Papers

Results 41 - 60 of 509

Cross Site Request Forgery on Android WebView Cross Site Request Forgery on Android WebView

Bhavani A ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 3 (2014) pp. 274-2277

  • 5

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Graphical User Authentication

Kumar Jena S ...see all

International Journal of Computer Science and Network (IJCSN), vol. 1, issue 5 (2013)

  • 5

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Improved Algorithm for Separating Latent Overlapped Fingerprints

Pawar A, Madankar M ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 2 (2016) pp. 2277-5420

  • 5

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

JPEG versus GIF Images in forms of LSB Steganography JPEG versus GIF Images in forms of LSB Steganography

Abed Elgabar E, Mohammed F ...see all

IJCSN International Journal of Computer Science and Network, vol. 2, issue 6 (2013) pp. 2277-5420

  • 5

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.
  • 5

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Real Time Hand Gesture Recognition System: A Review

Shabnam S, Aqueel S ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 2 (2015) pp. 2277-5420

  • 5

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Medical Document Classification from OHSUMED Dataset

Lal Gope H, Kumar Das P, Jahirul Islam M, Hanif Seddiqui M ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 3, issue 4 (2014) pp. 2277-5420

  • 5

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Review on Clustering Analysis based on Optimization Algorithm for Datamining

Dagde R, Dongre S, Raisoni G ...see all

IJCSN International Journal of Computer Science and Network, vol. 6, issue 1 (2017) pp. 2277-5420

  • 5

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Comparative Study of Data Mining and Machine Learning Approach for Anomaly Detection

Sangve S, Thool R ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 1 (2016) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Security Issues in Mobile Apps

Jagwani P, Kumar R, Sharma G ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 4, issue 3 (2015) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Course File Management System

Shaaban Z ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 5 (2014) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Facial Expression Recognition Algorithm Based On KNN Classifier

Thakare P, Patil P ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 6 (2016) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Review on Various Methods for Self Balancing

Barapatre M, Sahare V ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 1 (2015) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Survey on Medical Image Watermarking Techniques

Student M ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 5 (2014) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Efficient Information Retrieval Using Indexing

Patil S, Budhwant D ...see all

IJCSN International Journal of Computer Science and Network, vol. 6, issue 25 (2017)

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Automatics Vehicle License Plate Recognition using MATLAB

Hussein A, Mezher A ...see all

IJCSN -International Journal of Computer Science and Network, vol. 6, issue 6 (2017) pp. 677-681

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Simulation of SOBEL Edge Detection Using Fuzzy Logic in MATLAB

Iqbal Sheikh M, Ahmad Khan R ...see all

IJCSN International Journal of Computer Science and Network, vol. 6, issue 35 (2017)

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Prediction of Heart Disease using Decision Tree a Data Mining Technique

Kirmani M, Ansarullah S ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 6 (2016) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Improving The Learning Capability Of Students In Classroom Using Augmented Reality

Patil S, Professor A ...see all

IJCSN -International Journal of Computer Science and Network, vol. 7, issue 2 (2018) pp. 49-53

  • 5

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Steganographic Approach to Ensure Data Storage Security in Cloud Computing Using Huffman Coding (SAHC)

Chatterjee T, Sarkar M, Dhaka V ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 2 (2015) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Save time finding and organizing research with Mendeley

Sign up for free