Papers

Results 1 - 20 of 491

A Review on Hybrid Intrusion Detection System Using TAN & SVM

Potteti S, Parati N ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 4, issue 3 (2015) pp. 2277-5420

  • 14

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Review on Techniques of Hyperspectral Image Compression

Ajith V, Budhwant D ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 1 (2016) pp. 2277-5420

  • 15

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Review of Various Algorithms Used in Hybrid Cryptography

Kaur V, Singh A ...see all

IJCSN International Journal of Computer Science and Network, vol. 2, issue 6 (2013) pp. 2277-5420

  • 14

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

JSON vs XML: A Comparative Performance Analysis of Data Exchange Formats

Zunke S, D'Souza V ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 4 (2014) pp. 257-261

  • 14

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Survey on Medical Image Watermarking Techniques

Student M ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 5 (2014) pp. 2277-5420

  • 14

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Audio Steganography and Security Using Cryptography

Kapadia H, Haribau H, Patil H ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 2 (2015) pp. 2277-5420

  • 13

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Home Automation Using the Concept of IoT

Deshpande T, Ahire N ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 5, issue 3 (2016) pp. 2277-5420

  • 13

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Comparative Study of Cryptographic Algorithms A Comparative Study of Cryptographic Algorithms

Hussain Dar M, Mittal P, Kumar V ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 3 (2014) pp. 274-2277

  • 13

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Improved Twitter Sentiment Prediction through 'Cluster-then-Predict Model'

Soni R, Mathai K ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 4, issue 4 (2015) pp. 2277-5420

  • 12

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Review of the Roles and Importance of Information and Communication Technologies (ICTs) in Supply Chain Management (SCM) of Organizations and Companies

Yaw A, Oppong D S ...see all

International Journal of Computer Science and Network (IJCSN), vol. 1, issue 4 (2012) pp. 70-78

  • 12

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Cross Site Request Forgery on Android WebView Cross Site Request Forgery on Android WebView

Bhavani A ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 3 (2014) pp. 274-2277

  • 10

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Artificial Intelligence Approaches in Student Modeling: Half Decade Review (2010-2015)

Sani S, Bichi A, Ayuba S ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 5 (2016) pp. 2277-5420

  • 10

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Extraction of Hadith Based on Semantic Annotation

Kadhim R, Norwawi N, Abdulaaziz A, Al A ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 2 (2015) pp. 2277-5420

  • 10

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Real Time Hand Gesture Recognition System: A Review

Shabnam S, Aqueel S ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 2 (2015) pp. 2277-5420

  • 10

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Simulation of First Come First Served (FCFS) and Shortest Job First (SJF) Algorithms

Xoxa N, Zotaj M, Tafa I, Fejzaj J ...see all

IJCSN -International Journal of Computer Science and Network ISSN, vol. 3, issue 6 (2014) pp. 2277-5420

  • 10

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Enhancement in Classification of Semantically Secure Encrypted Data

Shewale C, Sangve S ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 5, issue 4 (2016) pp. 2277-5420

  • 9

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Conceptual Model for Ontology Based Intelligence

Yousefian F, Saberi H, Banirostam T ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 1 (2016) pp. 2277-5420

  • 9

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Health Care Using Telemedicine: A Case Study of Yobe State, Nigeria

Geidam M, Bello I, Prasad R ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 5 (2014) pp. 2277-5420

  • 8

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Survey on Spam Detection Methodologies in Social Networking Sites

Reddy K, Reddy E ...see all

IJCSN -International Journal of Computer Science and Network, vol. 6, issue 4 (2017)

  • 8

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Survey on Different Image Processing Techniques for Pest Identification and Plant Disease Detection

IJCSN International Journal of Computer Science and Network, vol. 5, issue 1 (2016) pp. 2277-5420

  • 8

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Save time finding and organizing research with Mendeley

Sign up for free