International Journal of Advanced Studies in Computer Science and Engineering (IJASCSE)

                                                                                                                                                                                                   ISSN : 2278 7917 

Call For Papers

May 2019

  Submission         May 10

  Acceptance         May 20

  Publication          May 31

Bookmark and Share

International Journal of advanced studies in Computer Science and Engineering (IJASCSE) is here to provide a timely and broad coverage of research in ever-challenging field of Computer Science and Computer Science Engineering. IJASCSE is an interdisciplinary, peer reviewed, fully refereed, monthly, Open Access journal for research scholars with a mix of regular and theme based issues to share their new and advanced research in Computer Science and Engineering. 

The papers published at IJASCSE are currently Abstracted & Indexed by some world famous databases.

 Call For Papers

April  2019

     Submission                     April 10

      Notification                     April 20

      Publication                     April 30

Bookmark and Share

Open Access Database

IJASCSE is an online peer reviewed quality publication, which publishes research papers from diverse fields in computers, sciences, engineering and technologies that emphasizes new research, development and their applications. It provides an open access database for all who are interested to exchange their research work, technical notes & surveying results among professionals through out the world.


 IJASCSE volume 7 issue 01 (Theme: Computers, Management & Information Technology)                            


An Intuitionistic Fuzzy AHP based Multi Criteria Recommender System for Life Insurance Products
Akshay Hinduja, Dr. Manju Pandey

Abstract-In order to overcome limitations of the existing recommender systems, we develop an original perception based Multi Criteria Recommender System that suggests
insurance products based on intuitionistic fuzzy analytic hierarchy process.

A Study and Analysis of Images in Different Color Models
Neetish Kumar, Deepa Raj


Abstract-Due to the efficient compression techniques the execution time for transmission drastically decreases and throughput of machine attains at a satisfactory level. This leads to the wider acceptance of the compression performance in much wider domain.


A Study of the Impact of Data Warehousing and Data Mining Implementation on Marketing Effort
Kanika Choudhary, Sanjay Dhingra

Abstract-This paper discusses the factor responsible for successful implementation of these tools. In this paper a model is proposed which shows that effective implementation of these tools leads to improved information quality and better marketing efforts for an organisation.

Analytical Study of different Load balancing algorithms
Kandi Phani Sai Sri Rohith, Abhineet Anand


Abstract — The point of this paper is to talk about the idea of load balancing in cloud computing and how it enhances and keep up the execution of cloud frameworks and furthermore contains comparison of different existing static load balancers and dynamic load balancers.


Design and Implementation of Energy-Aware Hierarchical clustering technique of WSN for Improving network life
Meenakshi Yadav, Anoop Bhola, Chandra Kumar Jha


Abstract- We use grid method and maximum energy set of sensor node to increase network life. Grid method divides the network into subparts called clusters. Division of
network is based on number of sensor nodes. Maximum energy set consider only those nodes have maximum energy.


Modeling for VM Allocation using Particle Swarm Optimization
Taskeen Zaidi, Ram Pratap

Abstract: There are various optimization techniques such as Ant colony Optimization (ACO), Particle Swarm Optimization (PSO) and genetic algorithms. Particle swarm optimization (PSO) is a biological population based method for optimizing a real problem to improve a candidate solution with regard to a given measure of quality.

Performance Evaluation of Nonlinear Filters for Impulse Noise Removal
Kaushal Kishor, Prabhisek Singh

Abstract: In this paper, various impulse noises filters are studied. These are median filter; center weighted median filter, pixel-wise MAD (mean of the absolute deviations from the median) filter and new adaptive median filtering technique. Here a novel, effective and simple impulse noise detector switching median filter is proposed.

Security and Compliance Management in Cloud Computing
Ahtisham Hashmi, Aarushi Ranjan, Abhineet Anand

Abstract: This paper focuses mainly on understanding the security issues in cloud computing and cognizes compliance management in Cloud computing, using the "Security as a Service" model of cloud computing. And comparing different SECaaS vendors for different aspects of security and compliance

Software Defects Prediction using AI Technique- A Review
Sunil Kumar Singh, Rajshree

Abstract: This paper provides a literature review of the use of various strategies for artificial intelligence techniques inside the area of software program disorder prediction. This literature evaluation may be very useful, since it brings a higher expertise of the field of observe, and that is an essential contribution of this paper.

Keywords- Multi Criteria Recommender System; Intuitionistic Fuzzy AHP; Life Insurance; Multi Criteria Decision Making.

Keywords — Compression, Enhancement, Transmission

Keywords: Business Intelligence, Data warehousing,Data Mining,Marketing Efforts

Keywords- Cloud Computing, Distributed Computing, Data Centre, Application Programming Interfaces, Redundancy, IP address, Network Address Translation, OSI
Model, Cloud Stack Adjusting, Static Load Balancing, Dynamic Load Balancing

Keywords— LEACH ; LEACH-Emax ; Cluster Head ;Wireless sensor network ; clustering ; Virtual Gird

Keywords- Particle Swarm Optimization (PSO); Fault Tolerance; Cloudsim; UML

Keywords-Mean Square Error (MSE); Peak Signal to Noise Ratio (PSNR); Probability Density Function (PDF); Median Filtering (MF); New Adaptive Median Filtering Techniques (NAMFT)

KEYWORDS:- Cloud Computing, Security, Compliance, Security-as-a-Service (SECaaS).

Keywords: Software defect, Artificial intelligence, Neural Network, Fuzzy logic, Data prediction

To download Click on PDF logo
To download Click on PDF logo
To download Click on PDF logo
To download Click on PDF logo
To download Click on PDF logo
To download Click on PDF logo
To download Click on PDF logo
To download Click on PDF logo
To download Click on PDF logo