Volume-5 , Issue-11 , Nov - 2017 Go Back

Open Access   Article

Client-Side Authorized Deduplication In Cloud Using PoW

P. Mounika, S.Jyothsna
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.120-126, Nov-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.120126
Open Access   Article

Addressing Challenges in Big Data Intrusion Detection System using Machine Learning Techniques

Saqr Mohammed H. Almansob, Santosh Shivajirao. Lomte
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.127-130, Nov-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.127130
Open Access   Article

Cloud Computing: BDaaS and HDaaS (Big Data as a Service and Hadoop as a Service)

Ujjwal Agarwal
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.131-134, Nov-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.131134
Open Access   Article

Study and Implemenation of Solar Botics

R. Nidhi
Review Paper | Journal Paper
Vol.5 , Issue.11 , pp.135-140, Nov-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.135140
Open Access   Article

Multimodal Approach on Finger Vein and Fingerprint by Using Visual Steganography for Efficient Biometric Security

P. Anitha, M. Grace
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.141-146, Nov-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.141146
Open Access   Article

Over view on Data Mining in Social Media

C.Amali Pushpam, J.Gnana Jayanthi
Review Paper | Journal Paper
Vol.5 , Issue.11 , pp.147-157, Nov-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.147157
Open Access   Article

Attacks on WSN and its Limitations

Shafiqul Abidin, Mohd Izhar
Review Paper | Journal Paper
Vol.5 , Issue.11 , pp.158-161, Nov-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.158161
Open Access   Article

Performance Analysis of S-MAC Protocol in Wireless Sensor Network

Deepika Bishnoi, Sunil Kumar Nandal
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.162-166, Nov-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.162166
Open Access   Article

Social link prediction using category based location history in trajectory data

Revathy S B, Remya R
Research Paper | Journal Paper
Vol.5 , Issue.11 , pp.167-170, Nov-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.167170
Open Access   Article

Secure Verification of Location Claims for Mobile Users

S. Harika, Renuka Kondabala
Review Paper | Journal Paper
Vol.5 , Issue.11 , pp.171-176, Nov-2017
CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.171176
First    Previous    Next    Last