Papers

Results 1 - 20 of 535

Application of Data Mining In Marketing Application of Data Mining In Marketing

Muhammed A ...see all

IJCSN International Journal of Computer Science and Network, vol. 2, issue 5 (2013) pp. 2277-5420

  • 21

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Improved Twitter Sentiment Prediction through 'Cluster-then-Predict Model'

Soni R, Mathai K ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 4, issue 4 (2015) pp. 2277-5420

  • 18

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Audio Steganography and Security Using Cryptography

Kapadia H, Haribau H, Patil H ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 2 (2015) pp. 2277-5420

  • 15

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Literature Review on Path Planning in Dynamic Environment

Mahajan B, Marbate P ...see all

IJCSN International Journal of Computer Science and Network, vol. 2, issue 1 (2013)

  • 14

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

An Unsupervised Pattern Clustering Approach for Identifying Abnormal User Behaviors in Smart Homes

Sukanya P, S G ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 2, issue 3 (2013) pp. 2277-5420

  • 14

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Extraction of Hadith Based on Semantic Annotation

Kadhim R, Norwawi N, Abdulaaziz A, Al A ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 2 (2015) pp. 2277-5420

  • 11

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Review of the Roles and Importance of Information and Communication Technologies (ICTs) in Supply Chain Management (SCM) of Organizations and Companies

Yaw A, Oppong D S ...see all

International Journal of Computer Science and Network (IJCSN), vol. 1, issue 4 (2012) pp. 70-78

  • 11

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Home Automation Using the Concept of IoT

Deshpande T, Ahire N ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 5, issue 3 (2016) pp. 2277-5420

  • 10

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Simulation of First Come First Served (FCFS) and Shortest Job First (SJF) Algorithms

Xoxa N, Zotaj M, Tafa I, Fejzaj J ...see all

IJCSN -International Journal of Computer Science and Network ISSN, vol. 3, issue 6 (2014) pp. 2277-5420

  • 10

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Artificial Intelligence Approaches in Student Modeling: Half Decade Review (2010-2015)

Sani S, Bichi A, Ayuba S ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 5 (2016) pp. 2277-5420

  • 9

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

JSON vs XML: A Comparative Performance Analysis of Data Exchange Formats

Zunke S, D'Souza V ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 4 (2014) pp. 257-261

  • 13

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Design and Implementation of Educational Data Warehouse Using OLAP

Abdullah Z, Obaid T ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 5 (2016) pp. 2277-5420

  • 9

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Cross Site Request Forgery on Android WebView Cross Site Request Forgery on Android WebView

Bhavani A ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 3 (2014) pp. 274-2277

  • 7

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Handwritten Character Recognition: A Review

Prasad J ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 5 (2014) pp. 2277-5420

  • 7

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Optimization of Tsukamoto Fuzzy Inference System using Fuzzy Grid Partition

IJCSN International Journal of Computer Science and Network, vol. 5, issue 5 (2016) pp. 2277-5420

  • 7

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Different Agile Methodology Processes for Implementing SDLC System

Krishna Mohan C, Raj Kumar G ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 1 (2015) pp. 2277-5420

  • 6

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Intelligent Bus Tracking System based on GSM and GPS

Jumle P, Gohane S ...see all

IJCSN International Journal of Computer Science and Network, vol. 6, issue 25 (2017) pp. 192-195

  • 6

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture

Balamurugan V ...see all

IJCSN -International Journal of Computer Science and Network ISSN, vol. 3, issue 6 (2014) pp. 2277-5420

  • 5

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Performance Evaluation of Anonymized Data Stream Classifiers

Nyati A, Bhatnagar D ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 2 (2016) pp. 2277-5420

  • 5

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Evaluation of Web Mining Approach Evaluation of Web Mining Approach

Kaur S, Khanna N ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 2 (2014) pp. 2277-5420

  • 5

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Save time finding and organizing research with Mendeley

Sign up for free