ISSN 2278–9669

Volume 1, Issue 1, January 2013

1. Fail-over Clusters – A Review [pdf ]

    Pabitra Mohan Khilar
 
    IJCSIT. 2013; 01(01): 05-09
 
 
2. Finite state machines implementation using DNA Techniques [pdf]
 
     Abeer Eshra and Ayman El-Sayed
 
     IJCSIT. 2013; 01(01): 10 - 16
 
3. Forecasting of Road Traffic Congestion Using Weighted Density Variation Algorithm [pdf]
 
     Prasanna Kumara and Alok Ranjan
 
     IJCSIT. 2013; 01(01): 17 - 21
 
4. Transformation of Digital Images using Morphlogical Operations [pdf]
 
     Amalarpovam et.Al.
 
     IJCSIT. 2013; 01(01): 22 - 28
 
5. A Survey on Network Security Issues in Cloud Computing [pdf]
 
    John Jeya Singh et.Al.
 
    IJCSIT. 2013; 01(01): 29 - 32
 
6. Data Center –Based, Service Oriented Architecture (SOA) in Cloud Computing [pdf]
 
    Abu Sarwar Zamani et.Al.
 
    IJCSIT. 2013; 01(01): 33 - 37
7. Applications of Remote Sensing (RS) and Geographic Information Systems (GIS) [pdf]
 
    Osama Bardan
 
    IJCSIT. 2013; 01(01): 38 - 52
    
Volume 1, Issue 2, April 2013

1.MITIGATE REPLICA NODES IN WIRELESS SENSOR NETWORKS USING ADAPTIVE TRAFFIC DATA CONTROL    SCHEME [ATDCS] [pdf ]

   S. KUMARAVEL and S. PRABHA
 
    IJCSIT. 2013; 01(02): 01-08
 
 
2. DESIGN AND IMPLEMENTATION OF PARAMETER TUNING ON ORACLE DBMS[pdf]
 
     DR. OSSAMA K. MUSLIH  AND DR. ALAA H. AL-HAMAMY
 
     IJCSIT. 2013; 01(02): 09 - 12
 
3.CLOUD-SLA: SERVICE LEVEL AGREEMENT FOR CLOUD COMPUTING [pdf]
 
     UDAYAKUMAR et.Al.,
 
     IJCSIT. 2013; 01(02): 13 - 16
 
4. ADVANCEMENT OF ROUTING AND FORWARDING IN MANET [pdf]
 
     THAMARAI SELVI et.Al.,
 
     IJCSIT. 2013; 01(02): 17 - 21
 
 
5. OPTIMIZATION OF HARD HANDOFF IN MOBILE COMMUNICATIONS USING IPv6 [pdf]
 
     NWALOZIEet.Al.,
 
     IJCSIT. 2013; 01(02): 22 - 31
 
 
6. PERFORMANCE EVALUATION OF WIRELESS LOCAL AREA NETWORK (WLAN) [pdf]
 
     UFOAROH et.Al.,
 
     IJCSIT. 2013; 01(02): 32 - 43
 
7. NATIONAL ID CARDS [pdf]
 
     YAZEED ALKHURAYYIF et.Al.,
 
     IJCSIT. 2013; 01(02): 44 - 48
 
8. KNOWLEDGE SIMULATION AND KNOWLEDGE ENGINEERING AN ABSTRACT [pdf]
 
     ELRASHEID MOHMED AHMED ELRAYAH et.Al.,
 
     IJCSIT. 2013; 01(02): 49 - 52
 

Volume 1, Issue 3, July 2013

1.DISTRIBUTED MULTI CONTROL MONITORING APPLICATION (DMCMA) BASED ON MOBILE/WIRELESS     NETWORKS  [pdf ]

  Afif Mghawish, Akram Abdel Qader and Mohammad AbuMahfouz
 
    IJCSIT. 2013; 01(03): 01-09
 
 
2. Security in Wireless Sensor Network [pdf]
 
     Yazeed ALKHURAYYIF
 
     IJCSIT. 2013; 01(03): 10 - 17
 
 

Volume 2, Issue 1, January 2014

1.Effectiveness of various FPM Algorithms in Data Mining  [pdf ]

    Dr. Telkapalli Murali Krishna
 
    IJCSIT. 2014; 02(01): 01-05
 
 
2. SOLUTION OF STOCHASTIC COOPERATIVE INVENTORY MODELS BY INTUTIONISTIC FUZZY OPTIMIZATION TECHNIQUE [pdf]
 
 
     K. KALAIARASI
 
     IJCSIT. 2014; 02(01): 06 - 10
 
3. THE ASSESSMENT AND MANAGMENT OF WATER RESOURCES IN EL-QAA PLAIN SOUTHWEST SINAI PENINSULA, EGYPT USING REMOTE SENSING TECHNIQUES  [pdf]
 
 
     OSAMA BARDAN
 
     IJCSIT. 2014; 02(01): 11 - 18
 
 

Volume 2, Issue 2, April 2014

1.An Improvement of Write-Back Caches  [pdf ]

    Arun Kanti Manna et al.,
 
    IJCSIT. 2014; 02(02): 01-05
 
 
2. Designing of a flexible Algorithm system for the statistical processing of     students' grades[pdf]
 
     Dr.Mozamel M.Saeed et al.,
 
     IJCSIT. 2014; 02(02): 06 - 10
 
 
3. Parallel processing application for cluster computing on gridsim using     Artificial Neural Network approach[pdf]
 
     Minal Dhoke et al.,
 
     IJCSIT. 2014; 02(02): 11 - 14
 
4. Optimization of trapezoidal balanced Transportation problem using     zero-suffix and Robust Ranking   Methodology with fuzzy demand and     fuzzy supply models [pdf]
 
   Dr. K.Kalaiarasi et al.,

Volume 2, Issue 3, July 2014

1.A novel approach for coin recognition using GLCM and Sweep line algorithm  [pdf ]

      T.M. Amarunishad et al.,
 
       IJCSIT. 2014; 02(03): 01-05
 
 
2. A comparative study on Time Based and Feature Driven   Release Management Techniques in Free and Open Source Software Projects [pdf]
 
     Nagendra et al.,
 
     IJCSIT. 2014; 02(03): 06 - 12
 
 
3. Agricultural Data Mining –Exploratory and Predictive model for finding Agricultural Product Patterns[pdf]
 
     Gulledmath Sangayya et al.,
 
     IJCSIT. 2014; 02(03): 12 - 19
 
4. Minimization of fuzzy assignment model using Robust Ranking technique with trapezoidal fuzzy numbers  [pdf]
 
      K.Kalaiarasi et al.,
 
      IJCSIT. 2014; 02(03): 20 - 26
 
 
Volume 2, Issue 4, October 2014

1.Some Studies on Relationship between BioTechnology Databases & Bioinformatics  [pdf ]

      N.Deepak Kumar et al.,
 
       IJCSIT. 2014; 02(04): 01-05
 
 
2. SOME STUDIES ON MAJOR DATABASES IN BIOINFORMATICS  [pdf ]
 
      N.Deepak Kumar et al.,
 
       IJCSIT. 2014; 02(04): 06-10
 
 

Volume 3, Issue 1, January 2015

1.An Effective Process for Finding Frequent Sequential Traversal Patterns on   Varying Weight Range  [pdf ]

       Abilasha vyas et al.,
 
       IJCSIT. 2015; 03(01): 01-06
 
 
2. Aggregated Probabilistic Fuzzy Relational Sentence Level Expectation Maximization Clustering Algorithm using Subjective Method For Efficient Text classification  [pdf ]
 
        Kartheek V.L. et al.,
 
        IJCSIT. 2015; 03(01): 07-12

 

3. Dynamic Load Balancing Strategies For a Distirbuted Computer System  [pdf ]
 
       Vijayabharathi.J. et al.,
 
       IJCSIT. 2015; 03(01): 13-18
 
 
4. Multi Attribute Based Security and Key Distribution for Secure Storage in Clouds  [pdf ]
 
       Vaishali R. et al.,
 
       IJCSIT. 2015; 03(01): 19-25
 
Volume 3, Issue 2, April 2015

1.Face Recognition of Illuminated Images Using Dwt and Pca [pdf ]

       Suchitra et al.,
       IJCSIT. 2015; 03(02): 01-05
 
2. User Ranking In WSNs Service  [pdf ]
 
        Deepana et al.,
        IJCSIT. 2015; 03(02): 06-09
 
3. Operation of hybrid electric vehicle using bidirectional DC - DC converter [pdf ]
 
       Arupananda Pradhan. et al.,
       IJCSIT. 2015; 03(02): 10-13
 
 
4. A Pattern Categorization Based Association Mining for Medical Databases  [pdf ]
 
       Mohit Sachan. et al.,
       IJCSIT. 2015; 03(02): 14-19
 
 

Volume 3, Issue 3, July 2015

1.Document Image Segmentation using Region Based Methods [pdf ]

       Manish T.Wanjari et al.,
       IJCSIT. 2015; 03(03): 01-08
 
2. A Framework for Text Extraction from Document Images [pdf ]
 
        Vikas K. Yeotikar et al.,
        IJCSIT. 2015; 03(03): 09-17
 
3. Web Personalization using web usage mining: applications,Pros and Cons,Future[pdf ]            
 
      Sneha Prakash
       IJCSIT. 2015; 03(03): 18-26
 
 

Volume 4, Issue 1, January 2016

1. IMPROVING DRIVING EFFICIENCY OF VEHICULAR AD-HOC NETWORK USING AODV ROUTING PROTOCOLS [pdf ]

    Richa Mishra et.al.,
 
    IJCSIT. 2016; 01(01): 01-04
 
 
2. PREDICTION AND LOAD BALANCED CLUSTERING FOR MOBILE DATA GATHERING IN WIRELESS SENSOR NETWORK LIFETIME EXTENSION [pdf]
 
     R.Shanmathi et.al.,
 
     IJCSIT. 2016; 01(01): 05 - 08
 
Volume 5, Issue 1, January 2017

1. An Implementation of Downlink Scheduling Algorithm for Improving UMTS Network [pdf ]

    Kritesh et.al.,
 
    IJCSIT. 2017; 01(01): 01-06
 
2. A novel approach for data integrity protection in cloud [pdf ]
     
   Mohamed Abdul-Aziz Gaffar Ahmed et.al.,
 
    IJCSIT. 2017; 01(01): 07-11
 

Volume 6, Issue 1, April 2018

Special Issue: International Conference on Computational Intelligence and Communication (ICCIC 2018), held in Presidency College, Bengaluru.

CONFERENCE EDITOR

Dr. Narayanaswamy Ph.D.,

Dr. Deepa Ph.D.,

1. eARMIA model to Analyses and Ranking Attributes of Time Series Data [pdf ]

    S.Gokila et.al.,
 
    IJCSIT. 2018; 06(01): 01-06
 
2. Study of Image Enhancement Techniques Using Histogram Processing [pdf ]
     
      Harish Naik T et.al.,
 
       IJCSIT. 2018; 06(01): 07-11
 
 
3. Real Time Vehicles Parking System Enabling Wireless Sensors In Cars [pdf ]
 
      Adhi.Sridevi et,al.,
 
      IJCSIT. 2018; 06(01): 12-13
 
4. Emerging Trends Of Information Technology In Education [pdf ]
 
      E.K.Radhika et. al.,
 
      IJCSIT. 2018; 06(01):14-16
 
5. Various Network Security Attacks And Prevention Of Attacks [pdf ]
 
      Dr. K.R. Viswa Jhananie et.al.,
 
      IJCSIT. 2018; 06(01):17-19
 
6. Skeleton Approach Based Gait Recognition For Human Identification[pdf ]
 
      Manjunatha Guru  et. al.,
 
      IJCSIT. 2018; 06(01):20-24
 
7. Analysis Of Tweet Sentiments And Causality Extraction For Prediction[pdf ]
 
    P .G.Preethi et.al.,
 
    IJCSIT. 2018; 06(01):25-30
 
8. Multiresolution Gray-Scale And Rotation Invariant Feature Extraction For An Object Recognition System In A Cluttered Scene[pdf ]
 
     Priya M.S et. al.,
     
     IJCSIT. 2018; 06(01):31-32
 
9. Conceptual Performance Of Various Cluster Based Olsr[pdf ]
 
      Hamela K et. al.,
 
      IJCSIT. 2018; 06(01):35-38
 
10. Data Mining Tools For Analyzing Microarray[pdf ]
 
       Sharmila Ravishankar 
 
       IJCSIT. 2018; 06(01):39-42
 
11. A Novel Methods For Diagnosis Of Diabetes Mellitus Using Machine Learning Classifiers [pdf ]
 
       Thiyagarajan C et.al.,
 
       IJCSIT. 2018; 06(01):43-49
 
 
12. A Methodical Review Of Virtualization Techniques In Cloud Computing [pdf ]
 
      Salini Suresh et.al.,
 
      IJCSIT. 2018; 06(01):50-53
 
13. Machine Learning Technique For Alzheimer’s Disease (Ad) – A Comprehensive Review [pdf ]
 
      Sumanth S et.al.,
 
      IJCSIT. 2018; 06(01):54-58
 
14. Application of Semantic Ontology for Observation of L’Aquila Toads, to Forecast Earthquakes’ [pdf ]
 
      J. Vijay Fidelis et.al.,
 
      IJCSIT. 2018; 06(01):59-62
 
15. Emerging Technologies In Food Processing [pdf ]
 
       Rajeswari. A et.al.,
 
       IJCSIT. 2018; 06(01): 63-66
 
16.Managing Community Identification With Distributed Cloud Using Internet Of Things[pdf ]
       
       Eshwaridevi Jagapur et.al.,
 
       IJCSIT. 2018; 06(01): 67-70
 
17.  Watermarking – Review &Applications[pdf ]
 
       R.Hemalatha et.al.,
 
       IJCSIT. 2018; 06(01): 71-73   
 
18. An Enterprise model - Cloud Computing[pdf ]
 
        S.Sree Mahithra et.al.,
 
        IJCSIT. 2018; 06(01): 74-79
 
19. A Study On Heat Generation Effecting The Performance Of Electronic Gadgets – Designer Challenges[pdf ]
     
        Rashmi B et.al.,
       
        IJCSIT. 2018; 06(01): 80-82
 
20. A Survey On The Language Transliteration From English To Kannada Using Application[pdf ]
 
       Megha H.R. et. al.,
 
       IJCSIT. 2018; 06(01): 83-85       
 
21. Automatic Helmet Wearing Detection on Public Roads Using Embedded System[pdf ]
 
        Sivakuamar.T et.al.,
 
       IJCSIT. 2018; 06(01): 86-87
 
22. Survey paper on Mobile Cloud Computing[pdf ]
  
        Mohammed Zabeeulla A N
 
        IJCSIT. 2018; 06(01): 88-91
 
23. Authentication & Key Agreement[pdf ]
      
       Priya Hari et.al.,
 
       IJCSIT. 2018; 06(01): 92-94
 
24. Review of EDM for Higher Education Sustainability[pdf ]
 
       N Kartik et.al.,
 
      IJCSIT. 2018; 06(01): 95-97
       
 
25Applications Of Data Mining Techniques In Software Defect Prediction[pdf ]
       
      Yethiraj N G et.al.,
 
      IJCSIT. 2018; 06(01): 98-100
 
26. Survey On Data Safety and Effectiveness estimation in cloud computing using Cloud Computing Adoption Framework[pdf ]
 
       Jyoti Vaishnav
 
       IJCSIT. 2018; 06(01): 101-105
 
27. Software Engineering Development[pdf ]
 
      N. Girija et.al.,
 
       IJCSIT. 2018; 06(01): 106-112
 
28. Optimizing Energy and Data Storage in WSN integrated Cloud applying Fuzzy method[pdf ]
 
       Suma S.V
   
         IJCSIT. 2018; 06(01): 113-118
 
29. The Privacy Issues With Third Party Applications On Facebook[pdf ]
 
         N. Jayalakshmi  et.al.,
   
        IJCSIT. 2018; 06(01): 119-125
 
30. Network Intrusion Detection System for Denial of Service Attack based on Anomaly Detection[pdf ]
 
     Y.S.Kalai Vani et.al.,
 
       IJCSIT. 2018; 06(01): 126-129


Share On :