Analysis of Web Application Security Journal Article published Sep 2017 in International Journal of Computer Sciences and Engineering volume 5 issue 9 |
New Iris Tracking Method using a Generalized Particle Filter Journal Article published Sep 2017 in International Journal of Computer Sciences and Engineering volume 5 issue 9 on pages 7 to 13 |
Performance Analysis of Classification Algorithms on Diabetes Dataset Journal Article published Sep 2017 in International Journal of Computer Sciences and Engineering volume 5 issue 9 on pages 15 to 20 |
Biometric Recognition System: A Review Journal Article published Sep 2017 in International Journal of Computer Sciences and Engineering volume 5 issue 9 on pages 40 to 45 |
Cloud Computing in Bioinformatics: Solution to Big Data Challenge Journal Article published Sep 2017 in International Journal of Computer Sciences and Engineering volume 5 issue 9 |
Noise Removal from News Web Sites Journal Article published Sep 2017 in International Journal of Computer Sciences and Engineering volume 5 issue 9 |
Robust Audio Watermarking using Improved DWT-SVD approach Journal Article published Sep 2017 in International Journal of Computer Sciences and Engineering volume 5 issue 9 on pages 68 to 73 |
Heterogeneous Cloud Radio Access Network Journal Article published Sep 2017 in International Journal of Computer Sciences and Engineering volume 5 issue 9 on pages 46 to 51 |
Extraction of Tamil Characters from a Handwritten Document using Connected Component Labeling Journal Article published Sep 2017 in International Journal of Computer Sciences and Engineering volume 5 issue 9 |
Efficient Parking Management Using the IoT Technology Journal Article published Sep 2017 in International Journal of Computer Sciences and Engineering volume 5 issue 9 |
A Novel Approach to Real Time Face Detection and Recognition Journal Article published Sep 2017 in International Journal of Computer Sciences and Engineering volume 5 issue 9 on pages 62 to 67 |
Comparison of Static and Dynamic Watchdog Technique to Provide Secure Data Transfer Journal Article published Sep 2017 in International Journal of Computer Sciences and Engineering volume 5 issue 9 |
Analysing data using R: An application in healthcare sector Journal Article published Sep 2017 in International Journal of Computer Sciences and Engineering volume 5 issue 9 |
Marking Clause Boundary in Compound Sentences of Punjabi Language Journal Article published Sep 2017 in International Journal of Computer Sciences and Engineering volume 5 issue 9 |
Red Gram Agro Advisory System Journal Article published Sep 2017 in International Journal of Computer Sciences and Engineering volume 5 issue 9 on pages 79 to 83 |
Decomposition of δ-Continuity and δ*-Continuity Journal Article published Sep 2017 in International Journal of Computer Sciences and Engineering volume 5 issue 9 |
A Study Of Cloud Computing Based On Virtualization And Security Threats Journal Article published Sep 2017 in International Journal of Computer Sciences and Engineering volume 5 issue 9 |
Fast and Efficient Coin Recognition using 5 Hidden Layers BPNN Journal Article published Sep 2017 in International Journal of Computer Sciences and Engineering volume 5 issue 9 |
Approach towards validity of Aggressive Packet Combining Scheme with Physical Level Representation Journal Article published Sep 2017 in International Journal of Computer Sciences and Engineering volume 5 issue 9 |
On Privacy Preserving Data Mining Techniques: Merits and Demerits Journal Article published Sep 2017 in International Journal of Computer Sciences and Engineering volume 5 issue 9 |