International Journal of
Computer Sciences and Engineering

Scholarly, Peer-Reviewed and Fully Refereed Academic Research Journal

Flash News 

Full paper submission has now been opened for August edition. You can upload your full paper using the required templates to the Online Submission System. Deadline for uploading the full papers is 22 August 2018.

Volume-6 , Issue-7 , Jul -2018, E-ISSN: 2347-2693

First    Previous   
Open Access   Article

New Secure Communication Framework for Detection, Prevention & Isolation of Malicious Modes in MANET
Priya, Yogesh Kumar, Rahul Rishi
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1169-1175, Jul-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.11691175
Open Access   Article

Study of Mobile Phone Jammer Technique
Waman R. Parulekar, Damini D. Bhingarde
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1176-1179, Jul-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.11761179
Open Access   Article

Attendance System for Face Recognition using GSM module
Kirti B Hubballi, Vandana S Bhat
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1180-1184, Jul-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.11801184
Open Access   Article

Cost Based Routing Protocols in WBAN: a Review
T. Kaur, N. Kaur, G. Sidhu
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1185-1193, Jul-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.11851193
Open Access   Article

Information Use Pattern among Medical Professionals in Union Territory of Puducherry
A. Sampath
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1194-1199, Jul-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.11941199
Open Access   Article

Safeguarding Against Reactive Jammers In Wireless Sensor Network
Qureshi Hafsa Mohammadi, Raafiya Gulmeher
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1200-1204, Jul-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.12001204
Open Access   Article

A Diplomatic Data Collection in Wireless Sensor Networks using MLEACH Algorithm
A. Rehash Rushmi Pavitra, E. Srie Vidhya Janani
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1205-1210, Jul-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.12051210
Open Access   Article

Applying Appropriate Security Policies against Threats on Virtual Machines using Multi-Step Approach: A Strategy
E.S. Phalguna Krishna, G.Mani Kumar, B.Madhu Priya
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1211-1215, Jul-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.12111215
Open Access   Article

A Novel Technique to Detects and Segments Brain Tumor
P. Nagaveni, Chandra Mohan Reddy Sivappagari
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1216-1219, Jul-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.12161219
Open Access   Article

Exploring Internet of Things Applications, Technologies, Challenges in the Cloud and Use of Fog Computing in IoT Devices
D. Gajalakshmi
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1220-1223, Jul-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.12201223
First    Previous