Volume-6 , Issue-11 , Nov - 2018 Go Back

Open Access   Article

Detecting and Preventing Cyber Attacks on Local Area Networks : A Working Example

Sezer YILDIZ, Umut ALTINIŞIK
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.1-6, Nov-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.16
Open Access   Article

Performance Analysis of Classifier Models to Predict Thyroid Disease

M. Saktheeswari, T. Balasubramanian
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.7-14, Nov-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.714
Open Access   Article

Development and Analysis of Generalized Queuing Model

Sachin Kumar Agrawal, B.K. Singh
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.15-32, Nov-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.1532
Open Access   Article

A Coupling of Voice and Iris Based Multimodal Biometric System for Person Authentication

Vijay K.Kale, Prapti D.Deshmukh
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.33-38, Nov-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.3338
Open Access   Article

A study of Preventing Concurrency’s Problems using 2-Phase Locking Protocols (2-PL)

Anil Kumar Singh
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.39-42, Nov-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.3942
Open Access   Article

Invasive weed optimization and Kernel Fuzzy C-Means Based MRI brain tissue segmentation

K. Venkatesh Sharma
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.43-50, Nov-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.4350
Open Access   Article

Comparative Analysis of Cube and Star Based Networks

Faizan Nasir, Jamshed Siddiqui
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.51-59, Nov-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.5159
Open Access   Article

ID-WNFS: Intrusion Detection Using Whale Neuro-Fuzzy System In Wireless Sensor Network

Rakesh Sharma, Vijay Anant Athavale
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.60-71, Nov-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.6071
Open Access   Article

Effective Feature Extraction Method in Novel Key Generation Using QR Code to secure the data

Sandha, M. Ganaga Durga
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.72-76, Nov-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.7276
Open Access   Article

Robust Design of Intrusion Detection System in Wireless Mobile Adhoc Network (RDIDS-WMAN)

Syed Muqtar Ahmed, Syed Abdul Sattar
Research Paper | Journal Paper
Vol.6 , Issue.11 , pp.77-82, Nov-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.7782
Next    Last