ISSN 2278–9669

Volume 1, Issue 1, January 2013

1. Fail-over Clusters – A Review [pdf ]

    Pabitra Mohan Khilar
 
    IJCSIT. 2013; 01(01): 05-09
 
 
2. Finite state machines implementation using DNA Techniques [pdf]
 
     Abeer Eshra and Ayman El-Sayed
 
     IJCSIT. 2013; 01(01): 10 - 16
 
3. Forecasting of Road Traffic Congestion Using Weighted Density Variation Algorithm [pdf]
 
     Prasanna Kumara and Alok Ranjan
 
     IJCSIT. 2013; 01(01): 17 - 21
 
4. Transformation of Digital Images using Morphlogical Operations [pdf]
 
     Amalarpovam et.Al.
 
     IJCSIT. 2013; 01(01): 22 - 28
 
5. A Survey on Network Security Issues in Cloud Computing [pdf]
 
    John Jeya Singh et.Al.
 
    IJCSIT. 2013; 01(01): 29 - 32
 
6. Data Center –Based, Service Oriented Architecture (SOA) in Cloud Computing [pdf]
 
    Abu Sarwar Zamani et.Al.
 
    IJCSIT. 2013; 01(01): 33 - 37
 
    
Volume 1, Issue 2, April 2013

1.MITIGATE REPLICA NODES IN WIRELESS SENSOR NETWORKS USING ADAPTIVE TRAFFIC DATA CONTROL    SCHEME [ATDCS] [pdf ]

   S. KUMARAVEL and S. PRABHA
 
    IJCSIT. 2013; 01(02): 01-08
 
 
2. DESIGN AND IMPLEMENTATION OF PARAMETER TUNING ON ORACLE DBMS[pdf]
 
     DR. OSSAMA K. MUSLIH  AND DR. ALAA H. AL-HAMAMY
 
     IJCSIT. 2013; 01(02): 09 - 12
 
3.CLOUD-SLA: SERVICE LEVEL AGREEMENT FOR CLOUD COMPUTING [pdf]
 
     UDAYAKUMAR et.Al.,
 
     IJCSIT. 2013; 01(02): 13 - 16
 
4. ADVANCEMENT OF ROUTING AND FORWARDING IN MANET [pdf]
 
     THAMARAI SELVI et.Al.,
 
     IJCSIT. 2013; 01(02): 17 - 21
 
 
5. OPTIMIZATION OF HARD HANDOFF IN MOBILE COMMUNICATIONS USING IPv6 [pdf]
 
     NWALOZIEet.Al.,
 
     IJCSIT. 2013; 01(02): 22 - 31
 
 
6. PERFORMANCE EVALUATION OF WIRELESS LOCAL AREA NETWORK (WLAN) [pdf]
 
     UFOAROH et.Al.,
 
     IJCSIT. 2013; 01(02): 32 - 43
 
7. NATIONAL ID CARDS [pdf]
 
     YAZEED ALKHURAYYIF et.Al.,
 
     IJCSIT. 2013; 01(02): 44 - 48
 
8. KNOWLEDGE SIMULATION AND KNOWLEDGE ENGINEERING AN ABSTRACT [pdf]
 
     ELRASHEID MOHMED AHMED ELRAYAH et.Al.,
 
     IJCSIT. 2013; 01(02): 49 - 52
 

Volume 1, Issue 3, July 2013

1.DISTRIBUTED MULTI CONTROL MONITORING APPLICATION (DMCMA) BASED ON MOBILE/WIRELESS     NETWORKS  [pdf ]

  Afif Mghawish, Akram Abdel Qader and Mohammad AbuMahfouz
 
    IJCSIT. 2013; 01(03): 01-09
 
 
2. Security in Wireless Sensor Network [pdf]
 
     Yazeed ALKHURAYYIF
 
     IJCSIT. 2013; 01(03): 10 - 17
 
 

Volume 2, Issue 1, January 2014

1.Effectiveness of various FPM Algorithms in Data Mining  [pdf ]

    Dr. Telkapalli Murali Krishna
 
    IJCSIT. 2014; 02(01): 01-05
 
 
2. SOLUTION OF STOCHASTIC COOPERATIVE INVENTORY MODELS BY INTUTIONISTIC FUZZY OPTIMIZATION TECHNIQUE [pdf]
 
 
     K. KALAIARASI
 
     IJCSIT. 2014; 02(01): 06 - 10
 
 

Volume 2, Issue 2, April 2014

1.An Improvement of Write-Back Caches  [pdf ]

    Arun Kanti Manna et al.,
 
    IJCSIT. 2014; 02(02): 01-05
 
 
2. Designing of a flexible Algorithm system for the statistical processing of     students' grades[pdf]
 
     Dr.Mozamel M.Saeed et al.,
 
     IJCSIT. 2014; 02(02): 06 - 10
 
 
3. Parallel processing application for cluster computing on gridsim using     Artificial Neural Network approach[pdf]
 
     Minal Dhoke et al.,
 
     IJCSIT. 2014; 02(02): 11 - 14
 
4. Optimization of trapezoidal balanced Transportation problem using     zero-suffix and Robust Ranking   Methodology with fuzzy demand and     fuzzy supply models [pdf]
 
   Dr. K.Kalaiarasi et al.,

Volume 2, Issue 3, July 2014

1.A novel approach for coin recognition using GLCM and Sweep line algorithm  [pdf ]

      T.M. Amarunishad et al.,
 
       IJCSIT. 2014; 02(03): 01-05
 
 
2. A comparative study on Time Based and Feature Driven   Release Management Techniques in Free and Open Source Software Projects [pdf]
 
     Nagendra et al.,
 
     IJCSIT. 2014; 02(03): 06 - 12
 
 
3. Agricultural Data Mining –Exploratory and Predictive model for finding Agricultural Product Patterns[pdf]
 
     Gulledmath Sangayya et al.,
 
     IJCSIT. 2014; 02(03): 12 - 19
 
4. Minimization of fuzzy assignment model using Robust Ranking technique with trapezoidal fuzzy numbers  [pdf]
 
      K.Kalaiarasi et al.,
 
      IJCSIT. 2014; 02(03): 20 - 26
 
 
Volume 2, Issue 4, October 2014

1.Some Studies on Relationship between BioTechnology Databases & Bioinformatics  [pdf ]

      N.Deepak Kumar et al.,
 
       IJCSIT. 2014; 02(04): 01-05
 
 
2. SOME STUDIES ON MAJOR DATABASES IN BIOINFORMATICS  [pdf ]
 
      N.Deepak Kumar et al.,
 
       IJCSIT. 2014; 02(04): 06-10
 
 

Volume 3, Issue 1, January 2015

1.An Effective Process for Finding Frequent Sequential Traversal Patterns on   Varying Weight Range  [pdf ]

       Abilasha vyas et al.,
 
       IJCSIT. 2015; 03(01): 01-06
 
 
2. Aggregated Probabilistic Fuzzy Relational Sentence Level Expectation Maximization Clustering Algorithm using Subjective Method For Efficient Text classification  [pdf ]
 
        Kartheek V.L. et al.,
 
        IJCSIT. 2015; 03(01): 07-12

 

3. Dynamic Load Balancing Strategies For a Distirbuted Computer System  [pdf ]
 
       Vijayabharathi.J. et al.,
 
       IJCSIT. 2015; 03(01): 13-18
 
 
4. Multi Attribute Based Security and Key Distribution for Secure Storage in Clouds  [pdf ]
 
       Vaishali R. et al.,
 
       IJCSIT. 2015; 03(01): 19-25
 
Volume 3, Issue 2, April 2015

1.Face Recognition of Illuminated Images Using Dwt and Pca [pdf ]

       Suchitra et al.,
       IJCSIT. 2015; 03(02): 01-05
 
2. User Ranking In WSNs Service  [pdf ]
 
        Deepana et al.,
        IJCSIT. 2015; 03(02): 06-09
 
3. Operation of hybrid electric vehicle using bidirectional DC - DC converter [pdf ]
 
       Arupananda Pradhan. et al.,
       IJCSIT. 2015; 03(02): 10-13
 
 
4. A Pattern Categorization Based Association Mining for Medical Databases  [pdf ]
 
       Mohit Sachan. et al.,
       IJCSIT. 2015; 03(02): 14-19
 
 

Volume 3, Issue 3, July 2015

1.Document Image Segmentation using Region Based Methods [pdf ]

       Manish T.Wanjari et al.,
       IJCSIT. 2015; 03(03): 01-08
 
2. A Framework for Text Extraction from Document Images [pdf ]
 
        Vikas K. Yeotikar et al.,
        IJCSIT. 2015; 03(03): 09-17
 
3. Web Personalization using web usage mining: applications,Pros and Cons,Future[pdf ]            
 
      Sneha Prakash
       IJCSIT. 2015; 03(03): 18-26
 
 

Volume 4, Issue 1, January 2016

1. IMPROVING DRIVING EFFICIENCY OF VEHICULAR AD-HOC NETWORK USING AODV ROUTING PROTOCOLS [pdf ]

    Richa Mishra et.al.,
 
    IJCSIT. 2016; 01(01): 01-04
 
 
2. PREDICTION AND LOAD BALANCED CLUSTERING FOR MOBILE DATA GATHERING IN WIRELESS SENSOR NETWORK LIFETIME EXTENSION [pdf]
 
     R.Shanmathi et.al.,
 
     IJCSIT. 2016; 01(01): 05 - 08
 
 
 
 
 
 
 
 


Share On :