{"id":766,"date":"2023-01-10T13:37:32","date_gmt":"2023-01-10T13:37:32","guid":{"rendered":"https:\/\/ijcsmc.com\/journal\/?page_id=766"},"modified":"2024-10-31T11:18:41","modified_gmt":"2024-10-31T11:18:41","slug":"volume-8-issue-5","status":"publish","type":"page","link":"https:\/\/ijcsmc.com\/index.php\/volume-8-issue-5\/","title":{"rendered":"Volume 8 Issue 5"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Analysis of Iris Detection Technique in Image Processing<br>Authors: Mr. Ankur Sharma; Mr. Anurag Rana; Gagandeep Kaur<br>Country: India<br><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201904.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Analysis of Various Credit Card Fraud Detection Techniques<br>Authors: Geetika; Dr. Gaurav Gupta<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201902.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Prediction Analysis Techniques of Data Mining: A Review<br>Authors: Himani Rani; Dr. Gaurav Gupta<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201903.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: A Review Paper on Cloud Computing &amp; Security Issue<br>Authors: Manisha Thakur; Dr. Neeru Bhardwaj<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201906.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: ANALYSIS OF TECHNIQUES USED TO DISCOVER PATTERNS FROM DATASET FOR DISEASE PREDICTION<br>Authors: Mr. Anurag Rana; Mr. Ankur Sharma; Disha Pathania<br>Country: India<br><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201908.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Investigation of ANN Used to Solve MLR Problem<br>Authors: Prof. Ziad A. AlQadi; Eng. Ahmad S. AlOthman; Eng. Mahmoud O. Alleddawi; Eng. Mohammad Ali Al-Hiary; Eng. Osama T. Ghazal; Eng. Sameh S. Salman<br>Country: Jordan<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201907.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: A Review Paper on Analysis of Security Techniques of VANET<br>Authors: Aaditya Barak; Vikas Sindhu<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201911.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: REQUIREMENT OF SECURITY FOR FOG BASED CLOUD ENVIRONMENT: A REVIEW<br>Authors: Manesh; Renu Malik<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201916.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Service Selection by Predicting Website Attender by Using Astrology<br>Authors: Dr. Amir Reza Shahbazkia<br>Country: Cyprus<br><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201917.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Service Selection (Negotiating Users to Our Goal) by Predicting Users&#8217; Psychological Manner (Iridology); Computer Position Next to Users<br>Authors: Dr. Amir Reza Shahbazkia<br>Country: Cyprus<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201918.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Hypnotization by Online Internet Games<br>Authors: Dr. Amir Reza Shahbazkia<br>Country: Cyprus<br><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201919.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Analysis of Energy Efficient Techniques for Wireless Sensor Networks<br>Authors: Chirag Malik; Vikas Sindhu<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201910.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: A Survey on Technique Used for Deblurring Licence Plate of Fast Moving Vehicles Using Sparse Representation<br>Authors: Anusha G K; Rashmi M; Shobha Chandra K<br>Country: India<br><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201912.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Development of Verification Environment for I2C Controller Using System Verilog and UVM<br>Authors: Mohamed Azheruddin; Anand M J<br>Country: India<br><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201921.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Recognition of Human Facial Expression using Machine Learning Algorithm<br>Authors: Lamia Zuha A; Anand M J<br>Country: India<br><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201922.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: PREDICTING THE PRESENCE OF HEART DISEASE USING MACHINE LEARNING<br>Authors: Akshay Jayraj Suvarna; Arvind Kumar M; Ajay Billav; Muthamma K M; Asst. Prof. Gadug Sudhamsu<br>Country: India<br><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201927.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: DIABETIC RETINOPATHY DETECTION USING DEEP NEURAL NETWORK<br>Authors: Akhila T; Ambarish A; Unnikrishnan S Kumar<br>Country: India<br><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201929.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: SMS SECURITY SYSTEM USING ENCRYPTION TECHNIQUES<br>Authors: Jitha P V; Unnikrishnan S Kumar<br>Country: India<br><strong><a class=\"\" rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201923.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: SMART AGRICULTURE USING IOT<br>Authors: Sweksha Goyal; Unnathi Mundra; Prof. Sahana Shetty<br>Country: India<br><strong><a class=\"\" rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201909.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: NEW GENERATION SMART CARD<br>Authors: Jeet Thakar; Rishabh Jain; Prof. Manjunath CR<br>Country: India<br><strong><a class=\"\" rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201926.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Comparative Analysis of Detection of DDOS Attack in WSN<br>Authors: Ankur Sharma; Anurag Rana; Gourav Tandon<br>Country: India<br><strong><a class=\"\" rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201930.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: IMPLEMENTATION OF AES CODE AND SPLITTER TO SECURE THE FOG BASED CLOUD ENVIRONMENT<br>Authors: Manesh; Renu Malik<br>Country: India<br><strong><a class=\"\" rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201932.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Analysis of MRI Image De-noising Technique<br>Authors: Pinkal Jain; Aabhas Mathur; Hemant Dhabhai<br>Country: India<br><strong><a class=\"\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201934.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: COMPARATIVE ANALYSIS BETWEEN FIRST-COME-FIRST-SERVE (FCFS) AND SHORTEST-JOB-FIRST (SJF) SCHEDULING ALGORITHMS<br>Authors: Gideon Dadik Bibu; Gloria Chizoba Nwankwo<br>Country: Nigeria<br><strong><a class=\"\" rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201935.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: REVIEW ANALYSIS ON IMPORTANCE OF SWARM INTELLIGENCE AND ROBOTICS<br>Authors: GOPI BATTINENI; NALINI CHINTALAPUDI; GETUGAMO SAGARO; FRANCESCO AMENTA<br>Country: Italy \/ India<br><strong><a class=\"\" rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201936.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Analysis of Sybil Attack Isolation Technique in VANET<br>Authors: Sudha;Mr. Kamal Kumar; Dr. Rahul Malhotra<br>Country: India<br><strong><a class=\"\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201937.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: CONTEXT BASED SENTIMENT ANALYSIS OF TWITTER USING HADOOP FRAMEWORK<br>Authors: Tarun R R; Sahana J S; Sadvik B S; Shashank S; Prof. Mahesh T R<br>Country: India<br><strong><a class=\"\" rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201941.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: A Novel Protocol for Two-Tiered Sensor Networks for Preserving Privacy and Integrity<br>Authors: Archana N; Megha J<br>Country: India<br><strong><a class=\"\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201942.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: A MOBILE BASED MEDICAL APPOINTMENT AND CONSULTATION (MMAC) SYSTEM<br>Authors: AJAYI, Olusola Olajide; AKINRUJOMU, Oluwatobiloba Samuel; DASO, Olugbenga Samuel; AKINNIYI Olufunmilayo Paulina<br>Country: Nigeria<br><strong><a class=\"\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201938.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Implementing a Mobile Cloud Computing Framework with an Optimized Computational Offloading Algorithm<br>Authors: Raji, Babatunde O.; Ajayi, Olusola O.<br>Country: Nigeria<br><strong><a class=\"\" rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201939.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Analysis of Density Based Clustering Techniques in Data Mining<br>Authors: Anjali Soni; Gaurav Kumar Srivastav<br>Country: India<br><strong><a class=\"\" rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201940.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Detection and Prevention of Black-Hole Attack in MANETS<br>Authors: Richa Sheokand; Meenakshi Gupta<br>Country: India<br><strong><a class=\"\" rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201901.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Big Data Prediction Framework for Weather Temperature Based on Map-Reduce Algorithm<br>Authors: Abhishek Kumar; Savita Shivani<br>Country: India<br><strong><a class=\"\" rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201928.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: ESP32 Based Data Logger<br>Authors: Ibrahim Al Abbas<br>Country: Jordan<br><strong><a class=\"\" rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201943.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Robust Image Watermarking Algorithm DWT-SVD-AES for Telemedicine Application<br>Authors: Nancy Kumari; Dr. S.P.S. Chauhan<br>Country: India<br><strong><a class=\"\" rel=\"noreferrer noopener\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2019\/V8I5201931.pdf\" target=\"_blank\">View\/Download-PDF<\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p style=\"font-size:26px\"><strong>Contact us or submit a paper through below form:<\/strong><\/p>\n\n\n\n<div class=\"forminator-guttenberg\"><div class=\"forminator-ui forminator-custom-form forminator-custom-form-1020 forminator-design--default  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-1020\" data-uid=\"69f350fc9a7b8\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-1020\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-1020 forminator-design--default  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"1020\"\n\t\t\t\tenctype=\"multipart\/form-data\" data-color-option=\"default\" data-design=\"default\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"69f350fc9a7b8\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div class=\"forminator-row\"><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_69f350fc9a7b8\" id=\"forminator-field-name-1_69f350fc9a7b8-label\" class=\"forminator-label\">First Name <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"E.g. John\" id=\"forminator-field-name-1_69f350fc9a7b8\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_69f350fc9a7b8\" id=\"forminator-field-email-1_69f350fc9a7b8-label\" class=\"forminator-label\">Email Address <span class=\"forminator-required\">*<\/span><\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"E.g. john@doe.com\" id=\"forminator-field-email-1_69f350fc9a7b8\" class=\"forminator-input forminator-email--field\" data-required=\"true\" aria-required=\"true\" autocomplete=\"email\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"phone-1\" class=\"forminator-field-phone forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-phone-1_69f350fc9a7b8\" id=\"forminator-field-phone-1_69f350fc9a7b8-label\" class=\"forminator-label\">Phone Number<\/label><input type=\"text\" name=\"phone-1\" value=\"\" placeholder=\"E.g. +1 3004005000\" id=\"forminator-field-phone-1_69f350fc9a7b8\" class=\"forminator-input forminator-field--phone\" data-required=\"\" aria-required=\"false\" autocomplete=\"off\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_69f350fc9a7b8\" id=\"forminator-field-textarea-1_69f350fc9a7b8-label\" class=\"forminator-label\">Message <span class=\"forminator-required\">*<\/span><\/label><textarea name=\"textarea-1\" placeholder=\"Enter your message...\" id=\"forminator-field-textarea-1_69f350fc9a7b8\" class=\"forminator-textarea\" rows=\"6\" style=\"--forminator-textarea-min-height:140px;\" maxlength=\"180\" ><\/textarea><span id=\"forminator-field-textarea-1_69f350fc9a7b8-description\" class=\"forminator-description\"><span data-limit=\"180\" data-type=\"characters\" data-editor=\"\">0 \/ 180<\/span><\/span><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"upload-1\" class=\"forminator-field-upload forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-upload-1_69f350fc9a7b8\" id=\"forminator-field-upload-1_69f350fc9a7b8-label\" class=\"forminator-label\">Upload file <span class=\"forminator-required\">*<\/span><\/label><div class=\"forminator-file-upload \" data-element=\"upload-1_69f350fc9a7b8\"><input type=\"file\" name=\"upload-1\" id=\"forminator-field-upload-1_69f350fc9a7b8\" class=\"forminator-input-file-required do-validate\" accept=\".jpg,.jpeg,.jpe,.gif,.png,.bmp,.tiff,.tif,.webp,.ico,.heic,.asf,.asx,.wmv,.wmx,.wm,.avi,.divx,.flv,.mov,.qt,.mpeg,.mpg,.mpe,.mp4,.m4v,.ogv,.webm,.mkv,.3gp,.3gpp,.3g2,.3gp2,.txt,.asc,.c,.cc,.h,.srt,.csv,.tsv,.ics,.rtx,.vtt,.mp3,.m4a,.m4b,.aac,.ra,.ram,.wav,.ogg,.oga,.flac,.mid,.midi,.wma,.wax,.mka,.rtf,.pdf,.class,.tar,.zip,.gz,.gzip,.7z,.psd,.xcf,.doc,.pot,.pps,.ppt,.wri,.xla,.xls,.xlt,.xlw,.mdb,.mpp,.docx,.docm,.dotx,.dotm,.xlsx,.xlsm,.xlsb,.xltx,.xltm,.xlam,.pptx,.pptm,.ppsx,.ppsm,.potx,.potm,.ppam,.sldx,.sldm,.onetoc,.onetoc2,.onetmp,.onepkg,.oxps,.xps,.odt,.odp,.ods,.odg,.odc,.odb,.odf,.wp,.wpd,.key,.numbers,.pages\" tabindex=\"-1\"><button id=\"forminator-field-upload-1_69f350fc9a7b8_button\" class=\"forminator-button forminator-button-upload\" data-id=\"forminator-field-upload-1_69f350fc9a7b8\">Choose File<\/button><span data-empty-text=\"No file chosen\">No file chosen<\/span><button class=\"forminator-button-delete\" style=\"display: none;\"><i class=\"forminator-icon-close\" aria-hidden=\"true\"><\/i><span class=\"forminator-screen-reader-only\">Delete uploaded file<\/span><\/button><\/div><\/div><\/div><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><div class=\"forminator-row forminator-row-last\"><div class=\"forminator-col\"><div class=\"forminator-field\"><button class=\"forminator-button forminator-button-submit\">Send Message<\/button><\/div><\/div><\/div><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"86ebda6432\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/index.php\/wp-json\/wp\/v2\/pages\/766\" \/><input type=\"hidden\" name=\"form_id\" value=\"1020\"><input type=\"hidden\" name=\"page_id\" value=\"766\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/ijcsmc.com\/index.php\/volume-8-issue-5\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><\/form><\/div>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Getting any problem in Paper Uploading?<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Please dont worry, just Submit \/ Email your paper at ijcsmc@zainpublications.com<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Title: Analysis of Iris Detection Technique in Image ProcessingAuthors: Mr. Ankur Sharma; Mr. Anurag Rana; Gagandeep KaurCountry: IndiaView\/Download-PDF Title: Analysis of Various Credit Card Fraud Detection TechniquesAuthors: Geetika; Dr. Gaurav GuptaCountry: IndiaView\/Download-PDF Title: Prediction Analysis Techniques of Data Mining: A ReviewAuthors: Himani Rani; Dr. Gaurav GuptaCountry: IndiaView\/Download-PDF Title: A Review Paper on Cloud Computing &amp; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"slim_seo":{"title":"Computer Science Paper Publication | Jordan | Cyprus","description":"Best Computer Science Journal for Paper Publication in the field of Computer Science, Mathematics, Artificial Intelligence, Information Technology."},"footnotes":""},"class_list":["post-766","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages\/766","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/comments?post=766"}],"version-history":[{"count":2,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages\/766\/revisions"}],"predecessor-version":[{"id":1926,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages\/766\/revisions\/1926"}],"wp:attachment":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/media?parent=766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}