Papers

Results 81 - 100 of 463

Simulation of DDA (Digital Differential Analyzer) Line Generation Algorithm

Trivedi J ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 1 (2015) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Efficient Security Performance of Attacker Nodes Using MANET

Sasikumar B, Munikrishnan J ...see all

IJCSN International Journal of Computer Science and Network, vol. 6, issue 25 (2017)

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Implementation of Data Mining in Wireless Sensor Networks: An Integrated Review

Muntjir M ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 5, issue 4 (2016) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Review Paper on Common Types of Attack in Grid Computing

Kaur K, Kumar D ...see all

IJCSN International Journal of Computer Science and Network, vol. 6, issue 25 (2017)

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Comparison on Intelligent Web Information Retrieval Systems

Prasanth A, Hemalatha M ...see all

IJCSN -International Journal of Computer Science and Network ISSN, vol. 3, issue 6 (2014) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Comparative Analysis on Different Image Processing Techniques for Forest Fire Detection

Benjamin S ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 1 (2016) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Multi-level Stable and Energy Efficient Clustering Protocol in WSN: A Review

Rana A, Bala M ...see all

IJCSN International Journal of Computer Science and Network, vol. 6, issue 25 (2017)

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.
  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Opinion Mining from Social Networks

Dave K, Chandurkar S, Sinha A ...see all

IJCSN -International Journal of Computer Science and Network ISSN, vol. 3, issue 6 (2014) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Review on Wireless Audio Transmission System for Real-Time Applications

Kuhite D, Madankar M ...see all

IJCSN International Journal of Computer Science and Network, vol. 6, issue 25 (2017)

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Digital Video Watermarking Using DWT-DFT Transforms and SVD Technique

Hasarmani S, Patil M, Naregalkar P ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 6 (2015) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

FPGA Implementation of Image Steganography Using LSB and DWT

Shete K, Patil M, Morbale J ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 6 (2015) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Comparative Analysis of Improved Path Selection Using PSO

IJCSN -International Journal of Computer Science and Network, vol. 6, issue 35 (2017)

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Survey on Image Fog Reduction Techniques

Singh P, Khan E, Upreti H, Kapse G ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 2 (2016) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Mirror Based Framework for Human Body Measurement

Hashimoto T, Suzuki T, Rövid A ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 5 (2014) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Wi-Fi Offloading Strategies for Facing Mobile Data Traffic Challenges

Malolli I ...see all

IJCSN International Journal of Computer Science and Network, vol. 6, issue 25 (2017)

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Comparative Study on Preserving Data Integrity for Shared Data in Cloud Storage

Patil S, Rao M ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 2 (2016) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Magnetic Manipulation Based Arduino Assisted 8 Queens Puzzle Solver

Johnson S, Shetty S, Philip A, Varghese N, Kamal A ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 5 (2016) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Comparison of Compact High Speed Reconfigurable RC4 Hardware with the Existing RC4 Hardware

Nagar P, Hulle N ...see all

IJCSN -International Journal of Computer Science and Network ISSN, vol. 3, issue 6 (2014) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Review on Resource Virtualization for Increasing Users Computing Power

Nawabasi R, Thakre V, Junghare U ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 5 (2014) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Showing the First 100 of 463 papers

Save time finding and organizing research with Mendeley

Sign up for free