Volume-6 , Issue-8 , Aug - 2018 Go Back

Open Access   Article

Optimized Information Hiding using Discrete Wavelet Transform and Genetic Algorithm

G. Umamaheswari, C.P. Sumathi
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.930-938, Aug-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.930938
Open Access   Article

Interference Aware, Topology, Power and Flow Control Channel Assignment Algorithm for Multi-Radio Multi-Channel Wireless Mesh Networks

J.S. Saini, B.S. Sohi
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.939-947, Aug-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.939947
Open Access   Article

Present Approaches for Detection of Design Pattern: A Survey

A. Chaturvedi
Survey Paper | Journal Paper
Vol.6 , Issue.8 , pp.948-958, Aug-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.948958
Open Access   Article

A Comparative And Statistical Approach To Leverage Cloud Computing And Big Data Analytics In E-Governance

Bhushan Jadhav, Archana B. Patankar
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.959-967, Aug-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.959967
Open Access   Article

Modeling Role of ICT in Business Startups and Incubation

Gopal Pardesi
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.968-973, Aug-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.968973
Open Access   Article

Wi-Li-Fi an Innovative Wireless Network Architecture for Future IOT Applications

S. Arunmozhi Selvi, P. Sivananaintha Perumal, R.S. Rajesh
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.974-977, Aug-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.974977
Open Access   Article

Multihoming in Multihomed AD HOC Networks with SCTP

Sarthika Dutt, Astha Sharma, Anuj Saxena
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.978-982, Aug-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.978982
Open Access   Article

A Survey of Genome Compression Methodology

Rituparna Mitra, Subhankar Roy
Survey Paper | Journal Paper
Vol.6 , Issue.8 , pp.983-991, Aug-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.983991
Open Access   Article

Host Based Intrusion Detection Using Data Mining Methodologies

M Naga Surya Lakshmi, K V N Sunitha
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.992-998, Aug-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.992998
Open Access   Article

Two-Level Image Encryption Algorithm Based On Key-Image

V. Sridhar, M. Dyna
Research Paper | Journal Paper
Vol.6 , Issue.8 , pp.999-1008, Aug-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.9991008
First    Previous    Next    Last