CS Journals

Established Since 2008

IJCSC Volume-5 Issue-1 March 2014

 
SN Paper
1 Ameliorating the image matching algorithm of Sikuli using Artificial Neural Networks

Pragya Kuchhal

2 A Survey on an energy Efficient Routing Algorithms to Improve Performance & to Reduce Energy Consumption in Wireless Sensor Networks

Gagandeep kaur

3 Association Rule Mining: An Overview

Neesha Sharma, Chander Kant

4 Adaptive Estimation of the Doppler Shift in CDMA Using Monte Carlo Method

Nagarjuna.Telagam, Menaka devi. Nanjundan

5 Estimating Regression Effort in Agile Environment

Rashmi Popli, Priyanka Malhotra, Naresh Chauhan

6 Study on Security of Online Voting System Using Biometrics and Steganography

Neha Gandhi

7 An Efficient Approach for Detection and Extraction of Vehicle License Plates using Edge Detection Technique

Chetan Sharma, Ajit Singh

8 A Comparative Study of Different Biometric Technologies

Arun Kr. Yadav, Sanjiv Kr. Grewal

9 Video Search Engine Tool

Tarjni Vyas, Keyur Patel, Parth Shah

10 Optimized Data Aggregation Protocol in WSN for Automation of water Sprinklers

Parita Oza, Priyanka Sharma

11 Performance Evaluation of Ad-Hoc on-Demand Distance Vector Routing Protocol and its Multi-Path Variant AOMDV

Parita Oza, Pooja Shah

12 A Digital Image Processing Algorithm for Automation of Human Karyotyping

Priya Chaku, Pooja Shah, Sonal Bakshi

13 Semantic and Sentiment Analysis

Shivani Desai, Priyank Bhatt, Vraj Solanki

14 Analysis of Cryptography Techniques

Shivani Desai, Yamini Rathod

15 Movie Related Information Retrieval Using Ontology Based Semantic Search

Tarjni Vyas, Hetali Tank, Kinjal Shah

16 Adaptive Message Passing in Vehicular Ad-hoc Networks

Vijay Ukani, Jitendra Bhatia

17 A Survey on Peer-to-Peer File Sharing using Network Coding in Delay Tolerant Networks

Vishal U. Parikh, Zunnun Narmawala

18 Data Security using shifting the Bits: Algorithm SKG 2.1

Satish Kumar Garg

19 Securing Biometric System using Multibiometrics

Meenu Mittal

20 Enhancing the Lifetime of Wireless Sensor Networks and Balancing the Load Using LEACH Protocol and Iterative Deepening A* Algorithm

E. Mariappan, B.Paramasivan

21 Randomness analysis of A5/1 Stream Cipher for secure mobile communicationDarshana Upadhyay, Priyanka Sharma, Sharada Valiveti
22 Rapid and Compact generic binary-to-BCD conversion circuit for less powerful computational devicesUjjwal Thaakar, Darshana Upadhyay
23 Improving Biometric Recognition System performance using Multibiometrics

Suman

24 Vulnerability to Fingerprint Biometric Systems- An Overview

Ramesh Kumar

25 Security Issues and Challenges for Cloud Computing Environment

Dr. Rajesh Kumar, Naveen Monga

26 Evaluation of Usefulness of Unlabeled Data in Learning a Recommender

Vikas Parmar, Priyank Thakkar, K Kotecha

27 A Survey on Gene feature selection using microarray data for cancer classification

A.Natarajan, T.Ravi

28 Security Model based on Network coding & Homomorphic Encryption for Content Distribution in VANET

Binoli Shah, Jitendra Bhatia

29 Sentiment Analysis and Big Data Processing

Mo Karimkhan, Jitendra B. Bhatia

30 Parallelization of Synthetic Aperture Radar (SAR) Imaging Algorithms on GPU

Bhaumik Pandya, Nagendra Gajjar

31 Survey on Software Quality Assurance

Dhaval Jha, Vaishnavi Bhagat, Anjali Bidua

32 FPGAC: - High Level Synthesis Tool

Harish Bhutra, Usha Patel, Prof. Darshana Upadhyay

33 Frequent Pattern mining Using Novel FP-Growth Approach

Sanjay Patel, K.Kotecha, Viral Patel, Harsh Shukla, Dhyey Shah, Sharan Raghu

34 Conceptual Study of Agile Software Development

Sharnil Pandya, Ankur Kumar Yadav, Nikunj Dalsaniya, Vivek Mandir

35 A Composite Approach for Biometric Template Security

Sanjiv Kr. Grewal

36 Mobile Ad-hoc Network Performance Analysis: A Survey

Ajit Singh, R.S.Uppal

37 An Improved Approach to Multibiometrics Security

Gursimarpreet Kaur, Arun Kumar Yadav, Dr. Sheetal Chaudhary

38 ICT-A Novel way of Teaching, Learning & Research in Higher Education: A Case Study of University of Jammu

Nidhi Sambyal, Rohit Gupta

39 Security of Remote Devices with Personal Identification Card using Biometrics

Ravi Parkash Goela

40 A Gujarati Phonetic Engine using Microsoft SAPI

Dhaval Shah, Rucha Shah, Trupti Manik

41 FLCPlus: A Light-Weight Open-Source Library In C++ For Fuzzy Logic Controller

Krishna K Panduru

42 Performance Evaluation of Profit-Aware Optimized Task Scheduling in Load Balancing Algorithm

Sweta Kumari Meel, K. S. Raghuwanshi

43 A Mobility aware algorithm to Manage Network Performance over Mobile Ad-Hoc Network

Ajit Singh, R.S.Uppal

44 Moment Invariants based Blur Detection and Estimation for Blind Image Restoration

Ruchi Gajjar, Darshan Limbachiya, Tanish Zaveri, Kishor Upla

45 Elements of File Synchronous Technology

Neeharika Pandey, Sarabjeet Kaur

46 Fingerprint Matching Using Minutiae Points

Komal Sondhi, Yogesh Bansal

47 ETL-EXTRACT, TRANSFORM & LOAD TESTING

Rajesh Popli

48 Sorting Algorithms: A Comparative Study

Karmjit kaur