Indexing
Guest Editorship Form / Join us Co-Publisher | Board Member
Mode of Payment
Call us : +91 97 90 12 02 37
Menu
Home
About Us
Issn | Indexing | Impact Factor
Editorial Board
Archives
Current Issue
Faq
Contact Us
A Secured Data Hiding Techniques for Motion Vectors using stenography
Reference ID: IJCS-001
A Study on Ad hoc wireless Networks
Reference ID: IJCS-002
IMPROVING ROUTING EFFICIENCY IN MANET
Reference ID: IJCS-003
EVALUATION OF SLEEP SCHEDULING AND TOPOLOGY CONTROL (CDS)
Reference ID: IJCS-004
A Hybrid Method on Fractal Image Compression Using Quadtree Decomposition and Run length Encoding
Reference ID: IJCS-005
Attacks Detected by Discovery and Distance Vector Protocols in Ad-hoc Networks
Reference ID: IJCS-006
Controlling IP Spoofing with SBGP
Reference ID: IJCS-007
Finding Misconfigurations in Router and Network Using Minerals
Reference ID: IJCS-008
Novel Color Fractal Image Compression based on Quadtree Decomposition
Reference ID: IJCS-009
Neighborhood Detection Using CA
Reference ID: IJCS-010
Establishment of Internal Cloud in a Cluster-based Environment
Reference ID: IJCS-011
Clustering Algorithms and Techniques: A Survey
Reference ID: IJCS-012
AUDIO STEGANOGRAPHY
Reference ID: IJCS-013
Implementation of Bankers Algorithms in Cloud Computing
Reference ID: IJCS-014
Hop-Field Model Using Travelling Salesman Problem
Reference ID: IJCS-015
INTRUSION DETECTION SYSTEM ON COMPUTER NETWORK SECURITY (IDS-CNS)
Reference ID: IJCS-016
AWARENESS AND USE OF WEB 2.0 APPLICATIONS BY THE RESEARCH SCHOLARS IN ALAGAPPA UNIVERSITY – A STUDY
Reference ID: IJCS-017
Survey on Joint Photographic Experts Group [JPEG] Watermarking
Reference ID: IJCS-018
An Overview of Data Mining Techniques and Clustering concepts
Reference ID: IJCS-019
SOLVING TRAVELLING SALESMAN PROBLEM EFFICIENTLY USING GENETIC ALGORITHM
Reference ID: IJCS-020
A Recent Approach on Identifying the ARM Based Clustering Algorithm on Text and Image Context
Reference ID: IJCS-021
INFORMATION EXTRACTION OF PREDICTING BLOOD CANCER
Reference ID: IJCS-022
Why Quantum Computing does not Offer a Computational Speedup When Performing Addition
Reference ID: IJCS-023
Cloud Storage System Using Secure Data Forwarding
Reference ID: IJCS-024
A Comparative Study of Noise Removal in Remote Sensing Images
Reference ID: IJCS-025
Article Removed by Editorial Board
Reference ID: IJCS-026
PARQ BASED RANGE QUERYPREDICATE IN GRID COMPUTING
Reference ID: IJCS-027
A Serial Based Encryption for Enhanced Access Control in Cloud Computing
Reference ID: IJCS-028
Partial Completion Filter Technique for Distributed Denial of Service Attacks
Reference ID: IJCS-029
Audio Watermarking System Using EMD with Psychoacoustic Model
Reference ID: IJCS-030
K-Anonymity Multidimensional Suppression
Reference ID: IJCS-031
AN EFFECTIVE SECURE KEYWORD SEARCH OVER ENCRYPTED OUTSOURCED CLOUD STORAGE
Reference ID: IJCS-032
Execution Fault Localization in Large Dynamic Web Application Using Randomized Input Generation
Reference ID: IJCS-033
Analysis of Resource Allocation Approaches in Cloud Computing
Reference ID: IJCS-034
Application of Cloud Computing to Agricultural Field through Smart Phone
Reference ID: IJCS-035
Fault Tolerant and Economic Resource Sharing Model for Self Organizing Cloud
Reference ID: IJCS-036
Detecting Spoofing Attack in Cluster based Wireless System
Reference ID: IJCS-037
Effective Tracking System Based On Android
Reference ID: IJCS-038
Transpose-Minify Model for data processing in Cloud
Reference ID: IJCS-039
WEB FORUMS CRAWLER FOR ANALYSIS USER SENTIMENTS
Reference ID: IJCS-040
Analysis of Security Issues and Privacy Preserving in Cloud Environment
Reference ID: IJCS-041
Extended Floating Car Data: A Hybrid Route level of Service for an Intelligent Transportation
Reference ID: IJCS-042
SMART RATION CARD FOR PDS
Reference ID: IJCS-043
Privacy-Preserving Scheme for Mobile Public Hotspots in Nested NEMO
Reference ID: IJCS-044
PRIVACY ENHANCED NEW MECHANISM FOR DCN USING DYNAMIC ID BASED ENCRYPTION AND HASHING ALGORITHM
Reference ID: IJCS-045
Mining Sequence Data and Time Series Data
Reference ID: IJCS-046
SPOC: A Secure And Privacy Preserving Oppurtunistic Computing Framework Using PPSPC Technique
Reference ID: IJCS-047
Effective Mechanism for Blocking DNS Based Misbehaviours and Web Content Modification
Reference ID: IJCS-048
Privacy Preserving Cost Reducing Heuristic Approach For Intermediate Datasets In Cloud
Reference ID: IJCS-049
An Improved Feature Subset Selection with Correlation Measures using Clustering Technique
Reference ID: IJCS-050
Analysis of Effective Portable Cloud Services Using TOSCA
Reference ID: IJCS-051
A Dynamic Programming Approach Privacy Preserving Collaborative Data Publishing
Reference ID: IJCS-052
IMPROVING NETWORK LIFE TIME OF MANET THROUGH LZW COMPRESSION TECHNIQUE
Reference ID: IJCS-053
Intrusion Detection and Preventing Attacks using Sequential Algorithm
Reference ID: IJCS-054
EFFICIENT DETECTION AND ELIMINATION OF VAMPIRE ATTACKS IN WIRELESS SENSOR NETWORKS
Reference ID: IJCS-055
SECURE ACCESS CONTROL OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING CRYPTOGRAPHIC TECHNIQUE
Reference ID: IJCS-056
Survey of Ant Colony Optimization with Classification Rule Discovery for Data Mining
Reference ID: IJCS-057
Generation of Concise Clusters Using Fuzzy Combined Pattern Association Rules
Reference ID: IJCS-058
A New Approach on Crime Detection with Data Mining and Cloud Computing
Reference ID: IJCS-059
A Recent Overview on Usage of Indian Sign Language
Reference ID: IJCS-060
A Survey on Embedded Zero Tree Wavelet
Reference ID: IJCS-061
QOS-AWARE ROUTING FOR IMPROVING PERFORMANCE IN COGNITIVE RADIO WIRELESS SENSOR NETWORKS
Reference ID: IJCS-062
An Improved Genetic Algorithm Based Weight Optimized RBF Kernel System for Face
Reference ID: IJCS-063
IMPROVING DATA ACCESSIBILITY IN MANET WITH NODE MOBILITY ALGORITHM
Reference ID: IJCS-064
Active Resource Provision in Cloud Computing Through Virtualization
Reference ID: IJCS-065
A Comparative Study on different types of Routing algorithms in VANET Network
Reference ID: IJCS-066
An Empirical Study on Measurement in Small and Medium Sized Software Organizations
Reference ID: IJCS-067
Reducing the communication and overhead for abetted life expectancy
Reference ID: IJCS-068
A SAFETY MEASURES END-TO-END DIMENSIONS CONTAINER PER SPREADING
Reference ID: IJCS-069
Article Removed by Editorial Board
Reference ID: IJCS-070
A jade based healthcare system
Reference ID: IJCS-071
Cryptography security in Online Transaction- A Current Scenario
Reference ID: IJCS-072
A PROFILE BASED USER CUSTOMIZABLE PRIVACY PRESERVING WEB SEARCH
Reference ID: IJCS-073
A Recent Cram on Mobile Computing based on Network Applications
Reference ID: IJCS-074
Cloud Server Leakage Protection in SaaS Using Anomaly Software Agent System
Reference ID: IJCS-075
An Efficient Model of Saliency Detection in a Compressed Domain Video Model
Reference ID: IJCS-076
QoS based clustering protocol in VANET Review
Reference ID: IJCS-077
Bidirectional Long-Short Term Memory Based Recurrent Neural Network for Handwriting Recognition
Reference ID: IJCS-078
Context Based Security Model to Enhance the Privacy of Smartphone
Reference ID: IJCS-079
Variety of Segmentation Techniques for High Accuracy Object
Reference ID: IJCS-080
A Framework to Channel Undesirable Messages and Pictures from OSN’s Clients Divider
Reference ID: IJCS-081
TOUCH-LESS FINGER-PRINT RECOGNITION
Reference ID: IJCS-082
AUTOMATIC TEST PACKET GENERATION FOR NETWORKS
Reference ID: IJCS-083
EVALUATION OF AN INFORMATION SHARING SYSTEM FOR HUMANIZED NETWORKS
Reference ID: IJCS-084
Efficient Management of Confidential Data in Disruption-Tolerant Military Networks
Reference ID: IJCS-0085
METHOD OF INTRUSION DETECTION USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT(EAACK)
Reference ID: IJCS-086
Performance Enhancment in Content Centric Network Using Load Balancing
Reference ID: IJCS-087
An Enhanced Security Technique with Authentication for Mobile and Pervasive Computing
Reference ID: IJCS-088
Software Process Quality Assessment in Medium Sized Software Organizations
Reference ID: IJCS-089
Delegated Access Control Two Layer Encryption Mechanism In Public Cloud
Reference ID: IJCS-090
SENTIMENTAL ANALYSIS WITH BIGDATA USING HADOOP
Reference ID: IJCS-091
ENHANCED DYNAMIC PROTECTION SCHEME IN SAAS IN CLOUDS USING ANOMALY SOFTWARE AGENT SYSTEM
Reference ID: IJCS-092
Advanced Sensor Deployment and Scheduling for Target Coverage Problem in Wireless Sensor Networks
Reference ID: IJCS-093
CLUSTERING HIGH-DIMENSIONAL DATA USING HUBNESS-BASED APPROACHES
Reference ID: IJCS-094
Privacy In Opportunistic Network For Interest-Casting In Manets
Reference ID: IJCS-095
A Review of Anomaly-Based IDS’s and Techniques
Reference ID: IJCS-096
A Survey on Various Search Results using Annotations
Reference ID: IJCS-097
SCALABLE KEY AGGREGATION OF CRYPTOSYSTEM FOR DATA SHARING IN CLOUD STORAGE
Reference ID: IJCS-098
MAGNIFYING SECURITY FOR CIPHERTEXT POLICY ATTRIBUTE BASED DATA SHARING
Reference ID: IJCS-099
SEPARATE DATA EXTRACTION IN ENCRYPTED IMAGES BY REVERSIBLE DATA HIDING USING SIRDS
Reference ID: IJCS-100
SECURE MULTIPARTY COMPUTATION FOR PRIVACY-PRESERVING CLOUD COMPUTING
Reference ID: IJCS-101
PRIVACY AND SECURITY OF MULTI-AGENT SYSTEMS ON WSN
Reference ID: IJCS-102
K-MEANS, WATERSHED AND TEXTURE-BASED IMAGE SEGMENTATION
Reference ID: IJCS-103
A Survey of Various Mutual Authentication Techniques in Cloud Computing Security
Reference ID: IJCS-104
K-means Clustering – A Survey on Various Clustering Techniques
Reference ID: IJCS-105
Kaizen in Computer Literacy Rate – A Study on Impact of Tamilnadu Government’s Cost Free Laptop Computer Scheme in Ramanathapuram District
Reference ID: IJCS-106
ADVANCED POLLING BY IRIS TECHNOLOGY WITH CLOUD COMPUTING AND GAIC ALGORITHM USING BIOMETRIC SECURITY
Reference ID: IJCS-107
A Survey of Various Opinion Mining in Social Media
Reference ID: IJCS-108
A Survey of Various Authorization & Deduplications in Cloud
Reference ID: IJCS-109
Cloud Data Storage Security – A Review Issues & Challenges
Reference ID: IJCS-110
A Survey on Security of Various Data Sharing Techniques in Cloud
Reference ID: IJCS-111
Contribution to K-Nearest neighbour’s system for under water mine classification
Reference ID: IJCS-112
Nano Technology For Electronics And It
Reference ID: IJCS-113
A Survey of Various Visual Cryptography Techniques
Reference ID: IJCS-114
SHIP BORDER SECURITY SYSTEM USING ZIGBEE
Reference ID: IJCS-115
DDoS: Inspect the Different Trace back Techniques
Reference ID: IJCS-116
Intrusion Detection Systems in Mobile Ad Hoc Networks: A Review
Reference ID: IJCS-117
An overview of Image Retrieval Systems using Relevance Feedback Method
Reference ID: IJCS-118
Load Balancing in Cloud Computing: Various Issues & Challenges
Reference ID: IJCS-119
Green Computing Technology: Challenges & Trends
Reference ID: IJCS-120
Article Removed by Editorial Board
Reference ID: IJCS-121
An Approach for Checking Grammar for Telugu Language Compound Sentences
Reference ID: IJCS-122
Energy Efficient MAC Protocol for Mobile Wireless Sensor Networks
Reference ID: IJCS-123
A NOVEL DATA TRANSFER TECHNIQUE IN AUDIO STEGANOGRAPHY USING DAUBECHIES WAVELETS
Reference ID: IJCS-124
Mixture of GMMs and Mixture of Multiple Histograms for Image Segmentation: A Review
Reference ID: IJCS-125
A Two Level Network Intrusion Detection System for MANET
Reference ID: IJCS-126
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing Sites
Reference ID: IJCS-127
Energy-Aware E-STAR Protocol for Heterogeneous Multihop Wireless Sensor Networks
Reference ID: IJCS-128
Personal Health Records in Cloud Computing Using Multi Authority Attribute-based Encryption
Reference ID: IJCS-129
Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems
Reference ID: IJCS-130
Mobile App Recommendation & Ranking Fraud Detection on Relationship among Rating Review & Ranking
Reference ID: IJCS-131
A Review on Achieving Security by Fragmentation and Replication of Data in Large-Scale Distributed File Systems
Reference ID: IJCS-132
A Survey on Network Anomaly Detection
Reference ID: IJCS-133
A Survey on Personal Health Records Using Multi Authority Attributebased Encryption
Reference ID: IJCS-134
Data integrity By Auditing the Data deduplication in SecCloud and SecCloud+
Reference ID: IJCS-135
Data Sharing in between Group Members & group Users By using key destitution
Reference ID: IJCS-136
Dynamic Data Control using CSP and Data Integrity by verified Users
Reference ID: IJCS-137
Group Data Sharing using Group keys on Encrypted cloud Data
Reference ID: IJCS-138
KP-ABE Security & Encryption on Cloud Data Storage System
Reference ID: IJCS-139
A Framework of Online Social IoT System and Trust Management Scheme
Reference ID: IJCS-140
Novel Decentralized systems for data publishing by trusty URI links
Reference ID: IJCS-141
Privacy Preserving in Location Based Services by using DGS
Reference ID: IJCS-142
DOF: Duplicate Detectable Opportunistic Forwarding In Energy Consumption Duty Cycled Wireless Sensor Network
Reference ID: IJCS-143
Using DGS Preserving Location Based Services by Encryption privacy
Reference ID: IJCS-144
A Novel ID-DPDP USING REVOCATION ON CLOUD OUTSOURCED DATA STORAGE
Reference ID: IJCS-145
Data Sharing in Cloud Storage Using Single key cryptosystem
Reference ID: IJCS-146
Cipher text policy Using attribute based encryption Data Storage in Cloud
Reference ID: IJCS-147
Mobile Apps Ranking Rating and Review Fraud Detection by evidences
Reference ID: IJCS-148
Ranked keyword search over Cloud Storage by several owners using dynamic hidden keys
Reference ID: IJCS-149
WAVE PROPAGATION IN A ROTATING FIBRE-REINFORCED PORO-ELASTIC SOLID UNDER THE ACTION OF UNIFORM MAGNETIC FIELD
Reference ID: IJCS-150
Reliable ZigBee Based Automatic Vehicle Speed Control System Using Tree Routing Algorithm
Reference ID: IJCS-151
Kids Monitoring and Tracking System Based on GSM
Reference ID: IJCS-152
A Multiple Determination Support for Web Application Clusters to Hybrid Clouds using cloudmigration
Reference ID: IJCS-153
Gaussian Mixture Model for Edge Detection Techniques
Reference ID: IJCS-154
Edge detection Definition, Modelling and Methodologies
Reference ID: IJCS-155
Smart E-learning content delivery system for ubiquitous devices, using Wi-Fi networks and smart board approach
Reference ID: IJCS-156
HEART DISEASE PREDICTION SYSTEM USING DATA MINING TECHNIQUES
Reference ID: IJCS-157
PERCEIVING INTRUSION USING DATA MINING TECHNIQUES
Reference ID: IJCS-158
Network Security and wireless sensor networks using in the Human Immune System
Reference ID: IJCS-159
DOUBLEGUARD: DETECTING INTRUSIONS IN MULTI-TIER WEB APPLICATIONS
Reference ID: IJCS-160
MULTILEVEL NETWORK SECURITY SYSTEM USED IN ARM PLATFORM
Reference ID: IJCS-161
Detection of Agricultural Plant Leaf Diseases Using Image Processing Techniques
Reference ID: IJCS-162
WILL CYBER- IMPROVE NETWORK SECURITY? A MARKET ANALYSIS
Reference ID: IJCS-163
Bigdata Analytics: Comparative Study of Tools
Reference ID: IJCS-164
AN DETAILED SURVEY ON BIG DATA ANALYTICS IN TEXT AUDIO AND VIDEO
Reference ID: IJCS-165
ARCHITECTURE AND PERFORMANCE OF A PRACTICAL IP FAST REROUTE IMPLEMENTATION
Reference ID: IJCS-166
A SURVEY ON AUTHENTICATION AND HIGH PERFORMANCE OF NETWORK SECURITY USING NEXT GENERATION FIREWALL SYSTEM
Reference ID: IJCS-167
A Review on Mobile Ad hoc Networks (MANETs)
Reference ID: IJCS-168
ENHANCED PRIVACY POLICY DETECTION FOR SOCIAL NETWORK USING COLLABORATIVE TAG SUPPRESSION
Reference ID: IJCS-169
SECURE ROUTING PROTOCOL FOR AERONAUTICAL AD HOC NETWORKS
Reference ID: IJCS-170
EFFICIENT VEHICLE TRACKING AND MONITORING SYSTEM USING GPS AND GSM
Reference ID: IJCS-171
DETECTING CHANGES IN DIGITAL IMAGE PROCESSING
Reference ID: IJCS-172
Fault Tolerant Sensor Query Framework using Pattern based Data Projection Scheme
Reference ID: IJCS-173
APPLICATIONS AND CLASSIFICATION RULES OF GENETIC ALGORITHM IN DATA MINING
Reference ID: IJCS-174
OPTIMAL DELAY BOUND FOR MAXIMUM WEIGHT SCHEDULING POLICY IN WIRELESS NETWORKS
Reference ID: IJCS-175
INTERPRETING DOCUMENT COLLECTIONS WITH TOPIC MODEL USING LATENT DIRICHLET ALLOCATION
Reference ID: IJCS-176
A SURVEY ON CLASSIFICATION TECHNIQUES IN DATA MINING FOR EARLY DETECTION OF LIVER DISEASE FROMINDIAN LIVER PATIENTS DATA
Reference ID: IJCS-177
WEB SPY DEFENSE SYSTEM
Reference ID: IJCS-178
Comparison of Feature Selection Methods for Credit Risk Assessment
Reference ID: IJCS-179
OPTIMIZATION OF PAGE RANKING WITH SWARM INTELLIGENCE ALGORITHMS FOR RE-RANKING OF WEB SEARCH RESULTS
Reference ID: IJCS-180
STUDY OF CLASSIFICAION METHODS FOR STUTTERING SPEECH SIGNAL ANALYSIS
Reference ID: IJCS-181
Predicting Users Behavior from the Analysis of Web Server logs Using Hash Map and PAFI Algorithm
Reference ID: IJCS-182
A STUDY ON EFFECTIVE CLASSIFICATION AND PREDICTION OF HEART DISEASE USING DATA MINING TECHNIQUES
Reference ID: IJCS-183
Smokestack Fabric Defects Detection
Reference ID: IJCS-184
Cyber and Social Terrorsim
Reference ID: IJCS-185
A SURVEY OF SOIL TEMPERATURE AND MOISTURE PREDICTION TO RECOMMEND PLANTING DIFFERENT CROPS IN AGRICULTURE USING DATA MINING
Reference ID: IJCS-186
SECURE DATA STORAGE AND SHARING IN MULTI CLOUD COMPUTING ENVIRONMENT USING MULTILEVEL ENCRYPTION ALGORITHMS
Reference ID: IJCS-187
A Survey on Technologies to Handle Big Data
Reference ID: IJCS-188
AN EFFICIENT MOTION DETECTION AND CAPTURING SYSTEM FOR CCTV SURVEILLANCE
Reference ID: IJCS-189
A REVIEW ON BIG DATA ANALYTICS
Reference ID: IJCS-190
Software System Engineering: Quantification of software using Measures of Effectiveness
Reference ID: IJCS-191
A Survey on Data Mining Trends & Tasks
Reference ID: IJCS-192
USING DATA REDUCTION TECHNIQUES FOR EFFECTIVE BUG TRIAGE
Reference ID: IJCS-193
EXPLORING ON CLASSIFICATION AND PREDICTION OF DIABETICS USING DATA MINING AND NEURAL NETWORK
Reference ID: IJCS-194
Prevention of DOS Attack by Using Enhanced Malicious Packet Detection Algorithm in VANET Architecture
Reference ID: IJCS-195
AN INNOVATIVE APPROACH TO GENETIC ALGORITHM BASED CRYPTOGRAPHY
Reference ID: IJCS-196
CONTENT BASED IMAGE RETRIEVAL WITH HASH CODES
Reference ID: IJCS-197
Hybrid Optimization Feature Selection for Predicting Student Performance
Reference ID: IJCS-198
SURVEY ON SECURITY ISSUES IN CLOUD COMPUTING
Reference ID: IJCS-199
SURVEY ON DOS ATTACKS AND ITS PREVENTION PROTOCOLS IN IN WSN
Reference ID: IJCS-200
Embedded System Based Cashless Campus System using Biometric Authentication
Reference ID: IJCS-201
TYPES OF COST IN INDUCTIVE CONCEPT LEARNING PETER
Reference ID: IJCS-202
ROBUST AND ATTACK TOLERANCE SECURE SECRET DISTRIBUTION SYSTEM
Reference ID: IJCS-203
A SURVEY ON RISK PREDICTION OF CARDIOVASCULAR DISEASE USING GENETIC INFORMATION
Reference ID: IJCS-204
RECENT SURVEY OF BIG DATA ANALYTICS FOR MAPREDUCE FREQUENT ITEM MINING
Reference ID: IJCS-205
INFORMATION REPRESENTAION AND RETRIVAL IN SEMANTIC WEB using UNSTRUCTURED DATA
Reference ID: IJCS-206
5G Technology of Mobile Communication: A Survey
Reference ID: IJCS-207
COST OPTIMIZATION FOR DISTRIBUTED BIG DATA ANALYTICS
Reference ID: IJCS-208
BIG DATA ANALYTICS IN CYBER CRIME DETECTION
Reference ID: IJCS-209
Quality of Secure Video Transmission Using Secure Multicast Routing Algorithm
Reference ID: IJCS-210
ANT COLONY SYSTEM WITH STATE TRANSITION
Reference ID: IJCS-211
CYBER SECURITY IN CLOUD COMPUTING USING DES ALGORITHM
Reference ID: IJCS-212
AN ANALYTICAL STUDY ON SECURITY ALGORITHMS USED IN CLOUD COMPUTING
Reference ID: IJCS-213
PRECISE INFORMATION HIDING TECHNIQUES
Reference ID: IJCS-214
A STUDY ON VARIOUS WORMHOLE ATTACK DETECTION TECHNIQUES IN MANET
Reference ID: IJCS-215
A SURVEY ON EVENT DETECTION IN WIRELESS SENSOR NETWORKS FOR DISASTER MANAGEMENT
Reference ID: IJCS-216
A REVIEW ON PREDICT THE STUDENT PERFORMANCE USING CLASSIFICATION METHODS IN DATA MINING
Reference ID: IJCS-217
A SURVEY ON SYBIL ATTACK AND DETECTION FOR SECURITY
Reference ID: IJCS-218
ISSUES AND FRAMEWORK OF E-COMMERCE AND CLOUD COMPUTING MODELS
Reference ID: IJCS-219
CYBER SECURITY ISSUES IN SOCIAL MEDIAS
Reference ID: IJCS-220
COMPARATIVE STUDY OF CANCER PATIENT BY USING DATAMINING TECHNIQUES
Reference ID: IJCS-221
A STUDY OF COMPARISON ON COMPUTATIONALOFFLOADINGSERVICES IN MOBILE CLOUD COMPUTING
Reference ID: IJCS-222
A SURVEY OF INTRUSION DETECTION SYSTEM IN MOBILE AD-HOC NETWORKS
Reference ID: IJCS-223
STEGANOGRAPHY USING REVERSIBLE TEXTURE SYNTHESIS
Reference ID: IJCS-224
A STUDY OF BLACK HOLE ATTACKS ON AODV PROTOCOL IN MANET
Reference ID: IJCS-225
GREEN HOUSE MONITORING USING WIRELESS SENSOR NETWORK THROUGH ZIG BEE TECHNOLOGY
Reference ID: IJCS-226
AN OVERVIEW OF CLOUD BASED E-LEARNING IN THE FIELD OF EDUCATION SYSTEM
Reference ID: IJCS-227
KNOWLEDGE MANAGEMENT AND BIG DATA –DATA DRIVEN KNOWLEDGE BASE
Reference ID: IJCS-228
A Survey – Methods of Missing Data Imputation
Reference ID: IJCS-229
A SURVEY ON GENETIC ALGORITHM BASED QOS ROUTING IN MANETS
Reference ID: IJCS-230
An Enhanced Sinkhole Attacker Node Identification Technique using Successful Link Ratio in IoT Environment
Reference ID: IJCS-231
A RELIABLE USER AUTHENTICATION SCHEME FOR HEALTHCARE MONITORING IN WIRELESS SENSOR NETWORKS
Reference ID: IJCS-232
Role of Scheduling and Load Balancing Algorithms in cloud to improve the Quality of Services
Reference ID: IJCS-233
Enhanced Security at Cloud Data with AES and ECC Cryptographic Algorithm
Reference ID: IJCS-234
Minutiae Extraction and Finger Print Image Recognition
Reference ID: IJCS-235
Semantic Information Retrieval System
Reference ID: IJCS-236
IDENTIFYING STUDENT CAPACITY TO IMPROVE ACADEMICS PERFOMANCE USING CLASSIFICATION ALGORITHM
Reference ID: IJCS-237
Lessen Database Scanning towards Hiding Sensitive Data based on Binary Search Approach
Reference ID: IJCS-238
Online Social Networking Services Impact on Big Data
Reference ID: IJCS-239
Similarity Measures of Web Repositories constructed by Web-Scrapping from Specific Web Resource
Reference ID: IJCS-240
DATA MINING TECHNIQUES FOR THE ANALYSIS OF TYPE-2 DIABETES–A SURVEY
Reference ID: IJCS-241
Security BM Techiniqueusing in Digital Image Processing
Reference ID: IJCS-242
A Framework for Building Intelligent Software Assistants for Virtual Worlds
Reference ID: IJCS-243
ELECTROENCEPHALOGRAPH SIGNAL CLASSIFICATION FOR DIFFERENT WAVE DIAGNOSIS
Reference ID: IJCS-244
BIG DATA – EFFICIENT PACKET TRANSMISSION TO MITIGATE THE FATIGUE NETWORK
Reference ID: IJCS-245
Efficient Pest Detection in Agriculture Using various image processing techniques
Reference ID: IJCS-246
A REVIEW ON CLUSTERING TECHNIQUES
Reference ID: IJCS-247
A Survey on Joint Static and Dynamic Traffic Scheduling in Data Center Networks
Reference ID: IJCS-248
A STUDY ON SECURE ONLINE VOTING SYSTEM IN BIOMETRICS USING VOTING USING DETECTION AND RECOGNITION
Reference ID: IJCS-249
A SURVEY ON WEB IMAGE SEARCH RE-RANKING WITH CLICK BASED SIMILARITY
Reference ID: IJCS-250
ANALYSIS OF EDGE DETECTION TECHNIQUES FOR IMAGE SEGMENTATION
Reference ID: IJCS-251
INTEGIRTY VERIFICATION SCHEME IN CLOUD ENVIRONMENT USING DYNAMIC KEY UPDATE
Reference ID: IJCS-252
A SURVEY ON DYNAMIC AND PRIORITY BASED SERVER ALLOCATION IN CLOUD COMPUTING
Reference ID: IJCS-253
A Study of parallel processing and its contemporary relevance
Reference ID: IJCS-254
Cut Detection in Wireless Sensor Networks: A Survey
Reference ID: IJCS-255
DEVELOPMENT OF A COMPUTER AIDED SOFTWARE ENGINEERING-A LITERATURE SURVEY
Reference ID: IJCS-256
A BACKTRACKING AND BRANCH & BOUND ALGORITHM USING KNAPSACK PROBLEM
Reference ID: IJCS-257
REVIEW ON CLOUD COMPUTING
Reference ID: IJCS-258
Image Resolution Enhancement using DWT and Edge Extraction
Reference ID: IJCS-259
STRUCTURAL HEALTH CARE MONITORING DEVICE USING IOT
Reference ID: IJCS-260
CONTINUOUS AND TRANSPARENT USER IDENTITY VERIFICATION FOR SECURE INTERNET SERVICES
Reference ID: IJCS-261
A PRAGMATIC STUDY OF STEGANOGRAPHY- AN ART OF HIDING DATA STEGANOGRAPHY- AN ART OF HIDING DATA
Reference ID: IJCS-262
Study on Data Mining Techniques for Diabetes Mellitus
Reference ID: IJCS-263
ENHANCED PARTICLE SWARM OPTIMIZATION ALGORITHM FOR JOB SCHEDULING PROBLEM
Reference ID: IJCS-264
PHOTO SHARING SAFE MODE SERVICES TO MAKE PRIVACY RELIABILITY
Reference ID: IJCS-265
A feasibility paradigmatic of (t n) visual cryptography codification with vitalizing group
Reference ID: IJCS-266
Efficient Psychological Disorder Analysis With Multimodal Fusion of Brain Imaging Data
Reference ID: IJCS-267
ESTABLISHING A MANAGEMENT INFORMATION SYSTEM- AN OVERVIEW
Reference ID: IJCS-268
Emerging Computing Resources
Reference ID: IJCS-269
DESINGING OF MILLET BASED CONVENIENT BREAKFAST MIX USING LINEAR PROGRAMMING APPROACH
Reference ID: IJCS-270
Automated Grade Classification of Brain Tumor MRI
Reference ID: IJCS-271
Exploring Key Aspects of Computational Thinking
Reference ID: IJCS-272
DEVELOPMENT OF SMART GARMENT WITH MOBILE COMMUNICATION
Reference ID: IJCS-273
A survey on Effective use of cloud computing in educational institutions
Reference ID: IJCS-274
Study on New Architecture for Enhancing the Security and Performance of E-Mail Security Protocols
Reference ID: IJCS-275
Big data: Issues, Challenges and Tools.
Reference ID: IJCS-276
A Brief Introduction to Process and Analyze Healthcare Big Data on Cloud Environment
Reference ID: IJCS-277
A Survey on Clustering Techniques of Webinars to Support E-Learning Using Data Mining
Reference ID: IJCS-278
Multipath Routing with Optimal Load balancing and channel sensing in Mobile Ad hoc Networks
Reference ID: IJCS-279
ANALYSIS OF CLUSTERING AND CLASSIFICATION
Reference ID: IJCS-280
An online Activity Tracker web application using ASP Dot Net
Reference ID: IJCS-281
A Study on E- Governance Scenario in Karaikudi Region- with Reference to Healthcare Sector in IT
Reference ID: IJCS-282
Application of Cloud Computing in Sericulture Monitoring
Reference ID: IJCS-283
A SURVEY ON CURRENT TRENDS AND GRID COMPUTING
Reference ID: IJCS-284
New Era of Business Intelligence in the Current Market Scenario
Reference ID: IJCS-285
FEEDING BIG DATA FOR ENHANCED SEARCH ENGINE APPLICATIONS
Reference ID: IJCS-286
EFFECTS OF PLYOMETRIC VERSUS PILATES EXERCISES ON THE MUSCULAR ABILITY AND COMPONENTS OF JUMPING TO VOLLEYBALL PLAYERS: A COMPARATIVE STUDY
Reference ID: IJCS-287
MIRO-MIDURR: Minimizing the Routing Overhead and the Duplication of Route Requests in Mobile Ad hoc Networks
Reference ID: IJCS-288
AN INTRINSIC STUDY ON IMAGE MINING AND ITS CHALLENGES
Reference ID: IJCS-289
Enhancement Supporting Reputation-Based Trust Management for Cloud Services
Reference ID: IJCS-290
Extensible markup Language approximate query answering Using data mining, intentional based on Tree-Based Association Rules
Reference ID: IJCS-291
A PASSMATRIX AUTHENTICATION SCHEME FOR SHOULDER SPOOFING RESISTANT
Reference ID: IJCS-292
SENTIMENT ANALYSIS BASED ON USER REVIEWS IN E-COMMERCE SITE
Reference ID: IJCS-293
SECURE AND OPTIMAL PERFORMANCE APPROACH FOR DATA DEDUPLICATION IN CLOUD
Reference ID: IJCS-294
EFFICIENT ROUTING MECHANISM IN UNSTRUCTURED P2P NETWORKS
Reference ID: IJCS-295
PERFORMANCE EVALUATION OF LDOS ATTACK BY USING ABE ALGORITHM
Reference ID: IJCS-296
Effect of EVM in the Assembly Elections of Tamil Nadu
Reference ID: IJCS-297
Role of E-resources in Education
Reference ID: IJCS-298
Internet as a Source for Job seeking
Reference ID: IJCS-299
Impact on Social Media
Reference ID: IJCS-300
ACHIEVING SECURE ANTI – COLLUSION FOR SHARING OF DATA BETWEEN DYNAMIC GROUPS IN THE CLOUD
Reference ID: IJCS-301
Design and Implementation of an Online Social Network Application with Privacy Violation Detector Based On Text Mining Technique
Reference ID: IJCS-302
DETECTING WORMHOLE ATTACK IN WIRELESS NETWORK CODING SYSTEM USING DAWN& ETX
Reference ID: IJCS-303
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Reference ID: IJCS-304
The Racial Conflict in Shakepeare’s ‘ Othello’
Reference ID: IJCS-305
A APPROPRIATED THREE-HOP REPULSE COMPACT TO BUILD THE CAPABILITY WIRELESS NETWORKS
Reference ID: IJCS-306
Classification Based Data Mining Technique for Discovering Disease Patterns: An Implementation Study
Reference ID: IJCS-307
CONTEMPORARY RELEVANCE IN GRISH KARNAD NOVELS
Reference ID: IJCS-308
An Innovative Technique for Enhancing the Performance of Association Rules Mining for Apriori Algorithm
Reference ID: IJCS-309
Need of Semantic Knowledge in E-Learning System for its Performance Improvements and Fruitful Realization: A Comprehensive Analytical Report
Reference ID: IJCS-310
A STUDY ON SOCIETY AND INDIVIDUAL IN MAHESH DATTANI’S DANCE LIKE A MAN
Reference ID: IJCS-311
MulkRaj Anand’s View Of Human Relationship As Reflected In The Select Novel Of ‘Coolie’ And ‘Untouchability’
Reference ID: IJCS-312
ILLUSION VERSUS REALITY IN THE SELECT PLAYS OF ARTHUR MILLER
Reference ID: IJCS-313
REALISM IN SHASHI DESHPANDE’S THAT LONG SILENCE
Reference ID: IJCS-314
Effect of Earthquake Induced In Lateral Soil Movement on Lateral Pile Resistance
Reference ID: IJCS-315
EVALUATION OF SPLIT TENSILE STRENGTH OF HIGH STRENGTH FIBERRE IN FORCED CONCRETE S
Reference ID: IJCS-316
STRENGTH AND DURABILITY STUDIES ON CONCRETE USING QUARRY DUST AS FINE AGGREGATE
Reference ID: IJCS-317
STUDY OF TEMPERATURE DIFFERENTIAL IN DIFFERENT CONCRETE SLABS OF VARYING SLAB THICKNESS IN DIFFERENT REGIONS
Reference ID: IJCS-318
STRENGTH CHARACTERISTICS OF SELF-CURING CONCRETE
Reference ID: IJCS-319
FASHION ON SMARTPHONE – APPS THAT CONNECT WITH CONSUMER
Reference ID: IJCS-320
TECHNIQUES AND APPLICATION OF SMART TEXTILES
Reference ID: IJCS-321
Smart Engine Based Border Alert and Security System
Reference ID: IJCS-322
Strength Behaviour and Properties of Lime Based Composite Paste
Reference ID: IJCS-323
Articulation Using Eye Gaze Tracing
Reference ID: IJCS-324
How to measure economic feasibility of big data?
Reference ID: IJCS-325
APP-DEDUPE:- An Application Aware Source Deduplication Approach for Cloud
Reference ID: IJCS-326
A NOVEL APPROACH TO DISCLOSE THE LOCATIONS OF IP SPOOFERS USING ICMP
Reference ID: IJCS-327
Heister/Swinder Detection in Live Stream Video Using Blob Analysis
Reference ID: IJCS-328
UNIVERSAL MULTI MODE BACKGROUND SUBTRACTION
Reference ID: IJCS-329
Web based Digital Library of Groundnut in India using Client Server methodology
Reference ID: IJCS SI – 2009/01
Design and Implementation of Online Groundnut Abstracts Database using Webspirs
Reference ID: IJCS SI – 2009/02
ALWAYS ACYCLIC DISTRIBUTED PATH COMPUTATION
Reference ID: IJCS SI – 2010/01
ENSURING DATA STORAGE SECURITY IN CLOUD COMPUTING
Reference ID: IJCS SI – 2010/01
FUNCTIONAL PROTEIN SEQUENCES ANALYSIS ON BIOINFORMATICS &GESTATIONAL DIABETES MELLITUS
Reference ID: IJCS SI – 2010/03
OPTIMAL SERVICE PRICING FOR A CLOUD CACHE
Reference ID: IJCS SI – 2011/01
Survey on Clustering over Multi-Viewpoint Similarity by Text Mining
Reference ID: IJCS SI – 2011/02
A Novel Study on Fog Computing Over Application Administrations
Reference ID: IJCS SI – 2012/01
A Novel Study on Fog Computing Over Application Administration
Reference ID: IJCS SI – 2012/02
EXPLOITATION AND SUBJUGATION OF A BEWILDERED INDIVIDUAL IN MAHASWETA DEVI’S AAJIR
Reference ID: IJCS SI – 2016/01
Comparative Analysis of Various Data Mining Classification Algorithms Using R Software
Reference ID: IJCS-330
An Efficient and Secure Data Storage Using Two Different Cloud Storage Technique
Reference ID: IJCS-331
An Efficient Way to Avoid Redundancy Record in Big Data
Reference ID: IJCS-332
An Events Detection and Analysis Using Block Matching With Linguistic Technique
Reference ID: IJCS-333
A Enhanced Monotone Wi-Fi Offloading Model Based Data Communication in Network
Reference ID: IJCS-334
A Framework for Privacy Data Protection against Attack
Reference ID: IJCS-335
A Dual Security with Cryptographic Key Generation Framework Using Data Protection
Reference ID: IJCS-336
A Novel Framework Using Phishing Prevention and Detection
Reference ID: IJCS-337
An Efficient and Secure Way for Key Distribution Using Attribute Based Multiple Keywords Subset Search Method
Reference ID: IJCS-338
Role of Information and Communication Technologies in the Tourism Industry of Vellore District
Reference ID: IJCS-339
A note on annihilating ideal graph of zn
Reference ID: IJCS-340
Magic sum spectra of ladder graphs
Reference ID: IJCS-341
SOFTWARE DEFECT DETECTION USING METAHEURISTIC GENETIC NEURAL NETWORK
Reference ID: IJCS-342
POLYNOMIALS ON SP-RING
Reference ID: IJCS-343
k-Distance Signed Total Domination Number of Graphs
Reference ID: IJCS-344
WEB SERVER SCALABILITY OF WR DISPATCHING APPROACHES IN DISTRIBUTED WEB SERVER SYSTEMS
Reference ID: IJCS-345
FRAMEWORK FOR LOW- HIGH INTRA CLUSTERING MEASURING COMMON WEIGHTED SIMILARITIES
Reference ID: IJCS-346
Design and Implementation of Agriculture Monitoring and Preventing of Wild Animals Entering into the Agricultural Fields
Reference ID: IJCS-347
Continuous SPO2 and Heart Rate Monitoring of the Patients Towards IOT Connected Healthcare Applications
Reference ID: IJCS-348
A survey on security forthe Internet of Things using Particle Swarm Optimization
Reference ID: IJCS-349
AN EFFICIENT APPROACH FOR FREQUENT ITEMSET MINING IN BIG DATA
Reference ID: IJCS-350
LOCATION BASED INFORMATION SHARING SYSTEM USING IOT
Reference ID: IJCS-351
Developing Geo-Tagging Application with Low Cost RTK Module
Reference ID: IJCS-352
A Literature Review of Efficient And Reliable Communication To Reduce Broadcast Storm in Vanets
Reference ID: IJCS-353
FINGERPRINT BASED ATTENDANCE SYSTEM USING RASPBERRY PI
Reference ID: IJCS-354
SUPREMACY LABELING OF SOME LADDER GRAPHS
Reference ID: IJCS-355
On k– Power 3 Mean Labeling of Graphs
Reference ID: IJCS-356
DEGREE SPLITTING OF STOLARSKY-3 MEAN LABELING OF GRAPHS
Reference ID: IJCS-357
ARBITRARY SUPER SUBDIVISION OF ROOT SQUARE MEAN LABELING OF GRAPHS
Reference ID: IJCS-358
DECOMPOSITION OF JUMP GRAPH OF PATHS
Reference ID: IJCS-359
SECURE DOMINATION IN ZERO-DIVISOR GRAPH
Reference ID: IJCS-360
Some topological indices of Molybdenum disulfide
Reference ID: IJCS-361
SOME STRONG FORMS OF CONTINUOUS FUNCTIONS IN NANO TOPOLOGY
Reference ID: IJCS-362
A Note on soft order sets in Topological Spaces
Reference ID: IJCS-363
δ- Topological Vector Spaces
Reference ID: IJCS-364
A NOTE ON COMPLEMENT OF THE REDUCED NON-ZERO COMPONENT GRAPH OF FREE SEMI-MODULES
Reference ID: IJCS-365
Power 3 Mean Cordial Labeling of Graphs
Reference ID: IJCS-366
SOME PROPERTIES OF THE SQUARE GRAPH OF FINITE ABELIAN GROUPS
Reference ID: IJCS-367
Numerical solution of boundary value problems using Hermite wavelet-Galerkin method
Reference ID: IJCS-368
Panoramic image stitching using cross correlation and phase correlation methods
Reference ID: IJCS-369
A COMMON FILTER FOR BOTH IMPULSE AND GAUSSIAN NOISE REMOVAL
Reference ID: IJCS-370
An Improved K-Means Clustering Method for RCC Segmentation
Reference ID: IJCS-371
Role of Unsupervised, Supervised and Regression Algorithm for Medical Image Segmentation: A Study
Reference ID: IJCS-372
IMPACT OF TECHNOLOGY ON COMMUNICATION SYSTEM
Reference ID: IJCS-373
Results on annihilator graph of a commutative Ring
Reference ID: IJCS-374
Artificial Intelligence (AI) and Internet of things (IoT) Technologies for Improving Agricultural Practice
Reference ID: IJCS-Special Issue
A Relative Comparison of Graph Based Techniques for Image Segmentation
Reference ID: IJCS-375
Identification of Knee Osteoarthritis Using Hybrid Segmentation Technique
Reference ID: IJCS-376
Library Book Procurement Proposal System Design Using Profile Matching
Reference ID: IJCS-377
Prototype of University Directory Application Using K-Means Clustering and TOPSIS
Reference ID: IJCS-378
Volume 5, Issue 2, No 05, 2017
Prototype of University Directory Application Using K-Means Clustering and TOPSIS
Reference ID: IJCS-378
Library Book Procurement Proposal System Design Using Profile Matching
Reference ID: IJCS-377
Identification of Knee Osteoarthritis Using Hybrid Segmentation Technique
Reference ID: IJCS-376
A Relative Comparison of Graph Based Techniques for Image Segmentation
Reference ID: IJCS-375
Artificial Intelligence (AI) and Internet of things (IoT) Technologies for Improving Agricultural Practice
Reference ID: IJCS-Special Issue
Results on annihilator graph of a commutative Ring
Reference ID: IJCS-374
IMPACT OF TECHNOLOGY ON COMMUNICATION SYSTEM
Reference ID: IJCS-373
Role of Unsupervised, Supervised and Regression Algorithm for Medical Image Segmentation: A Study
Reference ID: IJCS-372
An Improved K-Means Clustering Method for RCC Segmentation
Reference ID: IJCS-371
A COMMON FILTER FOR BOTH IMPULSE AND GAUSSIAN NOISE REMOVAL
Reference ID: IJCS-370
Panoramic image stitching using cross correlation and phase correlation methods
Reference ID: IJCS-369
Numerical solution of boundary value problems using Hermite wavelet-Galerkin method
Reference ID: IJCS-368
SOME PROPERTIES OF THE SQUARE GRAPH OF FINITE ABELIAN GROUPS
Reference ID: IJCS-367
Power 3 Mean Cordial Labeling of Graphs
Reference ID: IJCS-366
A NOTE ON COMPLEMENT OF THE REDUCED NON-ZERO COMPONENT GRAPH OF FREE SEMI-MODULES
Reference ID: IJCS-365
δ- Topological Vector Spaces
Reference ID: IJCS-364
A Note on soft order sets in Topological Spaces
Reference ID: IJCS-363
SOME STRONG FORMS OF CONTINUOUS FUNCTIONS IN NANO TOPOLOGY
Reference ID: IJCS-362
Some topological indices of Molybdenum disulfide
Reference ID: IJCS-361
SECURE DOMINATION IN ZERO-DIVISOR GRAPH
Reference ID: IJCS-360
DECOMPOSITION OF JUMP GRAPH OF PATHS
Reference ID: IJCS-359
ARBITRARY SUPER SUBDIVISION OF ROOT SQUARE MEAN LABELING OF GRAPHS
Reference ID: IJCS-358
DEGREE SPLITTING OF STOLARSKY-3 MEAN LABELING OF GRAPHS
Reference ID: IJCS-357
On k– Power 3 Mean Labeling of Graphs
Reference ID: IJCS-356
SUPREMACY LABELING OF SOME LADDER GRAPHS
Reference ID: IJCS-355
FINGERPRINT BASED ATTENDANCE SYSTEM USING RASPBERRY PI
Reference ID: IJCS-354
A Literature Review of Efficient And Reliable Communication To Reduce Broadcast Storm in Vanets
Reference ID: IJCS-353
Developing Geo-Tagging Application with Low Cost RTK Module
Reference ID: IJCS-352
LOCATION BASED INFORMATION SHARING SYSTEM USING IOT
Reference ID: IJCS-351
AN EFFICIENT APPROACH FOR FREQUENT ITEMSET MINING IN BIG DATA
Reference ID: IJCS-350
A survey on security forthe Internet of Things using Particle Swarm Optimization
Reference ID: IJCS-349
Continuous SPO2 and Heart Rate Monitoring of the Patients Towards IOT Connected Healthcare Applications
Reference ID: IJCS-348
Design and Implementation of Agriculture Monitoring and Preventing of Wild Animals Entering into the Agricultural Fields
Reference ID: IJCS-347
FRAMEWORK FOR LOW- HIGH INTRA CLUSTERING MEASURING COMMON WEIGHTED SIMILARITIES
Reference ID: IJCS-346
WEB SERVER SCALABILITY OF WR DISPATCHING APPROACHES IN DISTRIBUTED WEB SERVER SYSTEMS
Reference ID: IJCS-345
k-Distance Signed Total Domination Number of Graphs
Reference ID: IJCS-344
POLYNOMIALS ON SP-RING
Reference ID: IJCS-343
SOFTWARE DEFECT DETECTION USING METAHEURISTIC GENETIC NEURAL NETWORK
Reference ID: IJCS-342
Magic sum spectra of ladder graphs
Reference ID: IJCS-341
A note on annihilating ideal graph of zn
Reference ID: IJCS-340
Role of Information and Communication Technologies in the Tourism Industry of Vellore District
Reference ID: IJCS-339
An Efficient and Secure Way for Key Distribution Using Attribute Based Multiple Keywords Subset Search Method
Reference ID: IJCS-338
A Novel Framework Using Phishing Prevention and Detection
Reference ID: IJCS-337
A Dual Security with Cryptographic Key Generation Framework Using Data Protection
Reference ID: IJCS-336
A Framework for Privacy Data Protection against Attack
Reference ID: IJCS-335
A Enhanced Monotone Wi-Fi Offloading Model Based Data Communication in Network
Reference ID: IJCS-334
An Events Detection and Analysis Using Block Matching With Linguistic Technique
Reference ID: IJCS-333
An Efficient Way to Avoid Redundancy Record in Big Data
Reference ID: IJCS-332
An Efficient and Secure Data Storage Using Two Different Cloud Storage Technique
Reference ID: IJCS-331
Comparative Analysis of Various Data Mining Classification Algorithms Using R Software
Reference ID: IJCS-330
EXPLOITATION AND SUBJUGATION OF A BEWILDERED INDIVIDUAL IN MAHASWETA DEVI’S AAJIR
Reference ID: IJCS SI – 2016/01
A Novel Study on Fog Computing Over Application Administration
Reference ID: IJCS SI – 2012/02
A Novel Study on Fog Computing Over Application Administrations
Reference ID: IJCS SI – 2012/01
Survey on Clustering over Multi-Viewpoint Similarity by Text Mining
Reference ID: IJCS SI – 2011/02
OPTIMAL SERVICE PRICING FOR A CLOUD CACHE
Reference ID: IJCS SI – 2011/01
FUNCTIONAL PROTEIN SEQUENCES ANALYSIS ON BIOINFORMATICS &GESTATIONAL DIABETES MELLITUS
Reference ID: IJCS SI – 2010/03
ENSURING DATA STORAGE SECURITY IN CLOUD COMPUTING
Reference ID: IJCS SI – 2010/01
ALWAYS ACYCLIC DISTRIBUTED PATH COMPUTATION
Reference ID: IJCS SI – 2010/01
Design and Implementation of Online Groundnut Abstracts Database using Webspirs
Reference ID: IJCS SI – 2009/02
Web based Digital Library of Groundnut in India using Client Server methodology
Reference ID: IJCS SI – 2009/01
UNIVERSAL MULTI MODE BACKGROUND SUBTRACTION
Reference ID: IJCS-329
Heister/Swinder Detection in Live Stream Video Using Blob Analysis
Reference ID: IJCS-328
A NOVEL APPROACH TO DISCLOSE THE LOCATIONS OF IP SPOOFERS USING ICMP
Reference ID: IJCS-327
APP-DEDUPE:- An Application Aware Source Deduplication Approach for Cloud
Reference ID: IJCS-326
How to measure economic feasibility of big data?
Reference ID: IJCS-325
Articulation Using Eye Gaze Tracing
Reference ID: IJCS-324
Strength Behaviour and Properties of Lime Based Composite Paste
Reference ID: IJCS-323
Smart Engine Based Border Alert and Security System
Reference ID: IJCS-322
TECHNIQUES AND APPLICATION OF SMART TEXTILES
Reference ID: IJCS-321
FASHION ON SMARTPHONE – APPS THAT CONNECT WITH CONSUMER
Reference ID: IJCS-320
STRENGTH CHARACTERISTICS OF SELF-CURING CONCRETE
Reference ID: IJCS-319
STUDY OF TEMPERATURE DIFFERENTIAL IN DIFFERENT CONCRETE SLABS OF VARYING SLAB THICKNESS IN DIFFERENT REGIONS
Reference ID: IJCS-318
STRENGTH AND DURABILITY STUDIES ON CONCRETE USING QUARRY DUST AS FINE AGGREGATE
Reference ID: IJCS-317
EVALUATION OF SPLIT TENSILE STRENGTH OF HIGH STRENGTH FIBERRE IN FORCED CONCRETE S
Reference ID: IJCS-316
Effect of Earthquake Induced In Lateral Soil Movement on Lateral Pile Resistance
Reference ID: IJCS-315
REALISM IN SHASHI DESHPANDE’S THAT LONG SILENCE
Reference ID: IJCS-314
ILLUSION VERSUS REALITY IN THE SELECT PLAYS OF ARTHUR MILLER
Reference ID: IJCS-313
MulkRaj Anand’s View Of Human Relationship As Reflected In The Select Novel Of ‘Coolie’ And ‘Untouchability’
Reference ID: IJCS-312
A STUDY ON SOCIETY AND INDIVIDUAL IN MAHESH DATTANI’S DANCE LIKE A MAN
Reference ID: IJCS-311
Need of Semantic Knowledge in E-Learning System for its Performance Improvements and Fruitful Realization: A Comprehensive Analytical Report
Reference ID: IJCS-310
An Innovative Technique for Enhancing the Performance of Association Rules Mining for Apriori Algorithm
Reference ID: IJCS-309
CONTEMPORARY RELEVANCE IN GRISH KARNAD NOVELS
Reference ID: IJCS-308
Classification Based Data Mining Technique for Discovering Disease Patterns: An Implementation Study
Reference ID: IJCS-307
A APPROPRIATED THREE-HOP REPULSE COMPACT TO BUILD THE CAPABILITY WIRELESS NETWORKS
Reference ID: IJCS-306
The Racial Conflict in Shakepeare’s ‘ Othello’
Reference ID: IJCS-305
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Reference ID: IJCS-304
DETECTING WORMHOLE ATTACK IN WIRELESS NETWORK CODING SYSTEM USING DAWN& ETX
Reference ID: IJCS-303
Design and Implementation of an Online Social Network Application with Privacy Violation Detector Based On Text Mining Technique
Reference ID: IJCS-302
ACHIEVING SECURE ANTI – COLLUSION FOR SHARING OF DATA BETWEEN DYNAMIC GROUPS IN THE CLOUD
Reference ID: IJCS-301
Impact on Social Media
Reference ID: IJCS-300
Internet as a Source for Job seeking
Reference ID: IJCS-299
Role of E-resources in Education
Reference ID: IJCS-298
Effect of EVM in the Assembly Elections of Tamil Nadu
Reference ID: IJCS-297
PERFORMANCE EVALUATION OF LDOS ATTACK BY USING ABE ALGORITHM
Reference ID: IJCS-296
EFFICIENT ROUTING MECHANISM IN UNSTRUCTURED P2P NETWORKS
Reference ID: IJCS-295
SECURE AND OPTIMAL PERFORMANCE APPROACH FOR DATA DEDUPLICATION IN CLOUD
Reference ID: IJCS-294
SENTIMENT ANALYSIS BASED ON USER REVIEWS IN E-COMMERCE SITE
Reference ID: IJCS-293
A PASSMATRIX AUTHENTICATION SCHEME FOR SHOULDER SPOOFING RESISTANT
Reference ID: IJCS-292
Extensible markup Language approximate query answering Using data mining, intentional based on Tree-Based Association Rules
Reference ID: IJCS-291
Enhancement Supporting Reputation-Based Trust Management for Cloud Services
Reference ID: IJCS-290
AN INTRINSIC STUDY ON IMAGE MINING AND ITS CHALLENGES
Reference ID: IJCS-289
MIRO-MIDURR: Minimizing the Routing Overhead and the Duplication of Route Requests in Mobile Ad hoc Networks
Reference ID: IJCS-288
EFFECTS OF PLYOMETRIC VERSUS PILATES EXERCISES ON THE MUSCULAR ABILITY AND COMPONENTS OF JUMPING TO VOLLEYBALL PLAYERS: A COMPARATIVE STUDY
Reference ID: IJCS-287
FEEDING BIG DATA FOR ENHANCED SEARCH ENGINE APPLICATIONS
Reference ID: IJCS-286
New Era of Business Intelligence in the Current Market Scenario
Reference ID: IJCS-285
A SURVEY ON CURRENT TRENDS AND GRID COMPUTING
Reference ID: IJCS-284
Application of Cloud Computing in Sericulture Monitoring
Reference ID: IJCS-283
A Study on E- Governance Scenario in Karaikudi Region- with Reference to Healthcare Sector in IT
Reference ID: IJCS-282
An online Activity Tracker web application using ASP Dot Net
Reference ID: IJCS-281
ANALYSIS OF CLUSTERING AND CLASSIFICATION
Reference ID: IJCS-280
Multipath Routing with Optimal Load balancing and channel sensing in Mobile Ad hoc Networks
Reference ID: IJCS-279
A Survey on Clustering Techniques of Webinars to Support E-Learning Using Data Mining
Reference ID: IJCS-278
A Brief Introduction to Process and Analyze Healthcare Big Data on Cloud Environment
Reference ID: IJCS-277
Big data: Issues, Challenges and Tools.
Reference ID: IJCS-276
Study on New Architecture for Enhancing the Security and Performance of E-Mail Security Protocols
Reference ID: IJCS-275
A survey on Effective use of cloud computing in educational institutions
Reference ID: IJCS-274
DEVELOPMENT OF SMART GARMENT WITH MOBILE COMMUNICATION
Reference ID: IJCS-273
Exploring Key Aspects of Computational Thinking
Reference ID: IJCS-272
Automated Grade Classification of Brain Tumor MRI
Reference ID: IJCS-271
DESINGING OF MILLET BASED CONVENIENT BREAKFAST MIX USING LINEAR PROGRAMMING APPROACH
Reference ID: IJCS-270
Emerging Computing Resources
Reference ID: IJCS-269
ESTABLISHING A MANAGEMENT INFORMATION SYSTEM- AN OVERVIEW
Reference ID: IJCS-268
Efficient Psychological Disorder Analysis With Multimodal Fusion of Brain Imaging Data
Reference ID: IJCS-267
A feasibility paradigmatic of (t n) visual cryptography codification with vitalizing group
Reference ID: IJCS-266
PHOTO SHARING SAFE MODE SERVICES TO MAKE PRIVACY RELIABILITY
Reference ID: IJCS-265
ENHANCED PARTICLE SWARM OPTIMIZATION ALGORITHM FOR JOB SCHEDULING PROBLEM
Reference ID: IJCS-264
Study on Data Mining Techniques for Diabetes Mellitus
Reference ID: IJCS-263
A PRAGMATIC STUDY OF STEGANOGRAPHY- AN ART OF HIDING DATA STEGANOGRAPHY- AN ART OF HIDING DATA
Reference ID: IJCS-262
CONTINUOUS AND TRANSPARENT USER IDENTITY VERIFICATION FOR SECURE INTERNET SERVICES
Reference ID: IJCS-261
STRUCTURAL HEALTH CARE MONITORING DEVICE USING IOT
Reference ID: IJCS-260
Image Resolution Enhancement using DWT and Edge Extraction
Reference ID: IJCS-259
REVIEW ON CLOUD COMPUTING
Reference ID: IJCS-258
A BACKTRACKING AND BRANCH & BOUND ALGORITHM USING KNAPSACK PROBLEM
Reference ID: IJCS-257
DEVELOPMENT OF A COMPUTER AIDED SOFTWARE ENGINEERING-A LITERATURE SURVEY
Reference ID: IJCS-256
Cut Detection in Wireless Sensor Networks: A Survey
Reference ID: IJCS-255
A Study of parallel processing and its contemporary relevance
Reference ID: IJCS-254
A SURVEY ON DYNAMIC AND PRIORITY BASED SERVER ALLOCATION IN CLOUD COMPUTING
Reference ID: IJCS-253
INTEGIRTY VERIFICATION SCHEME IN CLOUD ENVIRONMENT USING DYNAMIC KEY UPDATE
Reference ID: IJCS-252
ANALYSIS OF EDGE DETECTION TECHNIQUES FOR IMAGE SEGMENTATION
Reference ID: IJCS-251
A SURVEY ON WEB IMAGE SEARCH RE-RANKING WITH CLICK BASED SIMILARITY
Reference ID: IJCS-250
A STUDY ON SECURE ONLINE VOTING SYSTEM IN BIOMETRICS USING VOTING USING DETECTION AND RECOGNITION
Reference ID: IJCS-249
A Survey on Joint Static and Dynamic Traffic Scheduling in Data Center Networks
Reference ID: IJCS-248
A REVIEW ON CLUSTERING TECHNIQUES
Reference ID: IJCS-247
Efficient Pest Detection in Agriculture Using various image processing techniques
Reference ID: IJCS-246
BIG DATA – EFFICIENT PACKET TRANSMISSION TO MITIGATE THE FATIGUE NETWORK
Reference ID: IJCS-245
ELECTROENCEPHALOGRAPH SIGNAL CLASSIFICATION FOR DIFFERENT WAVE DIAGNOSIS
Reference ID: IJCS-244
A Framework for Building Intelligent Software Assistants for Virtual Worlds
Reference ID: IJCS-243
Security BM Techiniqueusing in Digital Image Processing
Reference ID: IJCS-242
DATA MINING TECHNIQUES FOR THE ANALYSIS OF TYPE-2 DIABETES–A SURVEY
Reference ID: IJCS-241
Similarity Measures of Web Repositories constructed by Web-Scrapping from Specific Web Resource
Reference ID: IJCS-240
Online Social Networking Services Impact on Big Data
Reference ID: IJCS-239
Lessen Database Scanning towards Hiding Sensitive Data based on Binary Search Approach
Reference ID: IJCS-238
IDENTIFYING STUDENT CAPACITY TO IMPROVE ACADEMICS PERFOMANCE USING CLASSIFICATION ALGORITHM
Reference ID: IJCS-237
Semantic Information Retrieval System
Reference ID: IJCS-236
Minutiae Extraction and Finger Print Image Recognition
Reference ID: IJCS-235
Enhanced Security at Cloud Data with AES and ECC Cryptographic Algorithm
Reference ID: IJCS-234
Role of Scheduling and Load Balancing Algorithms in cloud to improve the Quality of Services
Reference ID: IJCS-233
A RELIABLE USER AUTHENTICATION SCHEME FOR HEALTHCARE MONITORING IN WIRELESS SENSOR NETWORKS
Reference ID: IJCS-232
An Enhanced Sinkhole Attacker Node Identification Technique using Successful Link Ratio in IoT Environment
Reference ID: IJCS-231
A SURVEY ON GENETIC ALGORITHM BASED QOS ROUTING IN MANETS
Reference ID: IJCS-230
A Survey – Methods of Missing Data Imputation
Reference ID: IJCS-229
KNOWLEDGE MANAGEMENT AND BIG DATA –DATA DRIVEN KNOWLEDGE BASE
Reference ID: IJCS-228
AN OVERVIEW OF CLOUD BASED E-LEARNING IN THE FIELD OF EDUCATION SYSTEM
Reference ID: IJCS-227
GREEN HOUSE MONITORING USING WIRELESS SENSOR NETWORK THROUGH ZIG BEE TECHNOLOGY
Reference ID: IJCS-226
A STUDY OF BLACK HOLE ATTACKS ON AODV PROTOCOL IN MANET
Reference ID: IJCS-225
STEGANOGRAPHY USING REVERSIBLE TEXTURE SYNTHESIS
Reference ID: IJCS-224
A SURVEY OF INTRUSION DETECTION SYSTEM IN MOBILE AD-HOC NETWORKS
Reference ID: IJCS-223
A STUDY OF COMPARISON ON COMPUTATIONALOFFLOADINGSERVICES IN MOBILE CLOUD COMPUTING
Reference ID: IJCS-222
COMPARATIVE STUDY OF CANCER PATIENT BY USING DATAMINING TECHNIQUES
Reference ID: IJCS-221
CYBER SECURITY ISSUES IN SOCIAL MEDIAS
Reference ID: IJCS-220
ISSUES AND FRAMEWORK OF E-COMMERCE AND CLOUD COMPUTING MODELS
Reference ID: IJCS-219
A SURVEY ON SYBIL ATTACK AND DETECTION FOR SECURITY
Reference ID: IJCS-218
A REVIEW ON PREDICT THE STUDENT PERFORMANCE USING CLASSIFICATION METHODS IN DATA MINING
Reference ID: IJCS-217
A SURVEY ON EVENT DETECTION IN WIRELESS SENSOR NETWORKS FOR DISASTER MANAGEMENT
Reference ID: IJCS-216
A STUDY ON VARIOUS WORMHOLE ATTACK DETECTION TECHNIQUES IN MANET
Reference ID: IJCS-215
PRECISE INFORMATION HIDING TECHNIQUES
Reference ID: IJCS-214
AN ANALYTICAL STUDY ON SECURITY ALGORITHMS USED IN CLOUD COMPUTING
Reference ID: IJCS-213
CYBER SECURITY IN CLOUD COMPUTING USING DES ALGORITHM
Reference ID: IJCS-212
ANT COLONY SYSTEM WITH STATE TRANSITION
Reference ID: IJCS-211
Quality of Secure Video Transmission Using Secure Multicast Routing Algorithm
Reference ID: IJCS-210
BIG DATA ANALYTICS IN CYBER CRIME DETECTION
Reference ID: IJCS-209
COST OPTIMIZATION FOR DISTRIBUTED BIG DATA ANALYTICS
Reference ID: IJCS-208
5G Technology of Mobile Communication: A Survey
Reference ID: IJCS-207
INFORMATION REPRESENTAION AND RETRIVAL IN SEMANTIC WEB using UNSTRUCTURED DATA
Reference ID: IJCS-206
RECENT SURVEY OF BIG DATA ANALYTICS FOR MAPREDUCE FREQUENT ITEM MINING
Reference ID: IJCS-205
A SURVEY ON RISK PREDICTION OF CARDIOVASCULAR DISEASE USING GENETIC INFORMATION
Reference ID: IJCS-204
ROBUST AND ATTACK TOLERANCE SECURE SECRET DISTRIBUTION SYSTEM
Reference ID: IJCS-203
TYPES OF COST IN INDUCTIVE CONCEPT LEARNING PETER
Reference ID: IJCS-202
Embedded System Based Cashless Campus System using Biometric Authentication
Reference ID: IJCS-201
SURVEY ON DOS ATTACKS AND ITS PREVENTION PROTOCOLS IN IN WSN
Reference ID: IJCS-200
SURVEY ON SECURITY ISSUES IN CLOUD COMPUTING
Reference ID: IJCS-199
Hybrid Optimization Feature Selection for Predicting Student Performance
Reference ID: IJCS-198
CONTENT BASED IMAGE RETRIEVAL WITH HASH CODES
Reference ID: IJCS-197
AN INNOVATIVE APPROACH TO GENETIC ALGORITHM BASED CRYPTOGRAPHY
Reference ID: IJCS-196
Prevention of DOS Attack by Using Enhanced Malicious Packet Detection Algorithm in VANET Architecture
Reference ID: IJCS-195
EXPLORING ON CLASSIFICATION AND PREDICTION OF DIABETICS USING DATA MINING AND NEURAL NETWORK
Reference ID: IJCS-194
USING DATA REDUCTION TECHNIQUES FOR EFFECTIVE BUG TRIAGE
Reference ID: IJCS-193
A Survey on Data Mining Trends & Tasks
Reference ID: IJCS-192
Software System Engineering: Quantification of software using Measures of Effectiveness
Reference ID: IJCS-191
A REVIEW ON BIG DATA ANALYTICS
Reference ID: IJCS-190
AN EFFICIENT MOTION DETECTION AND CAPTURING SYSTEM FOR CCTV SURVEILLANCE
Reference ID: IJCS-189
A Survey on Technologies to Handle Big Data
Reference ID: IJCS-188
SECURE DATA STORAGE AND SHARING IN MULTI CLOUD COMPUTING ENVIRONMENT USING MULTILEVEL ENCRYPTION ALGORITHMS
Reference ID: IJCS-187
A SURVEY OF SOIL TEMPERATURE AND MOISTURE PREDICTION TO RECOMMEND PLANTING DIFFERENT CROPS IN AGRICULTURE USING DATA MINING
Reference ID: IJCS-186
Cyber and Social Terrorsim
Reference ID: IJCS-185
Smokestack Fabric Defects Detection
Reference ID: IJCS-184
A STUDY ON EFFECTIVE CLASSIFICATION AND PREDICTION OF HEART DISEASE USING DATA MINING TECHNIQUES
Reference ID: IJCS-183
Predicting Users Behavior from the Analysis of Web Server logs Using Hash Map and PAFI Algorithm
Reference ID: IJCS-182
STUDY OF CLASSIFICAION METHODS FOR STUTTERING SPEECH SIGNAL ANALYSIS
Reference ID: IJCS-181
OPTIMIZATION OF PAGE RANKING WITH SWARM INTELLIGENCE ALGORITHMS FOR RE-RANKING OF WEB SEARCH RESULTS
Reference ID: IJCS-180
Comparison of Feature Selection Methods for Credit Risk Assessment
Reference ID: IJCS-179
WEB SPY DEFENSE SYSTEM
Reference ID: IJCS-178
A SURVEY ON CLASSIFICATION TECHNIQUES IN DATA MINING FOR EARLY DETECTION OF LIVER DISEASE FROMINDIAN LIVER PATIENTS DATA
Reference ID: IJCS-177
INTERPRETING DOCUMENT COLLECTIONS WITH TOPIC MODEL USING LATENT DIRICHLET ALLOCATION
Reference ID: IJCS-176
OPTIMAL DELAY BOUND FOR MAXIMUM WEIGHT SCHEDULING POLICY IN WIRELESS NETWORKS
Reference ID: IJCS-175
APPLICATIONS AND CLASSIFICATION RULES OF GENETIC ALGORITHM IN DATA MINING
Reference ID: IJCS-174
Fault Tolerant Sensor Query Framework using Pattern based Data Projection Scheme
Reference ID: IJCS-173
DETECTING CHANGES IN DIGITAL IMAGE PROCESSING
Reference ID: IJCS-172
EFFICIENT VEHICLE TRACKING AND MONITORING SYSTEM USING GPS AND GSM
Reference ID: IJCS-171
SECURE ROUTING PROTOCOL FOR AERONAUTICAL AD HOC NETWORKS
Reference ID: IJCS-170
ENHANCED PRIVACY POLICY DETECTION FOR SOCIAL NETWORK USING COLLABORATIVE TAG SUPPRESSION
Reference ID: IJCS-169
A Review on Mobile Ad hoc Networks (MANETs)
Reference ID: IJCS-168
A SURVEY ON AUTHENTICATION AND HIGH PERFORMANCE OF NETWORK SECURITY USING NEXT GENERATION FIREWALL SYSTEM
Reference ID: IJCS-167
ARCHITECTURE AND PERFORMANCE OF A PRACTICAL IP FAST REROUTE IMPLEMENTATION
Reference ID: IJCS-166
AN DETAILED SURVEY ON BIG DATA ANALYTICS IN TEXT AUDIO AND VIDEO
Reference ID: IJCS-165
Bigdata Analytics: Comparative Study of Tools
Reference ID: IJCS-164
WILL CYBER- IMPROVE NETWORK SECURITY? A MARKET ANALYSIS
Reference ID: IJCS-163
Detection of Agricultural Plant Leaf Diseases Using Image Processing Techniques
Reference ID: IJCS-162
MULTILEVEL NETWORK SECURITY SYSTEM USED IN ARM PLATFORM
Reference ID: IJCS-161
DOUBLEGUARD: DETECTING INTRUSIONS IN MULTI-TIER WEB APPLICATIONS
Reference ID: IJCS-160
Network Security and wireless sensor networks using in the Human Immune System
Reference ID: IJCS-159
PERCEIVING INTRUSION USING DATA MINING TECHNIQUES
Reference ID: IJCS-158
HEART DISEASE PREDICTION SYSTEM USING DATA MINING TECHNIQUES
Reference ID: IJCS-157
Smart E-learning content delivery system for ubiquitous devices, using Wi-Fi networks and smart board approach
Reference ID: IJCS-156
Edge detection Definition, Modelling and Methodologies
Reference ID: IJCS-155
Gaussian Mixture Model for Edge Detection Techniques
Reference ID: IJCS-154
A Multiple Determination Support for Web Application Clusters to Hybrid Clouds using cloudmigration
Reference ID: IJCS-153
Kids Monitoring and Tracking System Based on GSM
Reference ID: IJCS-152
Reliable ZigBee Based Automatic Vehicle Speed Control System Using Tree Routing Algorithm
Reference ID: IJCS-151
WAVE PROPAGATION IN A ROTATING FIBRE-REINFORCED PORO-ELASTIC SOLID UNDER THE ACTION OF UNIFORM MAGNETIC FIELD
Reference ID: IJCS-150
Ranked keyword search over Cloud Storage by several owners using dynamic hidden keys
Reference ID: IJCS-149
Mobile Apps Ranking Rating and Review Fraud Detection by evidences
Reference ID: IJCS-148
Cipher text policy Using attribute based encryption Data Storage in Cloud
Reference ID: IJCS-147
Data Sharing in Cloud Storage Using Single key cryptosystem
Reference ID: IJCS-146
A Novel ID-DPDP USING REVOCATION ON CLOUD OUTSOURCED DATA STORAGE
Reference ID: IJCS-145
Using DGS Preserving Location Based Services by Encryption privacy
Reference ID: IJCS-144
DOF: Duplicate Detectable Opportunistic Forwarding In Energy Consumption Duty Cycled Wireless Sensor Network
Reference ID: IJCS-143
Privacy Preserving in Location Based Services by using DGS
Reference ID: IJCS-142
Novel Decentralized systems for data publishing by trusty URI links
Reference ID: IJCS-141
A Framework of Online Social IoT System and Trust Management Scheme
Reference ID: IJCS-140
KP-ABE Security & Encryption on Cloud Data Storage System
Reference ID: IJCS-139
Group Data Sharing using Group keys on Encrypted cloud Data
Reference ID: IJCS-138
Dynamic Data Control using CSP and Data Integrity by verified Users
Reference ID: IJCS-137
Data Sharing in between Group Members & group Users By using key destitution
Reference ID: IJCS-136
Data integrity By Auditing the Data deduplication in SecCloud and SecCloud+
Reference ID: IJCS-135
A Survey on Personal Health Records Using Multi Authority Attributebased Encryption
Reference ID: IJCS-134
A Survey on Network Anomaly Detection
Reference ID: IJCS-133
A Review on Achieving Security by Fragmentation and Replication of Data in Large-Scale Distributed File Systems
Reference ID: IJCS-132
Mobile App Recommendation & Ranking Fraud Detection on Relationship among Rating Review & Ranking
Reference ID: IJCS-131
Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems
Reference ID: IJCS-130
Personal Health Records in Cloud Computing Using Multi Authority Attribute-based Encryption
Reference ID: IJCS-129
Energy-Aware E-STAR Protocol for Heterogeneous Multihop Wireless Sensor Networks
Reference ID: IJCS-128
Adaptive Privacy Policy Prediction of User Uploaded Images on Content sharing Sites
Reference ID: IJCS-127
A Two Level Network Intrusion Detection System for MANET
Reference ID: IJCS-126
Mixture of GMMs and Mixture of Multiple Histograms for Image Segmentation: A Review
Reference ID: IJCS-125
A NOVEL DATA TRANSFER TECHNIQUE IN AUDIO STEGANOGRAPHY USING DAUBECHIES WAVELETS
Reference ID: IJCS-124
Energy Efficient MAC Protocol for Mobile Wireless Sensor Networks
Reference ID: IJCS-123
An Approach for Checking Grammar for Telugu Language Compound Sentences
Reference ID: IJCS-122
Article Removed by Editorial Board
Reference ID: IJCS-121
Green Computing Technology: Challenges & Trends
Reference ID: IJCS-120
Load Balancing in Cloud Computing: Various Issues & Challenges
Reference ID: IJCS-119
An overview of Image Retrieval Systems using Relevance Feedback Method
Reference ID: IJCS-118
Intrusion Detection Systems in Mobile Ad Hoc Networks: A Review
Reference ID: IJCS-117
DDoS: Inspect the Different Trace back Techniques
Reference ID: IJCS-116
SHIP BORDER SECURITY SYSTEM USING ZIGBEE
Reference ID: IJCS-115
A Survey of Various Visual Cryptography Techniques
Reference ID: IJCS-114
Nano Technology For Electronics And It
Reference ID: IJCS-113
Contribution to K-Nearest neighbour’s system for under water mine classification
Reference ID: IJCS-112
A Survey on Security of Various Data Sharing Techniques in Cloud
Reference ID: IJCS-111
Cloud Data Storage Security – A Review Issues & Challenges
Reference ID: IJCS-110
A Survey of Various Authorization & Deduplications in Cloud
Reference ID: IJCS-109
A Survey of Various Opinion Mining in Social Media
Reference ID: IJCS-108
ADVANCED POLLING BY IRIS TECHNOLOGY WITH CLOUD COMPUTING AND GAIC ALGORITHM USING BIOMETRIC SECURITY
Reference ID: IJCS-107
Kaizen in Computer Literacy Rate – A Study on Impact of Tamilnadu Government’s Cost Free Laptop Computer Scheme in Ramanathapuram District
Reference ID: IJCS-106
K-means Clustering – A Survey on Various Clustering Techniques
Reference ID: IJCS-105
A Survey of Various Mutual Authentication Techniques in Cloud Computing Security
Reference ID: IJCS-104
K-MEANS, WATERSHED AND TEXTURE-BASED IMAGE SEGMENTATION
Reference ID: IJCS-103
PRIVACY AND SECURITY OF MULTI-AGENT SYSTEMS ON WSN
Reference ID: IJCS-102
SECURE MULTIPARTY COMPUTATION FOR PRIVACY-PRESERVING CLOUD COMPUTING
Reference ID: IJCS-101
SEPARATE DATA EXTRACTION IN ENCRYPTED IMAGES BY REVERSIBLE DATA HIDING USING SIRDS
Reference ID: IJCS-100
MAGNIFYING SECURITY FOR CIPHERTEXT POLICY ATTRIBUTE BASED DATA SHARING
Reference ID: IJCS-099
SCALABLE KEY AGGREGATION OF CRYPTOSYSTEM FOR DATA SHARING IN CLOUD STORAGE
Reference ID: IJCS-098
A Survey on Various Search Results using Annotations
Reference ID: IJCS-097
A Review of Anomaly-Based IDS’s and Techniques
Reference ID: IJCS-096
Privacy In Opportunistic Network For Interest-Casting In Manets
Reference ID: IJCS-095
CLUSTERING HIGH-DIMENSIONAL DATA USING HUBNESS-BASED APPROACHES
Reference ID: IJCS-094
Advanced Sensor Deployment and Scheduling for Target Coverage Problem in Wireless Sensor Networks
Reference ID: IJCS-093
ENHANCED DYNAMIC PROTECTION SCHEME IN SAAS IN CLOUDS USING ANOMALY SOFTWARE AGENT SYSTEM
Reference ID: IJCS-092
SENTIMENTAL ANALYSIS WITH BIGDATA USING HADOOP
Reference ID: IJCS-091
Delegated Access Control Two Layer Encryption Mechanism In Public Cloud
Reference ID: IJCS-090
Software Process Quality Assessment in Medium Sized Software Organizations
Reference ID: IJCS-089
An Enhanced Security Technique with Authentication for Mobile and Pervasive Computing
Reference ID: IJCS-088
Performance Enhancment in Content Centric Network Using Load Balancing
Reference ID: IJCS-087
METHOD OF INTRUSION DETECTION USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT(EAACK)
Reference ID: IJCS-086
Efficient Management of Confidential Data in Disruption-Tolerant Military Networks
Reference ID: IJCS-0085
EVALUATION OF AN INFORMATION SHARING SYSTEM FOR HUMANIZED NETWORKS
Reference ID: IJCS-084
AUTOMATIC TEST PACKET GENERATION FOR NETWORKS
Reference ID: IJCS-083
TOUCH-LESS FINGER-PRINT RECOGNITION
Reference ID: IJCS-082
A Framework to Channel Undesirable Messages and Pictures from OSN’s Clients Divider
Reference ID: IJCS-081
Variety of Segmentation Techniques for High Accuracy Object
Reference ID: IJCS-080
Context Based Security Model to Enhance the Privacy of Smartphone
Reference ID: IJCS-079
Bidirectional Long-Short Term Memory Based Recurrent Neural Network for Handwriting Recognition
Reference ID: IJCS-078
QoS based clustering protocol in VANET Review
Reference ID: IJCS-077
An Efficient Model of Saliency Detection in a Compressed Domain Video Model
Reference ID: IJCS-076
Cloud Server Leakage Protection in SaaS Using Anomaly Software Agent System
Reference ID: IJCS-075
A Recent Cram on Mobile Computing based on Network Applications
Reference ID: IJCS-074
A PROFILE BASED USER CUSTOMIZABLE PRIVACY PRESERVING WEB SEARCH
Reference ID: IJCS-073
Cryptography security in Online Transaction- A Current Scenario
Reference ID: IJCS-072
A jade based healthcare system
Reference ID: IJCS-071
Article Removed by Editorial Board
Reference ID: IJCS-070
A SAFETY MEASURES END-TO-END DIMENSIONS CONTAINER PER SPREADING
Reference ID: IJCS-069
Reducing the communication and overhead for abetted life expectancy
Reference ID: IJCS-068
An Empirical Study on Measurement in Small and Medium Sized Software Organizations
Reference ID: IJCS-067
A Comparative Study on different types of Routing algorithms in VANET Network
Reference ID: IJCS-066
Active Resource Provision in Cloud Computing Through Virtualization
Reference ID: IJCS-065
IMPROVING DATA ACCESSIBILITY IN MANET WITH NODE MOBILITY ALGORITHM
Reference ID: IJCS-064
An Improved Genetic Algorithm Based Weight Optimized RBF Kernel System for Face
Reference ID: IJCS-063
QOS-AWARE ROUTING FOR IMPROVING PERFORMANCE IN COGNITIVE RADIO WIRELESS SENSOR NETWORKS
Reference ID: IJCS-062
A Survey on Embedded Zero Tree Wavelet
Reference ID: IJCS-061
A Recent Overview on Usage of Indian Sign Language
Reference ID: IJCS-060
A New Approach on Crime Detection with Data Mining and Cloud Computing
Reference ID: IJCS-059
Generation of Concise Clusters Using Fuzzy Combined Pattern Association Rules
Reference ID: IJCS-058
Survey of Ant Colony Optimization with Classification Rule Discovery for Data Mining
Reference ID: IJCS-057
SECURE ACCESS CONTROL OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING CRYPTOGRAPHIC TECHNIQUE
Reference ID: IJCS-056
EFFICIENT DETECTION AND ELIMINATION OF VAMPIRE ATTACKS IN WIRELESS SENSOR NETWORKS
Reference ID: IJCS-055
Intrusion Detection and Preventing Attacks using Sequential Algorithm
Reference ID: IJCS-054
IMPROVING NETWORK LIFE TIME OF MANET THROUGH LZW COMPRESSION TECHNIQUE
Reference ID: IJCS-053
A Dynamic Programming Approach Privacy Preserving Collaborative Data Publishing
Reference ID: IJCS-052
Analysis of Effective Portable Cloud Services Using TOSCA
Reference ID: IJCS-051
An Improved Feature Subset Selection with Correlation Measures using Clustering Technique
Reference ID: IJCS-050
Privacy Preserving Cost Reducing Heuristic Approach For Intermediate Datasets In Cloud
Reference ID: IJCS-049
Effective Mechanism for Blocking DNS Based Misbehaviours and Web Content Modification
Reference ID: IJCS-048
SPOC: A Secure And Privacy Preserving Oppurtunistic Computing Framework Using PPSPC Technique
Reference ID: IJCS-047
Mining Sequence Data and Time Series Data
Reference ID: IJCS-046
PRIVACY ENHANCED NEW MECHANISM FOR DCN USING DYNAMIC ID BASED ENCRYPTION AND HASHING ALGORITHM
Reference ID: IJCS-045
Privacy-Preserving Scheme for Mobile Public Hotspots in Nested NEMO
Reference ID: IJCS-044
SMART RATION CARD FOR PDS
Reference ID: IJCS-043
Extended Floating Car Data: A Hybrid Route level of Service for an Intelligent Transportation
Reference ID: IJCS-042
Analysis of Security Issues and Privacy Preserving in Cloud Environment
Reference ID: IJCS-041
WEB FORUMS CRAWLER FOR ANALYSIS USER SENTIMENTS
Reference ID: IJCS-040
Transpose-Minify Model for data processing in Cloud
Reference ID: IJCS-039
Effective Tracking System Based On Android
Reference ID: IJCS-038
Detecting Spoofing Attack in Cluster based Wireless System
Reference ID: IJCS-037
Fault Tolerant and Economic Resource Sharing Model for Self Organizing Cloud
Reference ID: IJCS-036
Application of Cloud Computing to Agricultural Field through Smart Phone
Reference ID: IJCS-035
Analysis of Resource Allocation Approaches in Cloud Computing
Reference ID: IJCS-034
Execution Fault Localization in Large Dynamic Web Application Using Randomized Input Generation
Reference ID: IJCS-033
AN EFFECTIVE SECURE KEYWORD SEARCH OVER ENCRYPTED OUTSOURCED CLOUD STORAGE
Reference ID: IJCS-032
K-Anonymity Multidimensional Suppression
Reference ID: IJCS-031
Audio Watermarking System Using EMD with Psychoacoustic Model
Reference ID: IJCS-030
Partial Completion Filter Technique for Distributed Denial of Service Attacks
Reference ID: IJCS-029
A Serial Based Encryption for Enhanced Access Control in Cloud Computing
Reference ID: IJCS-028
PARQ BASED RANGE QUERYPREDICATE IN GRID COMPUTING
Reference ID: IJCS-027
Article Removed by Editorial Board
Reference ID: IJCS-026
A Comparative Study of Noise Removal in Remote Sensing Images
Reference ID: IJCS-025
Cloud Storage System Using Secure Data Forwarding
Reference ID: IJCS-024
Why Quantum Computing does not Offer a Computational Speedup When Performing Addition
Reference ID: IJCS-023
INFORMATION EXTRACTION OF PREDICTING BLOOD CANCER
Reference ID: IJCS-022
A Recent Approach on Identifying the ARM Based Clustering Algorithm on Text and Image Context
Reference ID: IJCS-021
SOLVING TRAVELLING SALESMAN PROBLEM EFFICIENTLY USING GENETIC ALGORITHM
Reference ID: IJCS-020
An Overview of Data Mining Techniques and Clustering concepts
Reference ID: IJCS-019
Survey on Joint Photographic Experts Group [JPEG] Watermarking
Reference ID: IJCS-018
AWARENESS AND USE OF WEB 2.0 APPLICATIONS BY THE RESEARCH SCHOLARS IN ALAGAPPA UNIVERSITY – A STUDY
Reference ID: IJCS-017
INTRUSION DETECTION SYSTEM ON COMPUTER NETWORK SECURITY (IDS-CNS)
Reference ID: IJCS-016
Hop-Field Model Using Travelling Salesman Problem
Reference ID: IJCS-015
Implementation of Bankers Algorithms in Cloud Computing
Reference ID: IJCS-014
AUDIO STEGANOGRAPHY
Reference ID: IJCS-013
Clustering Algorithms and Techniques: A Survey
Reference ID: IJCS-012
Establishment of Internal Cloud in a Cluster-based Environment
Reference ID: IJCS-011
Neighborhood Detection Using CA
Reference ID: IJCS-010
Novel Color Fractal Image Compression based on Quadtree Decomposition
Reference ID: IJCS-009
Finding Misconfigurations in Router and Network Using Minerals
Reference ID: IJCS-008
Controlling IP Spoofing with SBGP
Reference ID: IJCS-007
Attacks Detected by Discovery and Distance Vector Protocols in Ad-hoc Networks
Reference ID: IJCS-006
A Hybrid Method on Fractal Image Compression Using Quadtree Decomposition and Run length Encoding
Reference ID: IJCS-005
EVALUATION OF SLEEP SCHEDULING AND TOPOLOGY CONTROL (CDS)
Reference ID: IJCS-004
IMPROVING ROUTING EFFICIENCY IN MANET
Reference ID: IJCS-003
A Study on Ad hoc wireless Networks
Reference ID: IJCS-002
A Secured Data Hiding Techniques for Motion Vectors using stenography
Reference ID: IJCS-001
Home
About Us
Issn | Indexing | Impact Factor
Editorial Board
Archives
Current Issue
Faq
Contact Us
Indexing
Guest Editorship Form / Join us Co-Publisher | Board Member
Mode of Payment
Call us : +91 97 90 12 02 37