Volume-6 , Issue-3 , Mar - 2018 Go Back

Open Access   Article

A Comparative Review on the Performance of Intrusion Detection Algorithms and Datasets in Networks Using Data Mining Techniques

Ramakant Soni, Pradeep Singh Shekhawat
Review Paper | Journal Paper
Vol.6 , Issue.3 , pp.327-332, Mar-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i3.327332
Open Access   Article

Sentiment Analysis on Microblog Content

Y.K. Pitale, D.C. Salot , R.S. Mhatre, T. Dabreo
Review Paper | Journal Paper
Vol.6 , Issue.3 , pp.333-336, Mar-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i3.333336
Open Access   Article

Inducing Neuro-linguistic changes in human brain to improve the efficiency of human being

Shobanbabu R.J, Raju, Anil Kumar Chengali
Review Paper | Journal Paper
Vol.6 , Issue.3 , pp.337-342, Mar-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i3.337342
Open Access   Article

A Review of Wireless Multimedia Sensor Network and existing Routing Protocols

Moumita Deb, Abantika Choudhury
Review Paper | Journal Paper
Vol.6 , Issue.3 , pp.343-358, Mar-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i3.343358
Open Access   Article

New Trends in Digital Data Storage for the Internet of Things

A. Saxena, S. Sharma, S. Dangi, A. Sharma, C. Patel
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.359-363, Mar-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i3.359363
Open Access   Article

A Novel Encryption Technique Using DNA Encoding and Single Qubit Rotations

Partha Sarathi Goswami, Tamal Chakraborty, Harekrishna Chatterjee
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.364-369, Mar-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i3.364369
Open Access   Article

Application of ACO in Model Based Software Testing: A Review

Navneet Kaur, Jaskaranjit Kaur, J.S.Budwal
Review Paper | Journal Paper
Vol.6 , Issue.3 , pp.370-374, Mar-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i3.370374
Open Access   Article

Dynamic Scheduling Algorithm With Task Execution Time Estimation Method In Cloud

Babita Rani Radwal, Sanjay Kumar
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.375-379, Mar-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i3.375379
Open Access   Article

A Survey of Cancelable Biometric Based Key Generation Scheme using various Cryptography Techniques

K.N. Joshi, P. Chaudhari
Review Paper | Journal Paper
Vol.6 , Issue.3 , pp.380-383, Mar-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i3.380383
Open Access   Article

Priority Based Least Waiting Time Load Balancing Algorithm Applied in Cloud Computing

A.B. Majumder, S. Sil, S. Das, A. Mondal
Research Paper | Journal Paper
Vol.6 , Issue.3 , pp.384-388, Mar-2018
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i3.384388
First    Previous    Next    Last