Papers

Results 41 - 60 of 463

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Review on Hybrid Intrusion Detection System Using TAN & SVM

Potteti S, Parati N ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 4, issue 3 (2015) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture

Balamurugan V ...see all

IJCSN -International Journal of Computer Science and Network ISSN, vol. 3, issue 6 (2014) pp. 2277-5420

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Classification of Sensors used in WSNs

IJCSN -International Journal of Computer Science and Network, vol. 6, issue 35 (2017)

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Battery monitoring and Quota management System

Bhagat J, Dharmik S, Upadhyay N, Katole M ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 2 (2015) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Web Based Programming Environment Using Network-Virtual Cloud Compilation

IJCSN International Journal of Computer Science and Network, vol. 5, issue 2 (2016) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Review on Baby Monitoring System

Naiknaware S, Gajare D, Vibhute S, Kenjale S, Kulkarni S ...see all

IJCSN International Journal of Computer Science and Network, vol. 6, issue 25 (2017)

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Dynamic Data Integration Using Smart Card

Puranik S, Dhone P, Zodape S, Nimje A ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 2 (2015) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Evaluation of Performance Ip-tv in Wimax Network

Ndaohialy Manda-Vy R, Zafimarina Zo Stefana R, Mamy Alain R ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 1 (2016) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Home Automation Using the Concept of IoT

Deshpande T, Ahire N ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 5, issue 3 (2016) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Performance Analysis of Multiple Key Management Schemes in Wireless Sensor Network

Kishk A, Messiha N, El-Fishawy N, Alkafs A, Madian A ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 4, issue 3 (2015) pp. 2277-5420

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Comparative Analysis of Energy Consumption by IT Systems at Different Levels of Operation & Usage

Firdous R, Sofi S, Naaz R ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 2 (2015) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Lifetime Extension of Wireless Sensor Network Using Harmony Search Algorithm

IJCSN -International Journal of Computer Science and Network ISSN, vol. 3, issue 6 (2014) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Advancements in Genetic Algorithm for Intrusion Detection System

IJCSN International Journal of Computer Science and Network ISSN, vol. 5, issue 4 (2016) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Evaluation of seven MANET Routing Protocols using Scalability Scenario

Natarajan K, Mahadevan G ...see all

IJCSN International Journal of Computer Science and Network, vol. 6, issue 25 (2017)

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Detection of Cracks Using Different Techniques: A Survey

IJCSN International Journal of Computer Science and Network, vol. 5, issue 1 (2016) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

PLC Based Leak Test Machine for Shock Absorber Tube- A Survey

Attarde G, Rahane L, Bhavsar S, Jejurkar N, Dhande S ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 6 (2016) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Comparative Study of ROI Extraction of Palmprint

Rane M, Bhadade U ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 2 (2016) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Facial Expression Recognition Algorithm Based On KNN Classifier

Thakare P, Patil P ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 6 (2016) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

The Way to 5G Networks and Spectrum Policies to Cope with High Data Communication Consumption - The Albanian Case

Malolli I ...see all

IJCSN -International Journal of Computer Science and Network, vol. 6, issue 35 (2017)

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Save time finding and organizing research with Mendeley

Sign up for free