Manuscript Submission for IJCSMA
Submit articles via Scholars Central
Research
A Review Report on the Evolution and Implementation of Business Intelligence Technique in the Banking Sector
A SURVEY OF TEXTURE CLASSIFICATION USING RECENT TECHNOLOGY
LOW POWER DSP ARCHITECTURE FOR WIRELESS SENSOR NODES USING DVFS ALGORITHM
Cryptography Based Privacy Protection Mechanism for Online Social Networks
ASSESSMENT OF POWER OPTIMIZATION IN VLSI SYSTEM USING LAUNCH-OFF-SHIFT AND LAUNCH-OFF-CAPTURE TESTING
Dynamic Linkability with User Authentication Privacy Preserving for Roaming Services: A Review
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
Remote Data Back-up and Privacy Preserving Data Distribution in the Cloud: A Review
Enhanced Approach for Keyword Based Search on Uncertain Graph Data: A Review
Study of Data Transmission Using Sockets
REVIEW OF TWO DIMENSIONAL ANALYTICAL MODEL OF DUAL MATERIAL GATE TUNNEL FIELD EFFECT TRANSISTOR
Model Based Test Case Optimization of UML Activity Diagrams using Evolutionary Algorithms
A SURVEY ON VARIOUS METHODS IN MANET BASED ON ANALYSING VARIOUS TRAFFIC PATTERNS FOR ANONYMOUS COMMUNICATION
Analysis and Comparison of Different Image Denoising Techniques- Review
IMPLEMENTATION OF UNMANNED GROUND VEHICLE WITH A SMARTPHONE
Study of Dynamic Routing Protocols
Web Log Mining Based on Soft Clustering and Multi-Objective Genetic Algorithm
DATA MINING INFORMATION SEARCH
Performance Evaluation of Various Discrete Cosine Transforms
A REVIEW ON DIMINISH THE UTILIZATION COST IN DISTRIBUTED DCs
Real Time System Fault Tolerance Scheduling Algorithms
A Technique for Mining Uncommon Causal Relations and Its Submission in Finding Adverse Drug Reaction Indication Pairs
Protected Mining of Association Instructions in Horizontally Scattered Records
An Architectural-Model for the Mobile based E-Learning Environment
Analysis of TOI (Things of Internet) Industrial Monitoring System on Raspberry pi Platform
Computer Network Attacks - A Study
Intrusions in Computer Networks - A Perspective
Evaluation Metrics for Intrusion Detection Systems - A Study