The first image in a slideshow demo.
Announcements
ijmcs  IJMCS

Volume-5 & Issue-6 Published (Acceptance Ratio=42.85%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-5 Published (Acceptance Ratio=27.27%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-4 Published (Acceptance Ratio=47.36%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-3 Published (Acceptance Ratio=38.88%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-2 Published (Acceptance Ratio=25%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Submit your Paper Last date 20th June 2017 http://www.ijmcs.info/submit_your_paper

ijmcs  IJMCS

Submit your paper @ Free of Cost http://www.ijmcs.info/publication_fee...

ijmcs  IJMCS

Volume-5 & Issue-1 Published (Acceptance Ratio=28.94%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-5 Published (Acceptance Ratio=41.42%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-4 Published (Acceptance Ratio=54.02%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-3 Published (Acceptance Ratio=48.05%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-2 Published (Acceptance Ratio=44%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-1 Published (Acceptance Ratio=50%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-3 & Issue-2 Published (Acceptance Ratio=34%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Submit your Paper Last date 10th October 2015 http://www.ijmcs.info/submit_your_paper

ijmcs  IJMCS

Volume-2 & Issue-6 Published (Acceptance Ratio=69.56%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS October

Volume-2 & Issue-5 Published (Acceptance Ratio=45.94%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS 15 August

Upcoming Isuue: Volume-2 & Issue-6 http://www.ijmcs.info/next_issue

ijmcs  IJMCS

Volume-2 & Issue-4 Published (Acceptance Ratio=25%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS

National Conference on (Advances in Modern Computing and Application Trends) Organised By Acharya Institute of Technology Bangalore, India

  • For More Detail Click Here
  • http://www.acharya.ac.in/Techman_2014.pdf

    Volume-5 Issue-6(December 2017)
    Title: Client Prioritizing and Load Balancing Of a Server
    Authors: M.Indhumathi and Dr. K.Nandhini
    Abstract: In a rapid development of internet usage increases in day by day. In more than one client will be accessed at a time, there will be collision will be occurs at the time. Instead of these problem is control by the Priority. Priority means those client will be approach the server in first, they establish the connection without any fail. Priority network load balancing offers technology, processes, instant expertise, and support to small and midsized organization. Prioritization control is the major role in the Round Robin scheduling algorithm. The Priority Network Load Balancing used the Round Robin Scheduling Algorithm for assigning the time slices the client request. The arrival time and the execution time are calculated by each and every nodes connection is established.
    Click Here to Download Pdf
    Title: Modification of Block Match Three Dimension Algorithm for De-Noising Spatial Domain Optical Coherence Tomography Images
    Authors: Kamalakshi N and Dr. M N Shanmukha Swamy
    Abstract: The diagnosis in an medical image plays a vital role highlighting on operations as image restoration, feature extraction and object recognition. These operations may become hectic if the images are contaminated with noises. So devising an efficient algorithm for noise removal is an important and challenging research area in these days even with abundant existing de-noising algorithm. Developing Image de-noising algorithms is a cumbersome task since crucial details in a medical image embedding diagnostic information should not be eradicated while removing the noise. This paper proposes a modified de-noising approach for retinal Optical Tomography Images by incorporating un-decimated Wavelet Transform to the existing block matching three dimension algorithm, which that its uses in The results proves that the de-noised image using modified BM3D(Block Matching three dimension) have a improved PSNR and visual quality as compared to the state of art BM3D algorithm which in turns will help the doctors to diagnosis the disease better.
    Click Here to Download Pdf
    Title: Comparative Study on Web Based Software Project Management Tools
    Authors: Jayakumar Sadhasivam
    Abstract: Nowadays people become more depended on technology for their business, project operations and management activities but project managers have to become more professional for deliver quality projects. Today project management system is fast growing technique in information technology. To expand productivity of project, many web developers find different kind of project management system but they needed one system which can fulfill the entire task in very convenient way. A web based project management system is developed to make operation easier and hassle free. Because of this system project developer and other team members and customer can communicate and share their opinion on whole process also they can track resources and components of project and they can be in touch with entire progress of project from development to completion phase. The web based project management system has integrated functionality to increase reliability and efficiency of project. With the help of this technique the project developers can complete their task in higher productivity and they can develop a quality project to satisfy their customer’s needs. This functionality also helps the user to handle project in proper manner. It’s always necessary to complete project and hand over it to customer in given time so now with the help of web based project management system project manager can complete and deliver project on scheduled time period. It’s also benefited company’s value because companies can do many projects in short time period.
    Click Here to Download Pdf
    Title: Detection of Leaf Disease Using Image Processing Techniques
    Authors: Sreesha Govind
    Abstract: Plant disease can be indicated by a change in the plant’s appearance relative to a healthy plant of the same age and variety. It cause periodic outbreak of diseases which leads to large scale death and famine. It is hard for the cultivators to observe each and every plant in the cultivation area to detect diseases that occur to the plant. So, for detecting the growth of a disease at an early stage, determining the type of the disease the leaf is infected with and suggesting necessary actions, there has been developed many image processing approaches in recent years to serve the purpose of an observer. This paper is aimed to give an overview of most of the research work that has been done in the field of image Processing and classifiers such as support vector machine and artificial neural network for the purpose of detection and diagnosis of disease in a plant leaf by capturing its image.
    Click Here to Download Pdf
    Title: Design for Data Security in Multicloud Using AES-256 Encryption Algorithm and File Splitting Technique
    Authors: Ms. Rashmi S. Ghavghave
    Abstract: As the data storage is the main service provided by cloud computing, there are security issues regarding to the data storage in cloud. For security of data storage in multicloud, new system architecture is designed which uses two mechanisms-data encryption and file splitting. For security purpose, AES symmetric encryption algorithm with key size 256 is used to encrypt data as it is strong and fast than other symmetric encryption algorithms.
    Click Here to Download Pdf
    Title: Malicious Node Detection in Multi Hop Wireless Mesh Networks through Protocol Profile Enhancement
    Authors: Boopathy.P
    Abstract: Network security need to covers such issues as network communication privacy, information confidentiality and integrity over network, controlled access to restricted network domains and sensitive information. It is important for intrusion detection to be highly efficient, if network speeds and detection workloads are increase. But Current security approaches may not be effective to various attacks in a specific protocol layer. However, there still exists a need for a comprehensive mechanism to prevent or counter attacks in all protocol layers. The main challenge in intrusion detection area of research is to discover new protection techniques that can be applied to existing routing protocols, without forfeiting connectivity, coverage or scalability. The primary objective of the proposed work is to develop a theoretical basis for show and enhancing the performance of protocol intrusion detection systems using advances of protocol profile fusion with easily available intrusion detection systems and evaluates the strategies to build reliable and secure communication in multihop mesh networks.
    Click Here to Download Pdf
    Title: Study of issues and challenges of data aggregation in wireless sensor network
    Authors: Dr. Nagendra Nath Giri and Mrs Sumati Behera
    Abstract: In The large-scale deployment of wireless sensor, Data should be aggregated in wireless sensor networks (WSN) to reserve energy and to avoid burst traffic in network. The regular sensor node generates data, based on its sensing mechanism, observation and then transmit sensed data packet to the base station (sink). Here the data can be transmitted directly to the base station located far away from the sensor nodes but requires more energy, hence it is better to transmit data by few nodes by collecting the data locally from neighboring nodes. These few nodes that collect and process data and later sent to base station are called aggregator nodes and the process is called aggregation and data dissemination in wireless sensor networks.
    Click Here to Download Pdf
    Title: Design and Implementation of a Framework for Travel Package Recommendations
    Authors: A.Sivva Kumar and P. Anjaneya Reddy
    Abstract: Travel package recommendations are very important research area as the recommendations can help travellers to make well informed decisions. The rationale behind this is that travel packages that are suitable for particular trip or travel can provide many benefits to travellers. In the recent past, tourism became an important source of income to many public and private sectors. Therefore, governments are taking special interest on providing tourism facilities. Travel package refers to a collection of facilities and pricing that caters to the needs of travellers. In this paper we proposed a framework that takes care of travel package recommendations. It takes history of tours of a given tourist and provides travel package recommendations automatically. The travel package recommendations are the outcome of the framework. Towards this end, it performs various operations like neighbourhood selection, collaborative pricing, price distributions, collaborative filtering and travel package analysis. Then it generates travel package recommendations. We built a prototype application that demonstrates proof of the concept. The experimental results revealed that the proposed framework is useful in rendering travel package recommendations.
    Click Here to Download Pdf
    Title: LiFi: A New Era of Wireless Visible Light Communication
    Authors: Prakash Tripathi
    Abstract: LiFi stands for Light Fidelity. Light Fidelity is an emerging technology that uses light as a medium to transmit the data. In current era wireless communication become the part of human life. All devices like mobiles, vehicles etc uses wireless communication to sending data/messages to one another. Light Fidelity refers to Visible Light Communication (VLC) technology which uses light as a transmission medium to deliver data with high speed. This technology uses light as a source so it is also called “Data through Illumination”. Light Fidelity– IEEE 802.15.7 Standard is high-speed, bidirectional, fully networked wireless communications technology. LiFi was proposed by the German Physicist “Harald Haas” in 2011 TED (Technology, Entertainment, Design) Global Talk on Visible Light Communication (VLC). In this paper we have discuss the architecture of lifi, working of lifi, comparative study between wifi, wimax and lifi, basic issue of wifi and lifi and applications of lifi.
    Click Here to Download Pdf

    QR Code

    IJMCS