Volume-7 , Issue-2 , Feb - 2019 Go Back

Open Access   Article

Analysis of Report Generation of Daily Production in Manufacturing Industry using IoT

Mayuri Sewatkar, Ajitkumar Khachane
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.308-312, Feb-2019
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.308312
Open Access   Article

A Survey on Feature Extraction Methods & Classifiers for Handwritten Gurmukhi Character Recognition

Sonia Flora, Parth Goel, Anju Kakkad
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.313-320, Feb-2019
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.313320
Open Access   Article

Time Complexity Analysis of Cloud Data Security: Elliptical Curve and Polynomial Cryptography

D.Pharkkavi, D. Maruthanayagam
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.321-331, Feb-2019
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.321331
Open Access   Article

Detection Of Primary User Emulation Attack in Cognitive Radio Networks Based On TDOA using Grey Wolf Optimizer

Aasia Rehman
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.332-337, Feb-2019
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.332337
Open Access   Article

A Survey on Plant Disease Detection and Classification Using Different Machine Learning Algorithms

Shraddha Tadmare, Bodireddy Mahalakshmi
Survey Paper | Journal Paper
Vol.7 , Issue.2 , pp.338-341, Feb-2019
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.338341
Open Access   Article

Revisiting Cloud Security Threats: Man-in-the-Middle Attack

Vaishali Singh, Kavita Bhatia, S. K. Pandey
Review Paper | Journal Paper
Vol.7 , Issue.2 , pp.342-348, Feb-2019
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.342348
Open Access   Article

Review Paper on Dynamic Mechanisms of Data Leakage Detection and Prevention

Shivakumara T, Rajshekhar M Patil, Muneshwara M S
Review Paper | Journal Paper
Vol.7 , Issue.2 , pp.349-358, Feb-2019
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.349358
Open Access   Article

Analysis of Cloud Computing Load Balancing Algorithms

Alok Kumar, Shivani Rohilla, Manish Bhardwaj
Review Paper | Journal Paper
Vol.7 , Issue.2 , pp.359-362, Feb-2019
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.359362
Open Access   Article

Performance Analysis of Data Encryption Algorithms for Secure EHR Transmission

Shraddha M. Dudhani, Santosh S. Lomte
Research Paper | Journal Paper
Vol.7 , Issue.2 , pp.363-366, Feb-2019
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.363366
Open Access   Article

A Review on Performance Analysis and Improvement of Internet of Things Application

Ajay Kumar Bharti, Rashmi Negi, Deepak Kumar Verma
Review Paper | Journal Paper
Vol.7 , Issue.2 , pp.367-371, Feb-2019
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.367371
First    Previous    Next    Last