ISSN 2278–9669

 

Volume 6, Issue 1, April 2018

Special Issue: International Conference on Computational Intelligence and Communication (ICCIC 2018), held in Presidency College, Bengaluru.

CONFERENCE EDITOR

Dr. Narayanaswamy Ph.D.,

Dr. Deepa Ph.D.,

1. eARMIA model to Analyses and Ranking Attributes of Time Series Data [pdf ]

    S.Gokila et.al.,
 
    IJCSIT. 2018; 06(01): 01-06
 
2. Study of Image Enhancement Techniques Using Histogram Processing [pdf ]
     
      Harish Naik T et.al.,
 
       IJCSIT. 2018; 06(01): 07-11
 
 
3. Real Time Vehicles Parking System Enabling Wireless Sensors In Cars [pdf ]
 
      Adhi.Sridevi et,al.,
 
      IJCSIT. 2018; 06(01): 12-13
 
4. Emerging Trends Of Information Technology In Education [pdf ]
 
      E.K.Radhika et. al.,
 
      IJCSIT. 2018; 06(01):14-16
 
5. Various Network Security Attacks And Prevention Of Attacks [pdf ]
 
      Dr. K.R. Viswa Jhananie et.al.,
 
      IJCSIT. 2018; 06(01):17-19
 
6. Skeleton Approach Based Gait Recognition For Human Identification[pdf ]
 
      Manjunatha Guru  et. al.,
 
      IJCSIT. 2018; 06(01):20-24
 
7. Analysis Of Tweet Sentiments And Causality Extraction For Prediction[pdf ]
 
    P .G.Preethi et.al.,
 
    IJCSIT. 2018; 06(01):25-30
 
8. Multiresolution Gray-Scale And Rotation Invariant Feature Extraction For An Object Recognition System In A Cluttered Scene[pdf ]
 
     Priya M.S et. al.,
     
     IJCSIT. 2018; 06(01):31-32
 
9. Conceptual Performance Of Various Cluster Based Olsr[pdf ]
 
      Hamela K et. al.,
 
      IJCSIT. 2018; 06(01):35-38
 
10. Data Mining Tools For Analyzing Microarray[pdf ]
 
       Sharmila Ravishankar 
 
       IJCSIT. 2018; 06(01):39-42
 
11. A Novel Methods For Diagnosis Of Diabetes Mellitus Using Machine Learning Classifiers [pdf ]
 
       Thiyagarajan C et.al.,
 
       IJCSIT. 2018; 06(01):43-49
 
 
12. A Methodical Review Of Virtualization Techniques In Cloud Computing [pdf ]
 
      Salini Suresh et.al.,
 
      IJCSIT. 2018; 06(01):50-53
 
13. Machine Learning Technique For Alzheimer’s Disease (Ad) – A Comprehensive Review [pdf ]
 
      Sumanth S et.al.,
 
      IJCSIT. 2018; 06(01):54-58
 
14. Application of Semantic Ontology for Observation of L’Aquila Toads, to Forecast Earthquakes’ [pdf ]
 
      J. Vijay Fidelis et.al.,
 
      IJCSIT. 2018; 06(01):59-62
 
15. Emerging Technologies In Food Processing [pdf ]
 
       Rajeswari. A et.al.,
 
       IJCSIT. 2018; 06(01): 63-66
 
16.Managing Community Identification With Distributed Cloud Using Internet Of Things[pdf ]
       
       Eshwaridevi Jagapur et.al.,
 
       IJCSIT. 2018; 06(01): 67-70
 
17.  Watermarking – Review &Applications[pdf ]
 
       R.Hemalatha et.al.,
 
       IJCSIT. 2018; 06(01): 71-73   
 
18. An Enterprise model - Cloud Computing[pdf ]
 
        S.Sree Mahithra et.al.,
 
        IJCSIT. 2018; 06(01): 74-79
 
19. A Study On Heat Generation Effecting The Performance Of Electronic Gadgets – Designer Challenges[pdf ]
     
        Rashmi B et.al.,
       
        IJCSIT. 2018; 06(01): 80-82
 
20. A Survey On The Language Transliteration From English To Kannada Using Application[pdf ]
 
       Megha H.R. et. al.,
 
       IJCSIT. 2018; 06(01): 83-85       
 
21. Automatic Helmet Wearing Detection on Public Roads Using Embedded System[pdf ]
 
        Sivakuamar.T et.al.,
 
       IJCSIT. 2018; 06(01): 86-87
 
22. Survey paper on Mobile Cloud Computing[pdf ]
  
        Mohammed Zabeeulla A N
 
        IJCSIT. 2018; 06(01): 88-91
 
23. Authentication & Key Agreement[pdf ]
      
       Priya Hari et.al.,
 
       IJCSIT. 2018; 06(01): 92-94
 
24. Review of EDM for Higher Education Sustainability[pdf ]
 
       N Kartik et.al.,
 
      IJCSIT. 2018; 06(01): 95-97
       
 
25Applications Of Data Mining Techniques In Software Defect Prediction[pdf ]
       
      Yethiraj N G et.al.,
 
      IJCSIT. 2018; 06(01): 98-100
 
26. Survey On Data Safety and Effectiveness estimation in cloud computing using Cloud Computing Adoption Framework[pdf ]
 
       Jyoti Vaishnav
 
       IJCSIT. 2018; 06(01): 101-105
 
27. Software Engineering Development[pdf ]
 
      N. Girija et.al.,
 
       IJCSIT. 2018; 06(01): 106-112
 
28. Optimizing Energy and Data Storage in WSN integrated Cloud applying Fuzzy method[pdf ]
 
       Suma S.V
   
         IJCSIT. 2018; 06(01): 113-118
 
29. The Privacy Issues With Third Party Applications On Facebook[pdf ]
 
         N. Jayalakshmi  et.al.,
   
        IJCSIT. 2018; 06(01): 119-125
 
30. Network Intrusion Detection System for Denial of Service Attack based on Anomaly Detection[pdf ]
 
     Y.S.Kalai Vani et.al.,
 
       IJCSIT. 2018; 06(01): 126-129
 
31. Necessary Requirements for Block chain Technology and applications[pdf ]
 
        Sheetal et.al.,
     
       IJCSIT. 2018; 06(01): 130-133
 
32. Security Challenges in Wireless Sensor Networks- A Review[pdf ]
 
       A. P. Nirmala et.al.,
 
      IJCSIT. 2018; 06(01): 134-138
 
33. Data Stream Prediction Using Ddsmi Algorithm[pdf ]
 
      Priya.S
 
      IJCSIT. 2018; 06(01): 139-142
    
34. A Keyless Approach to Image Encryption and Decryption by applying Transformations[pdf ]
 
     Vasantha Kumari N
 
     IJCSIT. 2018; 06(01): 143-147
 
35. A Survey on Hashgraph The Future of Decentralized Technology[pdf ]
 
        Monika M S et.al.,
 
        IJCSIT. 2018; 06(01): 148-151