e-ISSN : 0975-3397
Print ISSN : 2229-5631
Home | About Us | Contact Us

ARTICLES IN PRESS

Articles in Press

ISSUES

Current Issue
Archives

CALL FOR PAPERS

CFP 2021

TOPICS

IJCSE Topics

EDITORIAL BOARD

Editors

Indexed in

oa
 

Search the Article

VOLUME 9 ISSUE 05 2017

ISSN: 0975–3397

Article # Article Title & Authors (Volume 9 Number 05 May 2017) Page
1. Testing Effort Dependent Delayed S-shaped Software Reliability Growth Model with Imperfect Debugging
M.U. Bokhari, Md. Ashraf Siddiqui, N. Ahmad
Abstract | PDFIconPDF
138-148
2. Survey Paper On Impact Of Cloud Computing on Conventional Software Engineering
Rohan Garg, Prof. Kruti Lavingia
Abstract | PDFIconPDF
149-152
3. Energy-Efficient Cloud Computing using Power Optimisation
Shridhar Shah, Prof. Vivek Kumar Prasad
Abstract | PDFIconPDF
153-159
4. An Illustrative Approach for Secure Key Based Authentication for Cloud Communication
Dr. Richa Purohit
Abstract | PDFIconPDF
160-164
5. On the applicability of Artificial Intelligence in Black Box Testing
Esha Khanna
Abstract | PDFIconPDF
165-169
6. Achieving Energy Efficiency through Optimized Resource Usage
Rachit Shah, Prof. Vivek Kumar Prasad
Abstract | PDFIconPDF
170-177
7. Detecting Duplicates and near Duplicates Records in Large Datasets
Shailesh Singh, Dr. Syed Imtiyaz Hassan
Abstract | PDFIconPDF
178-185
8. Comparative Study of Various Techniques for Leukemia Detection
Rupinder Kaur Sandhu, Dr. Raman Maini
Abstract | PDFIconPDF
186-191
9. Density Based Clustering using Modified PSO based Neighbor Selection
K. Nafees Ahmed, Dr. T. Abdul Razak
Abstract | PDFIconPDF
192-199
10. Cloud Federation with Resource Provisioning
Shreya Phadke, Vivek Prasad
Abstract | PDFIconPDF
200-206
11. Security for Healthcare Data on Cloud
Kushan Shah, Vivek Prasad
Abstract | PDFIconPDF
207-212
12. Automatic Fault Control System For Resource Utilization in Desktop Grid Middleware
Dr.Rajesh Kumar
Abstract | PDFIconPDF
213-221
13. Face Recognition by SVM Using Local Binary Patterns
Ab Waheed Lone, Syed Sarver Hussain, Mohd Abdul Ahad
Abstract | PDFIconPDF
222-226
14. Adaptive Rate allocation Approach to improve video Quality in IEEE 802.11e
Dr H.S.N. Murthy, Naveed Farhana
Abstract | PDFIconPDF
227-234
15. Visual statistic preparation and interactive graph mining:in R using packages iplots
Shahin Zafar, Suraiya Parween
Abstract | PDFIconPDF
235-241
16. Dynamic Channel Aware Neighbour Switching Path Optimization Technique for Vanets
J. Uma Maheswari, S.Karishma, C.Nivetha, S.Rizhvana Begum
Abstract | PDFIconPDF
242-247
17. Fabrication Analysis for Corner Identification Using Algorithms Increasing the Production Rate
Ravindra Singh Rathore, Dr. Yogesh Kumar Sharma
Abstract | PDFIconPDF
248-256
18. A Hybrid Intelligent System for Fruit Grading and Sorting
Jasmeen Gill, Akshay Girdhar, Tejwant Singh
Abstract | PDFIconPDF
257-265
19. An Optimized Deployment Approach for Intercloud and Hybrid cloud
Vinit Kumar Dhull, Shah Imran Alam, Syed Imtiyaz Hassan
Abstract | PDFIconPDF
266-274
20. Face Detection and Extraction from Low Resolution Surveillance Video Using Motion Segmentation
Vikram Mutneja, Dr. Satvir Singh
Abstract | PDFIconPDF
275-282
21. Implementation of enhanced REAC-IN protocol
Amandeep kaur, Dr. Rajesh kumar
Abstract | PDFIconPDF
283-288
22. Persistency Based Ad-hoc Broadcast Protocol for Location Privacy in LBS applications
Balaso Jagdale, Jagdish Bakal
Abstract | PDFIconPDF
289-300
23. Prominence of Big data and its related issues, challenges and applications
R.Gokilabharathi, K.Gurulakshmi, Hatim Gasmel Seed, K.Sowndariya
Abstract | PDFIconPDF
301-307
24. Study of Phishing Attacks in Social Network
Muthu Palanivel.P.B, Vasanth Kumar.V, Ananda Krishnan. K, NesaRani.A
Abstract | PDFIconPDF
308-316
25. Air Hopper Malware
G V S N Sobhan, Sanjay Ragavendra.R
Abstract | PDFIconPDF
317-322
26. Mosquitto Security Advancement Using the Checksum Feature
B. V. S. Bharghava, B.Haritha, Mrs.R.Kanniga Devi
Abstract | PDFIconPDF
323-325
27. A Survey on Enhancing Cloud Security through Access Control Models and Technologies
P.Chinnasamy, P.Deepalakshmi
Abstract | PDFIconPDF
326-332
28. Inspecting Irresponsible Hypes: Rumors in Social Media Networks
Krithika R, Ashok Kumar Mohan
Abstract | PDFIconPDF
333-337
29. Network Access Control
M.Roopesh, G.Reethika, B V Srinath, A.Sarumathi
Abstract | PDFIconPDF
338-343
30. Automated Recognition Of Object in Digital Images And Real Time Videos
Dr.G.Nagappan, Preethi K
Abstract | PDFIconPDF
344-349
To view the PDF use Adobe Acrobat 6.0 or more
All Rights Reserved © 2009-2024 Engg Journals Publications
Page copy protected against web site content infringement by CopyscapeCreative Commons License