Papers

Results 21 - 40 of 536

Hand Gesture Recognition to Speech Conversion in Regional Language

Jadhav B, Munot N, Hambarde M, Ashtikar J ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 1 (2015) pp. 2277-5420

  • 5

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

ParkSmart: Android Application for Parking System

Gatalwar S, Agnihotri R, Gujarathi N, Behere A ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 1 (2016) pp. 2277-5420

  • 5

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Optimization of Tsukamoto Fuzzy Inference System using Fuzzy Grid Partition

IJCSN International Journal of Computer Science and Network, vol. 5, issue 5 (2016) pp. 2277-5420

  • 7

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

JPEG versus GIF Images in forms of LSB Steganography JPEG versus GIF Images in forms of LSB Steganography

Abed Elgabar E, Mohammed F ...see all

IJCSN International Journal of Computer Science and Network, vol. 2, issue 6 (2013) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Cloud Computing Scheduling Algorithms: A Review

Kaur V, Kaur G ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 2 (2015) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Comparative Study of Cryptographic Algorithms A Comparative Study of Cryptographic Algorithms

Hussain Dar M, Mittal P, Kumar V ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 3 (2014) pp. 274-2277

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Feature Fusion of Palm and Face Based on Curvelet Transform

Seshikala G, Kulkarni U, Prasad M ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 1 (2014) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Mining Weather Data Using Rattle Mining Weather Data Using Rattle

Bavirisetty V, Ankireddy A, Seemakurthi P, Rajesh K ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 2, issue 3 (2013) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Course File Management System

Shaaban Z ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 5 (2014) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Comparison between Sentiment Analysis of Student Feedback at Sentence Level and at Token Level

Chatterjee C, Chakma K ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 4, issue 3 (2015) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Development of Android-Based Yoruba Language Mobile E-Tutor

Omotosho O, Adeyanju I, Odeniran A ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 4, issue 4 (2015) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Comparative Study of Symmetric Key Encryption Algorithms

Jain A, Bhatnagar D ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 5 (2014) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Security Challenges in Implementing Semantic Web-Unifying Logic

Gyamfi N ...see all

IJCSN -International Journal of Computer Science and Network ISSN, vol. 3, issue 6 (2014) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

An Experimental Study on Authorship Identification for Cyber Forensics

Nirkhi S, Dharaskar R, Thakare V ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 5 (2015) pp. 2277-5420

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.
  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Performance Analysis of Multiple Key Management Schemes in Wireless Sensor Network

Kishk A, Messiha N, El-Fishawy N, Alkafs A, Madian A ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 4, issue 3 (2015) pp. 2277-5420

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Classification of Cardiotocography Data with WEKA

Bhatnagar D, Maheshwari P ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 2 (2016) pp. 2277-5420

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Prediction of Heart Disease using Decision Tree a Data Mining Technique

Kirmani M, Ansarullah S ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 6 (2016) pp. 2277-5420

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Fragile Watermarking of Medical Image for Content Authentication and Security

Boujemaa N, Aissaoui Abdelaziz E, Yousef E, Rachid L, Aziz B ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 5 (2016) pp. 2277-5420

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Survey on Spam Detection Methodologies in Social Networking Sites

Reddy K, Reddy E ...see all

IJCSN -International Journal of Computer Science and Network, vol. 6, issue 4 (2017) pp. 483-488

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Save time finding and organizing research with Mendeley

Sign up for free