Call For Paper - Upcoming Conferences

Search Mode
Sort Results
Filter By Journal

Featured Publications

IJCSE IJCSE-V3I9P102

 Cloud providers ensure that applications available as a service via the cloud are secure by implementing testing a...

V.Meena, N.Dhivya
IJCSE IJCSE-V3I9P101

A Big challenges to develop routing protocol that can meet different application needs and optimize routing paths accord...

A.M.Nirmala, P.Sakthivel
IJCSE IJCSE-V3I8P125

At the moment the service is a matter that could be considered to determine the relevant performance of a company. Socie...

Mochammad Iswan Perangin-angin, Muslim, Andysah Putera Utama Siahaan
IJCSE IJCSE-V3I8P124

Huffman is one of the compression algorithms. It is the most famous algorithm to compress text. There are four phases in...

Suherman, Andysah Putera Utama Siahaan
IJCSE IJCSE-V3I8P115

One of the greatest threats for both police and military forces to handle is explosive devices. Bomb disposal teams requ...

Vikas Kumar, Mr. Nitin Sharma
IJCSE IJCSE-V3I8P114

Vehicle Identification has become very important in today’s scenario. These days’ organizations are more con...

Juhi Ranglani, Vijay Lachwani
IJCSE IJCSE-V3I8P102

 Penetration test is a great way to identify vulnerabilities in SDN network and DOS Mitigation can be done by ident...

N.Priyanka, Dr.V.Vetriselvi
IJCSE IJCSE-V3I8P101

Cloud computing is a new computing way that has emerged recently in the commercial market Increased processor speed, sto...

Mohammad Javad Abbasi, Mehrdad Mohri
IJCSE IJCSE-V3I7P105

In the period of ten years, significant attention has been discussion of the Health care system. Even though there have...

P.KiranmaI, V.Devasekhar
IJCSE IJCSE-V3I7P104

The execution of use is relying upon backend calls like database calls and/or web administrations. As number of calls in...

V.S.Raju, Ramesh Peramalasetty