<?xml version="1.0" encoding="UTF-8"?>
		<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
		<url>
		<loc>https://www.ijcsma.com/</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/about-us.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/instructions.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/editorial-board.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/indexing.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/publication-fee.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/contact.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/inprocess.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/archive.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/citations.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/awards-nomination.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/aidriven-wound-healing-analysis-and-progression-tracking-in-mobile-applicationsa-scalable-approach-for-healthcare-access-1102058.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/aidriven-wound-healing-analysis-and-progression-tracking-in-mobile-applicationsa-scalable-approach-for-healthcare-access.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/bounded-number-theory-a-study-on-the-negation-of-infinite-numbers-in-parts-or-completely-1101213.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/bounded-number-theory-a-study-on-the-negation-of-infinite-numbers-in-parts-or-completely.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/cybersecurity-risk-management-frameworks-in-oil-and-gas-pipelines-and-the-role-of-ai-1100842.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/cybersecurity-risk-management-frameworks-in-oil-and-gas-pipelines--and-the-role-of-ai.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/cybersecurity-risk-management-frameworks-in-oil-and-gas-pipelines-and-the-role-of-ai-1100842.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/engineering-motivation-into-an-instructional-design-skillstrength-assessment-and-mentoring-system-1100632.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/engineering-motivation-into-an-instructional-design-skillstrength-assessment-and-mentoring-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/engineering-motivation-into-an-instructional-design-skillstrength-assessment-and-mentoring-system-1100632.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/diversity-of-thought-elicits-stronger-reasoning-capabilities-in-multiagent-debate-frameworks-1100503.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/diversity-of-thought-elicits-stronger-reasoning-capabilities-in-multiagent-debate-frameworks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/diversity-of-thought-elicits-stronger-reasoning-capabilities-in-multiagent-debate-frameworks-1100503.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/dmany-nexus-protocol-a-decentralized-reputation-protocol-for-scalable-web3-economies-through-dynamic-trust-quantificatio-1100461.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/dmany-nexus-protocol--a-decentralized-reputation-protocol-for-scalable-web3-economies-through-dynamic-trust-quantificati.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/convnext-in-isolated-sign-language-recognition-1100415.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/convnext-in-isolated-sign-language-recognition.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/quantumpowered-personalized-learning-1100081.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/quantumpowered-personalized-learning.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/quantumpowered-personalized-learning-1100081.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/theory-of-major-and-minor-numerical-progressions-1099767.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/theory-of-major-and-minor-numerical-progressions.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/theory-of-major-and-minor-numerical-progressions-1099767.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/occmllmalphaempowering-multimodal-large-language-model-for-the-understanding-of-occluded-objects-with-selfsupervised-tes-1099766.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/occmllmalphaempowering-multimodal-large-language-model-for-the-understanding-of-occluded-objects-with-selfsupervised-tes.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/occmllmalphaempowering-multimodal-large-language-model-for-the-understanding-of-occluded-objects-with-selfsupervised-testtime-lear-1099766.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/enhancing-augmentative-and-alternative-communication-systems-with-finetuned-gpt3-improving-predictive-text-for-users-wit-1099410.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/enhancing-augmentative-and-alternative-communication-systems-with-finetuned-gpt3-improving-predictive-text-for-users-wit.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/enhancing-augmentative-and-alternative-communication-systems-with-finetuned-gpt3-improving-predictive-text-for-users-with-speech-a-1099410.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-framework-for-requirements-management-to-develop-safety-management-and-operation-of-maritime-autonomous-surface-ships-110312.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-framework-for-requirements-management-to-develop-safety-management-and-operation-of-maritime-autonomous-surface-ships.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-framework-for-requirements-management-to-develop-safety-management-and-operation-of-maritime-autonomous-surface-ships-110312.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/analyzing-the-energy-consumption-of-smart-home-and-price-prediction-110109.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/analyzing-the-energy-consumption-of-smart-home-and-price-prediction.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/analyzing-the-energy-consumption-of-smart-home-and-price-prediction-110109.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/the-generation-of-semantics-in-natural-language-and-the-formation-of-brain-intelligence-110108.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/the-generation-of-semantics-in-natural-language-and-the-formation-of-brain-intelligence.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/the-generation-of-semantics-in-natural-language-and-the-formation-of-brain-intelligence-110108.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/securing-your-data-with-cybersecurity-protecting-your-digital-assets-110051.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/securing-your-data-with-cybersecurity-protecting-your-digital-assets.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/securing-your-data-with-cybersecurity-protecting-your-digital-assets-110051.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/flood-prediction-using-classical-and-quantum-machine-learning-models-109890.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/flood-prediction-using-classical-and-quantum-machine-learning-models.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/flood-prediction-using-classical-and-quantum-machine-learning-models-109890.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/multilayer-networks-and-public-digital-health-scalability-109677.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/multilayer-networks-and-public-digital-health-scalability.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/multilayer-networks-and-public-digital-health-scalability-109677.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/aipowered-educational-data-analysis-for-early-identification-of-learning-difficulties-109676.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/aipowered-educational-data-analysis-for-early-identification-of-learning-difficulties.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/aipowered-educational-data-analysis-for-early-identification-of-learning-difficulties-109676.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/tracking-intelligence-and-effectiveness-of-agents-109675.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/tracking-intelligence-and-effectiveness-of-agents.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/tracking-intelligence-and-effectiveness-of-agents-109675.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/the-interactive-digital-media-as-a-scenography-108882.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/the-interactive-digital-media-as-a-scenography.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/the-interactive-digital-media-as-a-scenography-108882.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/improving-measurement-accuracy-of-sound-pressure-in-vibrating-machines-using-a-doosan-robot-108728.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/improving-measurement-accuracy-of-sound-pressure-in-vibrating-machines-using-a-doosan-robot.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/improving-measurement-accuracy-of-sound-pressure-in-vibrating-machines-using-a-doosan-robot-108728.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-framework-for-classification-of-fetal-health-using-deep-learning-108726.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-framework-for-classification-of-fetal-health-using-deep-learning.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-framework-for-classification-of-fetal-health-using-deep-learning-108726.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/contributions-of-artificial-intelligence-models-to-platform-economics-a-comprehensive-examination-108615.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/contributions-of-artificial-intelligence-models-to-platform-economics-a-comprehensive-examination.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/contributions-of-artificial-intelligence-models-to-platform-economics-a-comprehensive-examination-108615.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/building-a-trusted-network-of-energy-experts-on-2-twitter-through-graph-traversal-strategies-and-active-3-node-classific-108531.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/building-a-trusted-network-of-energy-experts-on--2-twitter-through-graph-traversal-strategies-and-active-3-node-classifi.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/building-a-trusted-network-of-energy-experts-on-2-twitter-through-graph-traversal-strategies-and-active-3-node-classification-108531.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/enhancing-drug-discovery-and-development-through-artificial-intelligence-108430.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/enhancing-drug-discovery-and-development-through-artificial-intelligence.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/enhancing-drug-discovery-and-development-through-artificial-intelligence-108430.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/the-role-of-a-data-analyst-unlocking-insights-in-a-datadriven-world-103767.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/the-role-of-a-data-analyst-unlocking-insights-in-a-datadriven-world.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/the-role-of-a-data-analyst-unlocking-insights-in-a-datadriven-world-103767.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/understanding-the-threat-landscape-the-rising-menace-of-cyber-attacks-103765.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/understanding-the-threat-landscape-the-rising-menace-of-cyber-attacks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/understanding-the-threat-landscape-the-rising-menace-of-cyber-attacks-103765.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/examining-the-runtime-of-nltk-and-tensorflow-algorithms-for-chatbot-based-on-intentsjson-length-101857.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/examining-the-runtime-of-nltk-and-tensorflow-algorithms-for-chatbot-based-on-intentsjson-length.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/exploiting-cnns-for-semantic-segmentation-with-pascal-voc-101646.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/exploiting-cnns-for-semantic-segmentation-with-pascal-voc.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/exploring-legal-ownership-of-aigenerated-images-insights-from-the-indian-context-101321.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/exploring-legal-ownership-of-aigenerated-images-insights-from-the-indian-context.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/exploring-legal-ownership-of-aigenerated-images-insights-from-the-indian-context-101321.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/simulation-and-analysis-of-imus-transport-plaza-terminal-ridership-101312.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/simulation-and-analysis-of-imus-transport-plaza-terminal-ridership.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/simulation-and-analysis-of-imus-transport-plaza-terminal-ridership-101312.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/probabilistic-data-prefetching-for-data-transportation-in-smart-cities-101311.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/probabilistic-data-prefetching-for--data-transportation-in-smart-cities.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/probabilistic-data-prefetching-for-data-transportation-in-smart-cities-101311.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/regeneraton-battery-101310.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/regeneraton-battery.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/regeneration-battery-101310.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/faketypeappusingfsmcfl-101306.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/faketypeappusingfsmcfl.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/faketype-a-typing-test-application-using-finite-state-machine-and-contextfree-language-101306.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/real-time-face-recognition-using-haar-cascade-classifiers-for-door-unlocking-system-101253.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/real-time-face-recognition-using-haar-cascade-classifiers-for-door-unlocking-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/real-time-face-recognition-using-haar-cascade-classifiers-for-door-unlocking-system-101253.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/the-power-of-immersive-media-enhancing-empathy-through-virtual-reality-experiences-101172.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/the-power-of-immersive-media-enhancing-empathy-through-virtual-reality-experiences.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/investigation-of-a-very-sensitive-refractive-index-sensor-based-on-waveguide-tm-mode-resonance-and-design-of-a-plasmonic-101084.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/investigation-of-a-very-sensitive-refractive-index-sensor-based-on-waveguide-tm-mode-resonance-and-design-of-a-plasmonic.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/investigation-of-a-very-sensitive-refractive-index-sensor-based-on-waveguide-tm-mode-resonance-and-design-of-a-plasmonic-sensor-101084.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/design-and-analysis-of-a-plasmonic-refractive-index-sensor-with-symmetrical-cavities-and-rings-101083.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/design-and-analysis-of-a-plasmonic-refractive-index-sensor-with-symmetrical-cavities-and-rings.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/design-and-analysis-of-a-plasmonic-refractive-index-sensor-with-symmetrical-cavities-and-rings-101083.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/implementation-of-the-future-of-drug-discovery-quantumbased-machine-learning-simulation-qmls-100891.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/implementation-of-the-future-of-drug-discovery-quantumbased-machine-learning-simulation-qmls.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/implementation-of-the-future-of-drug-discovery-quantumbased-machine-learning-simulation-qmls-100891.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/complexity-of-negation-domains-swarm-optimization-fractal-numbers-and-experimentation-100534.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/complexity-of-negation-domains-swarm-optimization-fractal-numbers-and-experimentation.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/complexity-of-negation-domains-swarm-optimization-fractal-numbers-and-experimentation-100534.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/adaptive-feature-fusion-enhancing-generalization-in-deep-learning-models-100533.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/adaptive-feature-fusion-enhancing-generalization-in-deep-learning-models.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/adaptive-feature-fusion-enhancing-generalization-in-deep-learning-models-100533.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/adaptive-control-of-a-wheeled-robot-with-a-trailer-by-feedback-linearization-method-in-the-presence-of-uncertainties-98767.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/adaptive-control-of-a-wheeled-robot-with-a-trailer-by-feedback-linearization-method-in-the-presence-of-uncertainties.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/adaptive-control-of-a-wheeled-robot-with-a-trailer-by-feedback-linearization-method-in-the-presence-of-uncertainties-98767.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/diffusing-the-innovation-of-cloud-computing-implementation-international-marketing-organization-perspective-98766.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/diffusing-the-innovation-of-cloud-computing-implementation-international-marketing-organization-perspective.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/diffusing-the-innovation-of-cloud-computing-implementation-international-marketing-organization-perspective-98766.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-efficient-load-balancing-algorithm-for-parallel-searching-and-synchronization-98729.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-efficient-load-balancing-algorithm-for-parallel-searching-and-synchronization.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-efficient-load-balancing-algorithm-for-parallel-searching-and-synchronization-98729.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-blockchain-applications-and-challenges-98728.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-blockchain-applications-and-challenges.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-blockchain-applications-and-challenges-98728.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/system-design-for-an-intelligent-agronomic-advisory-application-98727.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/system-design-for-an-intelligent-agronomic-advisory-application.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/system-design-for-an-intelligent-agronomic-advisory-application-98727.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/iot-base-monitoring-systems-for-icu-of-buraimi-hospital-98676.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/iot-base-monitoring-systems-for-icu-of-buraimi-hospital.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/iot-base-monitoring-systems-for-icu-of-buraimi-hospital-98676.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-overview-data-visualization-of-population-health-98412.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-overview-data-visualization-of-population-health.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-overview-data-visualization-of-population-health-98412.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/the-role-of-information-technology-in-environmental-protection-and-management-for-sustainable-development-profiling-turk-98326.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/the-role-of-information-technology-in-environmental-protection-and-management-for-sustainable-development-profiling-turk.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/the-role-of-information-technology-in-environmental-protection-and-management-for-sustainable-development-profiling-turkana-county-98326.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/towards-automated-detection-of-fraudulent-reviews-97797.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/towards-automated-detection-of--fraudulent-reviews.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/model-driven-architecture-a-review-of-current-trends-97594.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/model-driven-architecture-a-review-of-current-trends.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/model-driven-architecture-a-review-of-current-trends-97594.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/cyber-security-in-health-care-application-95970.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/cyber-security-in-health-care-application.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-implementation-of-phishing-url-detection-approach-using-data-mining-technique-95969.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-implementation-of-phishing-url-detection-approach-using-data-mining-technique.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-review-iot-based-fire-alert-system-95920.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-review-iot-based-fire-alert-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/controlling-and-modelling-of-an-hbridge-drive-by-using-svpwm-95904.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/controlling-and-modelling-of-an-hbridge-drive-by-using-svpwm.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/cost-effective-transformerless-inverter-in-grid-connected-solar-power-system-95903.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/cost-effective-transformerless-inverter-in-grid-connected-solar-power-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/fault-current-interruption-in-a-radial-distribution-system-by-using-the-dvr-95902.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/fault-current-interruption-in-a-radial-distribution-system-by-using-the-dvr.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/enhanced-vertical-handoff-using-hybrid-parallelized-acs-3-opt-local-search-95901.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/enhanced-vertical-handoff-using-hybrid-parallelized-acs--3-opt-local-search.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/to-investigate-the-performance-of-manet-routing-protocols-with-varying-node-densities-95900.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/to-investigate-the-performance-of-manet-routing-protocols-with-varying-node-densities.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/allocation-of-resources-dynamically-using-virtual-machines-for-cloud-computing-services-95899.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/allocation-of-resources-dynamically-using-virtual-machines-for-cloud-computing-services.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/protecting-user-privacy-using-opinion-based-collaborative-tag-filtering-95898.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/protecting-user-privacy-using-opinion-based-collaborative-tag-filtering.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/eaack-secure-ids-for-manet-by-using-cryptographic-ecdsa-algorithm-95896.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/eaack-secure-ids-for-manet-by-using-cryptographic-ecdsa-algorithm.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/unsupervised-learning-for-text-mining-and-object-recognition-in-images-95895.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/unsupervised-learning-for-text-mining-and-object-recognition-in-images.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/implementation-of-a-novel-approach-to-make-nlp-predictive-and-nonambigious-in-punjabi-language-95894.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/implementation-of-a-novel-approach-to-make-nlp-predictive-and-nonambigious-in-punjabi-language.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/raicon-routing-arbitration-for-interintra-chip-optical-network-95893.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/raicon-routing-arbitration-for--interintra-chip-optical-network.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/implementation-of-reduction-of-ambiguity-due-to-synonyms-in-punjabi-language-95892.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/implementation-of-reduction-of-ambiguity-due-to-synonyms-in-punjabi-language.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/review-data-mining-approach-for-image-retrieval-in-multimodal-fusion-using-frequent-pattern-tree-95891.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/review-data-mining-approach-for-image-retrieval-in-multimodal-fusion-using-frequent-pattern-tree.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/static-timing-analysis-of-the-nongaussian-variation-sources-for-vlsi-circuits-95890.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/static-timing-analysis-of-the-nongaussian-variation-sources-for-vlsi-circuits.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-survey-on-mapreduce-in-cloud-computing-95889.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-survey-on-mapreduce-in-cloud-computing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/effect-of-a-high-efficiency-passive-llc-converter-in-the-application-of-transmission-lines-95888.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/effect-of-a-high-efficiency-passive-llc-converter-in-the-application-of-transmission-lines.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/widespread-manner-of-scrutiny-on-data-preprocessing-techniques-95887.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/widespread-manner-of-scrutiny-on-data-preprocessing-techniques.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/malware-detection-and-search-rank-fraud-in-network-using-datamining-techniques-95886.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/malware-detection-and-search-rank-fraud-in-network-using-datamining-techniques.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/embedded-extended-visual-cryptography-schemes-95885.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/embedded-extended-visual-cryptography-schemes.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/iot-based-agricultural-environment-monitoring-system-95884.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/iot-based-agricultural-environment-monitoring-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/implementation-of-relevant-and-redundant-features-of-hidden-predictive-information-based-on-data-mining-95883.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/implementation-of-relevant-and-redundant-features-of-hidden-predictive-information-based-on-data-mining.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/mining-high-utility-itemsets-by-ameliorate-upgrowth-95882.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/mining-high-utility-itemsets-by-ameliorate-upgrowth.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-adaptive-distributed-load-balancing-technique-for-cloud-computing-95881.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-adaptive-distributed-load-balancing-technique-for-cloud-computing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/designing-of-ad-hoc-networks-by-using-opportunistic-petal-routing-protocol-95880.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/designing-of-ad-hoc-networks-by-using-opportunistic-petal-routing-protocol.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/expert-discovery-and-interaction-in-miscellaneous-service-aligned-systems-95879.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/expert-discovery-and-interaction-in-miscellaneous-service-aligned-systems.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/study-of-various-data-compression-tools-95878.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/study-of-various-data-compression-tools.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/study-on-challenges-in-android-application-development-95877.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/study-on-challenges-in-android-application-development.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/distributed-file-system-for-load-rebalancing-in-cloud-computing-95876.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/distributed-file-system-for-load-rebalancing-in-cloud-computing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/reduction-of-harmonics-in-solar-power-generation-system-by-using-five-level-inverter-95875.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/reduction-of-harmonics-in-solar-power-generation-system-by-using-five-level-inverter.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/study-on-android-and-smartphone-security-95874.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/study-on-android-and-smartphone-security.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/pitch-based-raag-identification-from-monophonic-indian-classical-music-95873.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/pitch-based-raag-identification-from-monophonic-indian-classical-music.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-android-application-to-aid-uneducated-deafdumb-people-95872.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-android-application-to-aid-uneducated-deafdumb-people.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/study-on-artificial-intelligence-and-robotics-95871.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/study-on-artificial-intelligence-and-robotics.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/artificial-intelligence-and-its-purposes-95870.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/artificial-intelligence-and-its-purposes.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/study-of-cryptography-need-of-digital-world-95869.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/study-of-cryptography--need-of-digital-world.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/increasing-for-digitalisation-in-hospital-95868.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/increasing-for-digitalisation-in-hospital.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/approach-for-it-infrastructure-implementation-of-creating-digital-hospital-95867.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/approach-for-it-infrastructure-implementation-of-creating-digital-hospital.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-study-on-image-restoration-and-effect-of-blind-deconvolution-algorithms-95866.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-study-on-image-restoration-and-effect-of-blind-deconvolution-algorithms.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/behaviour-analysis-of-student-in-education-system-using-fls-kmc-95865.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/behaviour-analysis-of-student-in-education-system-using-fls--kmc.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-efficient-multiclass-exploration-of-ensemble-classification-using-genetic-algorithm-95864.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-efficient-multiclass-exploration-of-ensemble-classification-using-genetic-algorithm.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/digital-cities-real-estate-development-motivated-by-big-data-95863.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/digital-cities-real-estate-development-motivated-by-big-data.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/security-problems-and-possible-security-approaches-in-cloud-computing-95862.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/security-problems-and-possible-security-approaches-in-cloud-computing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/the-emergence-of-big-data-a-survey-95861.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/the-emergence-of-big-data-a-survey.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-perspective-review-on-elearning-promotions-and-development-95860.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-perspective-review-on-elearning-promotions-and-development.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-review-on-product-rating-behaviour-analytics-95859.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-review-on-product-rating-behaviour-analytics.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/challenges-in-mobile-computing-protections-95858.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/challenges-in-mobile-computing-protections.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/dwt-features-based-image-retrieval-using-neural-network-95857.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/dwt-features-based-image-retrieval-using-neural-network.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/aspect-based-sentimental-analysis-for-online-product-reviews-using-classification-algorithms-95856.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/aspect-based-sentimental-analysis-for-online-product-reviews-using-classification-algorithms.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-inclusive-periodical-of-soft-computing-performances-95854.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-inclusive-periodical-of-soft-computing-performances.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/security-purpose-of-data-mining-and-its-solution-suggestion-95853.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/security-purpose-of-data-mining-and-its-solution-suggestion.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/analyzing-performance-of-the-different-classifiers-on-diabetic-dataset-with-genetic-algorithm-as-preprocessor-95852.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/analyzing-performance-of-the-different-classifiers-on-diabetic-dataset-with-genetic-algorithm-as-preprocessor.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/implementation-of-wormhole-attack-on-rpl-protocol-in-internet-of-things-95851.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/implementation-of-wormhole-attack-on-rpl-protocol-in-internet-of-things.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/cloud-computing-and-data-concealing-techniques-95850.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/cloud-computing-and-data-concealing-techniques.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/determination-and-analysis-of-automated-fruits-grading-system-using-machine-learning-method-95849.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/determination-and-analysis-of-automated-fruits-grading-system-using-machine-learning-method.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/vulnerability-assessment-policies-and-tools-in-enterprise-networks-95848.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/vulnerability-assessment-policies-and-tools-in-enterprise-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/performance-analysis-of-modified-blowfish-algorithm-towards-cloud-security-95847.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/performance-analysis-of-modified-blowfish-algorithm-towards-cloud-security.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-design-approach-to-secure-data-transmission-in-network-centric-warfare-systems-95846.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-design-approach-to-secure-data-transmission-in-network-centric-warfare-systems.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/security-enhancement-and-minimized-delay-of-neighbour-defence-technique-for-aodv-ndtaodv-routing-protocol-by-varying-net-95845.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/security-enhancement-and-minimized-delay-of-neighbour-defence-technique-for-aodv-ndtaodv-routing-protocol-by-varying-net.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/big-data-landscape-state-of-the-art-trend-analysis-and-potential-challenges-95844.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/big-data-landscape-state-of-the-art-trend-analysis-and-potential-challenges.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/enhanced-cross-domain-sentimental-classification-using-pattern-recognition-95843.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/enhanced-cross-domain-sentimental-classification-using-pattern-recognition.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/fraud-detection-using-reddit-ranking-algorithm-95841.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/fraud-detection-using-reddit-ranking-algorithm.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/microarray-using-advanced-regression-for-fixing-lost-data-95840.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/microarray-using-advanced-regression-for-fixing-lost-data.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-survey-on-early-detection-of-liver-cancer-for-preventive-health-care-using-image-processing-95839.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-survey-on-early-detection-of-liver-cancer-for-preventive-health-care-using-image-processing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/augmented-reality-based-mobile-app-for-a-university-campus-95837.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/augmented-reality-based-mobile-app-for-a-university-campus.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/stepwise-regression-based-support-vector-machine-for-stable-and-consistent-data-delivery-in-wsn-95836.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/stepwise-regression-based-support-vector-machine-for-stable-and-consistent-data-delivery-in-wsn.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/shielding-network-virtualization-using-cbcmac-for-imminent-interconnected-networks-95835.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/shielding-network-virtualization-using-cbcmac-for-imminent-interconnected-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-study-on-multimodal-biometrics-system-95834.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-study-on-multimodal-biometrics-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-novel-approach-to-control-the-employees-attrition-rate-of-an-organization-95833.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-novel-approach-to-control-the-employees-attrition-rate-of-an-organization.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/challenges-essential-of-mobile-banking-in-india-95832.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/challenges--essential-of-mobile-banking-in-india.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/study-of-time-management-technique-to-manage-stress-among-software-professionals-95831.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/study-of-time-management-technique-to-manage-stress-among-software-professionals.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-modern-approach-to-predict-the-stock-market-behaviour-for-nave-investors-95830.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-modern-approach-to-predict-the-stock-market-behaviour-for-nave-investors.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/online-attendance-management-system-using-rfid-with-object-contradict-95829.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/online-attendance-management-system-using-rfid-with-object-contradict.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-analytical-approach-for-customer-retention-through-business-intelligence-95828.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-analytical-approach-for-customer-retention-through-business-intelligence.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-analysis-of-database-from-traditional-database-towards-hana-in-business-environment-95827.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-analysis-of-database-from-traditional-database-towards-hana-in-business-environment.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/effectiveness-of-openmp-for-algorithm-parallelization-95826.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/effectiveness-of-openmp-for-algorithm-parallelization.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-novel-approach-to-sustain-customer-loyalty-in-banking-sector-using-mining-techniques-95825.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-novel-approach-to-sustain-customer-loyalty-in-banking-sector-using-mining-techniques.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/improved-performance-of-ext4-file-system-by-using-extent-95824.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/improved-performance-of-ext4-file-system-by-using-extent.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/sentiment-analysis-of-tweets-using-support-vector-machine-95823.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/sentiment-analysis-of-tweets-using-support-vector-machine.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-survey-of-comparison-study-of-classification-for-hematological-data-95822.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-survey-of-comparison-study-of-classification-for-hematological-data.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/shape-based-image-retrieval-for-2d-vehicle-images-95821.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/shape-based-image-retrieval-for-2d-vehicle-images.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-survey-on-issues-and-challenges-in-fog-computing-95820.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-survey-on-issues-and-challenges-in-fog-computing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/govschemana-a-machine-learning-enabled-android-app-for-analysis-of-government-schemes-95819.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/govschemana--a-machine-learning-enabled-android-app-for-analysis-of-government-schemes.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/fault-node-recovery-algorithm-to-enhance-the-lifetime-of-a-wireless-sensor-network-95818.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/fault-node-recovery-algorithm-to-enhance-the-lifetime-of-a-wireless-sensor-network.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/kmeans-wards-algorithm-with-hbo-in-spatial-data-mining-95817.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/kmeans--wards-algorithm-with-hbo-in-spatial-data-mining.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/map-matching-algorithms-in-gps-navigating-system-and-their-functions-95816.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/map-matching-algorithms-in-gps-navigating-system-and-their-functions.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/survey-on-load-balancing-in-mobile-cloud-computing-95815.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/survey-on-load-balancing-in-mobile-cloud-computing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/power-aware-load-balancing-in-secured-character-diverse-wsn-95814.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/power-aware-load-balancing-in-secured-character-diverse-wsn.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/multilayer-approach-in-agriculture-cropping-system-to-increase-productivity-using-smart-wireless-sensor-network-95813.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/multilayer-approach-in-agriculture-cropping-system-to-increase-productivity-using-smart-wireless-sensor-network.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/logical-grouping-of-character-diverse-nodes-in-wsn-to-procure-load-balancing-and-distributio-95812.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/logical-grouping-of-character-diverse-nodes-in-wsn-to-procure-load-balancing-and-distributio.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/vitality-efficient-load-balancing-in-character-diverse-nodes-of-a-wsn-95811.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/vitality-efficient-load-balancing-in-character-diverse-nodes-of-a-wsn.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/frequency-of-using-whatsapp-messenger-among-college-students-in-salem-district-tamilnadu-95810.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/frequency-of-using-whatsapp-messenger-among-college-students-in-salem-district-tamilnadu.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/usability-testing-methods-for-mobile-learning-application-95809.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/usability-testing-methods-for-mobile-learning-application.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/secure-packet-transmission-for-preventing-selective-jamming-attacks-95808.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/secure-packet-transmission-for-preventing-selective-jamming-attacks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-review-on-worldwide-interoperability-for-microwave-access-wimax-networks-95807.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-review-on-worldwide-interoperability-for-microwave-access-wimax-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/content-based-image-retrieval-system-using-svm-classification-and-evolutionary-algorithms-95806.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/content-based-image-retrieval-system-using-svm-classification-and-evolutionary-algorithms.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/intelligent-road-accident-detection-and-response-using-iot-internet-of-things-95805.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/intelligent-road-accident-detection-and-response-using-iot-internet-of-things.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/floor-planning-application-using-smart-contracts-95804.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/floor-planning-application-using-smart-contracts.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/anomalies-detection-using-public-auditing-scheme-in-cloud-computing-environment-95803.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/anomalies-detection-using-public-auditing-scheme-in-cloud-computing-environment.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-survey-paper-on-detection-of-phishing-website-by-url-technique-95802.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-survey-paper-on-detection-of-phishing-website-by-url-technique.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/potentials-of-elearning-for-national-security-95801.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/potentials-of-elearning-for-national-security.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/present-status-and-issues-of-land-record-system-in-satara-district-maharashtra-india-95800.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/present-status-and-issues-of-land-record-system-in-satara-district-maharashtra-india.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-comparison-of-cloud-based-office-productivity-suites-95799.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-comparison-of-cloud-based-office-productivity-suites.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-study-on-spatial-reusability-technique-in-multihop-wireless-sensor-networks-95798.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-study-on-spatial-reusability-technique-in-multihop-wireless-sensor-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/workers-call-relation.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/8bit-computer.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-survey-of-texture-classification-using-recent-technology-95795.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-survey-of-texture-classification-using-recent-technology.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/dermatological-disease-detection-using-image-processing-and-neural-networks-95794.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/dermatological-disease-detection-using-image-processing-and-neural-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-review-on-various-image-segmentation-techniques-95793.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-review-on-various-image-segmentation-techniques.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/low-power-dsp-architecture-for-wireless-sensor-nodes-using-dvfs-algorithm-95791.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/low-power-dsp-architecture-for-wireless-sensor-nodes-using-dvfs-algorithm.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/cryptography-based-privacy-protection-mechanism-for-online-social-networks-95790.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/cryptography-based-privacy-protection-mechanism-for-online-social-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-efficient-approach-of-travel-recommendation-model-from-high-dimensional-databases-95789.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-efficient-approach-of-travel-recommendation-model-from-high-dimensional-databases.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/assessment-of-power-optimization-in-vlsi-system-using-launchoffshift-and-launchoffcapture-testing-95788.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/assessment-of-power-optimization-in-vlsi-system-using-launchoffshift-and-launchoffcapture-testing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-analysis-of-different-ethnic-age-group-estimation-from-facial-images-95787.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-analysis-of-different-ethnic-age-group-estimation-from-facial-images.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/dynamic-linkability-with-user-authentication-privacy-preserving-for-roaming-services-a-review-95785.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/dynamic-linkability-with-user-authentication-privacy-preserving-for-roaming-services-a-review.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/big-data-analytics-integration-with-cloud-computing-an-overview-and-security-challenges-95784.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/big-data-analytics-integration-with-cloud-computing--an-overview-and-security-challenges.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/hybrid-intrusion-detection-for-cluster-based-wireless-sensor-network-95783.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/hybrid-intrusion-detection-for-cluster-based-wireless-sensor-network.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/rf-controlled-surveillance-car-95782.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/rf-controlled-surveillance-car.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/recommender-system-for-mobile-phone-selection-95781.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/recommender-system-for-mobile-phone-selection.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/implementation-of-bch-code-n-k-encoder-and-decoder-for-multiple-error-correction-control-95780.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/implementation-of-bch-code-n-k-encoder-and-decoder-for-multiple-error-correction-control.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/entropy-based-method-to-calculate-weight-for-multicriterian-vm-allocation-policy-in-compute-cloud-95778.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/entropy-based-method-to-calculate-weight-for-multicriterian-vm-allocation-policy-in-compute-cloud.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-literature-survey-on-web-crawlers-95777.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-literature-survey-on-web-crawlers.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/remote-data-backup-and-privacy-preserving-data-distribution-in-the-cloud-a-review-95776.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/remote-data-backup-and-privacy-preserving-data-distribution-in-the-cloud-a-review.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/enhanced-approach-for-keyword-based-search-on-uncertain-graph-data-a-review-95775.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/enhanced-approach-for-keyword-based-search-on-uncertain-graph-data-a-review.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/evaluation-of-javabased-platformsrnfor-mhealth-solutions-95774.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/evaluation-of-javabased-platformsfor-mhealth-solutions.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-selfsystematize-dependence-sculpt-for-decentralized-systems-95773.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-selfsystematize-dependence-sculpt-for-decentralized-systems.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/study-of-data-transmission-using-sockets-95772.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/study-of-data-transmission-using-sockets.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/kmeans-based-document-clustering-with-automatic-k-selection-and-cluster-refinement-95770.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/kmeans-based-document-clustering-with-automatic-k-selection-and-cluster-refinement.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/review-of-two-dimensional-analytical-model-of-dual-material-gate-tunnel-field-effect-transistor-95769.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/review-of-two-dimensional-analytical-model-of-dual-material-gate-tunnel-field-effect-transistor.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/detecting-and-identifying-the-location-of-multiple-spoofing-adversaries-in-wireless-network-95768.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/detecting-and-identifying-the-location-of-multiple-spoofing-adversaries-in-wireless-network.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/model-based-test-case-optimization-of-uml-activity-diagrams-using-evolutionary-algorithms-95767.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/model-based-test-case-optimization-of-uml-activity-diagrams-using-evolutionary-algorithms.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/semantic-approach-for-travel-package-and-recommendation-95765.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/semantic-approach-for-travel-package-and-recommendation.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-survey-on-various-methods-in-manet-based-on-analysing-various-traffic-patterns-for-anonymous-communication-95764.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-survey-on-various-methods-in-manet-based-on-analysing-various-traffic-patterns-for-anonymous-communication.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/leakage-power-minimization-in-stsram-cell-using-adaptive-reverse-body-bias-technique-95763.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/leakage-power-minimization-in-stsram-cell-using-adaptive-reverse-body-bias-technique.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/development-in-advancement-of-a-green-appoint-mechanism-for-vitality-investment-funds-in-cloud-gauge-95762.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/development-in-advancement-of-a-green-appoint-mechanism-for-vitality-investment-funds-in-cloud-gauge.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/automatic-speech-recognition-of-plosive-phonetic-class-words-in-malayalam-language-95761.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/automatic-speech-recognition-of-plosive-phonetic-class-words-in-malayalam-language.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/ubiquitous-computing-advantages-and-challenges-95760.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/ubiquitous-computing-advantages-and-challenges.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/analysis-and-comparison-of-different-image-denoising-techniques-review-95759.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/analysis-and-comparison-of-different-image-denoising-techniques-review.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/information-security-through-compression-and-cryptography-techniques-95758.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/information-security-through-compression-and-cryptography-techniques.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/challenges-issues-and-social-implications-of-smart-learning-through-internet-of-things-iot-95757.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/challenges-issues-and-social-implications-of-smart-learning-through-internet-of-things-iot.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/efficient-third-party-auditing-in-secure-cloud-95756.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/efficient-third-party-auditing-in-secure-cloud.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/bio-medical-imaging-and-dicom-standard-95755.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/bio-medical-imaging-and-dicom-standard.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-mobile-multimedia-cloud-computing-on-the-web-95754.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-mobile-multimedia-cloud-computing-on-the-web.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/integrated-counselling-testing-centres-ictc-portal-95753.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/integrated-counselling--testing-centres-ictc-portal.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/energy-efficient-data-traffic-management-in-mobile-cloud-computing-95752.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/energy-efficient-data-traffic-management-in-mobile-cloud-computing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-gtree-based-efficient-and-scalable-index-for-spatial-search-in-location-based-service-95751.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-gtree-based-efficient-and-scalable-index-for-spatial-search-in-location-based-service.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/qos-based-performance-analysis-of-scheduling-algorithms-for-wimax-95750.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/qos-based-performance-analysis-of-scheduling-algorithms-for-wimax.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/bone-crack-detection-in-medical-images-using-multi-model-image-fusion-95749.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/bone-crack-detection-in-medical-images-using-multi-model-image-fusion.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-approach-to-ecommerce-product-rating-based-customer-review-mining-95748.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-approach-to-ecommerce-product-rating-based-customer-review-mining.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/providing-reliable-service-in-datacenter-networks-95747.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/providing-reliable-service-in-datacenter-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/design-of-a-framework-for-trusted-data-monitoring-in-the-cloud-95746.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/design-of-a-framework-for-trusted-data-monitoring-in-the-cloud.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/smart-locator-appliance-95745.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/smart-locator-appliance.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/estimation-of-clustering-algorithms-in-logistics-database-of-an-online-trade-centre-95744.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/estimation-of-clustering-algorithms-in-logistics-database-of-an-online-trade-centre.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/survey-on-recognition-of-human-using-their-physical-traits-95743.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/survey-on-recognition-of-human-using-their-physical-traits.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/support-and-confidence-based-algorithms-for-hiding-sensitive-association-rules-95742.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/support-and-confidence-based-algorithms-for-hiding-sensitive-association-rules.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-study-on-enhancing-data-security-in-cloud-computing-environment-95741.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-study-on-enhancing-data-security-in-cloud-computing-environment.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/cia-triad-for-achieving-accountability-in-cloud-computing-environment-95740.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/cia-triad-for-achieving-accountability-in-cloud-computing-environment.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/security-attacks-in-mobile-adhoc-networks-a-literature-survey-95739.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/security-attacks-in-mobile-adhoc-networks--a-literature-survey.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-introduction-to-spatial-database-spatial-data-types-and-spatial-index-analysis-using-multidimensional-geodatabase-95738.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-introduction-to-spatial-database-spatial-data-types-and-spatial-index-analysis-using-multidimensional-geodatabase.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-review-report-on-the-evolution-and-implementation-of-business-intelligence-technique-in-the-banking-sector-95737.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-review-report-on-the-evolution-and-implementation-of-business-intelligence-technique-in-the-banking-sector.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/swachh-swadesh-a-citizen-and-engineer-participation-in-cleanliness-of-nation-95736.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/swachh-swadesh-a-citizen-and-engineer-participation-in-cleanliness-of-nation.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/intersect-node-selection-based-clustering-algorithms-for-manet-95735.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/intersect-node-selection-based-clustering-algorithms-for-manet.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/study-of-dynamic-routing-protocols-95734.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/study-of-dynamic-routing-protocols.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/aslbacc-a-study-on-load-balancing-algorithms-in-cloud-computing-95733.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/aslbacc-a-study-on-load-balancing-algorithms-in-cloud-computing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/web-log-mining-based-on-soft-clustering-and-multiobjective-genetic-algorithm-95732.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/web-log-mining-based-on-soft-clustering-and-multiobjective-genetic-algorithm.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/data-mining-information-search-95731.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/data-mining-information-search.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/performance-evaluation-of-various-discrete-cosine-transforms-95730.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/performance-evaluation-of-various-discrete-cosine-transforms.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-review-on-diminish-the-utilization-cost-in-distributed-dcs-95729.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-review-on-diminish-the-utilization-cost-in-distributed-dcs.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/real-time-system-fault-tolerance-scheduling-algorithms-95728.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/real-time-system-fault-tolerance-scheduling-algorithms.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-technique-for-mining-uncommon-causal-relations-and-its-submission-in-finding-adverse-drug-reaction-indication-pairs-95727.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-technique-for-mining-uncommon-causal-relations-and-its-submission-in-finding-adverse-drug-reaction-indication-pairs.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/protected-mining-of-association-instructions-in-horizontally-scattered-records-95726.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/protected-mining-of-association-instructions-in-horizontally-scattered-records.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-architecturalmodel-for-the-mobile-based-elearning-environment-95725.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-architecturalmodel-for-the-mobile-based-elearning-environment.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/analysis-of-toi-things-of-internet-industrial-monitoring-system-on-raspberry-pi-platform-95724.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/analysis-of-toi-things-of-internet-industrial-monitoring-system-on-raspberry-pi-platform.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/computer-network-attacks-a-study-95723.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/computer-network-attacks--a-study.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/intrusions-in-computer-networks-a-perspective-95722.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/intrusions-in-computer-networks--a-perspective.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/evaluation-metrics-for-intrusion-detection-systems-a-study-95721.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/evaluation-metrics-for-intrusion-detection-systems--a-study.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/implementation-of-unmanned-ground-vehicle-with-a-smartphone-95720.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/implementation-of-unmanned-ground-vehicle-with-a-smartphone.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-pso-based-prediction-and-reversible-histogram-shifting-steganographic-scheme-95719.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-pso-based-prediction-and-reversible-histogram-shifting-steganographic-scheme.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/optimized-hybrid-wireless-mesh-protocol-using-estimation-of-packet-loss-rate-algorithm-for-vanet-95718.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/optimized-hybrid-wireless-mesh-protocol-using-estimation-of-packet-loss-rate-algorithm-for-vanet.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/key-pre-distribution-using-quantum-key-channel-95717.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/key-pre-distribution-using-quantum-key-channel.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/key-pre-distribution-using-quantum-key-channel-a-survey-95716.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/key-pre-distribution-using-quantum-key-channel--a-survey.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/exudates-detection-strategies-in-retinalimages-exploitation-process-techniques-95715.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/exudates-detection-strategies-in-retinalimages-exploitation-process-techniques.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/improving-efficiency-and-accuracy-in-string-transformation-on-large-data-sets-95713.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/improving-efficiency-and-accuracy-in-string-transformation-on-large-data-sets.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/mining-of-outlier-detection-in-large-categorical-datasets-95712.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/mining-of-outlier-detection-in-large-categorical-datasets.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/stock-market-indices-prediction-with-various-neural-network-models-95711.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/stock-market-indices-prediction-with-various-neural-network-models.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-scalable-and-secure-sharing-of-phr-in-cloud-computing-95710.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-scalable-and-secure-sharing-of-phr-in-cloud-computing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-comparison-of-histogram-equalization-method-and-histogram-expansion-95709.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-comparison-of-histogram-equalization-method-and-histogram-expansion.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/routing-protocols-for-manet-a-literature-survey-95708.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/routing-protocols-for-manet-a-literature-survey.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-proactive-data-reporting-protocol-for-wireless-sensor-networks-95707.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-proactive-data-reporting-protocol-for-wireless-sensor-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/image-segmentation-by-using-different-types-of-edge-detection-algorithm-with-different-threshol-95706.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/image-segmentation-by-using-different-types-of-edge-detection-algorithm-with-different-threshol.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/encryption-based-security-model-for-cloud-environment-95598.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/encryption-based-security-model-for-cloud-environment.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/advancement-of-blur-detection-and-subject-extraction-using-background-sequential-learning-and-action-prediction-technolo-95597.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/advancement-of-blur-detection-and-subject-extraction-using-background-sequential-learning-and-action-prediction-technolo.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-analytical-study-on-research-challenges-and-issues-in-big-data-analysis-95596.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-analytical-study-on-research-challenges-and-issues-in-big-data-analysis.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-real-time-dynamic-and-extensible-information-map-for-lusaka-city-95595.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-real-time-dynamic-and-extensible-information-map-for-lusaka-city.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/cloud-computing-security-a-review-95594.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/cloud-computing-security-a-review.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/pseudo-eye-an-interactive-augmented-reality-assistant-app-for-electronic-engineering-students-95593.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/pseudo-eye-an-interactive-augmented-reality-assistant-app-for-electronic-engineering-students.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/design-of-space-division-multiplexing-with-six-polarized-and-multiplexed-modes-of-pdmdwdm-system-using-multimode-splicer-95591.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/design-of-space-division-multiplexing-with-six-polarized-and-multiplexed-modes-of-pdmdwdm-system-using-multimode-splicer.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/the-entire-tasks-of-the-business-using-mobile-applications-95590.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/the-entire-tasks-of-the-business-using-mobile-applications.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/gaussian-probabilistic-non-additive-entropy-based-kernel-entropy-component-analysis-with-scale-invariant-feature-transfo-95589.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/gaussian-probabilistic-non-additive-entropy-based-kernel-entropy-component-analysis-with-scale-invariant-feature-transfo.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/mobile-computing-issues-and-limitations-95588.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/mobile-computing-issues-and-limitations.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/detection-and-prevention-of-child-abuse-using-iot-a-survey-95587.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/detection-and-prevention-of-child-abuse-using-iot--a-survey.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-network-safety-in-internet-penetration-forreducing-ecommerce-risks-95586.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-network-safety-in-internet-penetration-forreducing-ecommerce-risks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/security-enhancement-of-wireless-systems-by-using-frequency-hopping-technique-95585.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/security-enhancement-of-wireless-systems-by-using-frequency-hopping-technique.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-study-on-different-music-genre-classification-methods-95583.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-study-on-different-music-genre-classification-methods.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-study-of-approach-to-green-computing-ewaste-management-95582.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-study-of-approach-to-green-computing-ewaste-management.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/theoretical-understanding-the-concepts-of-big-data-and-its-approaches-95581.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/theoretical-understanding-the-concepts-of-big-data-and-its-approaches.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-trust-based-approach-for-security-and-user-confidence-in-pervasive-computing-systems-95580.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-trust-based-approach-for-security-and-user-confidence-in-pervasive-computing-systems.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/flooding-attack-countermeasures-in-mobile-adhoc-networks-95579.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/flooding-attack-countermeasures-in-mobile-adhoc-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-study-on-supporting-visual-narratives-student-engagement-using-big-data-technologies-95578.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-study-on-supporting-visual-narratives-student-engagement-using-big-data-technologies.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-security-enhanced-voter-identity-verification-system-based-on-blockchain-95577.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-security-enhanced-voter-identity-verification-system-based-on-blockchain.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/lbptop-descriptor-for-detecting-interesting-events-95576.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/lbptop-descriptor-for-detecting-interesting-events.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/robust-hybrid-feature-description-for-object-detection-in-the-ocean-imagery-95575.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/robust--hybrid-feature-description-for-object-detection-in-the-ocean-imagery.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-dynamic-ee-and-se-estimation-for-the-load-matrix-method-95574.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-dynamic-ee-and-se-estimation-for-the-load-matrix-method.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/the-multiple-time-series-clinical-data-processing-using-optimization-algorithm-95573.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/the-multiple-time-series-clinical-data-processing-using-optimization-algorithm.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/convolution-neural-network-cnn-based-object-detection-in-oceanographic-imagery-95572.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/convolution-neural-network-cnn-based-object-detection-in-oceanographic-imagery.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/ensemble-methods-for-time-series-classification-95571.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/ensemble-methods-for-time-series-classification.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/data-security-privacy-availability-and-integrity-in-cloud-computing-issues-and-solution-95569.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/data-security-privacy-availability-and-integrity-in-cloud-computing-issues-and-solution.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-implementation-of-cross-layer-approach-to-improve-tcp-performance-in-manet-95568.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-implementation-of-cross-layer-approach-to-improve-tcp-performance-in-manet.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/approach-for-pdp-estimation-technique-for-load-matrix-concept-95567.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/approach-for-pdp-estimation-technique-for-load-matrix-concept.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/fast-convergence-based-multipath-routing-over-partial-topology-based-wmns-95565.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/fast-convergence-based-multipath-routing-over-partial-topology-based-wmns.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-attempt-to-offer-advanced-browsing-structures-and-positive-thinking-with-lowered-cost-for-casual-user-95564.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-attempt-to-offer-advanced-browsing-structures-and-positive-thinking-with-lowered-cost-for-casual-user.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/partial-mesh-based-dynamic-routing-with-fast-convergence-for-wmn-95562.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/partial-mesh-based-dynamic-routing-with-fast-convergence-for-wmn.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/improving-the-quality-of-health-care-systems-based-on-it-applications-95561.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/improving-the-quality-of-health-care-systems-based-on-it-applications.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/implementation-of-short-message-service-system-using-gsm-model-via-wards-academia-routine-monitoring-95560.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/implementation-of-short-message-service-system-using-gsm-model-via-wards-academia-routine-monitoring.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/recovering-energy-efficiency-using-green-computing-approaches-for-in-it-systems-95559.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/recovering-energy-efficiency-using-green-computing-approaches-for-in-it-systems.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/multilayered-security-architecture-for-wireless-network-for-detection-and-removal-of-blackhole-nodes-95558.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/multilayered-security-architecture-for-wireless-network-for-detection-and-removal-of-blackhole-nodes.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-survey-paper-on-the-evaluation-criteria-of-open-source-cloud-computing-solutions-95557.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-survey-paper-on-the-evaluation-criteria-of-open-source-cloud-computing-solutions.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/cluster-analysis-of-cyber-crime-data-using-r-95556.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/cluster-analysis-of-cyber-crime-data-using-r.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/security-against-phishing-attacks-95555.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/security-against-phishing-attacks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/retrieving-unrecognized-objects-using-hyperspectral-imaging-95554.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/retrieving-unrecognized-objects-using-hyperspectral-imaging.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/spc-based-software-reliability-using-modified-genetic-algorithm-inflection-sshaped-model-95553.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/spc-based-software-reliability-using-modified-genetic-algorithm-inflection-sshaped-model.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/broadcasting-based-energy-efficient-protocol-to-enhance-the-routing-performance-in-manet-using-btsnads-algorithm-95552.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/broadcasting-based-energy-efficient-protocol-to-enhance-the-routing-performance-in-manet-using-btsnads-algorithm.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/delegate-data-guaranteed-deletion-confidentialityprotect-finegrained-access-controlrndynamic-computing-95551.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-implementation-of-novel-secure-data-selfdestructing-scheme-in-cloud-computing-for-sharing-sensitive-data.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/privacy-policies-based-on-context-awareness-in-sensor-network-healthcare-environment-95550.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/privacy-policies-based-on-context-awareness-in-sensor-network-healthcare-environment.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/combining-keystroke-security-and-finger-print-identification-for-mobile-based-secure-authentication-system-95549.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/combining-keystroke-security-and-finger-print-identification-for-mobile-based-secure-authentication-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/geo-ip-detection-of-credit-card-fraud-using-knearest-neighbor-algorithm-95548.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/geo-ip-detection-of-credit-card-fraud-using-knearest-neighbor-algorithm.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/automobile-routing-problem-a-survey-on-protection-of-sybil-attacks-95547.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/automobile-routing-problem-a-survey-on-protection-of-sybil-attacks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-optimal-partitioning-algorithm-of-mobile-device-interface-to-the-cloud-application-systems-95546.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-optimal-partitioning-algorithm-of-mobile-device-interface-to-the-cloud-application-systems.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/protecting-data-using-platform-encryption-in-cloud-95545.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/protecting-data-using-platform-encryption-in-cloud.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/intercloud-the-cloud-of-clouds.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-review-on-syn-flooding-attack-counter-measures-in-mobile-adhoc-network-95543.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-review-on-syn-flooding-attack-counter-measures-in-mobile-adhoc-network.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-attempt-to-find-a-solution-for-destructing-jamming-problems-using-game-theroritic-analysis-95542.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-attempt-to-find-a-solution-for-destructing-jamming-problems-using-game-theroritic-analysis.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/memory-utilization-and-improving-the-performance-of-cloud-with-deduplication-95541.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/memory-utilization-and-improving-the-performance-of-cloud-with-deduplication.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-review-on-leach-and-its-descendants-95540.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-review-on-leach-and-its-descendants.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-review-on-cryptocurrency-95539.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-review-on-cryptocurrency.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/surreptitious-information-sharing-scheme-using-legitimate-delegacy-in-cloud-computing-95538.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/surreptitious-information-sharing-scheme-using-legitimate-delegacy-in-cloud-computing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/green-computing-resource-for-environmental-issues-95537.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/green-computing-resource-for-environmental-issues.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/hello-flood-attack-countermeasures-in-wireless-sensor-networks-95534.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/hello-flood-attack-countermeasures-in-wireless-sensor-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/big-data-era-and-privacy-challenges-95532.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/big-data-era-and-privacy-challenges.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/bitcoins-future-currency-95531.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/bitcoins-future-currency.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/green-computing-to-saving-energy-by-computer-virtualization-95530.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/green-computing-to-saving-energy-by-computer-virtualization.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/efficient-segmentation-method-for-textured-images-by-using-svd-95529.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/efficient-segmentation-method-for-textured-images-by-using-svd.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/blockchain-technology-beyond-bitcoin-an-overview-95528.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/blockchain-technology-beyond-bitcoin-an-overview.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/improved-resource-allocation-algorithms-for-cloud-95527.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/improved-resource-allocation-algorithms-for-cloud.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/data-extraction-by-information-processing-from-various-user-recommended-systems-95526.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/data-extraction-by-information-processing-from-various-user-recommended-systems.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/color-coding-features-based-image-retrieval-using-svm-classifier-95525.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/color-coding-features-based-image-retrieval-using-svm-classifier.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/image-compression-and-decompression-using-coding-redundancy-method-95524.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/image-compression-and-decompression-using-coding-redundancy-method.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/green-computing-a-fundamental-trend-for-secure-opportunity-95523.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/green-computing-a-fundamental-trend-for-secure-opportunity.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/network-security-technology-based-on-firewall-and-intrusion-detection-system-95522.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/network-security-technology-based-on-firewall-and-intrusion-detection-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/study-and-analysis-of-rule-mining-from-heterogeneous-applications-in-data-mining-95521.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/study-and-analysis-of-rule-mining-from-heterogeneous-applications-in-data-mining.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/green-computing-opportunity-of-computers-95520.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/green-computing-opportunity-of-computers.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/graph-traversals-and-its-applications-in-graph-theory-95519.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/graph-traversals-and-its-applications-in-graph-theory.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/dr-kkavitha-95518.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/dr-kkavitha.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/selfdetermining-automobile-robot-movement-using-travelling-salesman-problem-with-genetic-algorithm-search-technique-95517.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/selfdetermining-automobile-robot-movement-using-travelling-salesman-problem-with-genetic-algorithm-search-technique.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-approach-to-data-mining-95516.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-approach-to-data-mining.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-survey-on-various-techniques-in-data-mining-95515.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-survey-on-various-techniques-in-data-mining.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/detection-automation-of-malignant-neoplasm-using-clustering-techniques-with-matlab-95514.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/detection-automation-of-malignant-neoplasm-using-clustering-techniques-with-matlab.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/required-and-efforts-of-green-computing-95512.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/required-and-efforts-of-green-computing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/hadoop-map-reduce-framework-for-automated-banking-system-95510.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/hadoop-map-reduce-framework-for-automated-banking-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/review-on-existing-methods-of-adaptive-modulation-and-power-allocation-using-mimo-ofdm-95509.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/review-on-existing-methods-of-adaptive-modulation-and-power-allocation-using-mimo-ofdm.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-study-on-virtualization-and-hypervisor-in-cloud-computing-95507.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-study-on-virtualization-and-hypervisor-in-cloud-computing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/identity-and-authentication-using-fingerprint-biometrics-mj2rsa-cryptosystem-in-health-care-system-95506.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/identity-and-authentication-using-fingerprint-biometrics-mj2rsa-cryptosystem-in-health-care-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/aspect-based-parsing-for-sentiment-analysis-in-big-data-95505.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/aspect-based-parsing-for-sentiment-analysis-in-big-data.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/event-notification-in-vehicular-adhoc-networks-using-da-platoon-system-95504.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/event-notification-in-vehicular-adhoc-networks-using-da-platoon-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/ict-specific-technological-changes-in-precision-agriculture-environment-95503.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/ict-specific-technological-changes-in-precision-agriculture-environment.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/marrying-inefficient-sorting-techniques-can-give-birth-to-a-substantially-more-efficient-algorithm-95501.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/marrying-inefficient-sorting-techniques-can-give-birth-to-a-substantially-more-efficient-algorithm.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/reach-green-computing-95500.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/reach-green-computing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-trusted-hardware-based-data-base-with-filled-security-95497.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-trusted-hardware-based-data-base-with-filled-security.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/usability-study-of-an-interactive-digital-tool-for-teaching-process-scheduling-in-operating-systems-95494.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/usability-study-of-an-interactive-digital-tool-for-teaching-process-scheduling-in-operating-systems.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/challenges-and-analysis-in-cyber-crime-95492.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/challenges-and-analysis-in-cyber-crime.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/using-hybrid-genetic-pso-in-qod-for-hybrid-wireless-networkto-optimize-the-cost-95491.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/using-hybrid-genetic-pso-in-qod-for-hybrid-wireless-networkto-optimize-the-cost.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/security-issues-in-mobile-computing-95490.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/security-issues-in-mobile-computing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/semantically-secured-message-authentication-for-wireless-sensor-networks-95489.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/semantically-secured-message-authentication-for-wireless-sensor-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/detection-and-avoidance-of-congestion-control-using-adhoc-network-95488.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/detection-and-avoidance-of-congestion-control-using-adhoc-network.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-review-on-color-image-processing-95487.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-review-on-color-image-processing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/controlling-electrical-devices-with-the-help-of-messenger-95486.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/controlling-electrical-devices-with-the-help-of-messenger.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/digital-image-watermarking-review-95485.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/digital-image-watermarking-review.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/towards-efficient-virtual-appliance-creation-and-optimization-in-stable-infrastructure-as-a-service-in-cloud-95484.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/towards-efficient-virtual-appliance-creation-and-optimization-in-stable-infrastructure-as-a-service-in-cloud.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/comparative-study-of-routing-protocols-for-manets-95483.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/comparative-study-of-routing-protocols-for-manets.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/dynamic-optimization-of-generalized-sql-queries-with-horizontal-aggregations-using-kmeans-clustering-95482.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/dynamic-optimization-of-generalized-sql-queries-with-horizontal-aggregations-using-kmeans-clustering.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/privacy-preserving-and-fully-anonymous-protocols-for-profile-matching-in-mobile-social-networks-95481.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/privacy-preserving-and-fully-anonymous-protocols-for-profile-matching-in-mobile-social-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-survey-on-data-mining-methods-andtechniques-for-diabetes-mellitus-95480.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-survey-on-data-mining-methods-andtechniques-for-diabetes-mellitus.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/super-resolution-by-using-gradient-profile-sharpness-survey-paper-95479.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/super-resolution-by-using-gradient-profile-sharpness-survey-paper.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-survey-on-recallbased-graphical-user-authentications-algorithms-95478.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-survey-on-recallbased-graphical-user-authentications-algorithms.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-survey-on-security-attacks-for-vanet-95477.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-survey-on-security-attacks-for-vanet.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/capcha-as-otp-a-new-security-primitive-based-on-critical-ai-problem-95476.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/capcha-as-otp-a-new-security-primitive-based-on-critical-ai-problem.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-survey-on-rainfall-prediction-using-datamining-95474.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-survey-on-rainfall-prediction-using-datamining.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/rsa-and-elgamal-cryptosystem-an-overview-95473.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/rsa-and-elgamal-cryptosystem-an-overview.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-comparative-survey-on-symmetric-key-encryption-algorithms-95472.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-comparative-survey-on-symmetric-key-encryption-algorithms.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/the-comparison-of-interapplication-communication-mechanisms-in-mobile-operating-systems-95470.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/the-comparison-of-interapplication-communication-mechanisms-in-mobile-operating-systems.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-survey-on-heart-disease-prediction-system-using-data-mining-techniques-95469.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-survey-on-heart-disease-prediction-system-using-data-mining-techniques.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/review-paper-on-enhance-the-atm-security-using-fingerprint-recognition-95468.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/review-paper-on-enhance-the-atm-security-using-fingerprint-recognition.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/survey-of-classification-techniques-in-data-mining-95467.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/survey-of-classification-techniques-in-data-mining.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-questionnaire-on-survey-of-problems-in-teachers-marital-life-using-data-mining-95466.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-questionnaire-on-survey-of-problems-in-teachers-marital-life-using-data-mining.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-framework-for-tracking-criminals-using-imagebased-height-detection-techniques-95463.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-framework-for-tracking-criminals-using-imagebased-height-detection-techniques.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/security-in-multiple-clouds-using-distributed-depsky-system-95461.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/security-in-multiple-clouds-using-distributed-depsky-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/dishdistributed-information-sharing-system-for-energy-efficiency-in-manets-95460.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/dishdistributed-information-sharing-system-for-energy-efficiency-in-manets.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-stochastic-digest-based-falsification-encryption-and-reestablishing-decryption-of-multimedia-data-in-android-device-95459.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-stochastic-digest-based-falsification-encryption-and-reestablishing-decryption-of-multimedia-data-in-android-device.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/survey-on-aqm-congestion-control-algorithms-95458.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/survey-on-aqm-congestion-control-algorithms.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-dictionary-based-image-coding-using-orthogonal-matching-pursuit-95457.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-dictionary-based-image-coding-using-orthogonal-matching-pursuit.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/efficient-routing-from-multiple-sources-to-multiple-sinks-in-wireless-sensor-networks-95456.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/efficient-routing-from-multiple-sources-to-multiple-sinks-in-wireless-sensor-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-review-on-keyword-ranked-search-over-encrypted-cloud-data-95454.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-review-on-keyword-ranked-search-over-encrypted-cloud-data.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/survey-on-insider-data-theft-misuse-attacks-in-the-cloud-95453.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/survey-on-insider-data-theft-misuse-attacks-in-the-cloud.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/secure-key-distribution-over-tor-networks-in-mobile-social-networks-95452.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/secure-key-distribution-over-tor-networks-in-mobile-social-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-efficient-and-robust-addressing-protocol-for-node-auto-configuration-in-ad-hoc-networks-95446.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-efficient-and-robust-addressing-protocol-for-node-auto-configuration-in-ad-hoc-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/control-and-track-android-smartphone-by-sms-commands-95444.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/control-and-track-android-smartphone-by-sms-commands.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/wireless-sensor-network-black-hole-attack-detection-using-bfofuzzy-95440.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/wireless-sensor-network-black-hole-attack-detection-using-bfofuzzy.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/mathlab-repercussion-digital-image-methodologies-application-for-privacy-and-security-using-steganography-95438.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/mathlab-repercussion-digital-image-methodologies-application-for-privacy-and-security-using-steganography.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-survey-about-the-mobile-computing-infrastructures-95437.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-survey-about-the-mobile-computing-infrastructures.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/secure-data-shared-and-stored-in-cloud-using-keypolicy-attribute-based-encryption-95434.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/secure-data-shared-and-stored-in-cloud-using-keypolicy-attribute-based-encryption.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/review-on-security-issues-in-wimax-networks-for-elearning-95433.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/review-on-security-issues-in-wimax-networks-for-elearning.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/collaborative-locationbased-novel-schemes-for-trusted-topk-query-retrieval-95431.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/collaborative-locationbased-novel-schemes-for-trusted-topk-query-retrieval.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/performance-of-classification-algorithms-on-students-data-a-comparative-study-95430.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/performance-of-classification-algorithms-on-students-data--a-comparative-study.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/using-deep-learning-techniques-to-predict-wind-speed-95426.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/using-deep-learning-techniques-to-predict-wind-speed.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/functionality-based-regions-discovery-in-a-city-based-on-hpc-frame-work-95425.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/functionality-based-regions-discovery-in-a-city-based-on-hpc-frame-work.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/using-an-efficient-genetic-algorithm-to-improve-the-quality-of-service-for-various-data-types-transmission-in-manet-95424.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/using-an-efficient-genetic-algorithm-to-improve-the-quality-of-service-for-various-data-types-transmission-in-manet.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/communication-disabilities-among-primary-students-a-case-in-south-east-coast-95423.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/communication-disabilities-among-primary-students-a-case-in-south-east-coast.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/detection-and-avoidance-of-congestion-control-through-routing-protocols-95422.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/detection-and-avoidance-of-congestion-control-through-routing-protocols.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-review-of-clustering-algorithms-95421.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-review-of-clustering-algorithms.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-new-approach-on-optimized-routing-technique-for-handling-multiple-request-from-multiple-devices-for-mobile-cloud-compu-95420.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-new-approach-on-optimized-routing-technique-for-handling-multiple-request-from-multiple-devices-for-mobile-cloud-compu.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/traffic-analysis-and-prevent-pattern-in-manet-using-aodv-protocol-with-aes-algorithm-95419.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/traffic-analysis-and-prevent-pattern-in-manet-using-aodv-protocol-with-aes-algorithm.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/structural-design-of-engineering-buildings-95418.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/structural-design-of-engineering-buildings.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/development-of-a-mobile-application-for-emergency-response-system-95416.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/development-of-a-mobile-application-for-emergency-response-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-review-college-enquiry-automated-chatbot-95415.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-review-college-enquiry-automated-chatbot.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/multisink-based-energy-efficient-routing-in-wireless-sensor-networks-with-delay-constraint-95414.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/multisink-based-energy-efficient-routing-in-wireless-sensor-networks-with-delay-constraint.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/collection-of-web-opinion-information-and-visualization-based-on-sdc-95413.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/collection-of-web-opinion-information-and-visualization-based-on-sdc.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/privacy-preserving-and-content-filtering-model-using-collaborative-tagging-95412.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/privacy-preserving-and-content-filtering-model-using-collaborative-tagging.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/setting-up-the-django-framework-for-web-development-95411.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/setting-up-the-django-framework-for-web-development.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-survey-based-research-for-data-mining-techniques-to-forecast-water-demand-in-irrigation-95410.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-survey-based-research-for-data-mining-techniques-to-forecast-water-demand-in-irrigation.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/efficient-incentive-compatible-model-for-secure-data-sharing-95409.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/efficient-incentive-compatible-model-for-secure-data-sharing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-predictive-approach-of-data-science-to-transform-unstructured-web-data-95408.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-predictive-approach-of-data-science-to-transform-unstructured-web-data.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/emergency-tracking-and-antitheft-system-for-android-mobiles-95407.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/emergency-tracking-and-antitheft-system-for-android-mobiles.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/analysing-and-integrating-evolutionary-algorithms-towards-optimum-solution-95406.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/analysing-and-integrating-evolutionary-algorithms-towards-optimum-solution.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/partbased-pedestrian-detection-and-tracking-using-hogsvm-classification-95405.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/partbased-pedestrian-detection-and-tracking-using-hogsvm-classification.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/emerging-impact-of-artificial-intelligence-in-human-life-95404.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/emerging-impact-of-artificial-intelligence-in-human-life.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/beacon-update-for-greedy-perimeter-stateless-routing-protocol-in-manets-95403.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/beacon-update-for-greedy-perimeter-stateless-routing-protocol-in-manets.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/future-direction-of-internet-of-things-iot-and-its-challenges-in-application-domain-95402.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/future-direction-of-internet-of-things-iot-and-its-challenges-in-application-domain.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/car-hailing-provider-apps-and-user-behavior-95401.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/car-hailing-provider-apps-and-user-behavior.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/security-analysis-of-visual-secret-sharing-scheme-95400.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/security-analysis-of-visual-secret-sharing-scheme.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/cheating-detection-in-eexam-using-similarity-methods-95399.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/cheating-detection-in-eexam-using-similarity-methods.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/antiphishing-framework-for-banking-based-on-visual-cryptography-95398.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/antiphishing-framework-for-banking-based-on-visual-cryptography.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/utilization-of-health-information-system-to-enhance-health-care-delivery-in-nigeria-95397.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/utilization-of-health-information-system-to-enhance-health-care-delivery-in-nigeria.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/overcome-vampire-attacks-problem-in-wireless-adhoc-sensor-network-by-using-distance-vector-protocols-95396.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/overcome-vampire-attacks-problem-in-wireless-adhoc-sensor-network-by-using-distance-vector-protocols.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/subject-review-securing-iris-authentication-system-95395.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/subject-review-securing-iris-authentication-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/diagnostic-group-socio-behaviors-using-dim-extractions-95394.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/diagnostic-group-socio-behaviors-using-dim-extractions.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/subject-review-hand-geometry-recognition-system-95393.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/subject-review-hand-geometry-recognition-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/hiding-packet-send-through-multiple-transmission-line-by-virtually-in-ad-hoc-95392.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/hiding-packet-send-through-multiple-transmission-line-by-virtually-in-ad-hoc.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-comparative-study-of-parallel-programming-language-95391.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-comparative-study-of-parallel-programming-language.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/proxy-reencryption-using-hybrid-encryption-scheme-secure-against-chosen-ciphertext-attack-95390.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/proxy-reencryption-using-hybrid-encryption-scheme-secure-against-chosen-ciphertext-attack.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-review-on-image-forgery-using-improved-color-filter-analysis-95389.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-review-on-image-forgery-using-improved-color-filter-analysis.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/subject-review-data-encryption-using-block-cipher-algorithm-95388.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/subject-review-data-encryption-using-block-cipher-algorithm.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/securing-sensitive-information-in-social-network-data-anonymization-95387.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/securing-sensitive-information-in-social-network-data-anonymization.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-empirical-study-on-smart-android-based-security-survillance-for-detective-applications-95386.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-empirical-study-on-smart-android-based-security-survillance-for-detective-applications.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/the-effects-of-social-media-addiction-among-students-in-the-tertiary-institution-a-case-study-of-the-department-of-rn-om-95385.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/the-effects-of-social-media-addiction-among-students-in-the-tertiary-institution-a-case-study-of-the-department-of--ompu.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/gpsr-geographical-routing-protocol-using-manet-95384.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/gpsr-geographical-routing-protocol-using-manet.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/to-compare-the-performance-of-tora-and-dsr-based-on-the-size-of-the-network-95383.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/to-compare-the-performance-of-tora-and-dsr-based-on-the-size-of-the-network.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/parallel-computational-models-95382.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/parallel-computational-models.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/performance-analysis-of-manet-and-wlan-using-dsr-protocol-95381.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/performance-analysis-of-manet-and-wlan-using-dsr-protocol.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/object-tracking-and-recognitionrnfor-real-time-videos-using-naive-rnbayes-classification-95380.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/object-tracking-and-recognitionfor-real-time-videos-using-naive-bayes-classification.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/moodup-emotion-based-recommendation-system-with-face-and-speech-recognition-95379.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/moodup-emotion-based-recommendation-system-with-face-and-speech-recognition.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-review-on-topology-based-routing-protocol-in-vanet-95378.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-review-on-topology-based-routing-protocol-in-vanet.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/privacy-protection-against-wormhole-attacks-in-manet-95377.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/privacy-protection-against-wormhole-attacks-in-manet.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/dynamic-routing-for-multihop-wireless-network-95376.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/dynamic-routing-for-multihop-wireless-network.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/implementation-on-particle-swarm-optimization-algorithm-95375.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/implementation-on-particle-swarm-optimization-algorithm.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/biometric-authentication-system-using-finger-vein-95373.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/biometric-authentication-system-using-finger-vein.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/graph-traversals-and-its-applications-95372.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/graph-traversals-and-its-applications.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/subject-review-palm-print-biometric-authentication-system-for-security-applications-95371.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/subject-review-palm-print-biometric-authentication-system-for-security-applications.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/lossless-and-reversible-data-hiding-in-encrypted-images-with-publickey-cryptography-a-review-95370.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/lossless-and-reversible-data-hiding-in-encrypted-images-with-publickey-cryptography-a-review.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/evolution-of-supercomputer-architecture-a-survey-95369.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/evolution-of-supercomputer-architecture-a-survey.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/advanced-architecture-95368.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/advanced-architecture.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/rbm-rule-based-lexical-meaning-extraction-in-video-data-using-fuzzy-95367.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/rbm-rule-based-lexical-meaning-extraction-in-video-data-using-fuzzy.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-study-of-features-and-datamining-techniques-used-for-plant-leaf-disease-prediction-in-agricultural-informatics-95366.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-study-of-features-and-datamining-techniques-used-for-plant-leaf-disease-prediction-in-agricultural-informatics.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-novel-scheme-for-live-streaming-evolution-networks-95365.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-novel-scheme-for-live-streaming-evolution-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/analytical-study-of-image-steganography-techniques-in-the-context-of-present-scenario-95364.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/analytical-study-of-image-steganography-techniques-in-the-context-of-present-scenario.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/the-power-of-ussd-a-solution-to-african-financial-transaction-problems-95363.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/the-power-of-ussd-a-solution-to-african-financial-transaction-problems.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/survey-on-classification-of-feature-selection-strategies-95362.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/survey-on-classification-of-feature-selection-strategies.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/distributed-intrusion-detection-system-for-resource-constrained-devices-in-networks-95361.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/distributed-intrusion-detection-system-for-resource--constrained-devices-in-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-review-on-kalman-filter-for-gps-tracking-95360.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-review-on-kalman-filter-for-gps-tracking.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-multi-context-embedding-model-based-on-convolutional-neural-network-for-trajectory-data-mining-95359.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-multi-context-embedding-model-based-on-convolutional-neural-network-for-trajectory-data-mining.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/review-predictor-on-social-media-for-specific-topic-to-find-its-impact-on-people-sentiment-analysis-approach-95358.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/review-predictor-on-social-media-for-specific-topic-to-find-its-impact-on-people-sentiment-analysis-approach.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/enhanced-homomorphism-encryption-technique-for-cloud-computing-95357.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/enhanced-homomorphism-encryption-technique-for-cloud-computing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/public-auditing-automatic-protocol-blocking-with-3d-password-authentication-for-secure-cloud-storage-95356.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/public-auditing--automatic-protocol-blocking-with-3d-password-authentication-for-secure-cloud-storage.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/designing-of-modified-fuzzy-based-cpu-scheduling-algorithm-95355.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/designing-of-modified-fuzzy-based-cpu-scheduling-algorithm.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-new-system-for-product-aspect-ranking-in-data-mining-95354.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-new-system-for-product-aspect-ranking-in-data-mining.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/various-data-mining-techniques-used-to-study-students-academic-performance-95353.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/various-data-mining-techniques-used-to-study-students-academic-performance.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/survey-on-effective-feature-selection-methods-and-algorithms-for-high-dimensional-data-95352.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/survey-on-effective-feature-selection-methods-and-algorithms-for-high-dimensional-data.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/information-reclamation-progress-for-multiitem-requirements-in-multichannel-transmit-environments-95351.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/information-reclamation-progress-for-multiitem-requirements-in-multichannel-transmit-environments.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/energy-consumption-in-wireless-roving-application-95350.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/energy-consumption-in-wireless-roving-application.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/security-and-usability-issues-in-captcha-design-95349.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/security-and-usability-issues-in-captcha-design.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/flexible-rts-and-concurrent-transmission-schemes-for-reducing-exposed-node-problem-in-80211-wlans-95348.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/flexible-rts-and-concurrent-transmission-schemes-for-reducing-exposed-node-problem-in-80211-wlans.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/different-approaches-for-the-removal-of-different-valued-salt-and-pepper-noise-in-images-using-spartan-3-fpga-with-secur-95347.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/different-approaches-for-the-removal-of-different-valued-salt-and-pepper-noise-in-images-using-spartan-3-fpga-with-secur.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/cashless-transactions-issues-and-solutions-95346.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/cashless-transactions-issues-and-solutions.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/adiabatic-logic-for-low-power-digital-design-95345.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/adiabatic-logic-for-low-power-digital-design.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/ids-in-wsn-based-on-spy-node-and-voting-scheme-95344.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/ids-in-wsn-based-on-spy-node-and-voting-scheme.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/types-of-cyber-crimes-and-prevention-measures-95338.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/types-of-cyber-crimes-and-prevention-measures.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/private-cloud-by-means-of-different-open-source-softwares-95336.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/private-cloud-by-means-of-different-open-source-softwares.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/routing-protocol-for-ad-hoc-network-based-on-location-information-95333.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/routing-protocol-for-ad-hoc-network-based-on-location-information.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-survey-of-challenges-in-mobile-computing-for-education-sector-95332.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-survey-of-challenges-in-mobile-computing-for-education-sector.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/the-distributed-kmeans-clustering-over-peertopeer-mesh-networks-95331.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/the-distributed-kmeans-clustering-over-peertopeer-mesh-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/incremental-information-extraction-using-relational-database-system-ptql-95330.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/incremental-information-extraction-using-relational-database-system--ptql.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/edm-applications-and-report-analysis-case-study-95328.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/edm-applications-and-report-analysis--case-study.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/enhancing-the-ecommerce-business-by-integrating-with-social-media-95327.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/enhancing-the-ecommerce-business-by-integrating-with-social-media.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-study-on-asymmetric-key-cryptography-algorithms-95326.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-study-on-asymmetric-key-cryptography-algorithms.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/efficient-network-coding-using-secure-cloud-storage-protocol-95325.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/efficient-network-coding-using-secure-cloud-storage-protocol.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/quality-of-service-enhancement-analysis-process-in-mobile-adhoc-networks-95324.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/quality-of-service-enhancement-analysis-process-in-mobile-adhoc-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/innovative-dcdc-converter-for-hybrid-energy-sources-using-multi-inputs-95323.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/innovative-dcdc-converter-for-hybrid-energy-sources-using-multi-inputs.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/analogous-research-on-pursuance-assessment-of-mac-protocols-in-wsns-95322.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/analogous-research-on-pursuance-assessment-of-mac-protocols-in-wsns.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/papr-reduction-in-mimo-ofdm-system-using-improved-constant-modulus-algorithm-95321.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/papr-reduction-in-mimo-ofdm-system-using-improved-constant-modulus-algorithm.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-novel-approach-towards-test-suite-optimization-in-regression-testing-95320.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-novel-approach-towards-test-suite-optimization-in-regression-testing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/green-cloud-computing-resource-utilization-with-respect-to-sla-and-power-consumption-95319.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/green-cloud-computing--resource-utilization-with-respect-to-sla-and-power-consumption.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/protecting-location-privacy-in-wireless-networks-using-sasp-95318.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/protecting-location-privacy-in-wireless-networks-using-sasp.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/exploration-of-real-world-services-by-google-goggles-freeware-95317.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/exploration-of-real-world-services-by-google-goggles-freeware.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/the-android-a-widely-growing-mobile-operating-system-with-its-mobile-based-applications-95316.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/the-android--a-widely-growing-mobile-operating-system-with-its-mobile-based-applications.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/big-data-the-vast-growing-technology-with-its-challenges-and-solutions-95315.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/big-data-the-vast-growing-technology-with-its-challenges-and-solutions.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/survey-on-data-mining-using-dynamic-query-forms-technique-95314.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/survey-on-data-mining-using-dynamic-query-forms-technique.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/survey-on-security-architecture-based-on-ecc-elliptic-curve-cryptography-in-network-95313.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/survey-on-security-architecture-based-on-ecc-elliptic-curve-cryptography-in-network.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/to-eliminate-common-mode-leakage-current-in-photovoltaic-grid-connected-power-system-95312.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/to-eliminate-common-mode-leakage-current-in-photovoltaic-grid-connected-power-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/text-preprocessing-for-text-mining-using-side-information-95311.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/text-preprocessing-for-text-mining-using-side-information.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/significant-applications-of-iot-in-covid-pandemic-a-systematic-review-95310.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/significant-applications-of-iot-in-covid-pandemic-a-systematic-review.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/role-of-unani-herbal-formulation-of-sumbulutteeb-nardostachysrnjatamansi-khulanjan-alpinia-galangal-in-the-management-of-95309.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/role-of-unani-herbal-formulation-of-sumbulutteeb-nardostachysjatamansi--khulanjan-alpinia-galangal-in-the-management-oft.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/various-phytochemicals-present-in-maida-lakdirnlitsea-glutinosa-lour-acts-in-the-management-ofrnwaja-ul-mafasil-arthriti-95308.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/various-phytochemicals-present-in-maida-lakdilitsea-glutinosa-lour-acts-in-the-management-ofwaja-ul-mafasil-arthritis-in.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/sentiment-analysis-on-twitter-data-a-comparative-approach-95307.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/sentiment-analysis-on-twitter-data-a-comparative-approach.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/densitybased-multi-feature-background-subtraction-with-support-vector-machine-95304.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/densitybased-multi-feature-background-subtraction-with-support-vector-machine.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/implementing-asymmetrickey-cryptography-using-parallelkey-cryptographic-algorithm-pca-95303.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/implementing-asymmetrickey-cryptography-using-parallelkey-cryptographic-algorithm-pca.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-confidentialsecure-public-investigation-for-cloud-storage-95302.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-confidentialsecure-public-investigation-for-cloud-storage.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-new-approach-for-detecting-memory-errors-in-jpeg2000-standard-95301.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-new-approach-for-detecting-memory-errors-in-jpeg2000-standard.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/comparative-analysis-of-rpa-toolsuipath-automation-anywhere-and-blueprism-95300.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/comparative-analysis-of-rpa-toolsuipath-automation-anywhere-and-blueprism.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/dual-sorting-algorithm-based-on-quick-sort-95299.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/dual-sorting-algorithm-based-on-quick-sort.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/aco-parameters-analysis-of-tsp-problem-95298.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/aco-parameters-analysis-of-tsp-problem.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/monitoring-people-movements-and-face-tracking-using-unmanned-aerial-vehicles-uav-during-covid-19-using-cloud-computing-95297.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/monitoring-people-movements-and-face-tracking-using-unmanned-aerial-vehicles-uav-during-covid--19-using-cloud-computing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/comparison-between-python-r-and-julia-language-in-data-science-95296.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/comparison-between-python-r-and-julia-language-in-data-science.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/eliminate-residue-in-cloud-system-95295.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/eliminate-residue-in-cloud-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/comparative-analysis-of-algorithms-used-in-deep-learning-95294.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/comparative-analysis-of-algorithms-used-in-deep-learning.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/data-loss-prevention-in-detecting-and-preventing-data-breaches-an-overview-95293.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/data-loss-prevention-in-detecting-and-preventing-data-breaches-an-overview.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/user-rating-prediction-using-data-mining-techniques-in-online-purchase-95292.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/user-rating-prediction-using-data-mining-techniques-in-online-purchase.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/insight-into-information-extractionrnmethod-using-natural-languagernprocessing-technique-95291.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/insight-into-information-extractionmethod-using-natural-languageprocessing-technique.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/comparative-analysis-of-algorithms-used-in-credit-card-fraud-detection-system-95290.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/comparative-analysis-of-algorithms-used-in-credit-card-fraud-detection-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/improved-cma-a-beamforming-algorithms-for-wireless-system-using-smart-antenna-95289.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/improved-cma-a-beamforming-algorithms-for-wireless-system-using-smart-antenna.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-research-study-on-distributed-computing-its-application-with-development-trend-analysis-95288.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-research-study-on-distributed-computing--its-application-with-development-trend-analysis.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-agent-oriented-markov-model-framework-for-service-composition-95287.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-agent-oriented-markov-model-framework-for-service-composition.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-novel-approach-to-predict-the-students-academic-concert-through-data-mining-techniques-95286.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-novel-approach-to-predict-the-students-academic-concert-through-data-mining-techniques.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-ontologybased-service-discovery-framework-for-an-enterprise-95285.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-ontologybased-service-discovery-framework-for-an-enterprise.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/analysis-of-various-energy-efficient-data-centers-using-cloud-systems-95284.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/analysis-of-various-energy-efficient-data-centers-using-cloud-systems.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/study-of-emerging-threats-in-cybersecurity-95283.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/study-of-emerging-threats-in-cybersecurity.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/smart-vehicle-tracking-system-95282.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/smart-vehicle-tracking-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/security-issues-of-enabling-technologies-for-internet-of-things-95281.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/security-issues-of-enabling-technologies-for-internet-of-things.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/protect-of-security-firewalls-95280.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/protect-of-security-firewalls.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/internet-enable-devices-security-for-society-95279.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/internet-enable-devices-security-for-society.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/introducing-twofactor-authentication-for-the-block-chain-protocol-with-help-of-hash-algorithm-95278.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/introducing-twofactor-authentication-for-the-block-chain-protocol-with-help-of-hash-algorithm.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/managed-data-layer-in-ecommerce-and-extending-to-bigdata-95277.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/managed-data-layer-in-ecommerce-and-extending-to-bigdata.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-apriori-based-algorithm-for-frequent-pattern-mining-95276.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-apriori-based-algorithm-for-frequent-pattern-mining.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/implementation-of-hardware-based-system-for-asset-monitoring-and-tracking-system-95275.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/implementation-of-hardware-based-system-for-asset-monitoring-and-tracking-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-enhanced-approach-for-customer-segmentation-through-predictive-modelling-with-costbenefit-analysis-95274.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-enhanced-approach-for-customer-segmentation-through-predictive-modelling-with-costbenefit-analysis.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/improving-the-trust-and-adversary-detection-process-for-delaytolerant-networks-95273.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/improving-the-trust-and-adversary-detection-process-for-delaytolerant-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/shift-managerial-strategy-for-it-services-95272.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/shift-managerial-strategy-for-it-services.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/effective-efficient-boolean-retrieval-95271.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/effective-efficient-boolean-retrieval.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-approach-for-crime-rate-prediction-using-data-mining-95270.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-approach-for-crime-rate-prediction-using-data-mining.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/homomorphic-recommendations-for-data-packing-a-survey-95269.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/homomorphic-recommendations-for-data-packing-a-survey.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-artificial-bee-colony-algorithm-for-efficient-routing-in-manet-95268.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-artificial-bee-colony-algorithm-for-efficient-routing-in-manet.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/image-encryptiondecryption-using-rsa-algorithm-95267.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/image-encryptiondecryption-using-rsa-algorithm.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/visualization-raster-based-3d-digital-elevation-model-on-web-using-qgis-95266.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/visualization-raster-based-3d-digital-elevation-model-on-web-using-qgis.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/wireless-communication-technologies-95265.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/wireless-communication-technologies.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/selfadaptive-mobile-applications-and-their-architectural-stability-95264.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/selfadaptive-mobile-applications-and-their-architectural-stability.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/homomorphic-recommendations-for-data-packing-95263.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/homomorphic-recommendations-for-data-packing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/literature-review-on-lung-nodule-segmentation-for-detection-of-cancerous-nodules-95262.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/literature-review-on-lung-nodule-segmentation-for-detection-of-cancerous-nodules.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-comparative-performance-analysis-on-gis-based-web-development-using-geoserver-versus-without-using-geoserver-95261.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-comparative-performance-analysis-on-gis-based-web-development-using-geoserver-versus-without-using-geoserver.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/implementation-of-band-pass-filter-for-homomorphic-filtering-technique-95260.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/implementation-of-band-pass-filter-for-homomorphic-filtering-technique.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/literature-review-on-real-estate-value-prediction-using-machine-learning-95259.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/literature-review-on-real-estate-value-prediction-using-machine-learning.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/online-admission-providing-system-95258.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/online-admission-providing-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-review-data-mining-techniques-and-its-applications-95257.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-review-data-mining-techniques-and-its-applications.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/elmni-an-android-application-for-teaching-arabic-language-and-arabic-literacy-95256.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/elmni-an-android-application-for-teaching-arabic-language-and-arabic-literacy.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-extensive-and-correlative-evolution-of-neural-network-approach-95255.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-extensive-and-correlative-evolution-of-neural-network-approach.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-reliable-mobile-application-package-picker-and-delivery-system-95254.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-reliable-mobile-application-package-picker-and-delivery-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/implementing-data-security-in-cloud-computing-95253.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/implementing-data-security-in-cloud-computing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/mathematical-analysis-of-efficacy-of-condom-as-a-contraceptive-on-the-transmission-of-chlamydia-disease-95251.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/mathematical-analysis-of-efficacy-of-condom-as-a-contraceptive-on-the-transmission-of-chlamydia-disease.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/design-and-develop-the-b2c-farming-information-system-solution-using-mobile-and-web-geospatial-development-technologies--95250.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/design-and-develop-the-b2c-farming-information-system-solution-using-mobile-and-web-geospatial-development-technologies-.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-study-on-aspect-level-sentiment-analysis-of-named-entities-using-annotation-scheme-95249.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-study-on-aspect-level-sentiment-analysis-of-named-entities-using-annotation-scheme.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/performance-evaluation-of-soft-thresholding-approach-for-energy-optimization-in-temperature-sensor-95248.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/performance-evaluation-of-soft-thresholding-approach-for-energy-optimization-in-temperature-sensor.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/blue-brain-a-magic-of-human-brain-95247.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/blue-brain-a-magic-of-human-brain.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/an-analysis-on-performance-evaluation-of-intermediate-web-traffic-applying-web-optimizer-95246.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/an-analysis-on-performance-evaluation-of-intermediate-web-traffic-applying-web-optimizer.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/mobilephone-based-remote-patients-vital-signs-monitoring-and-automated-alerts-95245.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/mobilephone-based-remote-patients-vital-signs-monitoring-and-automated-alerts.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-comparative-study-on-optimization-of-search-in-overlay-networks-95244.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-comparative-study-on-optimization-of-search-in-overlay-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/performance-analysis-of-broadcast-based-mobile-adhoc-routing-protocols-aodv-and-dsdv-95243.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/performance-analysis-of-broadcast-based-mobile-adhoc-routing-protocols-aodv-and-dsdv.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/proposed-model-of-gisbased-cloud-computing-architecture-for-emergency-system-95242.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/proposed-model-of-gisbased-cloud-computing-architecture-for-emergency-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-review-on-ensemble-of-classifier-using-artificial-neural-networks-as-base-classifier-95241.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-review-on-ensemble-of-classifier-using-artificial-neural-networks-as-base-classifier.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/prototype-development-of-fpga-based-ps2-mouse-controlled-pcb-drill-machine-95240.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/prototype-development-of-fpga-based-ps2-mouse-controlled-pcb-drill-machine.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/packet-loss-maintenance-using-puzzlelogic-algorithm-in-wireless-sensor-networks-95239.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/public-auditing--automatic-protocol--blocking-with-3d-password--authentication-for-secure-cloud-storage.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/extracting-efficient-and-quality-information-using-database-queries-95238.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/extracting-efficient-and-quality-information-using-database-queries.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/robust-identity-crime-detection-95237.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/robust-identity-crime-detection.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/balancing-chunks-for-distributed-file-systems-in-clouds-by-using-load-rebalancing-algorithm-95236.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/balancing-chunks-for-distributed-file-systems-in-clouds-by-using-load-rebalancing-algorithm.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/ip-traceback-techniques-a-selective-survey-95235.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/ip-traceback-techniques--a-selective-survey.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/fpga-based-hardware-level-analysis-of-inverse-sinc-filters-95234.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/fpga-based-hardware-level-analysis-of-inverse-sinc-filters.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/methodology-of-privacy-preserving-data-publishing-by-data-slicing-95233.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/methodology-of-privacy-preserving-data-publishing-by-data-slicing.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/development-of-fpga-microblaze-processor-and-gsm-based-heart-rate-monitoring-system-95232.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/development-of-fpga-microblaze-processor-and-gsm-based-heart-rate-monitoring-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/development-of-fpga-and-gsm-based-advanced-digital-locker-system-95231.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/development-of-fpga-and-gsm-based-advanced-digital-locker-system.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/agile-unified-process-95230.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/agile-unified-process.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/effects-of-timeofuse-demand-response-programs-based-on-logarithmic-modeling-for-electricity-customers-and-utilities-in-s-95229.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/effects-of-timeofuse-demand-response-programs-based-on-logarithmic-modeling-for-electricity-customers-and-utilities-in-s.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/the-derivatives-of-two-types-of-functions-95228.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/the-derivatives-of-two-types-of-functions.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/the-differential-problem-of-some-functions-95220.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/the-differential-problem-of-some-functions.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/a-cooperative-approach-for-understanding-behavior-of-intrusion-detection-system-in-mobile-ad-hoc-networks-95219.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/a-cooperative-approach-for-understanding-behavior-of-intrusion-detection-system-in-mobile-ad-hoc-networks.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/performance-evaluation-of-average-energy-consumption-in-dsr-protocol-95218.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/performance-evaluation-of-average-energy-consumption-in-dsr-protocol.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/design-and-implementation-of-enhanced-secure-field-based-routing-in-wireless-mesh-network-wmn-95217.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/design-and-implementation-of-enhanced-secure-field-based-routing-in-wireless-mesh-network-wmn.pdf</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/abstract/secure-neighbor-discovery-in-wireless-networks-by-detecting-various-attacks-95216.html</loc>
		</url>
	<url>
		<loc>https://www.ijcsma.com/articles/secure-neighbor-discovery-in-wireless-networks-by-detecting-various-attacks.pdf</loc>
		</url>
	</urlset>
