Applications and Challenges
Karan Singh, Anil Kumar
DOI: 10.090592/IJCSC.2016.027
|
28 |
IoT: Trends, Challenges and Future Scope
Daiwat A. Vyas, Dvijesh Bhatt, Dhaval Jha
DOI: 10.090592/IJCSC.2016.028
|
29 |
Data Quality Management - Tools and Techniques
Jigna Patel
DOI: 10.090592/IJCSC.2016.029
|
30 |
Brain Tumor Disease Identification Using Random Forest Classifiers
Meet Oza,Rupal Kapdi
DOI: 10.090592/IJCSC.2016.030
|
31 |
Security and Privacy with Perturbation Based Encryption Technique in Big Data
Prajapati Het I., Patel Shivani M., Prof. Ketan J. Sarvakar
DOI: 10.090592/IJCSC.2016.031
|
32 |
An Efficient Energy Hole Detection Approach for Mobile Sensor Networks
Yashwant Singh Sangwan, Surender Jangra
DOI: 10.090592/IJCSC.2016.032
|
33 |
Video Based Face Detection and Tracking for Forensic Applications
Ritika Lohiya, Pooja Shah
DOI: 10.090592/IJCSC.2016.033
|
34 |
FANET Communication Protocols: A Survey
Karan Palan, Priyanka Sharma
DOI: 10.090592/IJCSC.2016.034
|
35 |
Ransomware: A Threat to Cyber security
Deneesha Kansagra, Malaram Kumhar, Dhaval Jha
DOI: 10.090592/IJCSC.2016.035
|
36 |
Analysis of Energy Consumption in SET TOP BOX: A survey and Opportunities for Energy Saving
Rima Patel, GaurangRaval, SharadaValiveti
DOI: 10.090592/IJCSC.2016.036
|
37 |
A Machine Learning Approach to Improve the Efficiency of Fake Websites Detection Techniques
Anuj Dakwala, Kruti Lavingia
DOI: 10.090592/IJCSC.2016.037
|
38 |
Bandwidth Optimization for Real Time Video Streaming
Sarthak Trivedi, Priyanka Sharma
DOI: 10.090592/IJCSC.2016.038
|
39 |
Identification of Trusted Elements with Malicious Behavior of Public Cloud against DoS Attack
Mishti Samani, Jitendra Bhatia, Miren Karamta, M.B.potdar
DOI: 10.090592/IJCSC.2016.039
|
40 |
Deep Learning Algorithms
Jitali Patel, Pimal Khanpara, Akarsh Agarwal, Akash Motwani
DOI: 10.090592/IJCSC.2016.040
|
41 |
Comparing Multiple Linear Regression and Linear Support Vector Regression for Predicting in Stock Market
Dr. Priyank Thakkar
DOI: 10.090592/IJCSC.2016.041
|
42 |
Built-In Testing For Component Based Software Development in Embedded Systems
Divya Shree
DOI: 10.090592/IJCSC.2016.042
|
43 |
Use of Business Intelligence in Knowledge Management
Anish Soni
DOI: 10.090592/IJCSC.2016.043
|
44 |
Review of various Load Balancing Techniques in Cloud Computing
Jyoti Rathore,Dr. Bright Keswani, Dr. Vijay Singh Rathore
DOI: 10.090592/IJCSC.2016.044
|
45 |
Design and Analysis of a Levenshtein Distance Based Code Clones Detection Algorithm
Jai Bhagwan
DOI: 10.090592/IJCSC.2016.045
|
46 |
MATLAB: A Tool for Enhancing Teaching and Learning of Control System
Mahesh Kumar, Rajender Kumar
DOI: 10.090592/IJCSC.2016.046
|