Papers

Results 61 - 80 of 545

Banks & E−Commerce Network Security Threats and Best Policies in Practice

Zare Hudaib A ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 3, issue 4 (2014) pp. 2277-5420

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Design of an Intelligent Speaker Recognition System using Mel Frequency Cepstrum Coefficients and Vector Quantization for Biometric Authentication

Sheela G ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 6 (2015) pp. 2277-5420

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Academic Monitoring System

Adagale A, Agrawal D, Dane S ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 2 (2016) pp. 2277-5420

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Novel Classifier for Gender Classification from Iris Code used for Recognition

Paul A, Loganathan D ...see all

IJCSN International Journal of Computer Science and Network, vol. 6, issue 35 (2017) pp. 325-331

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Real Time Virtual Dressing Room

Deshmukh N, Patil I, Patwari S, Deshmukh A, Mehta P ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 2 (2016) pp. 2277-5420

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Analysis of Bio-inspired Scalable Routing Protocol for Cognitive Radio Sensor Networks

Thakare A, Bhagat L, Thomas A ...see all

IJCSN -International Journal of Computer Science and Network, vol. 6, issue 6 (2017)

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.
  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Review on Clustering Analysis based on Optimization Algorithm for Datamining

Dagde R, Dongre S, Raisoni G ...see all

IJCSN International Journal of Computer Science and Network, vol. 6, issue 1 (2017) pp. 2277-5420

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

College Parent Interaction using Android Application

Mohadikar P, Mulani N, Shaikh A, Sable R ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 1 (2015) pp. 2277-5420

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Image Normalization and Preprocessing for Gujarati Character Recognition

Prasad J ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 5 (2014) pp. 2277-5420

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Design of Portable Data Logger for Water Department

Gohane S, Jaumle P, Dhore J, Longadge R ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 2 (2015) pp. 2277-5420

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Detection and Analysis of Shellcode in Malicious Documents

Brinda G, George G ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 2 (2016) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Comparison of Global EDF and LLREF Scheduling Algorithms

Prifti V, Balla B, Zane R, Fejzaj J, Tafa I ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 5 (2014) pp. 2277-5420

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

High Capacity Image Steganography Using Block Randomization

Jyoti A, Banerjee S, Gupta G ...see all

IJCSN -International Journal of Computer Science and Network ISSN, vol. 3, issue 6 (2014) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

An Android Application for Indian Currency Recognition and Authentication for Blind

Sagar S, Mondal S, Seth A, Shah R, Deshpande A ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 2 (2016)

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.
  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Image Inpainting Image Inpainting

Lokhande D, Zope R, Bendre V ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 1 (2014) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Design and Simulation of Folded Arm Miniaturized Microstrip Low Pass Filter

Singh I, Bhatt P ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 5 (2016) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Detection of Cracks Using Different Techniques: A Survey

IJCSN International Journal of Computer Science and Network, vol. 5, issue 1 (2016) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Applied Spatial Durbin Model to Assess Factors Influencing the Number of Foreign Tourists in Indonesia 2011-2015

Arifatin D, Djuraidah A, Syafitri U ...see all

IJCSN -International Journal of Computer Science and Network, vol. 7, issue 1 (2018) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Save time finding and organizing research with Mendeley

Sign up for free