Papers

Results 81 - 100 of 535

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Survey on Communication Gap between Hearing and Speech Impaired Persons and Normal Persons

Advani N, Bora S, Bhat A, Yerolkar S ...see all

IJCSN International Journal of Computer Science and Network, vol. 2, issue 6 (2013) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Sink and Relay Mobility Based Energy Conservation Techniques for WSN: A Survey

Kulkarni U, Kenchannavar H, Kulkarni U ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 2 (2015) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Fuzzy C-Means Clustering Algorithm for Optimization of Routing Protocol in Wireless Sensor Networks

Tamene M, Rao K ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 2 (2016) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Diabetic Retinopathy Detection using Image Processing: A Survey

Pattanashetty A, Nandyal S ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 5, issue 4 (2016) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Research Issues and Developments in Social Network Analytics

Suneetha D, Shashi M ...see all

IJCSN -International Journal of Computer Science and Network, vol. 6, issue 6 (2017) pp. 702-707

  • 3

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Knowledge Discovery in Database

Gaikwad K ...see all

IJCSN -International Journal of Computer Science and Network ISSN, vol. 3, issue 6 (2014) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Analysis and Review of EDFA

Pradhan D, Mishra V ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 6 (2015) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Review on Shoulder Surfing Attack in Authentication Technique

Waghmare P, Longadge R, Kapgate D ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 3, issue 6 (2014) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Survey on Traffic Pattern Discovery in Mobile Ad hoc Network

Sen P, Sahare V ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 1 (2015) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

FPGA Implementation of Image Steganography Using LSB and DWT

Shete K, Patil M, Morbale J ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 6 (2015) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Evidential Modeling for Telemedicine Continual Security

Mansouri S, Raggad B ...see all

IJCSN -International Journal of Computer Science and Network, vol. 6, issue 5 (2017) pp. 559-564

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Automatics Vehicle License Plate Recognition using MATLAB

Hussein A, Mezher A ...see all

IJCSN -International Journal of Computer Science and Network, vol. 6, issue 6 (2017) pp. 677-681

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Authentication and Authorization in Cloud : Reviewing The Trend

Pratiba D, Shobha G, Arjun A ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 3, issue 6 (2014) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Recognition of Real or Picture Face Using Skin Colour Detection and Depth Map Information

Mahadevpatil C, Paradeshi K ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 2 (2016) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Review on Hybrid Intrusion Detection System Using TAN & SVM

Potteti S, Parati N ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 4, issue 3 (2015) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Geographically and Temporally Weighted Regression (GTWR) for Modeling Economic Growth using R

Sholihin M, Mohamad Soleh A, Djuraidah A ...see all

IJCSN -International Journal of Computer Science and Network, vol. 6, issue 65 (2017) pp. 800-805

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Generic Proximity Privacy Preservation Technique for Data Anonymization in Cloud

Seetha R, Srijayanthi S, Sethukarasi T ...see all

IJCSN International Journal of Computer Science and Network, vol. 6, issue 25 (2017)

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Design Approach for Dynamic Traffic Control System Based Radio Propagation Model in Vanet

Dorle S, Patel P ...see all

IJCSN International Journal of Computer Science and Network, vol. 2, issue 1 (2013) pp. 112-114

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Cryptography Using Three-Dimensional Cellular Automata (3-D CA)

Obaid Alezzani A, Mohammed Yousif Al-Bayatti H ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 1 (2016) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Showing the First 100 of 535 papers

Save time finding and organizing research with Mendeley

Sign up for free