Manuscript Submission for IJCSMA
Submit articles via Scholars Central
Research Article
CONTENT BASED IMAGE RETRIEVAL SYSTEM USING SVM CLASSIFICATION AND EVOLUTIONARY ALGORITHMS
Usability Testing Methods for Mobile Learning Application
VITALITY EFFICIENT LOAD BALANCING IN CHARACTER DIVERSE NODES OF A WSN
LOGICAL GROUPING OF CHARACTER DIVERSE NODES IN WSN TO PROCURE LOAD BALANCING AND DISTRIBUTIO
MULTI-LAYER APPROACH IN AGRICULTURE CROPPING SYSTEM TO INCREASE PRODUCTIVITY USING SMART WIRELESS SENSOR NETWORK
POWER AWARE LOAD BALANCING IN SECURED CHARACTER DIVERSE WSN
K-Means & Ward?s Algorithm with HBO in Spatial Data Mining
GovSchemAna - A Machine Learning Enabled Android App for Analysis of Government Schemes
A SURVEY OF COMPARISON STUDY OF CLASSIFICATION FOR HEMATOLOGICAL DATA
SENTIMENT ANALYSIS OF TWEETS USING SUPPORT VECTOR MACHINE
EFFECTIVENESS OF OPENMP FOR ALGORITHM PARALLELIZATION
An Analysis of Database from Traditional Database Towards Hana in Business Environment
Online Attendance Management System Using RFID with Object Contradict
Study of Time Management Technique to Manage Stress among Software Professionals
Challenges & Essential of Mobile Banking in India
A Study on Multimodal Biometrics System
SHIELDING NETWORK VIRTUALIZATION USING CBC-MAC FOR IMMINENT INTERCONNECTED NETWORKS
STEPWISE REGRESSION BASED SUPPORT VECTOR MACHINE FOR STABLE AND CONSISTENT DATA DELIVERY IN WSN
Augmented Reality Based Mobile App for a University Campus
A Survey on Early Detection of Liver Cancer for Preventive Health Care using Image Processing
MICROARRAY USING ADVANCED REGRESSION FOR FIXING LOST DATA
FRAUD DETECTION USING REDDIT RANKING ALGORITHM
ENHANCED CROSS DOMAIN SENTIMENTAL CLASSIFICATION USING PATTERN RECOGNITION
Big Data Landscape: State of the Art, Trend Analysis and Potential Challenges
SECURITY ENHANCEMENT AND MINIMIZED DELAY OF NEIGHBOUR DEFENCE TECHNIQUE FOR AODV (NDTAODV) ROUTING PROTOCOL BY VARYING NETWORK SIZE IN MANETS
A Design Approach to Secure Data Transmission in Network Centric Warfare Systems
Performance Analysis of Modified Blowfish Algorithm towards Cloud Security
Vulnerability Assessment Policies and Tools in Enterprise Networks
Determination and Analysis of Automated Fruits Grading System Using Machine Learning Method
A Survey on Security Attacks for VANET