Papers

Results 81 - 100 of 483

SLAM Based Autonomous Mobile Robot Navigation using Stereo Vision

Al-Mutib K ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 6 (2015) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Design and Development of An Antenna Model using Artificial Intelligence

Pandit M, Roy T, Ghose M, Pandey H ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 1 (2015) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Neural Network based LEACH Clustering Algorithm in WSN

IJCSN International Journal of Computer Science and Network, vol. 6, issue 15 (2017)

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Comparative Study of Cryptographic Algorithms A Comparative Study of Cryptographic Algorithms

Hussain Dar M, Mittal P, Kumar V ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 3 (2014) pp. 274-2277

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Formation of Metagraph Using Clustering

Gaur S, Dhyani P ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 5 (2014) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Classification Model Using Optimization Technique: A Review

Diwathe D, Dongare S ...see all

IJCSN International Journal of Computer Science and Network, vol. 6, issue 15 (2017)

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Prognostic Based Resource Monitoring System Prognostic Based Resource Monitoring System

Mali M, Lonkar V, Meshram P ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 1 (2014) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Simulation of DDA (Digital Differential Analyzer) Line Generation Algorithm

Trivedi J ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 1 (2015) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

An Expert Technique for Content-Based Color Image Retrieval

Vaiapury S ...see all

IJCSN -International Journal of Computer Science and Network, vol. 6, issue 35 (2017)

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Proposal of Max-Min Algorithm for Scheduling of Workflows in Cloud Environment

Singh Brar S, Rao S ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 4, issue 4 (2015) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Automatic " Anti Water-Flooding " Supervisory System, Using Wireless Water-Level Sensors

IJCSN International Journal of Computer Science and Network ISSN, vol. 4, issue 4 (2015) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Application of New Approaches for the Feature Extraction and Classification of EEG Signal Processing in Brain Research

Kumari M, Somani S ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 4, issue 3 (2015) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Comparative Study on Preserving Data Integrity for Shared Data in Cloud Storage

Patil S, Rao M ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 2 (2016) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Design of an Intelligent Speaker Recognition System using Mel Frequency Cepstrum Coefficients and Vector Quantization for Biometric Authentication

Sheela G ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 6 (2015) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Data Security Using Reliable Re-Encryption in Unreliable Cloud

Adhau A, Bobade P, Zilpe P, Fulmali Y ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 2 (2015) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Different Agile Methodology Processes for Implementing SDLC System

Krishna Mohan C, Raj Kumar G ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 1 (2015) pp. 2277-5420

  • 6

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Fraud Claim Detector for Health Insurance

Pradeep A, Sakkir H ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 2 (2016) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

FPGA Implementation of Image Steganography Using LSB and DWT

Shete K, Patil M, Morbale J ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 6 (2015) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Anti Money Laundering Reporting in a Cash-Less World

Drini E, Bahiti R ...see all

IJCSN International Journal of Computer Science and Network, vol. 6, issue 15 (2017)

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Comparative Study on Target Detection in Military Field Using Various Digital Image Processing Techniques

IJCSN International Journal of Computer Science and Network, vol. 5, issue 1 (2016) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Showing the First 100 of 483 papers

Save time finding and organizing research with Mendeley

Sign up for free