Papers

Results 81 - 100 of 458

Survey of LiFi and WiFi Technologies

Nithya J, Iswariya N, Sathyasutha P, Sabari M ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 6 (2016) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Human Identification Method: SCLERA RECOGNITION

Patil V, Patil A ...see all

IJCSN International Journal of Computer Science and Network, vol. 6, issue 15 (2017)

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Academic Monitoring System

Adagale A, Agrawal D, Dane S ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 2 (2016) pp. 2277-5420

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Multi-Message Gossiping, With The Assistance Of Mobility

Gugale S, Dhone R, Khedakar D ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 2 (2015) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Beam Pattern Simulation of Nkutunse Antenna

Akoto-Danso A, Azankpo S, Proven-Adzri E, Atemkeng M, Ansah T, Narh – ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 3, issue 4 (2014) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Extraction of Hadith Based on Semantic Annotation

Kadhim R, Norwawi N, Abdulaaziz A, Al A ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 2 (2015) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Data Security Using Reliable Re-Encryption in Unreliable Cloud

Adhau A, Bobade P, Zilpe P, Fulmali Y ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 2 (2015) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Wi-Fi Offloading Strategies for Facing Mobile Data Traffic Challenges

Malolli I ...see all

IJCSN International Journal of Computer Science and Network, vol. 6, issue 25 (2017)

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Performance Evaluation of Anonymized Data Stream Classifiers

Nyati A, Bhatnagar D ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 2 (2016) pp. 2277-5420

  • 4

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Generic Proximity Privacy Preservation Technique for Data Anonymization in Cloud

Seetha R, Srijayanthi S, Sethukarasi T ...see all

IJCSN International Journal of Computer Science and Network, vol. 6, issue 25 (2017)

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Self-Reliant Location Privacy Techniques In Location Based Mobile Applications

Jagdale B, Bakal J ...see all

IJCSN International Journal of Computer Science and Network, vol. 6, issue 35 (2017)

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Enhancement of Distributed Network System using Fuzzy Based Load Balancing & Task Scheduling Technique

Rajguru A, Sulabha M, Apte S ...see all

IJCSN International Journal of Computer Science and Network, vol. 6, issue 25 (2017)

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Concert Estimation of IPV4 and IPV6 on its Throughput

Vengatesh T, Kannan S ...see all

IJCSN International Journal of Computer Science and Network, vol. 4, issue 1 (2015) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Vehicle Counting and Automated Toll Collection System using Image Processing

Sagar S, Jori J, Kale A, Khodade K, Mali P ...see all

IJCSN International Journal of Computer Science and Network, vol. 5, issue 2 (2016) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Design Approach for Dynamic Traffic Control System Based Radio Propagation Model in Vanet

Dorle S, Patel P ...see all

IJCSN International Journal of Computer Science and Network, vol. 2, issue 1 (2013) pp. 112-114

  • 2

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

To Identify of Human Using Finger-Vein Imaging

Gajare V, Patil S ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 4, issue 4 (2015) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Review on Resource Virtualization for Increasing Users Computing Power

Nawabasi R, Thakre V, Junghare U ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 5 (2014) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Review of Review of Review of Review of Code Code Code Code Clone Detection Clone Detection Clone Detection Clone Detection

Khanna J, Singh R, Garg R ...see all

IJCSN International Journal of Computer Science and Network, vol. 3, issue 2 (2014) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

A Comparison on Intelligent Web Information Retrieval Systems

Prasanth A, Hemalatha M ...see all

IJCSN -International Journal of Computer Science and Network ISSN, vol. 3, issue 6 (2014) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Linear Regression Based Analysis to Find Traffic Prone Areas

Khanna A, Malhotra T, Meena S, Yadav K ...see all

IJCSN International Journal of Computer Science and Network ISSN, vol. 4, issue 3 (2015) pp. 2277-5420

  • 1

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Showing the First 100 of 458 papers