Volume 1, Issue 1, January 2013
1. Fail-over Clusters – A Review [pdf ]
IJCSIT. 2013; 01(01): 05-09
2.
Finite state machines implementation using DNA Techniques [
pdf]
Abeer Eshra and Ayman El-Sayed
IJCSIT. 2013; 01(01): 10 - 16
3.
Forecasting of Road Traffic Congestion Using Weighted Density Variation Algorithm [
pdf]
Prasanna Kumara and Alok Ranjan
IJCSIT. 2013; 01(01): 17 - 21
4.
Transformation of Digital Images using Morphlogical Operations [
pdf]
IJCSIT. 2013; 01(01): 22 - 28
5.
A Survey on Network Security Issues in Cloud Computing [
pdf]
IJCSIT. 2013; 01(01): 29 - 32
6.
Data Center –Based, Service Oriented Architecture (SOA) in Cloud Computing [
pdf]
IJCSIT. 2013; 01(01): 33 - 37
7.
Applications of Remote Sensing (RS) and Geographic Information Systems (GIS) [
pdf]
IJCSIT. 2013; 01(01): 38 - 52
Volume 1, Issue 2, April 2013
1.MITIGATE REPLICA NODES IN WIRELESS SENSOR NETWORKS USING ADAPTIVE TRAFFIC DATA CONTROL SCHEME [ATDCS] [pdf ]
S. KUMARAVEL and S. PRABHA
IJCSIT. 2013; 01(02): 01-08
2.
DESIGN AND IMPLEMENTATION OF PARAMETER TUNING ON ORACLE DBMS[
pdf]
DR. OSSAMA K. MUSLIH AND DR. ALAA H. AL-HAMAMY
IJCSIT. 2013; 01(02): 09 - 12
3.
CLOUD-SLA: SERVICE LEVEL AGREEMENT FOR CLOUD COMPUTING [
pdf]
IJCSIT. 2013; 01(02): 13 - 16
4.
ADVANCEMENT OF ROUTING AND FORWARDING IN MANET [
pdf]
IJCSIT. 2013; 01(02): 17 - 21
5.
OPTIMIZATION OF HARD HANDOFF IN MOBILE COMMUNICATIONS USING IPv6 [
pdf]
IJCSIT. 2013; 01(02): 22 - 31
6.
PERFORMANCE EVALUATION OF WIRELESS LOCAL AREA NETWORK (WLAN) [
pdf]
IJCSIT. 2013; 01(02): 32 - 43
7.
NATIONAL ID CARDS [
pdf]
YAZEED ALKHURAYYIF et.Al.,
IJCSIT. 2013; 01(02): 44 - 48
8.
KNOWLEDGE SIMULATION AND KNOWLEDGE ENGINEERING AN ABSTRACT [
pdf]
ELRASHEID MOHMED AHMED ELRAYAH et.Al.,
IJCSIT. 2013; 01(02): 49 - 52
Volume 1, Issue 3, July 2013
1.DISTRIBUTED MULTI CONTROL MONITORING APPLICATION (DMCMA) BASED ON MOBILE/WIRELESS NETWORKS [pdf ]
Afif Mghawish, Akram Abdel Qader and Mohammad AbuMahfouz
IJCSIT. 2013; 01(03): 01-09
2. Security in Wireless Sensor Network [pdf]
IJCSIT. 2013; 01(03): 10 - 17
Volume 2, Issue 1, January 2014
1.Effectiveness of various FPM Algorithms in Data Mining [pdf ]
Dr. Telkapalli Murali Krishna
IJCSIT. 2014; 02(01): 01-05
2. SOLUTION OF STOCHASTIC COOPERATIVE INVENTORY MODELS BY INTUTIONISTIC FUZZY OPTIMIZATION TECHNIQUE [pdf]
IJCSIT. 2014; 02(01): 06 - 10
3. THE ASSESSMENT AND MANAGMENT OF WATER RESOURCES IN EL-QAA PLAIN SOUTHWEST SINAI PENINSULA, EGYPT USING REMOTE SENSING TECHNIQUES [pdf]
IJCSIT. 2014; 02(01): 11 - 18
Volume 2, Issue 2, April 2014
1.An Improvement of Write-Back Caches [pdf ]
Arun Kanti Manna et al.,
IJCSIT. 2014; 02(02): 01-05
2. Designing of a flexible Algorithm system for the statistical processing of students' grades[pdf]
Dr.Mozamel M.Saeed et al.,
IJCSIT. 2014; 02(02): 06 - 10
3. Parallel processing application for cluster computing on gridsim using Artificial Neural Network approach[pdf]
Minal Dhoke et al.,
IJCSIT. 2014; 02(02): 11 - 14
4. Optimization of trapezoidal balanced Transportation problem using zero-suffix and Robust Ranking Methodology with fuzzy demand and fuzzy supply models [pdf]
Dr. K.Kalaiarasi et al.,
Volume 2, Issue 3, July 2014
1.A novel approach for coin recognition using GLCM and Sweep line algorithm [pdf ]
T.M. Amarunishad et al.,
IJCSIT. 2014; 02(03): 01-05
2. A comparative study on Time Based and Feature Driven Release Management Techniques in Free and Open Source Software Projects [pdf]
Nagendra et al.,
IJCSIT. 2014; 02(03): 06 - 12
3. Agricultural Data Mining –Exploratory and Predictive model for finding Agricultural Product Patterns[pdf]
Gulledmath Sangayya et al.,
IJCSIT. 2014; 02(03): 12 - 19
4. Minimization of fuzzy assignment model using Robust Ranking technique with trapezoidal fuzzy numbers [pdf]
K.Kalaiarasi et al.,
IJCSIT. 2014; 02(03): 20 - 26
Volume 2, Issue 4, October 2014
1.Some Studies on Relationship between BioTechnology Databases & Bioinformatics [pdf ]
N.Deepak Kumar et al.,
IJCSIT. 2014; 02(04): 01-05
2. SOME STUDIES ON MAJOR DATABASES IN BIOINFORMATICS [pdf ]
N.Deepak Kumar et al.,
IJCSIT. 2014; 02(04): 06-10
Volume 3, Issue 1, January 2015
1.An Effective Process for Finding Frequent Sequential Traversal Patterns on Varying Weight Range [pdf ]
Abilasha vyas et al.,
IJCSIT. 2015; 03(01): 01-06
2. Aggregated Probabilistic Fuzzy Relational Sentence Level Expectation Maximization Clustering Algorithm using Subjective Method For Efficient Text classification [pdf ]
Kartheek V.L. et al.,
IJCSIT. 2015; 03(01): 07-12
3. Dynamic Load Balancing Strategies For a Distirbuted Computer System [pdf ]
Vijayabharathi.J. et al.,
IJCSIT. 2015; 03(01): 13-18
4. Multi Attribute Based Security and Key Distribution for Secure Storage in Clouds [pdf ]
Vaishali R. et al.,
IJCSIT. 2015; 03(01): 19-25
Volume 3, Issue 2, April 2015
1.Face Recognition of Illuminated Images Using Dwt and Pca [pdf ]
Suchitra et al.,
IJCSIT. 2015; 03(02): 01-05
2. User Ranking In WSNs Service [pdf ]
Deepana et al.,
IJCSIT. 2015; 03(02): 06-09
3. Operation of hybrid electric vehicle using bidirectional DC - DC converter [pdf ]
Arupananda Pradhan. et al.,
IJCSIT. 2015; 03(02): 10-13
4. A Pattern Categorization Based Association Mining for Medical Databases [pdf ]
Mohit Sachan. et al.,
IJCSIT. 2015; 03(02): 14-19
Volume 3, Issue 3, July 2015
1.Document Image Segmentation using Region Based Methods [pdf ]
Manish T.Wanjari et al.,
IJCSIT. 2015; 03(03): 01-08
2. A Framework for Text Extraction from Document Images [pdf ]
Vikas K. Yeotikar et al.,
IJCSIT. 2015; 03(03): 09-17
3. Web Personalization using web usage mining: applications,Pros and Cons,Future[pdf ]
Sneha Prakash
IJCSIT. 2015; 03(03): 18-26
Volume 4, Issue 1, January 2016
1. IMPROVING DRIVING EFFICIENCY OF VEHICULAR AD-HOC NETWORK USING AODV ROUTING PROTOCOLS [pdf ]
Richa Mishra et.al.,
IJCSIT. 2016; 01(01): 01-04
2.
PREDICTION AND LOAD BALANCED CLUSTERING FOR MOBILE DATA GATHERING IN WIRELESS SENSOR NETWORK LIFETIME EXTENSION [
pdf]
IJCSIT. 2016; 01(01): 05 - 08
Volume 5, Issue 1, January 2017
1. An Implementation of Downlink Scheduling Algorithm for Improving UMTS Network [pdf ]
Kritesh et.al.,
IJCSIT. 2017; 01(01): 01-06
2. A novel approach for data integrity protection in cloud [pdf ]
Mohamed Abdul-Aziz Gaffar Ahmed et.al.,
IJCSIT. 2017; 01(01): 07-11