Papers

Results 21 - 40 of 545

Medical Document Classification from OHSUMED Dataset

Lal Gope H, Kumar Das P, Jahirul Islam M, Hanif Seddiqui M ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 3, issue 4 (2014) pp. 2277-5420

  • 6

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Hand Gesture Recognition to Speech Conversion in Regional Language

Jadhav B, Munot N, Hambarde M, Ashtikar J ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 1 (2015) pp. 2277-5420

  • 7

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

ParkSmart: Android Application for Parking System

Gatalwar S, Agnihotri R, Gujarathi N, Behere A ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 1 (2016) pp. 2277-5420

  • 5

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

JPEG versus GIF Images in forms of LSB Steganography JPEG versus GIF Images in forms of LSB Steganography

Abed Elgabar E, Mohammed F ...see all

IJCSN International Journal of Computer Science and Network, vol. 2, issue 6 (2013) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Cloud Computing Scheduling Algorithms: A Review

Kaur V, Kaur G ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 2 (2015) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Survey on Different Image Processing Techniques for Pest Identification and Plant Disease Detection

IJCSN International Journal of Computer Science and Network, vol. 5, issue 1 (2016) pp. 2277-5420

  • 5

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

EEG Based Classification of Hand Movements using BCI

H L, S J ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 5, issue 4 (2016) pp. 2277-5420

  • 5

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Comparative Study of Cryptographic Algorithms A Comparative Study of Cryptographic Algorithms

Hussain Dar M, Mittal P, Kumar V ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 3 (2014) pp. 274-2277

  • 5

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Feature Fusion of Palm and Face Based on Curvelet Transform

Seshikala G, Kulkarni U, Prasad M ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 1 (2014) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Mining Weather Data Using Rattle Mining Weather Data Using Rattle

Bavirisetty V, Ankireddy A, Seemakurthi P, Rajesh K ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 2, issue 3 (2013) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

State-of-the-Art Survey on In-Vehicle Network Communication " CAN-Bus " Security and Vulnerabilities

Avatefipour O, Malik H ...see all

IJCSN -International Journal of Computer Science and Network, vol. 6, issue 6 (2017) pp. 720-727

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Course File Management System

Shaaban Z ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 5 (2014) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Comparison between Sentiment Analysis of Student Feedback at Sentence Level and at Token Level

Chatterjee C, Chakma K ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 4, issue 3 (2015) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Security Challenges in Implementing Semantic Web-Unifying Logic

Gyamfi N ...see all

IJCSN -International Journal of Computer Science and Network ISSN, vol. 3, issue 6 (2014) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Comparative Study of Symmetric Key Encryption Algorithms

Jain A, Bhatnagar D ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 5 (2014) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

An Experimental Study on Authorship Identification for Cyber Forensics

Nirkhi S, Dharaskar R, Thakare V ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 5 (2015) pp. 2277-5420

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Review of Various Algorithms Used in Hybrid Cryptography

Kaur V, Singh A ...see all

IJCSN International Journal of Computer Science and Network, vol. 2, issue 6 (2013) pp. 2277-5420

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.
  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Classification of Cardiotocography Data with WEKA

Bhatnagar D, Maheshwari P ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 2 (2016) pp. 2277-5420

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Improved Algorithm for Separating Latent Overlapped Fingerprints

Pawar A, Madankar M ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 2 (2016) pp. 2277-5420

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Save time finding and organizing research with Mendeley

Sign up for free