The first image in a slideshow demo.
Announcements
ijmcs  IJMCS

Volume-5 & Issue-5 Published (Acceptance Ratio=27.27%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-4 Published (Acceptance Ratio=47.36%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-3 Published (Acceptance Ratio=38.88%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-5 & Issue-2 Published (Acceptance Ratio=25%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Submit your Paper Last date 20th June 2017 http://www.ijmcs.info/submit_your_paper

ijmcs  IJMCS

Submit your paper @ Free of Cost http://www.ijmcs.info/publication_fee...

ijmcs  IJMCS

Volume-5 & Issue-1 Published (Acceptance Ratio=28.94%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-5 Published (Acceptance Ratio=41.42%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-4 Published (Acceptance Ratio=54.02%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-3 Published (Acceptance Ratio=48.05%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-2 Published (Acceptance Ratio=44%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-4 & Issue-1 Published (Acceptance Ratio=50%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Volume-3 & Issue-2 Published (Acceptance Ratio=34%)http://www.ijmcs.info/current_issue

ijmcs  IJMCS

Submit your Paper Last date 10th October 2015 http://www.ijmcs.info/submit_your_paper

ijmcs  IJMCS

Volume-2 & Issue-6 Published (Acceptance Ratio=69.56%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS October

Volume-2 & Issue-5 Published (Acceptance Ratio=45.94%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS 15 August

Upcoming Isuue: Volume-2 & Issue-6 http://www.ijmcs.info/next_issue

ijmcs  IJMCS

Volume-2 & Issue-4 Published (Acceptance Ratio=25%) http://www.ijmcs.info/current_issue

ijmcs  IJMCS

National Conference on (Advances in Modern Computing and Application Trends) Organised By Acharya Institute of Technology Bangalore, India

  • For More Detail Click Here
  • http://www.acharya.ac.in/Techman_2014.pdf

    Volume-5 Issue-5(October 2017)
    Title: Security Risk for Cloud-Based Services
    Authors: Dibyajyoti Saikia
    Abstract: Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Cloud computing has formed the conceptual and infrastructural basis for tomorrow’s computing. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. Cloud based services and service providers are being evolved which has resulted in a new business trend based on cloud technology. While the cloud may be flexible and cost-efficient, a lack of data safeguards and compliance standards makes security the largest hurdle to leap. Although much has been made about security risks stemming from the cloud in the past, recent technologies and security tools have eased many concerns. Yet some may still be hesitant to drop all on-premises infrastructure and move everything to the cloud. This paper concludes an analysis of the cloud computing security issues and challenges focusing on the cloud computing types and service delivery types.
    Click Here to Download Pdf
    Title: Illegal Parking detection system
    Authors: Varsha Sagare1st and Kanchan Jadhav
    Abstract: This system identifies the illegal parking in particular area. Identification is done using GPS system. System contains two main modules. One module contain whether in particular area illegal parking through ( Gps + satellite) second module will contain , if illegal traffic then inform to in-charge and in-charge will send information to vehicle owner using its vehicle no and RTO database information for further action.
    Click Here to Download Pdf
    Title: Intelligent Transportation Systems in Real Time Path Planning Using Hybrid VANET
    Authors: P.Ramkumar
    Abstract: Real-time path planning can proficiently mitigate traffic blocking in urban circumstances. However, iti is very arduous to design a well-organized path-planning algorithm to achieve a globally optimal vehicle traffic control. So in this paper, first it ascertained a hybrid intelligent transportation system (ITS), i.e., a hybrid-VANET-enhanced ITS, which make use of both vehicular ad hoc networks (VANETs) as well as cellular systems of the public transportation system to facilitate a real-time communications among vehicles, roadside units (RSUs), and a vehicle-traffic server in an efficient way. Then, it reveals a real-time path-planning algorithm, which not only uplift the overall spatial utilization of a road network but diminish the average vehicle travel cost for avoiding vehicles from getting stuck in congestion as well. A stochastic Lyapunov optimization technique is exploited to address the globally optimal path-planning problem. Finally, the transmission delay of the hybrid-VANET-enhanced ITS is assessed in VISSIM to show the timeliness of the proposed communication framework. Moreover, system-level simulations conducted in Java demonstrate that the proposed path-planning algorithm outperforms the traditional distributed path planning in terms of balancing the spatial utilization and drivers’ travel cost.
    Click Here to Download Pdf
    Title: Analysis and Elicitation of Bluetooth Versions and Bluetooth Attacks
    Authors: Anurag Chatterjee, Arushi Arora, Apoorva Pandey and Hetal Thakkar
    Abstract: Bluetooth is a technology that is used for transferring data wirelessly over short distances with low cost and low power, making it convenient for the users [1]. Bluetooth technology uses a two way communication protocol and a total of 8 devices can form a network. This review paper describes different versions of Bluetooth. This paper also defines different types of reported attacks on Bluetooth technology.
    Click Here to Download Pdf
    Title: Opinion Mining –Issues and Applications
    Authors: Akshat Jain and Rekha Jain
    Abstract: Decision making is one of the major important factors in our life. At every point of life we need a decision which provides some satisfaction to us. It is a natural phenomenon that good decision can be taken on the basis of opinion of others. So for choosing the right decision we use opinion mining technique. Opinion mining is process used for extracting the knowledge from the opinion of others about some particular topic or problem. Opinion mining can be carried out from various opinion rich resources like reviews, blogs, Twitter, forum discussions etc. This user generated content can help a person for making the right decision. An opinion can be thought, view or attitude based on emotion, thus opinion mining is also referred as sentiment analysis. This paper focuses on various issues and applications related to the Opinion Mining and Sentiment Analysis.
    Click Here to Download Pdf
    Title: An Effective Approach for Reusable Component Using Genetic Algorithm
    Authors: Ramu Vankudoth and Dr.P.Shireesha
    Abstract: The main objective of the research is to find the best optimal component and define the evaluation criteria for the reusable software component from the component repository that increases the quality of software component, reliability and also reduces the software development cost. In current scenario of the software development the main factors like time and cost for the component selection is too short and is also very difficult to identify the best matching component from the component repository. Various research and methodologies for the best optimal component selection models are exist with relevant to the data validation and verification to translate the annotated models into component performance. The decisions are often taken on temporary basis for the component selection from the component repository. The pre existing methodologies and processes for the component evaluation and selection does not meet the characteristics and evaluation of the functional and non-functional requirements. An effective solution for the evaluation and selection of the reusable software component from the component repository is a very hot issue for the software development community. In this paper the research will concentrate on the issue that belongs to the evaluation and selection process to find the best optimal component from the component repository by using the genetic algorithms.
    Click Here to Download Pdf
    Title:Determinants of Mobile Apps in C++ Programming Course: A reviewed Literature
    Authors: Faith Mueni Musyoka
    Abstract: In recent times, the use of mobile applications (mobile apps) has become undeniable where it permits people perform thousands of tasks through the use of smartphones, tablets or other related devices. The purpose of the review is to identify the determinants of programmer acceptance of mobile application for programming in C++. While developing a mobile app, a developer should consider Technology Acceptance Model (TAM) indicators which include: Perceived ease of use, social influence, Perceived Behavioural control, and perceived usefulness. With the consideration of the indicators, there will be significant intent to practice programming with use of mobile applications.
    Click Here to Download Pdf
    Title: Analysis of Static Code Techniques for Vulnerability Detec-tion: A reviewed Literature
    Authors: Faith MueniMusyoka
    Abstract: Web applications have become an integral part of the daily lives of trillions of users. These systems are usually complex and are developed by different programmers. Regularly programmers make mistakes in the code which could generate critical software vulnerabilities. Despite the knowledge about vulnerabilities nowadays there is still a growing tendency in the number of reported vulnerabilities, reason why software security has become an important field of research. Due to the presence of vulnerabilities it has been necessary to have tools that can help programmers detect them in code development stage. This paper has analysed pattern matching and taints analysis techniques that are currently used in development of static tools to in detection of vulnerabilities.
    Click Here to Download Pdf

    QR Code

    IJMCS