International Journal of Computer Application
ISSN: 2250-1797
 issue 8 Volume 1 (JANUARY-FEBRUARY 2018)

HOME EDITORIAL BOARD CALL FOR PAPER AUTHOR GUIDELINE ARCHIVE

 

 new now you can share your paper and improve your citation  by one click

 

go to website

 https://dx.doi.org/ 

and enter your DOI

 

VRML for automatic generation of 3D Scene

Priyanka Jain, R. P. Bhavsar, B. V. Pawar and Hemant Darbari

 

[FULL TEXT]rs doi: 10.26808/rs.ca.i8v2.01

 

-----------------------------------------------------


Code Similarity Detection by Computing Block Level Feature Metrics

Sudhamani M and Lalitha Rangarajan


[FULL TEXT]rs doi: 10.26808/rs.ca.i8v2.02

 

-----------------------------------------------------

 

Study of Hand Painted Kalamkari to Design New Motifs

 

Shalini Singh

 

[FULL TEXT]rs doi: 10.26808/rs.ca.i8v2.03

 

-----------------------------------------------------

Performance Analysis for Different Simulation Scenarios for DSDV, DSR and AODV MANET Routing Protocols using NS2 simulator

Kumar Neeraj, G.SAMPATH KUMAR, M.KASHYAP CHANDRA and M.BHARATH KUMAR

 

[FULL TEXT]rs doi: 10.26808/rs.ca.i8v2.04

 

-----------------------------------------------------


Testbed for Mitigation of Network Vulnerabilities- Enhancing organization’s security resilience in an experimental environment

Chanchala Joshi and Umesh Kumar Singh

 

[FULL TEXT]rs doi: 10.26808/rs.ca.i8v2.05

 

-----------------------------------------------------


A SYSTEMATIC REVIEW OF STUDIES ON PERCEIVED RISKS OVER ONLINE SOCIAL NETWORKS

Mr.J.S.Harilakshmanraj and Dr.S.Rathi

 

[FULL TEXT]rs doi: 10.26808/rs.ca.i8v2.06

 

-----------------------------------------------------

 


A Comparison of Various Classification Techniques in Big Data Mining

Sunu fathima T H, Binsu C Kovoor and Jaseena K U

 

[FULL TEXT]rs doi: 10.26808/rs.ca.i8v2.07

 

-----------------------------------------------------

 


Comparative Study of Information Security Risk Assessment Frameworks

Umesh Kumar Singh and Chanchala Joshi

 

[FULL TEXT]rs doi: 10.26808/rs.ca.i8v2.08

 

-----------------------------------------------------


Artificial Intelligence in China, Recent Trends

 

Abdul Mueed Hafiz and Ghulam Mohiuddin Bhat

 

[FULL TEXT]rs doi: 10.26808/rs.ca.i8v2.09

 

-----------------------------------------------------


E RTO: Modulation and Enhancement

 

Pranavi Gupta, Anisha Bijlani, Akanksha Singh and A.K Srivastava

 

[FULL TEXT]rs doi: 10.26808/rs.ca.i8v2.10

 

-----------------------------------------------------

AN EFFICIENT AND SECURE OPTIMIZED LINK STATE ROUTING PROTOCOL WITH FIREFLY ALGORITHM FOR SECURE PACKET TRANSMISSION

 

C.DANIEL NESA KUMAR and Dr. V. SARAVANAN

 

[FULL TEXT]rs doi: 10.26808/rs.ca.i8v2.11

 

-----------------------------------------------------

 

An Empirical Evaluation of Usability for SICCAT Tool

 

Vanitha N and ThirumalaiSelvi R

 

[FULL TEXT]rs doi: 10.26808/rs.ca.i8v2.12

 

-----------------------------------------------------

An Analytical Study of Authentication and Access Control Issues in Cloud Computing

Dr. Nilesh Mahajan and Mrs. Devyani Patil

 

[FULL TEXT]rs doi: 10.26808/rs.ca.i8v2.13

 

-----------------------------------------------------


A Novel Hybrid Image Analysis using ACO and Fuzzy Logic for Textured and Non-Textured Images

Subba Rao K, Dr. SambasivaraoN and Dr. Sammulal P

 

[FULL TEXT]rs doi: 10.26808/rs.ca.i8v2.14

 

-----------------------------------------------------


Comprehensive and Comparative Analysis of Neural Network

Mrs Vidushi Mishra, Smt. Manisha Agarwal and Neha Puri

 

[FULL TEXT]rs doi: 10.26808/rs.ca.i8v2.15

 

-----------------------------------------------------


PREDICTING HOSPITAL READMISSION FOR PATIENTS WITH COPD USING NATURAL LANGUAGE PROCESSIN

Aavula Ravi, Chilivelli Vinay Kumar Sharma, Devireddy Anurag Reddy and Elety Naveen Kumar Reddy

 

[FULL TEXT]rs doi: 10.26808/rs.ca.i8v2.16

 

-----------------------------------------------------


IMPLEMENTING CRYPTOGRAPHIC TECHNIQUES FOR SHARING FILES USING ACCESS CONTROL

Aavula Ravi, K. Satwik Raj, M. Giridhar Reddy and M. Soma Sundar Srikar

 

[FULL TEXT]rs doi: 10.26808/rs.ca.i8v2.17

 

-----------------------------------------------------


A Cloud Computing Framework for Quality Based e-Education System

Dr. Mohammad Alamgeer and Iqrar Ahmad

 

[FULL TEXT]rs doi: 10.26808/rs.ca.i8v2.18

 

-----------------------------------------------------

RAILWAY ENQUIRY AND FACILITIES SYSTEM

 

Hobab Alemeen, Sakshi Srivastava, Sadiqa Alam and Amit Kumar Srivastava

 

[FULL TEXT]rs doi: 10.26808/rs.ca.i8v2.19

 

-----------------------------------------------------








more to add..............