International Journal of
Computer Sciences and Engineering

Scholarly, Peer-Reviewed, and Pioneering Scientific Research Journal

Flash News 

Now Vol.5 , Issue.9 September 2017 edition has been published. Authors are cordially invited to submit papers for the upcoming edition through online submission system

Volume-5 , Issue-9 , Sep -2017, E-ISSN: 2347-2693

First    Previous   
Various Techniques for Controlling Transmit Power in Cognitive Radio: Survey
Sarika Devi, A.K. Goel, Nikita Sehgal
Review Paper | Journal Paper
Vol.5 , Issue.9 , pp.186-190, Sep-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i9.186190
Improving Confidentiality, Integrity, Authenticity in Mobile Wallet
Garima Agrawal, Abhilash Sonker
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.191-194, Sep-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i9.191194
Design and Development of Treadmill Controller with Wireless Mobile Health Monitoring System
Gaurav Sharma, Amit Pandey
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.195-199, Sep-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i9.195199
Barrier Removal from an Image Sequence using Edge Flow Technique
B.Pannalal, Ande Srinivasa Reddy, Nadipalli Yadagiri
Review Paper | Journal Paper
Vol.5 , Issue.9 , pp.200-203, Sep-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i9.200203
Classification of Vehicles using SURF Technique & SVM Classifier
Preeti Saini
Review Paper | Journal Paper
Vol.5 , Issue.9 , pp.204-207, Sep-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i9.204207
Efficient Parking Management Using the IoT Technology
Ayushi Rathore, Anjali, Mohammed Abdul Qadeer
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.208-212, Sep-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i9.208212
Comparison of Static and Dynamic Watchdog Technique to Provide Secure Data Transfer
Gayathri C., Vadivel R.
Review Paper | Journal Paper
Vol.5 , Issue.9 , pp.213-218, Sep-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i9.213218
On Privacy Preserving Data Mining Techniques: Merits and Demerits
Mohana Chelvan P., Perumal K.
Review Paper | Journal Paper
Vol.5 , Issue.9 , pp.19-223, Sep-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i9.19223
Analysis of Web Application Security
Shreekishan Jewliya
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.224-229, Sep-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i9.224229
Illustration of IOT with Big Data Analytics
Palaghat Yaswanth Sai, Pabolu Harika
Research Paper | Journal Paper
Vol.5 , Issue.9 , pp.230-235, Sep-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i9.230235
First    Previous