International Journal of
Computer Sciences and Engineering

Scholarly Peer-Reviewed, and Fully Refereed Scientific Research Journal

Volume-5 , Issue-11 , Nov -2017, E-ISSN: 2347-2693

First    Previous   
Client-Side Authorized Deduplication In Cloud Using PoW
P. Mounika, S.Jyothsna
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.117-123, Nov-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.117123
Addressing Challenges in Big Data Intrusion Detection System using Machine Learning Techniques
Saqr Mohammed H. Almansob, Santosh Shivajirao. Lomte
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.124-128, Nov-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.124128
Cloud Computing: BDaaS and HDaaS (Big Data as a Service and Hadoop as a Service)
Ujjwal Agarwal
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.129-132, Nov-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.129132
Study and Implemenation of Solar Botics
R. Nidhi
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.134-140, Nov-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.134140
Multimodal Approach on Finger Vein and Fingerprint by Using Visual Steganography for Efficient Biometric Security
P. Anitha, M. Grace
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.141-146, Nov-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.141146
Over view on Data Mining in Social Media
C.Amali Pushapm , J.Gnana Jayanthi
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.147-156, Nov-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.147156
Attacks on WSN and its Limitations
Shafiqul Abidin, Mohd Izhar
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.157-160, Nov-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.157160
Performance Analysis of S-MAC Protocol in Wireless Sensor Network
Deepika Bishnoi, Sunil Kumar Nandal
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.161-167, Nov-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.161167
Social link prediction using category based location history in trajectory data
Revathy S B, Remya R
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.168-171, Nov-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.168171
Secure Verification of Location Claims for Mobile Users
S. Harika, Renuka Kondabala
Review Paper | Journal Paper
Vol.5 , Issue.11 , pp.117-177, Nov-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.117177
First    Previous