CINXE.COM
Volume 7 Issue-1 March 2016 | CS Journals
<!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width"> <title>Volume 7 Issue-1 March 2016 | CS Journals</title> <link rel="stylesheet" href="http://www.csjournals.com/wp-content/themes/csjournal/css/reset.css" type="text/css" media="all"> <link rel="stylesheet" href="http://www.csjournals.com/wp-content/themes/csjournal/css/style.css" type="text/css" media="all"> <link rel="stylesheet" href="http://www.csjournals.com/wp-content/themes/csjournal/style.css" type="text/css" media="all"> <script type="text/javascript" src="http://www.csjournals.com/wp-content/themes/csjournal/js/jquery-1.4.2.min.js" ></script> <script type="text/javascript" src="http://www.csjournals.com/wp-content/themes/csjournal/js/Myriad_Pro_300.font.js"></script> <script type="text/javascript" src="http://www.csjournals.com/wp-content/themes/csjournal/js/Myriad_Pro_400.font.js"></script> <script type="text/javascript" src="http://www.csjournals.com/wp-content/themes/csjournal/js/script.js"></script> <!--[if lt IE 7]> <link rel="stylesheet" href="http://www.csjournals.com/wp-content/themes/csjournal/css/ie/ie6.css" type="text/css" media="screen"> <script type="text/javascript" src="http://www.csjournals.com/wp-content/themes/csjournal/js/ie_png.js"></script> <script type="text/javascript"> ie_png.fix('.png, footer, header nav ul li a, .nav-bg, .list li img'); </script> <![endif]--> <!--[if lt IE 9]> <script type="text/javascript" src="http://www.csjournals.com/wp-content/themes/csjournaljs/html5.js"></script> <![endif]--> <script src="http://ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script> <!-- optional touchswipe file to enable swipping to navigate slideshow --> <script type="text/javascript" src="jquery.touchSwipe.min.js"></script> <style> #fadeshow4 .gallerylayer img{ /* make all images inside fadeshow4 scale to 100% of slideshow width */ width: 100%; height: auto; } </style> <script type="text/javascript" src="http://www.csjournals.com/wp-content/themes/csjournal/js/fadeslideshow.js"></script> </head> <body id="page1"> <div class="wrap"> <!-- header --> <header> <div class="container"> <h1><a href="http://www.csjournals.com/">CS Journals</a></h1> <nav> <ul> <div class="menu-topmenu-container"><ul id="menu-topmenu" class="nav-menu"><li id="menu-item-168" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-home menu-item-168"><a href="http://www.csjournals.com/">Home</a></li> <li id="menu-item-33" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-33"><a href="http://www.csjournals.com/?page_id=8">Our Journals</a></li> <li id="menu-item-101" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-101"><a href="http://www.csjournals.com/?page_id=97">Indexing</a></li> <li id="menu-item-177" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-177"><a href="http://www.csjournals.com/?page_id=86">Conference</a></li> <li id="menu-item-164" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-164"><a href="http://www.csjournals.com/?page_id=160">Downloads</a></li> <li id="menu-item-104" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-104"><a href="http://www.csjournals.com/?page_id=47">Contact Us</a></li> </ul></div> </ul> </nav> <style type="text/css">.rowElem1{color: #008cc4; float: right; font-family: times new roman; font-size: 18px; margin: 0 12px 0 0; position: absolute; right: 0; text-shadow: 0 0 17px; top: 82px;}</style> <div class="rowElem1"> Established Since 2008 </div> <div class="rowElem"> <form role="search" method="get" class="search-form" action="http://www.csjournals.com/"> <label> <span class="screen-reader-text">Search for:</span> <input type="search" class="search-field" placeholder="Search …" value="" name="s" /> </label> <input type="submit" class="search-submit" value="Search" /> </form> </div> </div> </header><div class="container"> <aside> <ul class="categories"> <nav role="navigation" class="navigation site-navigation secondary-navigation"> <div class="menu-sidemenu-container"><ul id="menu-sidemenu" class="menu"><li id="menu-item-113" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-113"><a href="http://www.csjournals.com/?page_id=89">Why CS Journals</a></li> <li id="menu-item-114" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-114"><a href="http://www.csjournals.com/?page_id=68">Call for Papers</a></li> <li id="menu-item-112" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-112"><a href="http://www.csjournals.com/?page_id=91">Author Instructions</a></li> <li id="menu-item-169" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-169"><a href="http://www.csjournals.com/?page_id=8">Journals Archives</a></li> <li id="menu-item-111" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-111"><a href="http://www.csjournals.com/?page_id=93">Paper Submission</a></li> <li id="menu-item-110" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-110"><a href="http://www.csjournals.com/?page_id=95">FAQ</a></li> </ul></div> </nav> </ul> <!-- <h2>Fresh <span>News</span></h2> <ul class="news"> <li><strong>June 30, 2010</strong> <h4><a href="#">Sed ut perspiciatis unde</a></h4> Sed ut perspiciatis unde omnis iste natus error sit voluptatem accusantium doloremque. </li> <li><strong>June 14, 2010</strong> <h4><a href="#">Neque porro quisquam est</a></h4> Nemo enim ipsam voluptatem quia voluptas sit aspernatur aut odit aut fugit consequuntur magni. </li> <li><strong>May 29, 2010</strong> <h4><a href="#">Minima veniam, quis nostrum</a></h4> Uis autem vel eum iure reprehenderit qui in ea voluptate velit esse quam nihil molestiae. </li> </ul>--> <h3>NEWS BLOG</h3> <div class="news"> <aside id="execphp-2" class="widget widget_execphp"> <div class="execphpwidget"><marquee onMouseOver="this.stop()" onMouseOut="this.start()" scrolldelay="200" direction="up"> <p>1.聽<a title="6.JackDavies" href="http://www.csjournals.com/?page_id=3244">How to Be a Successful Graduate Student?</a></p> <p>2.聽<a title="1.Joseph" href="http://www.csjournals.com/?page_id=3195">How to Choose an Essay Writing Service?</a></p> <p>3.聽<a title="2.Joseph" href="http://www.csjournals.com/?page_id=3203">How Does Homework Help Students to Improve Their Grades?</a></p> <p>4.聽<a title="3.Joseph" href="http://www.csjournals.com/?page_id=3206">Seek Confidential Paper Services to Buy an Essay Online</a></p> <p>5.聽<a title="4.Joseph" href="http://www.csjournals.com/?page_id=3208">How a Writing Tutor Might Help Understanding an Assignment</a></p> <p>6. <a title="5.Joseph" href="http://www.csjournals.com/?page_id=3210">What Is the Best Custom Essay Writing Service and How Define It?</a></p> <h5>March-2020</h5> <p>___________________________________________________</p> <p><a title="Services" href="http://www.csjournals.com/?page_id=3180">Online Assignment, Thesis etc. Services</a></p> <h5>Feb-2020</h5> <p>__________________________________________________<br /> <a title="7 Motivational Books about Writing to Help You Reach Your Academic Success" href="http://www.csjournals.com/?page_id=3171">Motivational Books to Help You Reach Your Academic Success</a></p> <h5>Feb-2020</h5> <p>__________________________________________________</p> <p><a title="Maybach" href="http://www.csjournals.com/?page_id=3191">Write My Business Assignment and Help Me to Overcome the Challenges</a></p> <h5>March-2020</h5> <p>_________________________________________________</p> </marquee></div> </aside> </div> </aside> <section id="content"> <div id="main-content" class="main-content"> <div id="primary" class="content-area"> <div id="content" class="site-content" role="main"> <h3>IJCSC Volume-7 Issue-1 Sept. 2015 - March 2016</h3> <table width="100%"> <tbody> <tr> <td width="43"><strong>SN</strong></td> <td width="604"><strong>Paper</strong></td> </tr> <tr> <td width="61"><strong>1</strong></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/1. Aru.pdf"><strong>Towards Identifying Optimal Quality Indicators for Evaluating De-Noising Algorithm Performance in SAR</strong></a> <p style="text-align: left;">Arundhati Ray, B Kartikeyan, S Garg</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/1.%20Aru.pdf">DOI: 10.090592/IJCSC.2016.001</a></p> </td> </tr> <tr> <td width="61"><strong>2</strong></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/2. Rajendra.pdf"><strong>Model based robust Peak Detection algorithm of Radiation Pulse Shape using limited samples</strong></a> <p style="text-align: left;">Rajendra Chhajed, Himanshu Purohit, Madhuri Bhavsar</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/2. Rajendra.pdf">DOI: 10.090592/IJCSC.2016.00</a>2</p> </td> </tr> <tr> <td width="61"><strong>3</strong></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/3. Himali.pdf"><strong>Gujarati Braille Text Recognition: A Review</strong></a> <p style="text-align: left;">Himali Parekh, Stuti Shah, Feni Patel, Hardik Vyas</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/3. Himali.pdf">DOI: 10.090592/IJCSC.2016.003</a></p> </td> </tr> <tr> <td width="61"><b>4</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/4. kamal.pdf"><strong>A Review on Strategies and Methodologies of Dynamic Power Reduction on Low Power System Design</strong></a> <p style="text-align: left;">Kamal K Mehta</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/4. kamal.pdf">DOI: 10.090592/IJCSC.2016.004</a></p> </td> </tr> <tr> <td width="61"><b>5</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/5. Kush.pdf"><strong>Simulation of Picocell Interference Scenario for Cognitive Radio聽</strong></a> <p style="text-align: left;">Kushwinder Singh, Pooja</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/5. Kush.pdf">DOI: 10.090592/IJCSC.2016.005</a></p> </td> </tr> <tr> <td width="61"><b>6</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/6. Manjit.pdf"><strong>Analysis of EDEEC and its types using different parameters</strong></a> <p style="text-align: left;">Manjit Kaur Minhas, Er. Tripatjot Singh Panag</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/6. Manjit.pdf">DOI: 10.090592/IJCSC.2016.006</a></p> </td> </tr> <tr> <td width="61"><b>7</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/7. Manisha.pdf"><strong>Detection of Node Replication Attack Using XED and EDD algorithms in Wireless Sensor Networks</strong></a> <p style="text-align: left;">Manisha R. Deore, R. V. Patil</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/7. Manisha.pdf">DOI: 10.090592/IJCSC.2016.007</a></p> </td> </tr> <tr> <td width="61"><b>8</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/8. Smita.pdf"><strong>Performance evaluation of counting words from files using OpenMP</strong></a> <p style="text-align: left;">Prof. Smita Agrawal, Prof. Preeti Kathiria, Atul Patel, GUNJAN ASWANI, BINDIBEN BHATT</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/8. Smita.pdf">DOI: 10.090592/IJCSC.2016.008</a></p> </td> </tr> <tr> <td width="61"><b>9</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/9. Prashant.pdf"><strong>AODV Routing Algorithm with Link Prediction Model聽</strong></a> <p style="text-align: left;">Prashant Singh 聽 聽D.K. Lobiyal</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/9. Prashant.pdf" target="_blank">DOI: 10.090592/IJCSC.2016.009</a></p> </td> </tr> <tr> <td width="61"><b>10</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/10. Akash.pdf"><strong>Wearable live streaming gadget using Raspberry pi</strong></a> <p style="text-align: left;">Akash Dhamasia, Kunal Prajapati, Prof. Parita Oza</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/10. Akash.pdf">DOI: 10.090592/IJCSC.2016.010</a></p> </td> </tr> <tr> <td width="61"><b>11</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/11. Sonia.pdf"><strong>Face Detection and Tracking: A Comparative study of two algorithms</strong></a> <p style="text-align: left;">Sonia Mittal, Chirag Shivnani</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/11. Sonia.pdf">DOI: 10.090592/IJCSC.2016.011</a></p> </td> </tr> <tr> <td width="61"><b>12</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/12. Deepika.pdf"><strong>Empirical Performance Comparison of OODBMS over RDBMS</strong></a> <p style="text-align: left;">Deepika Shukla , Neha Singh, Nidhi Jagudaniya, Ami Nirmal</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/12. Deepika.pdf">DOI: 10.090592/IJCSC.2016.012</a></p> </td> </tr> <tr> <td width="61"><b>13</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/13. Deepti.pdf"><strong>A Singular Value Decomposition Based Robust Image Watermarking Scheme</strong></a> <p style="text-align: left;">Deepti Varshney</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/13. Deepti.pdf">DOI: 10.090592/IJCSC.2016.013</a></p> </td> </tr> <tr> <td width="61"><b>14</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/14. Anuja.pdf"><strong>AdWords : A Study of Usage and Tools</strong></a> <p style="text-align: left;">Anuja.R.Nair, Shaina Thakkar</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/14. Anuja.pdf">DOI: 10.090592/IJCSC.2016.014</a></p> </td> </tr> <tr> <td width="61"><b>15</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/15. Asha.pdf"><strong>Aggregated Search-A rising need for Information Retrieval</strong></a> <p style="text-align: left;">Aashka Kotecha, Shailee Patel, Shivani Desai</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/15. Asha.pdf">DOI: 10.090592/IJCSC.2016.015</a></p> </td> </tr> <tr> <td width="61"><b>16</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/16. Nikam.pdf"><strong>Fuzzy Approach to Maintain Delay in Ad Hoc Network for DSDV Protocol</strong></a> <p style="text-align: left;">SamikshaNikam, Dr.B.T.Jadhav</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/16. Nikam.pdf">DOI: 10.090592/IJCSC.2016.016</a></p> </td> </tr> <tr> <td width="61"><b>17</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/17. Raj.pdf"><strong>Hybrid Approach for Inpainting Large Object</strong></a> <p style="text-align: left;">Rajkumar L. Biradar</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/17. Raj.pdf">DOI: 10.090592/IJCSC.2016.017</a></p> </td> </tr> <tr> <td width="61"><b>18</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/18. Tejpal.pdf"><strong>Heart Disease Prediction Using Machine learning and Data Mining Technique</strong></a> <p style="text-align: left;">Jaymin Patel, Prof. Tejal Upadhyay, Dr. Samir Patel</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/18. Tejpal.pdf">DOI: 10.090592/IJCSC.2016.018</a></p> </td> </tr> <tr> <td width="61"><b>19</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/19. Swati.pdf"><strong>Feature Fusion of Colour Moment and Morphological Features for Enhanced Precision in Content Based Image Retrieval Systems</strong></a> <p style="text-align: left;">Swati Jain, Tanish Zaveri</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/19. Swati.pdf">DOI: 10.090592/IJCSC.2016.019</a></p> </td> </tr> <tr> <td width="61"><b>20</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/20. Anitha.pdf"><strong>Software Process Models for Mobile Application Development: A Review</strong></a> <p style="text-align: left;">Anitha Ashishdeep, Jitendra Bhatia, Krunal Varma</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/20. Anitha.pdf">DOI: 10.090592/IJCSC.2016.020</a></p> </td> </tr> <tr> <td width="61"><b>21</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/21. Vipul.pdf"><strong>Usability of Long Passwords in Web Application</strong></a> <p style="text-align: left;">Vipul Chudasama, Vishal Parikh, Tejas Chauhan</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/21. Vipul.pdf">DOI: 10.090592/IJCSC.2016.021</a></p> </td> </tr> <tr> <td width="61"><b>22</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/22. Raman.pdf"><strong>An Efficient Checkpointing Protocol for Mobile Distributed Systems</strong></a> <p style="text-align: left;">Raman Kumar, Parveen Kumar</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/22. Raman.pdf">DOI: 10.090592/IJCSC.2016.022</a></p> </td> </tr> <tr> <td width="61"><b>23</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/23. Tejpal.pdf"><strong>Lie Detection based on Human facial gestures</strong></a> <p style="text-align: left;">Prof. Tejal Upadhyay, Dipendy RoyRaman Kumar, Parveen Kumar</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/23. Tejpal.pdf">DOI: 10.090592/IJCSC.2016.023</a></p> </td> </tr> <tr> <td width="61"><b>24</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/24. Vishal.pdf"><strong>Improving Security in P2P File Sharing Based on Network Coding for DTN</strong></a> <p style="text-align: left;">Vishal Parikh, Kajol Markana, Vijay Ukani, Malaram Kumhar</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/24. Vishal.pdf">DOI: 10.090592/IJCSC.2016.024</a></p> </td> </tr> <tr> <td width="61"><b>25</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/25. Anitha.pdf"><strong>Various Approaches to Recognise Human Emotions</strong></a> <p style="text-align: left;">Anitha Modi, Priyanka Sharma, Dvijesh Bhatt</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/25. Anitha.pdf">DOI: 10.090592/IJCSC.2016.025</a></p> </td> </tr> <tr> <td width="61"><b>26</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/26. Dhaval.pdf"><strong>Medical Diagnosis System Using Machine Learning</strong></a> <p style="text-align: left;">Dhaval Raval, Dvijesh Bhatt, Malaram K Kumhar, Vishal Parikh, Daiwat Vyas</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/26. Dhaval.pdf">DOI: 10.090592/IJCSC.2016.026</a></p> </td> </tr> <tr> <td width="61"><b>27</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/27. Karan.pdf"><strong>Mobile Ad-Hoc Network: Applications and Challenges</strong></a> <p style="text-align: left;">Karan Singh, Anil Kumar</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/27. Karan.pdf">DOI: 10.090592/IJCSC.2016.027</a></p> </td> </tr> <tr> <td width="61"><b>28</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/28. Vyas.pdf"><strong>IoT: Trends, Challenges and Future Scope</strong></a> <p style="text-align: left;">Daiwat A. Vyas, Dvijesh Bhatt, Dhaval Jha</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/28. Vyas.pdf">DOI: 10.090592/IJCSC.2016.028</a></p> </td> </tr> <tr> <td width="61"><b>29</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/29. Jigna.pdf"><strong>Data Quality Management - Tools and Techniques</strong></a> <p style="text-align: left;">Jigna Patel</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/29. Jigna.pdf">DOI: 10.090592/IJCSC.2016.029</a></p> </td> </tr> <tr> <td width="61"><b>30</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/30. Rupal.pdf"><strong>Brain Tumor Disease Identification Using Random Forest Classifiers</strong></a> <p style="text-align: left;">Meet Oza,Rupal Kapdi</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/30. Rupal.pdf">DOI: 10.090592/IJCSC.2016.030</a></p> </td> </tr> <tr> <td width="61"><b>31</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/31. Prajapati.pdf"><strong>Security and Privacy with Perturbation Based Encryption Technique in Big Data</strong></a> <p style="text-align: left;">Prajapati Het I., Patel Shivani M., Prof. Ketan 聽J. Sarvakar</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/31. Prajapati.pdf">DOI: 10.090592/IJCSC.2016.031</a></p> </td> </tr> <tr> <td width="61"><b>32</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/32. Surender.pdf"><strong>An Efficient Energy Hole Detection Approach for Mobile Sensor Networks</strong></a> <p style="text-align: left;">Yashwant Singh Sangwan, Surender Jangra</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/32. Surender.pdf">DOI: 10.090592/IJCSC.2016.032</a></p> </td> </tr> <tr> <td width="61"><b>33</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/33. Ritika.pdf"><strong>Video Based Face Detection and Tracking for Forensic Applications</strong></a> <p style="text-align: left;">Ritika Lohiya, Pooja Shah</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/33. Ritika.pdf">DOI: 10.090592/IJCSC.2016.033</a></p> </td> </tr> <tr> <td width="61"><b>34</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/34. Karan.pdf"><strong>FANET Communication Protocols: A Survey</strong></a> <p style="text-align: left;">Karan Palan, Priyanka Sharma</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/34. Karan.pdf">DOI: 10.090592/IJCSC.2016.034</a></p> </td> </tr> <tr> <td width="61"><b>35</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/35. Malaram.pdf"><strong>Ransomware: A Threat to Cyber security</strong></a> <p style="text-align: left;">Deneesha Kansagra, Malaram Kumhar, Dhaval Jha</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/35. Malaram.pdf">DOI: 10.090592/IJCSC.2016.035</a></p> </td> </tr> <tr> <td width="61"><b>36</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/36. Rima.pdf"><strong>Analysis of Energy Consumption in SET TOP BOX: A survey and Opportunities for Energy Saving</strong></a> <p style="text-align: left;">Rima Patel, GaurangRaval, SharadaValiveti</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/36. Rima.pdf">DOI: 10.090592/IJCSC.2016.036</a></p> </td> </tr> <tr> <td width="61"><b>37</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/37. Anuj.pdf"><strong>A Machine Learning Approach to Improve the Efficiency of Fake Websites Detection Techniques</strong></a> <p style="text-align: left;">Anuj Dakwala, Kruti Lavingia</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/37. Anuj.pdf">DOI: 10.090592/IJCSC.2016.037</a></p> </td> </tr> <tr> <td width="61"><b>38</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/38. Sarthak.pdf"><strong>Bandwidth Optimization for Real Time Video Streaming</strong></a> <p style="text-align: left;">Sarthak Trivedi, Priyanka Sharma</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/38. Sarthak.pdf">DOI: 10.090592/IJCSC.2016.038</a></p> </td> </tr> <tr> <td width="61"><b>39</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/39. Mishti.pdf"><strong>Identification of Trusted Elements with Malicious Behavior of Public Cloud against DoS Attack</strong></a> <p style="text-align: left;">Mishti Samani, Jitendra Bhatia, Miren Karamta, M.B.potdar</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/39. Mishti.pdf">DOI: 10.090592/IJCSC.2016.039</a></p> </td> </tr> <tr> <td width="61"><b>40</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/40. Pimal.pdf"><strong>Deep Learning Algorithms</strong></a> <p style="text-align: left;">Jitali Patel, Pimal Khanpara, Akarsh Agarwal, Akash Motwani</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/40. Pimal.pdf">DOI: 10.090592/IJCSC.2016.040</a></p> </td> </tr> <tr> <td width="61"><b>41</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/41. Priyank.pdf" target="_blank"><strong>Comparing Multiple Linear Regression and Linear Support Vector Regression for Predicting in Stock Market</strong></a> <p style="text-align: left;">Dr. Priyank Thakkar</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/41. Priyank.pdf">DOI: 10.090592/IJCSC.2016.041</a></p> </td> </tr> <tr> <td width="61"><b>42</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/42. Divya.pdf" target="_blank"><strong>Built-In Testing For Component Based Software Development in Embedded Systems</strong></a> <p style="text-align: left;">Divya Shree</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/42. Divya.pdf">DOI: 10.090592/IJCSC.2016.042</a></p> </td> </tr> <tr> <td width="61"><b>43</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/43. Anish.pdf" target="_blank"><strong>Use of Business Intelligence in Knowledge Management</strong></a> <p style="text-align: left;">Anish Soni</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/43. Anish.pdf">DOI: 10.090592/IJCSC.2016.043</a></p> </td> </tr> <tr> <td width="61"><b>44</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/44. Jyoti.pdf" target="_blank"><strong>Review of various Load Balancing Techniques in Cloud Computing</strong></a> <p style="text-align: left;">Jyoti Rathore,Dr. Bright Keswani, Dr. Vijay Singh Rathore</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/44. Jyoti.pdf">DOI: 10.090592/IJCSC.2016.044</a></p> </td> </tr> <tr> <td width="61"><b>45</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/45. Jai.pdf" target="_blank"><strong>Design and Analysis of a Levenshtein Distance Based Code Clones Detection Algorithm</strong></a> <p style="text-align: left;">Jai Bhagwan</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/45. Jai.pdf">DOI: 10.090592/IJCSC.2016.045</a></p> </td> </tr> <tr> <td width="61"><b>46</b></td> <td width="573"><a href="http://csjournals.com/IJCSC/PDF7-1/46. Raj.pdf" target="_blank"><strong>MATLAB: A Tool for Enhancing Teaching and Learning of Control System</strong></a> <p style="text-align: left;">Mahesh Kumar, Rajender Kumar</p> <p style="text-align: left;"><a href="http://csjournals.com/IJCSC/PDF7-1/46. Raj.pdf">DOI: 10.090592/IJCSC.2016.04</a>6</p> </td> </tr> </tbody> </table> </div><!-- #content --> </div><!-- #main-content --> </section> </div> <footer> <div class="container"> <div class="inside"> <div class="wrapper"> <!--<div class="fleft">24/7 Customer Service <span>+91-8053743429</span></div>--> <div class="aligncenter">Copyright @ Computer Science & Electronics Journals <!--<a class="new_window" href="http://www.behindmethods.com" target="_blank" rel="nofollow">Behind Methods - your technology partner</a>--> <br/> All rights reserved. </div> </div> </div> </div> </footer> <script type="text/javascript"> Cufon.now(); </script> </body> </html>