{"id":905,"date":"2023-01-14T13:38:51","date_gmt":"2023-01-14T13:38:51","guid":{"rendered":"https:\/\/ijcsmc.com\/journal\/?page_id=905"},"modified":"2024-10-31T11:13:29","modified_gmt":"2024-10-31T11:13:29","slug":"volume-6-issue-5","status":"publish","type":"page","link":"https:\/\/ijcsmc.com\/index.php\/volume-6-issue-5\/","title":{"rendered":"Volume 6 Issue 5"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Continuous Authentication on Touch Devices using Behavioural Biometrics<br>Authors: Pranav Tiwari, Isha Agrawal, Leena Ahire, Arsh Khan<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201706.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Review about Off-line Handwriting Arabic Text Recognition<br>Authors: Wafa Alameen Alsanousi, Iman Siddig Adam, Mohsen Rashwan, Shrief Abdou<br>Country: Sudan \/ Egypt<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201705.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Online Examination System for MCQ&#8217;s<br>Authors: Rishish Mohan Bhatnagar<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201707.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Challenges of E-Commerce in India<br>Authors: Menal Dahiya<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201711.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Design of SRAM Cell at Low Supply Voltage Based on Schmitt Trigger<br>Authors: Nirmala, Gaurav Dhiman<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201712.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: AN OVERVIEW ON TESLACRYPT VIRUS: VIRUS VARIANT, VERSIONS, TOOLS AND REMOVAL APPROACH<br>Authors: Parvathy.K<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201714.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Banknotes detected using Image Processing Techniques<br>Authors: N.Panah, H.Masoumi<br>Country: Iran<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201710.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Review of the Character Recognition System Process and Optical Character Recognition Approach<br>Authors: Jaswinder Kaur, Mrs. Rupinder Kaur<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201713.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: ACHIEVING QUALITY IN AUTOMATION of SOFTWARE TESTING USING AI BASED TECHNIQUES<br>Authors: Neha Bhateja, Sunil Sikka<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201717.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: An Efficient Out Sourcing Computing System Using Cloud Storage<br>Authors: Shital Hemant Umale, Mahip M. Bartere<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201718.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Threats and Security Issues in TCP\/IP Layers: A Review<br>Authors: Komal<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201719.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Student Performance Analysis Using Data Mining Technique<br>Authors: Bhavesh Patel, Chetan Gondaliya<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201720.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Data Mining and Gene Expression Analysis in Bioinformatics<br>Authors: Saurabh Sindhu, Divya Sindhu<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201729.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Hardware Implementation of Cryptosystem by AES Algorithm Using FPGA<br>Authors: Prachi V. Bhalerao, Rahul D. Ghongade, Vishal B. Langote<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201731.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: A Review Paper on Implementation of a Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data<br>Authors: A.P. Jaware, N.R. Borkar<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201734.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Performance of SEP with Three Level of Heterogeneity over LEACH and SEP of WSN<br>Authors: Sameer, Saurabh Charaya<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201735.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Performance of SEP with Three Level of Heterogeneity over LEACH and SEP of WSN: A Review<br>Authors: Sameer, Saurabh Charaya<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201736.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Electricity Monitoring and Interference Reduction of Two-Wire Household Appliances Using Current and Voltage Sensor Tag<br>Authors: Vrushali S. Ajankar, P. N. Pusdekar<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201737.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: An Efficient Technique for Night Time Vehicle Detection with Fusion Based Image Enhancement<br>Authors: Sabnam.K, Jebakumari.M<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201723.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: AN EFFICIENT ANDROID AIDED FREE FALL DETECTION AND RESCUE SYSTEM<br>Authors: Rini KP, R.Gowthamani, L.Nithya<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201724.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: ENHANCING PERFORMANCE OF VIDEO BASED VEHICLE DETECTION TECHNOLOGY USING EDGE DETECTION MECHANISM<br>Authors: Jyoti, Rupali Malhotra<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201742.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: REVIEW PAPER ON TO PERFORM PREDICATIONS USING DATA MINING &amp; SESSION IDENTIFICATION<br>Authors: Mr. Pratik K.Hutke, Mr. A.P.Rudey<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201745.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Review: Routing Protocols and Optimization Algorithms in MANET<br>Authors: Harshpreet Kaur, Sukhjeet Kaur<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201748.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Trust Based Shortest Path Routing Algorithm to Enhance Security in WSN<br>Authors: Sunny Kumar, Dr. Anuj Sharma<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201752.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: A Review on Various Routing Algorithm in WSN<br>Authors: Sunny Kumar, Dr. Anuj Sharma<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201753.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: An Effective Approach to Detect Malware that Exploit Information Hiding using Artificial Intelligence in Android Devices<br>Authors: Aswini S, D.Palanikkumar, T.Palani Raja<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201722.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Data Mining Clustering Techniques &#8211; A Review<br>Authors: Shivangi Bhardwaj<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201750.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: IMPLEMENTATION ON SOLVE BROKEN LINK PROBLEM IN WIRELESS SENSOR NETWORK<br>Authors: Sonia, Rupali Malhotra<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201756.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: A Survey on Dynamic Analysis of Elevated Water Tank for Different Staging Configuration<br>Authors: Aliakbar Qutubuddin Ali, Deepa P. Telang<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201759.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Review on Seismic Analysis of Elevated Water Tank with Variations of H\/D Ratio and Container Shape<br>Authors: Mayank Gopal Manwani, Deepa P. Telang<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201760.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Seismic Analysis of Elevated Water Tank with Variations of H\/D Ratio and Container Shape<br>Authors: Shriram Nagorao Bengal, Sandip A. Tupat<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201761.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Development of Knowledge Based Expert System for Indian Legal Domain with Specific Reference to Consumer Protection Act<br>Authors: Goldi Soni, Jyoti Singh<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201728.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Detection and Recovery of Faulty Nodes Using Clustering Optimization and Bayesian Analysis in Wireless Sensor Networks<br>Authors: Beena.T, Biju Balakrishnan<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201743.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: AN OVERVIEW OF NETWORK SECURITY- ITS TYPES AND TECHNIQUES<br>Authors: NISHU SETHI<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201751.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Secure Key Distribution and Deduplication of Data<br>Authors: Prof. Dolly Chandani, Pooja Kumbhar, Bhagyashree Mahajan, Poonam Dambare, Pratiksha Ladkat<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201754.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Presentation Layer Work Based On Cloud<br>Authors: P.SURESH<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201757.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Review on Brand Related Sentiment Analysis in Commercial Field<br>Authors: Digamber Shelke, Pooja Tayade, Shaikh Shafi, Avinash Surnar<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201764.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: A Review Paper on Attribute-Based Encryption Scheme in Cloud Computing<br>Authors: Sphurti Atram, N. R. Borkar<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201741.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Impact of Social Media Usage by Employees on Banking Information Security in Developing Economies<br>Authors: Abel Yeboah-ofori, Marian Owusua Aduamoah<br>Country: Ghana<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201765.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: EMPLOYMENT ORIENTED TOURISM PORTAL<br>Authors: Geeta Gupta, Bablu Kumar, Sandhya Upadhyay, Rishabh Mishra<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201766.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Scaling Based Active Contour Model in Grayscale Images<br>Authors: Zafer Guler, Ahmet Cinar<br>Country: Turkey<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201767.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Student Academic Performance Prediction using Machine Learning and Data Mining Techniques<br>Authors: Chandini Lulla, Yash Agarwal, Snehal Kankariya, Prateek Sakaray, Pankaja Alappanavar<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201771.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Detail and Comparative Study on Various Segmentation Techniques<br>Authors: Sneha Kumari<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201774.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Soft-Biometric in Recognition of New Born?<br>Authors: Rehan Akhtar, Junaid Siddiqui, Deepak Sharma, Mr. Rishab Mishra<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201776.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: EFFECTIVE PREDICTION OF ELECTRICITY CONSUMPTION BASED ON EFFICIENT ANALYSIS OF HOUSEHOLD CHARACTERISTICS<br>Authors: Ms. Vaishali S. Sharma, Mrs. Rajni N. Pamnani<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201777.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: A Review on Fuzzy Rule-Base Expert System Assessment Possibility of Allergy<br>Authors: Kirandeep Kaur, Prabhsharan Kaur<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201739.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: VIDEO CAMERA FEATURE EXTRACTION USING SENSOR PATTERN NOISE ON GRAY SCALE IMAGES<br>Authors: Jagbeer Kaur, Deep Kamal Kaur Randhawa<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201781.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: The Bayesian Belief Network for Inference<br>Authors: Harshad M. Kubadet, Pallavi M. Chaudhari, Archana V. Potnurwar, Nischal S. Puri<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201730.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: FAULT-TOLERANCE ROUTING IN 3-D NETWORK ON CHIP<br>Authors: SARITA SINGH<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201716.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: TCP Window Based End-to-End Mechanisms<br>Authors: Dr. Elsadig Gamaleldeen Elsadig<br>Country: Sudan<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201749.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: An Assessment of the Level of Information Security Awareness among Online Banking Users in Nigeria<br>Authors: Dr. Amit Mishra, Ayesha. Awal, Joseph Elijah, I. Rabiu<br>Country: Nigeria<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201769.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: A Secure Algorithm of Encryption and Decryption for Text Transmission<br>Authors: H M Tiwari, Vinay Kumar Patel<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201775.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Transmitter Buffering and Avoiding Packet Dropping in Wireless Network<br>Authors: Prasath.K, V.Devi<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201783.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Collision Avoidance of Vehicle System Using CAN Protocol<br>Authors: Pradeep Kasle, Mr. P. T. Sasidharan<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201785.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: PREDICTION OF MU STUDENT&#8217;S PERFORMANCE USING DATA MINING TECHNIQUE<br>Authors: HEMANT SHARMA, SHIV KUMAR<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201740.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Efficient Approach to Enhance the Mobility Schemes with Node Clone Detection for Maximizing Network Lifetime of Wireless Network<br>Authors: Neha Sen<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201746.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Security Architecture against Denial of Service Attacks in Wireless Mesh Network<br>Authors: Swati Singla, Deepika Dhingra<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201758.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: ICT ENTREPRENEURSHIP DEVELOPMENT FOR POVERTY ALLEVIATION IN NIGERIA: A LOOK AT THE TIMING OF CISCO IT ESSENTIALS EXAMINATION<br>Authors: Okon, E.O, Yusuf, M.S, Joshua B. Agbogun, Ogba,Paul O<br>Country: Nigeria<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201782.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: Vintage Prediction in Arachis Hypogaea using Fuzzy Cognitive Map and Multi Objective Firefly Approach<br>Authors: K.P.MALARKODI, Dr. K.Arthi<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201773.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: A Hybrid Bayesian Approach with ABC to Recognition of Email SPAM<br>Authors: Shashi Kant Rathore, Dr. Surendra Yadav<br>Country: India<br><strong><a href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201780.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Title: A METHOD TO DETECT PACKET DROP ATTACK IN MANET<br>Authors: Vinod Bhupathi, P Buddha Reddy, G Srikanth Reddy<br>Country: India<br><strong><a class=\"\" href=\"https:\/\/ijcsmc.com\/docs\/papers\/May2017\/V6I5201786.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">View\/Download-PDF<\/a><br><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p style=\"font-size:26px\"><strong>Contact us or submit a paper through below form:<\/strong><\/p>\n\n\n\n<div class=\"forminator-guttenberg\"><div class=\"forminator-ui forminator-custom-form forminator-custom-form-1020 forminator-design--default  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-1020\" data-uid=\"69e1817261a22\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-1020\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-1020 forminator-design--default  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"1020\"\n\t\t\t\tenctype=\"multipart\/form-data\" data-color-option=\"default\" data-design=\"default\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"69e1817261a22\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div class=\"forminator-row\"><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_69e1817261a22\" id=\"forminator-field-name-1_69e1817261a22-label\" class=\"forminator-label\">First Name <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"E.g. John\" id=\"forminator-field-name-1_69e1817261a22\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_69e1817261a22\" id=\"forminator-field-email-1_69e1817261a22-label\" class=\"forminator-label\">Email Address <span class=\"forminator-required\">*<\/span><\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"E.g. john@doe.com\" id=\"forminator-field-email-1_69e1817261a22\" class=\"forminator-input forminator-email--field\" data-required=\"true\" aria-required=\"true\" autocomplete=\"email\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"phone-1\" class=\"forminator-field-phone forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-phone-1_69e1817261a22\" id=\"forminator-field-phone-1_69e1817261a22-label\" class=\"forminator-label\">Phone Number<\/label><input type=\"text\" name=\"phone-1\" value=\"\" placeholder=\"E.g. +1 3004005000\" id=\"forminator-field-phone-1_69e1817261a22\" class=\"forminator-input forminator-field--phone\" data-required=\"\" aria-required=\"false\" autocomplete=\"off\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_69e1817261a22\" id=\"forminator-field-textarea-1_69e1817261a22-label\" class=\"forminator-label\">Message <span class=\"forminator-required\">*<\/span><\/label><textarea name=\"textarea-1\" placeholder=\"Enter your message...\" id=\"forminator-field-textarea-1_69e1817261a22\" class=\"forminator-textarea\" rows=\"6\" style=\"min-height:140px;\" maxlength=\"180\" ><\/textarea><span id=\"forminator-field-textarea-1_69e1817261a22-description\" class=\"forminator-description\"><span data-limit=\"180\" data-type=\"characters\" data-editor=\"\">0 \/ 180<\/span><\/span><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"upload-1\" class=\"forminator-field-upload forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-upload-1_69e1817261a22\" id=\"forminator-field-upload-1_69e1817261a22-label\" class=\"forminator-label\">Upload file <span class=\"forminator-required\">*<\/span><\/label><div class=\"forminator-file-upload \" data-element=\"upload-1_69e1817261a22\"><input type=\"file\" name=\"upload-1\" id=\"forminator-field-upload-1_69e1817261a22\" class=\"forminator-input-file-required do-validate\" accept=\".jpg,.jpeg,.jpe,.gif,.png,.bmp,.tiff,.tif,.webp,.ico,.heic,.asf,.asx,.wmv,.wmx,.wm,.avi,.divx,.flv,.mov,.qt,.mpeg,.mpg,.mpe,.mp4,.m4v,.ogv,.webm,.mkv,.3gp,.3gpp,.3g2,.3gp2,.txt,.asc,.c,.cc,.h,.srt,.csv,.tsv,.ics,.rtx,.vtt,.mp3,.m4a,.m4b,.aac,.ra,.ram,.wav,.ogg,.oga,.flac,.mid,.midi,.wma,.wax,.mka,.rtf,.pdf,.class,.tar,.zip,.gz,.gzip,.7z,.psd,.xcf,.doc,.pot,.pps,.ppt,.wri,.xla,.xls,.xlt,.xlw,.mdb,.mpp,.docx,.docm,.dotx,.dotm,.xlsx,.xlsm,.xlsb,.xltx,.xltm,.xlam,.pptx,.pptm,.ppsx,.ppsm,.potx,.potm,.ppam,.sldx,.sldm,.onetoc,.onetoc2,.onetmp,.onepkg,.oxps,.xps,.odt,.odp,.ods,.odg,.odc,.odb,.odf,.wp,.wpd,.key,.numbers,.pages\" tabindex=\"-1\"><button id=\"forminator-field-upload-1_69e1817261a22_button\" class=\"forminator-button forminator-button-upload\" data-id=\"forminator-field-upload-1_69e1817261a22\">Choose File<\/button><span data-empty-text=\"No file chosen\">No file chosen<\/span><button class=\"forminator-button-delete\" style=\"display: none;\"><i class=\"forminator-icon-close\" aria-hidden=\"true\"><\/i><span class=\"forminator-screen-reader-only\">Delete uploaded file<\/span><\/button><\/div><\/div><\/div><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><div class=\"forminator-row forminator-row-last\"><div class=\"forminator-col\"><div class=\"forminator-field\"><button class=\"forminator-button forminator-button-submit\">Send Message<\/button><\/div><\/div><\/div><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"10bd2b7166\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/index.php\/wp-json\/wp\/v2\/pages\/905\" \/><input type=\"hidden\" name=\"form_id\" value=\"1020\"><input type=\"hidden\" name=\"page_id\" value=\"905\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/ijcsmc.com\/index.php\/volume-6-issue-5\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><\/form><\/div>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Getting any problem in Paper Uploading?<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Please dont worry, just Submit \/ Email your paper at ijcsmc@zainpublications.com<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Title: Continuous Authentication on Touch Devices using Behavioural BiometricsAuthors: Pranav Tiwari, Isha Agrawal, Leena Ahire, Arsh KhanCountry: IndiaView\/Download-PDF Title: Review about Off-line Handwriting Arabic Text RecognitionAuthors: Wafa Alameen Alsanousi, Iman Siddig Adam, Mohsen Rashwan, Shrief AbdouCountry: Sudan \/ EgyptView\/Download-PDF Title: Online Examination System for MCQ&#8217;sAuthors: Rishish Mohan BhatnagarCountry: IndiaView\/Download-PDF Title: Challenges of E-Commerce in IndiaAuthors: [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"slim_seo":{"title":"Computer Science Paper Publication | Ghana | Nigeria","description":"Fast Publishing SCI Journal in Computer Science with High Impact Factor and Less Fee."},"footnotes":""},"class_list":["post-905","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages\/905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/comments?post=905"}],"version-history":[{"count":2,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages\/905\/revisions"}],"predecessor-version":[{"id":1899,"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/pages\/905\/revisions\/1899"}],"wp:attachment":[{"href":"https:\/\/ijcsmc.com\/index.php\/wp-json\/wp\/v2\/media?parent=905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}