An Open Access Journal
|
Publisher - D-LAR Labs [Digital Library of Academic Research] |
ISSN Under CSIR -
NISCAIR
Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us
Impact Factor -
1.02
All Publications
Volume 5, Issue 4
Volume 5, Issue 3
Volume 5, Issue 2
Volume 5, Issue 1
Volume 4, Issue 6
Volume 4, Issue 5
Volume 4, Issue 4
Volume 4, Issue 3
Volume 4, Issue 2
Volume 4, Issue 1
Volume 3, Issue 6
Volume 3, Issue 5
Volume 3, Issue 4
Volume 3, Issue 3
Volume 3, Issue 2
Volume 3, Issue 1
Volume 2, Issue 6
Volume 2, Issue 5
Volume 2, Issue 4
Volume 2, Issue 3
Volume 2, Issue 2
Volume 2, Issue 1
Volume 1, Issue 6
Volume 1, Issue 5
Volume 1, Issue 4
Volume 1, Issue 3
Volume 1, Issue 2
Volume 1, Issue 1
August 2016,
Volume 5, Issue 4 -
Full Volume
Modeling and Analysis of RLCG Interconnect using Fourier Series and Frequency Shift Techniques
Pratiksha Singh Gaur
Dr.Vivek Singh Kushwah
Full Text Paper
| Year: August 2016
| Volume 5
Issue 4
| Pages
578-584
Internet of Things: Hindrance or Help
Parth Desai
Full Text Paper
| Year: August 2016
| Volume 5
Issue 4
| Pages
585-589
Clustering and Discovery of Web Services Using the Scenario of Blood Bank Services in Internet of Things
Jyoti L. Khachane
Latika R. Desai
Full Text Paper
| Year: August 2016
| Volume 5
Issue 4
| Pages
590-593
Enhancement in Classification of Semantically Secure Encrypted Data
Chaitali Shewale
S.M. Sangve
Full Text Paper
| Year: August 2016
| Volume 5
Issue 4
| Pages
594-598
Design and Development of an Intelligent Home Automation and Security System
Akash Mohta
Arindam Ray
Ankurita Chatterjee
Avijit Bose
Full Text Paper
| Year: August 2016
| Volume 5
Issue 4
| Pages
599-603
Optimal Security and Performance in File Hosting Applications
Sukruti Admuthe
Bharti Dhote
Full Text Paper
| Year: August 2016
| Volume 5
Issue 4
| Pages
604-608
Data Cluster Formation Using FAST Algorithm
Priyanka Patil
Babita Bhagat
Full Text Paper
| Year: August 2016
| Volume 5
Issue 4
| Pages
609-614
Exudates Detection of Retinal Images using Otsu’s Thresholding and Kirsch’s Templates
Shreyasi Hazra
Atashi Patra
Tuhin Utsab Paul
Full Text Paper
| Year: August 2016
| Volume 5
Issue 4
| Pages
615-621
Advancements in Genetic Algorithm for Intrusion Detection System
Abhijeet Karve
Full Text Paper
| Year: August 2016
| Volume 5
Issue 4
| Pages
622-627
Information Fusion towards Multi-sensor Data using Cognitive Computing Approach
Parikshit N Mahalle
Saudagar S Barde
Poonam N Railkar
Pankaj R Chandre
Full Text Paper
| Year: August 2016
| Volume 5
Issue 4
| Pages
628-637
A Review of Energy Conservation Issues and Routing Protocols in Mobile Ad Hoc Networks
Mousami Vanjale
Dr. J. S. Chitode
Full Text Paper
| Year: August 2016
| Volume 5
Issue 4
| Pages
638-644
A Novel Intrusion Detection System for Detecting Black Hole Attacks in Wireless Sensor Network using AODV Protocol
Umashankar Ghugar
Jayaram Pradhan
Monalisa Biswal
Full Text Paper
| Year: August 2016
| Volume 5
Issue 4
| Pages
645-652
Probabilistic Modeling and Estimation of Network Blocking Probability for Selfish Behavior Attack in Mobile Ad hoc Networks
Kirti A. Adoni
Anil S. Tavildar
Full Text Paper
| Year: August 2016
| Volume 5
Issue 4
| Pages
653-660
Diabetic Retinopathy Detection using Image Processing: A Survey
Anupama Pattanashetty
Dr. Suvarna Nandyal
Full Text Paper
| Year: August 2016
| Volume 5
Issue 4
| Pages
661-666
An Energy Aware Optimal Routing Protocol to Overcome Vampire Attacks in Wireless Ad Hoc Sensor Networks
E. Gayathri
Dr N. Geethanjali
Full Text Paper
| Year: August 2016
| Volume 5
Issue 4
| Pages
667-674
Online Workflow Scheduling System Using Grid Computing
G. Athira Krishna
N.Sumathi
Full Text Paper
| Year: August 2016
| Volume 5
Issue 4
| Pages
675-681
STATSFEED: An Extensible Statistics Collection Framework for Virtualized Environment
Meghana S
Monika M
Full Text Paper
| Year: August 2016
| Volume 5
Issue 4
| Pages
682-686
EEG Based Classification of Hand Movements using BCI
Lavanya T H
Jyothi K S
Full Text Paper
| Year: August 2016
| Volume 5
Issue 4
| Pages
687-691
Implementation of Data Mining in Wireless Sensor Networks: An Integrated Review
Mohd Muntjir
Full Text Paper
| Year: August 2016
| Volume 5
Issue 4
| Pages
692-698
A Novel Approach to Design Hybrid Vigenere Caesar Cipher Encryption with Genetic Algorithm (HVCEGA) for Data Security in Cloud Computing
Sonal Pawar
Dr. K. James Mathai
Full Text Paper
| Year: August 2016
| Volume 5
Issue 4
| Pages
699-705
List of Computer Science Journals
Computer Science Journal
IEEE Journals
Conference Alerts
International Conference Alerts
Impact Factor
List of computer science journal
Engineering Journals
IJCSN
Electronics Journals
IEEE Papers *
Mathematics Journals
Call for papers 2013