International Journal of
Computer Sciences and Engineering

Scholarly Peer-Reviewed, and Fully Refereed Scientific Research Journal

Flash News 

Vol.6, Issue.1, 2018 has published

Volume-6 , Issue-1 , Jan -2018, E-ISSN: 2347-2693

First    Previous   
Role of ICT in developing Smart Agriculture Systems: Digital India Initiatives
M.B. Chandak
Research Paper | Journal Paper
Vol.6 , Issue.1 , pp.124-128, Jan-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.124128
Integrating BCI with Virtual Reality
Y. Galphat, M. Gangwani, A. Bhave, B.S. Chadha, S. Adnani
Review Paper | Journal Paper
Vol.6 , Issue.1 , pp.129-131, Jan-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.129131
Comparative Study on Ontology Management Approaches in Semantic Web
Ranjna Jain, Neelam Duhan, A.K.Sharma
Review Paper | Journal Paper
Vol.6 , Issue.1 , pp.132-140, Jan-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.132140
Clustering Techniques Used in Vehicular Ad-hoc Network: A Survey
Megha Rani, Akash Saxena
Survey Paper | Journal Paper
Vol.6 , Issue.1 , pp.141-145, Jan-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.141145
Privacy Preserving In Data Mining: A Survey
Smita Rani, Akash Saxena
Survey Paper | Journal Paper
Vol.6 , Issue.1 , pp.146-150, Jan-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.146150
A Review on various secure data access schemes and techniques in Fog for Internet of Things
Ravula Arun Kumar, Kambalapally Vinuthna
Review Paper | Journal Paper
Vol.6 , Issue.1 , pp.151-155, Jan-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.151155
Survey Paper on Various Security Attacks In Mobile Ad Hoc Network
M. Selladevi, S. Duraisamy
Survey Paper | Journal Paper
Vol.6 , Issue.1 , pp.156-160, Jan-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.156160
Natural Language Processing
Aditya Jain, Gandhar Kulkarni, Vraj Shah
Review Paper | Journal Paper
Vol.6 , Issue.1 , pp.161-167, Jan-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.161167
Efficient Resource Allocation Algorithm in Dependable Distributed Computing Systems Using A Colony Optimization
Manas kumar Yogi, G. kumari, L.Yamuna
Review Paper | Journal Paper
Vol.6 , Issue.1 , pp.168-171, Jan-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.168171
Mitigation of Geometrical Attack in Watermarking Technique Using Support Vector Machine
Ankita Agrawal, Anubha parajapati
Research Paper | Journal Paper
Vol.6 , Issue.1 , pp.172-176, Jan-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.172176
First    Previous