IJCSIT. 2016; 01(01): 05 - 08
Volume 5, Issue 1, January 2017
1. An Implementation of Downlink Scheduling Algorithm for Improving UMTS Network [pdf ]
Kritesh et.al.,
IJCSIT. 2017; 01(01): 01-06
2. A novel approach for data integrity protection in cloud [pdf ]
Mohamed Abdul-Aziz Gaffar Ahmed et.al.,
IJCSIT. 2017; 01(01): 07-11
Volume 6, Issue 1, April 2018
Special Issue: International Conference on Computational Intelligence and Communication (ICCIC 2018), held in Presidency College, Bengaluru.
CONFERENCE EDITOR
Dr. Narayanaswamy Ph.D.,
Dr. Deepa Ph.D.,
1. eARMIA model to Analyses and Ranking Attributes of Time Series Data [pdf ]
S.Gokila et.al.,
IJCSIT. 2018; 06(01): 01-06
2. Study of Image Enhancement Techniques Using Histogram Processing [pdf ]
Harish Naik T et.al.,
IJCSIT. 2018; 06(01): 07-11
3. Real Time Vehicles Parking System Enabling Wireless Sensors In Cars [pdf ]
Adhi.Sridevi et,al.,
IJCSIT. 2018; 06(01): 12-13
4. Emerging Trends Of Information Technology In Education [pdf ]
E.K.Radhika et. al.,
IJCSIT. 2018; 06(01):14-16
5. Various Network Security Attacks And Prevention Of Attacks [pdf ]
Dr. K.R. Viswa Jhananie et.al.,
IJCSIT. 2018; 06(01):17-19
6. Skeleton Approach Based Gait Recognition For Human Identification[pdf ]
Manjunatha Guru et. al.,
IJCSIT. 2018; 06(01):20-24
7. Analysis Of Tweet Sentiments And Causality Extraction For Prediction[pdf ]
P .G.Preethi et.al.,
IJCSIT. 2018; 06(01):25-30
8. Multiresolution Gray-Scale And Rotation Invariant Feature Extraction For An Object Recognition System In A Cluttered Scene[pdf ]
Priya M.S et. al.,
IJCSIT. 2018; 06(01):31-32
9. Conceptual Performance Of Various Cluster Based Olsr[pdf ]
Hamela K et. al.,
IJCSIT. 2018; 06(01):35-38
10. Data Mining Tools For Analyzing Microarray[pdf ]
Sharmila Ravishankar
IJCSIT. 2018; 06(01):39-42
11. A Novel Methods For Diagnosis Of Diabetes Mellitus Using Machine Learning Classifiers [pdf ]
Thiyagarajan C et.al.,
IJCSIT. 2018; 06(01):43-49
12. A Methodical Review Of Virtualization Techniques In Cloud Computing [pdf ]
Salini Suresh et.al.,
IJCSIT. 2018; 06(01):50-53
13. Machine Learning Technique For Alzheimer’s Disease (Ad) – A Comprehensive Review [pdf ]
Sumanth S et.al.,
IJCSIT. 2018; 06(01):54-58
14. Application of Semantic Ontology for Observation of L’Aquila Toads, to Forecast Earthquakes’ [pdf ]
J. Vijay Fidelis et.al.,
IJCSIT. 2018; 06(01):59-62
15. Emerging Technologies In Food Processing [pdf ]
Rajeswari. A et.al.,
IJCSIT. 2018; 06(01): 63-66
16.Managing Community Identification With Distributed Cloud Using Internet Of Things[pdf ]
Eshwaridevi Jagapur et.al.,
IJCSIT. 2018; 06(01): 67-70
17. Watermarking – Review &Applications[pdf ]
R.Hemalatha et.al.,
IJCSIT. 2018; 06(01): 71-73
18. An Enterprise model - Cloud Computing[pdf ]
S.Sree Mahithra et.al.,
IJCSIT. 2018; 06(01): 74-79
19. A Study On Heat Generation Effecting The Performance Of Electronic Gadgets – Designer Challenges[pdf ]
Rashmi B et.al.,
IJCSIT. 2018; 06(01): 80-82
20. A Survey On The Language Transliteration From English To Kannada Using Application[pdf ]
Megha H.R. et. al.,
IJCSIT. 2018; 06(01): 83-85
21. Automatic Helmet Wearing Detection on Public Roads Using Embedded System[pdf ]
Sivakuamar.T et.al.,
IJCSIT. 2018; 06(01): 86-87
22. Survey paper on Mobile Cloud Computing[pdf ]
Mohammed Zabeeulla A N
IJCSIT. 2018; 06(01): 88-91
23. Authentication & Key Agreement[pdf ]
Priya Hari et.al.,
IJCSIT. 2018; 06(01): 92-94
24. Review of EDM for Higher Education Sustainability[pdf ]
N Kartik et.al.,
IJCSIT. 2018; 06(01): 95-97
25. Applications Of Data Mining Techniques In Software Defect Prediction[pdf ]
Yethiraj N G et.al.,
IJCSIT. 2018; 06(01): 98-100
26. Survey On Data Safety and Effectiveness estimation in cloud computing using Cloud Computing Adoption Framework[pdf ]
Jyoti Vaishnav
IJCSIT. 2018; 06(01): 101-105
27. Software Engineering Development[pdf ]
N. Girija et.al.,
IJCSIT. 2018; 06(01): 106-112
28. Optimizing Energy and Data Storage in WSN integrated Cloud applying Fuzzy method[pdf ]
Suma S.V
IJCSIT. 2018; 06(01): 113-118
29. The Privacy Issues With Third Party Applications On Facebook[pdf ]
N. Jayalakshmi et.al.,
IJCSIT. 2018; 06(01): 119-125
30. Network Intrusion Detection System for Denial of Service Attack based on Anomaly Detection[pdf ]
Y.S.Kalai Vani et.al.,
IJCSIT. 2018; 06(01): 126-129