Call For Paper - Upcoming Conferences

Search Mode
Sort Results
Filter By Journal

Featured Publications

IJCSE IJCSE-V1I5P102

The regular data access control system is to maintain the selective sharing composite Personal Health Records (PHRs), cu...

Sudhakar Murugesan, Nivash Thirunavukkarasu
IJCSE IJCSE-V1I5P101

Peer to Peer networks in general refers to the setup in which all computers have equal status. In other way, this allows...

Mrs. Padmapriya .G
IJCSE IJCSE-V1I4P101

Cloud computing provides a great collection of computing resources that can be rapidly and elastically provisioned and r...

Gagandeep Kaur, Dr.Sonal Chawla
IJCSE IJCSE-V1I3P102

Refactoring is a transformation that preserves the external behavior of a program and improves its internal quality. Usu...

S.Ayshwaryalakshmi, Kannan M
IJCSE IJCSE-V1I3P101

MANETs find their use particularly in the field where infrastructured network are not possible without having any centra...

Abdul Naeem Shaikh & Jitendra Kumawat
IJCSE IJCSE-V1I2P101

Energy Consumption is the most important issue in MANETs. A MANET is a mobile ad-hoc network and it is a self-configurin...

Pritam Kawade, Rahul Gaikwad, Aniket Shelke
IJCSE IJCSE-V1I1P105

The main challenges in MANET are reliability, bandwidth and battery power. Broadcasting is important in MANET for routin...

R.Arul
IJCSE IJCSE-V1I1P104

Every old thing has to be modified into a newer version to stay in par with this world. This theory of changing applies...

R.P.Muthu
IJCSE IJCSE-V1I1P103

A watermark is a hidden signal added to images that can be detected or extracted later to make some affirmation about th...

S.Balusamy
IJCSE IJCSE-V1I1P102

Building high quality and testable software is an essential requirement for software system. Software testability is a c...

N.Suresh