International Journal of
Computer Sciences and Engineering

Scholarly Peer-Reviewed, and Fully Refereed Scientific Research Journal

Flash News 

Vol.6, Issue.1, 2018 has published

Volume-6 , Issue-1 , Jan -2018, E-ISSN: 2347-2693

First    Previous   
Role of ICT in developing Smart Agriculture Systems: Digital India Initiatives
M.B. Chandak
Research Paper | Journal Paper
Vol.6 , Issue.1 , pp.128-132, Jan-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.128132
Integrating BCI with Virtual Reality
Y. Galphat, M. Gangwani, A. Bhave, B.S. Chadha, S. Adnani
Review Paper | Journal Paper
Vol.6 , Issue.1 , pp.133-135, Jan-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.133135
Comparative Study on Ontology Management Approaches in Semantic Web
Ranjna Jain, Neelam Duhan, A.K.Sharma
Review Paper | Journal Paper
Vol.6 , Issue.1 , pp.136-144, Jan-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.136144
Clustering Techniques Used in Vehicular Ad-hoc Network: A Survey
Megha Rani, Akash Saxena
Survey Paper | Journal Paper
Vol.6 , Issue.1 , pp.145-150, Jan-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.145150
Privacy Preserving In Data Mining: A Survey
Smita Rani, Akash Saxena
Survey Paper | Journal Paper
Vol.6 , Issue.1 , pp.151-155, Jan-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.151155
A Review on various secure data access schemes and techniques in Fog for Internet of Things
Ravula Arun Kumar, Kambalapally Vinuthna
Review Paper | Journal Paper
Vol.6 , Issue.1 , pp.156-161, Jan-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.156161
Survey Paper on Various Security Attacks In Mobile Ad Hoc Network
M. Selladevi, S. Duraisamy
Review Paper | Journal Paper
Vol.6 , Issue.1 , pp.162-167, Jan-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.162167
Natural Language Processing
Aditya Jain, Gandhar Kulkarni, Vraj Shah
Review Paper | Journal Paper
Vol.6 , Issue.1 , pp.168-174, Jan-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.168174
Efficient Resource Allocation Algorithm in Dependable Distributed Computing Systems Using A Colony Optimization
Manas kumar Yogi, G. kumari, L.Yamuna
Review Paper | Journal Paper
Vol.6 , Issue.1 , pp.175-178, Jan-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.175178
Mitigation of Geometrical Attack in Watermarking Technique Using Support Vector Machine
Ankita Agrawal, Anubha parajapati
Research Paper | Journal Paper
Vol.6 , Issue.1 , pp.179-182, Jan-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.179182
First    Previous