SPECIAL ISSUE: COMPUTER SCIENCE

Volume 9; Issue 2; 2018

CONTENTS

 

Mary Posonia A, Vigneshwari S, Jyothi V.L: AN APPROACH FOR EFFICIENT RANKING OF XML DOCUMENTS USING USING BPN BASED RANN. IIOABJ, 2018; Vol.9 (2):1-7. [RESEARCH] 

Komal A. Dhabale, M. S. Bewoor, S. S. Dhotre: A NOVEL APPROACH TO DEVELOP BUSINESS MODEL FOR E-COMMERCE USING CUSTOMER REVIEW THROUGH SOCIAL MEDIA. IIOABJ, 2018; Vol.9 (2):8-12. [RESEARCH]

Anagha Ramnath Kadve, S. B.Vanjale: IMPROVEMENT IN SEARCH TIME USING MULTI-KEYWORD SEARCH OVER ENCRYPTED DATA IN CLOUD COMPUTING. IIOABJ, 2018; Vol.9 (2):13-19. [RESEARCH]

Annu Vashisht, Akanksha Sukhija, Arpita Verma, Prateek Jain: A DETAILED STUDY OF SOFTWARE CODE CLONING.. IIOABJ, 2018; Vol.9 (2):20-32. [RESEARCH]

Aayushi Dubey, Sukhdeep Sharma, Shaveta Malik, Prateek Jain: A DETAILED STUDY OF DIGITAL IMAGE PROCESSING. IIOABJ, 2018; Vol.9 (2):33-42. [RESEARCH]

Deepika Sagar, Sahil Kukreja, Jwngfu Brahma, Shobha Tyagi, Prateek Jain: STUDYING OPEN SOURCE VULNERABILITY SCANNERS FOR VULNERABILITIES IN WEB APPLICATIONS. IIOABJ, 2018; Vol.9 (2):43-49. [RESEARCH]

Sukhendu Mukherjee: USE VAADIN FOR TOUCHKIT OFFLINE MODE. IIOABJ, 2018; Vol.9 (2):50-53. [EXPERT OPINION]

Sukhendu Mukherjee: GATLING AND VAADIN INTEGRATION IN CENTOS. IIOABJ, 2018; Vol.9 (2):54-60. [RESEARCH]

Deepansh Kumar, Yugansh Khera, Sujay, Nidhi Garg, Prateek Jain: TOWARDS THE IMPACT OF HACKING ON CYBER SECURITY. IIOABJ, 2018; Vol.9 (2):61-77. [RESEARCH]

Prashant D. Shinde, Suhas H. Patil: SECURED PASSWORD USING HONEYWORD ENCRYPTION. IIOABJ, 2018; Vol.9 (2):78-82. [RESEARCH]

Sharayu R Puranik, D. M. Thakore: REGIONAL LANGUAGE DRIVEN PRESENTATION TOOL. IIOABJ, 2018; Vol.9 (2):83-88. [RESEARCH]

Pranjali Kothawade, Suhas Patil: COLLECTIVE DATA-SANITIZATION FOR PERSONAL INFORMATION PROTECTION. IIOABJ, 2018; Vol.9 (2):89-93. [RESEARCH]

Praveen Kumar: OPTIMIZATION OF WATCHDOG SELECTION IN WIRELESS SENSOR NETWORKS. IIOABJ, 2018; Vol.9 (2):94-100. [RESEARCH]

Prateeksha Chaurasia: SOCIAL Q&A: AN ONLINE/OFFLINE SOCIAL NETWORK BASED QUESTION AND ANSWER SYSTEM . IIOABJ, 2018; Vol.9 (2):101-110. [RESEARCH]

Akash Udaysinh Suryawanshi, J. Naveenkumar: PRIVACY-PRESERVING FOR A SECURE DATA STORAGE ON CLOUD USING PUBLIC AUDITING TECHNIQUE. IIOABJ, 2018; Vol.9 (2):111-115. [RESEARCH]

Abhyuday Nivrutti Patil, Amol Kadam, Sachin B. Wakurdekar, S. D. Joshi: HYBRID APPROACH OF CODE ANALYSIS AND EFFORTS CALCULATION FOR SOFTWARE RELIABILITY GROWTH MEASUREMENT AND COST ESTIMATION. IIOABJ, 2018; Vol.9 (2):116-120. [RESEARCH]



















..................MORE COMING SOON ............


 



SECTION: SOCIOLOGY

F : R . IIOABJ, 2016; Vol.7 (10):31-37. [RESEARCH]  

SECTION: SOCIOLOGY

F : R . IIOABJ, 2016; Vol.7 (10):31-37. [RESEARCH]