{"id":506,"date":"2023-01-03T07:55:21","date_gmt":"2023-01-03T07:55:21","guid":{"rendered":"https:\/\/ijcsmc.com\/journal\/?page_id=506"},"modified":"2024-10-31T11:03:14","modified_gmt":"2024-10-31T11:03:14","slug":"volume-2-issue-3","status":"publish","type":"page","link":"https:\/\/ijcsmc.com\/index.php\/volume-2-issue-3\/","title":{"rendered":"Volume 2 Issue 3"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Various Approaches for Detecting Attacks in Intrusion Detection System<br>Authors: Purva Adlakha, Prof. Priti Subramanium<br>Country: India<br><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/abstracts\/V2I3201301.pdf\" target=\"_blank\"><strong>Abstract<\/strong><\/a><\/strong><br><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201301.pdf\" target=\"_blank\">View PDF<\/a><\/strong><a rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/February2013\/V2I2201301.pdf\" target=\"_blank\"><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Quality of Service Routing Protocol for Mobile Ad hoc Network<br>Authors: D. Annapurna, K B Raja, Venugopal K R, L M Patnaik<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/abstracts\/V2I3201302.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Abstract<\/strong><\/a><\/strong><br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201302.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Iris Recognition Using Fuzzy System<br>Authors: Prof.D.D.Patil, Prof.N.A.Nemade, K.M.Attarde<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/abstracts\/V2I3201307.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Abstract<\/strong><\/a><\/strong><br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201307.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: An Automated Biometric Attendance Management System with Dual Authentication Mechanism Based on Bluetooth and NFC Technologies<br>Authors: Samuel King Opoku<br>Country: Ghana<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/abstracts\/V2I3201303.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Abstract<\/strong><\/a><\/strong><br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201303.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Effect of Twisted Pair Cable Arrangement on Manual Termination with RJ 45 and the Quality of Communication in Auto-Sensing Port Devices<br>Authors: Samuel King Opoku, Malik Adams, Edward Akaadom<br>Country: Ghana<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/abstracts\/V2I3201304.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Abstract<\/strong><\/a><\/strong><br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201304.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Business Process Modeling Notation<br>Authors: Robert Flowers, Charles Edeki<br>Country: United States of America<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/abstracts\/V2I3201305.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Abstract<\/strong><\/a><\/strong><br><strong><a class=\"\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201305.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Signal Strength and System Operating Margin Estimation for Vehicular Ad-Hoc Networks in Rayleigh Fading Environment<br>Authors: Tilotma Yadav, Partha Pratim Bhattacharya<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/abstracts\/V2I3201308.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Abstract<\/strong><\/a><\/strong><br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201308.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: Energy Awareness in HPC: A Survey<br>Authors: A. R. Surve, A. R. Khomane, S.D. Cheke<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/abstracts\/V2I3201309.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Abstract<\/strong><\/a><\/strong><br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201309.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Federated Network Security Administration Framework<br>Authors: Bhadreshsinh G. Gohil, Rishi K. Pathak, Axaykumar A. Patel<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/abstracts\/V2I3201315.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Abstract<\/strong><\/a><\/strong><br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201315.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Prolonged Network Lifetime and Data Wholeness by Clusters Using B-Ct Algorithm<br>Authors: P.Thiyagarajan, O.K.Gowrishankar, K.Sudhakar<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/abstracts\/V2I3201310.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Abstract<\/strong><\/a><\/strong><br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201310.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Design of Search Engine using Vector Space Model for Personalized Search<br>Authors: R.K.Makhijani, I.N.Bharambe<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/abstracts\/V2I3201317.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Abstract<\/strong><\/a><\/strong><br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201317.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><a href=\"http:\/\/www.ijcsmc.com\/docs\/papers\/january2013\/V2I1201306.pdf\"><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Mesh Technique for Nymble Architecture Sustaining &#8211; Secrecy and Security in Anonymizing Networks<br>Authors: J.Praveen Kumar, B.Shyam Kumar<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/abstracts\/V2I3201312.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Abstract<\/strong><\/a><\/strong><br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201312.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Energy Conscious Dynamic Provisioning of Virtual Machines using Adaptive Migration Thresholds in Cloud Data Center<br>Authors: Khushbu Maurya, Richa Sinha<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/abstracts\/V2I3201319.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Abstract<\/strong><\/a><\/strong><br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201319.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Survey<br>Title: A Survey on Knowledge Based Classification of Different Routing Protocols in Delay Tolerant Networks<br>Authors: Chintan B. Desai, Vyomal N. Pandya, Prof. Sarman K. Hadia<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/abstracts\/V2I3201316.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Abstract<\/strong><\/a><\/strong><br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201316.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Grouping and Categorization of Documents in Relativity Measure<br>Authors: V. Asaithambi, D. John Aravindhar, V. Dheepa<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/abstracts\/V2I3201321.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Abstract<\/strong><\/a><\/strong><br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201321.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Signature Free Virus Blocking Method to Detect Software Code Security<br>Authors: N. Magarani, K. Devipriya, S. Madhan Kumar, T. Viknesh Kumar, K. Kumaresan<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/abstracts\/V2I3201313.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Abstract<\/strong><\/a><\/strong><br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201313.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: System Monitoring and Security Using Keylogger<br>Authors: Preeti Tuli, Priyanka Sahu<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/abstracts\/V2I3201322.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Abstract<\/strong><\/a><\/strong><br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201322.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: A Collaborative Selfish Replica with Watchdog and Pathrater in MANETS<br>Authors: D. Anitha, Dr. M.Punithavalli<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/abstracts\/V2I3201320.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Abstract<\/strong><\/a><\/strong><br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201320.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Efficient Key Generation for Multimedia and Web Applications<br>Authors: S.Swamy Reddy, V.Ramana reddy, K.Praveen kumar<br>Country: India<br><strong><a class=\"\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/abstracts\/V2I3201331.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Abstract<\/strong><\/a><\/strong><br><strong><a class=\"\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201331.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Face detection using a hybrid approach that combines HSV and RGB<br>Authors: Mrs. Sunita Roy, Prof. Samir K. Bandyopadhyay<br>Country: India<br><strong><a class=\"\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/abstracts\/V2I3201332.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Abstract<\/strong><\/a><\/strong><br><strong><a class=\"\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201332.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: Analysis of Robustness of Hybrid Digital Image Watermarking Technique under Various Attacks<br>Authors: Yashovardhan Kelkar, Heena Shaikh, Mohd.Imran Khan<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/abstracts\/V2I3201311.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Abstract<\/strong><\/a><\/strong><br><strong><a class=\"\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201311.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Type: Research<br>Title: COMPREHENSIVE STUDY OF THE APPLICATIONS OF WIRELESS SENSOR NETWORK<br>Authors: Sukhdev Singh Ghuman<br>Country: India<br><a class=\"\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/March2013\/V2I3201333.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>View PDF<\/strong><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p style=\"font-size:26px\"><strong>Contact us or submit a paper through below form:<\/strong><\/p>\n\n\n\n<div class=\"forminator-guttenberg\"><div class=\"forminator-ui forminator-custom-form forminator-custom-form-1020 forminator-design--default  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-1020\" data-uid=\"69f16a8af2b74\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-1020\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-1020 forminator-design--default  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"1020\"\n\t\t\t\tenctype=\"multipart\/form-data\" data-color-option=\"default\" data-design=\"default\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"69f16a8af2b74\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div class=\"forminator-row\"><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_69f16a8af2b74\" id=\"forminator-field-name-1_69f16a8af2b74-label\" class=\"forminator-label\">First Name <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"E.g. John\" id=\"forminator-field-name-1_69f16a8af2b74\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_69f16a8af2b74\" id=\"forminator-field-email-1_69f16a8af2b74-label\" class=\"forminator-label\">Email Address <span class=\"forminator-required\">*<\/span><\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"E.g. john@doe.com\" id=\"forminator-field-email-1_69f16a8af2b74\" class=\"forminator-input forminator-email--field\" data-required=\"true\" aria-required=\"true\" autocomplete=\"email\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"phone-1\" class=\"forminator-field-phone forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-phone-1_69f16a8af2b74\" id=\"forminator-field-phone-1_69f16a8af2b74-label\" class=\"forminator-label\">Phone Number<\/label><input type=\"text\" name=\"phone-1\" value=\"\" placeholder=\"E.g. +1 3004005000\" id=\"forminator-field-phone-1_69f16a8af2b74\" class=\"forminator-input forminator-field--phone\" data-required=\"\" aria-required=\"false\" autocomplete=\"off\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_69f16a8af2b74\" id=\"forminator-field-textarea-1_69f16a8af2b74-label\" class=\"forminator-label\">Message <span class=\"forminator-required\">*<\/span><\/label><textarea name=\"textarea-1\" placeholder=\"Enter your message...\" id=\"forminator-field-textarea-1_69f16a8af2b74\" class=\"forminator-textarea\" rows=\"6\" style=\"--forminator-textarea-min-height:140px;\" maxlength=\"180\" ><\/textarea><span id=\"forminator-field-textarea-1_69f16a8af2b74-description\" class=\"forminator-description\"><span data-limit=\"180\" data-type=\"characters\" data-editor=\"\">0 \/ 180<\/span><\/span><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"upload-1\" class=\"forminator-field-upload forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-upload-1_69f16a8af2b74\" id=\"forminator-field-upload-1_69f16a8af2b74-label\" class=\"forminator-label\">Upload file <span class=\"forminator-required\">*<\/span><\/label><div class=\"forminator-file-upload \" data-element=\"upload-1_69f16a8af2b74\"><input type=\"file\" name=\"upload-1\" id=\"forminator-field-upload-1_69f16a8af2b74\" class=\"forminator-input-file-required do-validate\" accept=\".jpg,.jpeg,.jpe,.gif,.png,.bmp,.tiff,.tif,.webp,.ico,.heic,.asf,.asx,.wmv,.wmx,.wm,.avi,.divx,.flv,.mov,.qt,.mpeg,.mpg,.mpe,.mp4,.m4v,.ogv,.webm,.mkv,.3gp,.3gpp,.3g2,.3gp2,.txt,.asc,.c,.cc,.h,.srt,.csv,.tsv,.ics,.rtx,.vtt,.mp3,.m4a,.m4b,.aac,.ra,.ram,.wav,.ogg,.oga,.flac,.mid,.midi,.wma,.wax,.mka,.rtf,.pdf,.class,.tar,.zip,.gz,.gzip,.7z,.psd,.xcf,.doc,.pot,.pps,.ppt,.wri,.xla,.xls,.xlt,.xlw,.mdb,.mpp,.docx,.docm,.dotx,.dotm,.xlsx,.xlsm,.xlsb,.xltx,.xltm,.xlam,.pptx,.pptm,.ppsx,.ppsm,.potx,.potm,.ppam,.sldx,.sldm,.onetoc,.onetoc2,.onetmp,.onepkg,.oxps,.xps,.odt,.odp,.ods,.odg,.odc,.odb,.odf,.wp,.wpd,.key,.numbers,.pages\" tabindex=\"-1\"><button id=\"forminator-field-upload-1_69f16a8af2b74_button\" class=\"forminator-button forminator-button-upload\" data-id=\"forminator-field-upload-1_69f16a8af2b74\">Choose File<\/button><span data-empty-text=\"No file chosen\">No file chosen<\/span><button class=\"forminator-button-delete\" style=\"display: none;\"><i class=\"forminator-icon-close\" aria-hidden=\"true\"><\/i><span class=\"forminator-screen-reader-only\">Delete uploaded file<\/span><\/button><\/div><\/div><\/div><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><div class=\"forminator-row forminator-row-last\"><div class=\"forminator-col\"><div class=\"forminator-field\"><button class=\"forminator-button forminator-button-submit\">Send Message<\/button><\/div><\/div><\/div><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"8d3572b1b6\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/index.php\/wp-json\/wp\/v2\/pages\/506\" \/><input type=\"hidden\" name=\"form_id\" value=\"1020\"><input type=\"hidden\" name=\"page_id\" value=\"506\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/ijcsmc.com\/index.php\/volume-2-issue-3\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><\/form><\/div>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Getting any problem in Paper Uploading?<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Please dont worry, just Submit \/ Email your paper at ijcsmc@zainpublications.com<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Type: ResearchTitle: Various Approaches for Detecting Attacks in Intrusion Detection SystemAuthors: Purva Adlakha, Prof. Priti SubramaniumCountry: IndiaAbstractView PDF Type: ResearchTitle: Quality of Service Routing Protocol for Mobile Ad hoc NetworkAuthors: D. Annapurna, K B Raja, Venugopal K R, L M PatnaikCountry: IndiaAbstractView PDF Type: ResearchTitle: Iris Recognition Using Fuzzy SystemAuthors: Prof.D.D.Patil, Prof.N.A.Nemade, K.M.AttardeCountry: IndiaAbstractView PDF [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"slim_seo":{"title":"Volume 2 Issue 3 - International Journal of Computer Science and Mobile Computing - IJCSMC","description":"Type: Research Title: Various Approaches for Detecting Attacks in Intrusion Detection System Authors: Purva Adlakha, Prof. Priti Subramanium Country: India Abst"},"footnotes":""},"class_list":["post-506","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages\/506","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/comments?post=506"}],"version-history":[{"count":2,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages\/506\/revisions"}],"predecessor-version":[{"id":1882,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages\/506\/revisions\/1882"}],"wp:attachment":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/media?parent=506"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}