CS Journals

Established Since 2008

IJCSC Volume-7 Issue-1 Sept. 2015 - March 2016

 
SN Paper
1 Towards Identifying Optimal Quality Indicators for Evaluating De-Noising Algorithm Performance in SAR

Arundhati Ray, B Kartikeyan, S Garg

DOI: 10.090592/IJCSC.2016.001

2 Model based robust Peak Detection algorithm of Radiation Pulse Shape using limited samples

Rajendra Chhajed, Himanshu Purohit, Madhuri Bhavsar

DOI: 10.090592/IJCSC.2016.002

3 Gujarati Braille Text Recognition: A Review

Himali Parekh, Stuti Shah, Feni Patel, Hardik Vyas

DOI: 10.090592/IJCSC.2016.003

4 A Review on Strategies and Methodologies of Dynamic Power Reduction on Low Power System Design

Kamal K Mehta

DOI: 10.090592/IJCSC.2016.004

5 Simulation of Picocell Interference Scenario for Cognitive Radio 

Kushwinder Singh, Pooja

DOI: 10.090592/IJCSC.2016.005

6 Analysis of EDEEC and its types using different parameters

Manjit Kaur Minhas, Er. Tripatjot Singh Panag

DOI: 10.090592/IJCSC.2016.006

7 Detection of Node Replication Attack Using XED and EDD algorithms in Wireless Sensor Networks

Manisha R. Deore, R. V. Patil

DOI: 10.090592/IJCSC.2016.007

8 Performance evaluation of counting words from files using OpenMP

Prof. Smita Agrawal, Prof. Preeti Kathiria, Atul Patel, GUNJAN ASWANI, BINDIBEN BHATT

DOI: 10.090592/IJCSC.2016.008

9 AODV Routing Algorithm with Link Prediction Model 

Prashant Singh    D.K. Lobiyal

DOI: 10.090592/IJCSC.2016.009

10 Wearable live streaming gadget using Raspberry pi

Akash Dhamasia, Kunal Prajapati, Prof. Parita Oza

DOI: 10.090592/IJCSC.2016.010

11 Face Detection and Tracking: A Comparative study of two algorithms

Sonia Mittal, Chirag Shivnani

DOI: 10.090592/IJCSC.2016.011

12 Empirical Performance Comparison of OODBMS over RDBMS

Deepika Shukla , Neha Singh, Nidhi Jagudaniya, Ami Nirmal

DOI: 10.090592/IJCSC.2016.012

13 A Singular Value Decomposition Based Robust Image Watermarking Scheme

Deepti Varshney

DOI: 10.090592/IJCSC.2016.013

14 AdWords : A Study of Usage and Tools

Anuja.R.Nair, Shaina Thakkar

DOI: 10.090592/IJCSC.2016.014

15 Aggregated Search-A rising need for Information Retrieval

Aashka Kotecha, Shailee Patel, Shivani Desai

DOI: 10.090592/IJCSC.2016.015

16 Fuzzy Approach to Maintain Delay in Ad Hoc Network for DSDV Protocol

SamikshaNikam, Dr.B.T.Jadhav

DOI: 10.090592/IJCSC.2016.016

17 Hybrid Approach for Inpainting Large Object

Rajkumar L. Biradar

DOI: 10.090592/IJCSC.2016.017

18 Heart Disease Prediction Using Machine learning and Data Mining Technique

Jaymin Patel, Prof. Tejal Upadhyay, Dr. Samir Patel

DOI: 10.090592/IJCSC.2016.018

19 Feature Fusion of Colour Moment and Morphological Features for Enhanced Precision in Content Based Image Retrieval Systems

Swati Jain, Tanish Zaveri

DOI: 10.090592/IJCSC.2016.019

20 Software Process Models for Mobile Application Development: A Review

Anitha Ashishdeep, Jitendra Bhatia, Krunal Varma

DOI: 10.090592/IJCSC.2016.020

21 Usability of Long Passwords in Web Application

Vipul Chudasama, Vishal Parikh, Tejas Chauhan

DOI: 10.090592/IJCSC.2016.021

22 An Efficient Checkpointing Protocol for Mobile Distributed Systems

Raman Kumar, Parveen Kumar

DOI: 10.090592/IJCSC.2016.022

23 Lie Detection based on Human facial gestures

Prof. Tejal Upadhyay, Dipendy RoyRaman Kumar, Parveen Kumar

DOI: 10.090592/IJCSC.2016.023

24 Improving Security in P2P File Sharing Based on Network Coding for DTN

Vishal Parikh, Kajol Markana, Vijay Ukani, Malaram Kumhar

DOI: 10.090592/IJCSC.2016.024

25 Various Approaches to Recognise Human Emotions

Anitha Modi, Priyanka Sharma, Dvijesh Bhatt

DOI: 10.090592/IJCSC.2016.025

26 Medical Diagnosis System Using Machine Learning

Dhaval Raval, Dvijesh Bhatt, Malaram K Kumhar, Vishal Parikh, Daiwat Vyas

DOI: 10.090592/IJCSC.2016.026

27 Mobile Ad-Hoc Network: Applications and Challenges

Karan Singh, Anil Kumar

DOI: 10.090592/IJCSC.2016.027

28 IoT: Trends, Challenges and Future Scope

Daiwat A. Vyas, Dvijesh Bhatt, Dhaval Jha

DOI: 10.090592/IJCSC.2016.028

29 Data Quality Management - Tools and Techniques

Jigna Patel

DOI: 10.090592/IJCSC.2016.029

30 Brain Tumor Disease Identification Using Random Forest Classifiers

Meet Oza,Rupal Kapdi

DOI: 10.090592/IJCSC.2016.030

31 Security and Privacy with Perturbation Based Encryption Technique in Big Data

Prajapati Het I., Patel Shivani M., Prof. Ketan  J. Sarvakar

DOI: 10.090592/IJCSC.2016.031

32 An Efficient Energy Hole Detection Approach for Mobile Sensor Networks

Yashwant Singh Sangwan, Surender Jangra

DOI: 10.090592/IJCSC.2016.032

33 Video Based Face Detection and Tracking for Forensic Applications

Ritika Lohiya, Pooja Shah

DOI: 10.090592/IJCSC.2016.033

34 FANET Communication Protocols: A Survey

Karan Palan, Priyanka Sharma

DOI: 10.090592/IJCSC.2016.034

35 Ransomware: A Threat to Cyber security

Deneesha Kansagra, Malaram Kumhar, Dhaval Jha

DOI: 10.090592/IJCSC.2016.035

36 Analysis of Energy Consumption in SET TOP BOX: A survey and Opportunities for Energy Saving

Rima Patel, GaurangRaval, SharadaValiveti

DOI: 10.090592/IJCSC.2016.036

37 A Machine Learning Approach to Improve the Efficiency of Fake Websites Detection Techniques

Anuj Dakwala, Kruti Lavingia

DOI: 10.090592/IJCSC.2016.037

38 Bandwidth Optimization for Real Time Video Streaming

Sarthak Trivedi, Priyanka Sharma

DOI: 10.090592/IJCSC.2016.038

39 Identification of Trusted Elements with Malicious Behavior of Public Cloud against DoS Attack

Mishti Samani, Jitendra Bhatia, Miren Karamta, M.B.potdar

DOI: 10.090592/IJCSC.2016.039

40 Deep Learning Algorithms

Jitali Patel, Pimal Khanpara, Akarsh Agarwal, Akash Motwani

DOI: 10.090592/IJCSC.2016.040

41 Comparing Multiple Linear Regression and Linear Support Vector Regression for Predicting in Stock Market

Dr. Priyank Thakkar

DOI: 10.090592/IJCSC.2016.041

42 Built-In Testing For Component Based Software Development in Embedded Systems

Divya Shree

DOI: 10.090592/IJCSC.2016.042

43 Use of Business Intelligence in Knowledge Management

Anish Soni

DOI: 10.090592/IJCSC.2016.043

44 Review of various Load Balancing Techniques in Cloud Computing

Jyoti Rathore,Dr. Bright Keswani, Dr. Vijay Singh Rathore

DOI: 10.090592/IJCSC.2016.044

45 Design and Analysis of a Levenshtein Distance Based Code Clones Detection Algorithm

Jai Bhagwan

DOI: 10.090592/IJCSC.2016.045

46 MATLAB: A Tool for Enhancing Teaching and Learning of Control System

Mahesh Kumar, Rajender Kumar

DOI: 10.090592/IJCSC.2016.046