Call For Paper - Upcoming Conferences

Search Mode
Sort Results
Filter By Journal

Featured Publications

IJCSE IJCSE-V2I7P101

Need for digital video communication is increasing day by day. In the very near future itself, video may become the domi...

Gadha M M
IJCSE IJCSE-V2I6P112

Sorting of fruits and vegetables is one in every of the foremost necessary processes in fruits production, whereas this...

Miss.Anuradha Gawande, Prof.S.S.Dhande
IJCSE IJCSE-V2I6P111

The United States Army in Europe uses a data mining on a Customs database to help stop illegal activities from happening...

Charles Edeki
IJCSE IJCSE-V2I6P110

The late mechanical advances in remote web & android versatile correspondence have permitted clients to join in into...

M.Nandha Kishore, A.Sridhar, S.Divakara
IJCSE IJCSE-V2I6P109

Use of security tools are increased over recent years as a result of increased number of malicious events. To detect pos...

Mr. Kulkarni Sagar S., Prof. Kahate Sandip A.
IJCSE IJCSE-V2I6P106

In today's universe of rodent race and due dates, its difficult to follow along on all our everyday exercises. Since...

G.Dhanasekhar, N.Mohan Reddy, N.Somasekhar
IJCSE IJCSE-V2I5P139

Text summarization is an art of abstracting key contents from one or more information sources. As time is an important d...

Sayali Hande, Mrs. M. A. Potey
IJCSE IJCSE-V2I5P138

Smartphones are mini laptops for its users. Besides calling, smartphones are used for banking, shopping, mailing, web su...

Prof. Sonali Tidke, Dr. Pravin Karde
IJCSE IJCSE-V2I5P133

We have applied a genetic algorithm (GA) to solve the Steiner Minimal Tree problem in graphs. In this a simple bit strin...

Ankit Anand, Shruti, Kunwar Ambarish Singh
IJCSE IJCSE-V2I5P101

In steganography, a message is hidden in such a way that no one apart from the intended recipient knows of the existence...

Harshal S. Tekade, Prof. Baisa L. Gunjal