Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computer Science and Network

ISSN: 2277--5420
Publisher: IJCSN publisher


ADD TO MY LIST
 
Distributed Conditional Multicast Access for IP TV in High-Speed Wireless Networks (Destination Specific Multicast) PDF available

Author(s): Jan Fesl | Richard Klee | Marie Dolezalova
Volume: 2
Issue: 6
Year: 2013
Data Minder using Steganography : Technology of Data Encryption PDF available

Author(s): Bhushan Walke | Riddhi Naik | Dhara Desai
Volume: 2
Issue: 6
Year: 2013
A Survey on Algorithms for Optimal Path Search in Dynamic Networks PDF available

Author(s): Neeraj Navlakha | Manisha J. Nene
Volume: 2
Issue: 6
Year: 2013
Review of Various Algorithms Used in Hybrid Cryptography PDF available

Author(s): Veerpal Kaur | Aman Singh
Volume: 2
Issue: 6
Year: 2013
Data Warehouse Creation for Preparing an Electricity Statistics Dashboard PDF available

Author(s): Shivani Khedikar | Purva Kirolikar | Supriya Thombre
Volume: 2
Issue: 6
Year: 2013
A Review on Metamorphic Cryptography for Video Files PDF available

Author(s): Dhananjay M. Dumbere | Nitin J. Janwe
Volume: 2
Issue: 6
Year: 2013
A Survey on Schedule-Based MAC Protocols for Wireless Sensor Networks PDF available

Author(s): Abul Kalam Azad | M. Humayun Kabir | Md. Bellal Hossain
Volume: 2
Issue: 6
Year: 2013
JPEG versus GIF Images in forms of LSB Steganography PDF available

Author(s): ELTYEB E. ABED ELGABAR | FAKHRELDEEN A. MOHAMMED
Volume: 2
Issue: 6
Year: 2013
A Review on the Various Recent Steganography Techniques PDF available

Author(s): Sandeep Singh | Aman Singh
Volume: 2
Issue: 6
Year: 2013
Improvised Security for RDF using Random Salt and Levels with Bi-Directional Translation to Relational Database PDF available

Author(s): Siva Srinivasa Rao Mothukuri | Sai Ganesh Repaka
Volume: 2
Issue: 6
Year: 2013
Taxonomy of Dummy Generation Techniques for Preserving Location Privacy PDF available

Author(s): Priti Jagwani | Ranjan Kumar
Volume: 2
Issue: 6
Year: 2013
Analytical Modeling of Social Network Growth Using Multilayer Network Projection PDF available

Author(s): Kambiz Behfar | Ekaterina Turkina | Patrick Cohendet | Animesh Animesh
Volume: 2
Issue: 6
Year: 2013
The Adoption of Information and Communications Technology in the Administration of Health Insurance Schemes in Ghana PDF available

Author(s): Jeffrey Mingle | Michael Dzigbordi Dzandu
Volume: 2
Issue: 6
Year: 2013
Back Propagation Neural Network Based Gender Classification Technique Based on Facial Features PDF available

Author(s): Ms. Anushri Jaswante | Dr. Asif Ullah Khan | Dr. Bhupesh Gour
Volume: 2
Issue: 6
Year: 2013
DPMAP for Abrupt Manuscript Clustering with Attribute Partition PDF available

Author(s): K.Nithya | G.PadmaPriya
Volume: 2
Issue: 6
Year: 2013
A Survey on Privacy Enhancement in Cloud Computing using Identity Management PDF available

Author(s): M. Janaki | Dr.M.Ganaga Durga
Volume: 2
Issue: 6
Year: 2013
Designing of a Tool for String Matching using Regular Expressions PDF available

Author(s): Panthadeep Bhattacharjee | Hussain Ahmed Choudhury | Nasima Aktar Laskar
Volume: 2
Issue: 6
Year: 2013
Activity Modeling in Smart Home using High Utility Pattern Mining over Data Streams PDF available

Author(s): Menaka Gandhi . J | Gayathri K . S
Volume: 2
Issue: 3
Year: 2013
The Adaptive Optimized Routing Protocol for Vehicular Ad-hoc Networks PDF available

Author(s): Kunal Vikas Patil | M.R. Dhage
Volume: 2
Issue: 3
Year: 2013
Role of Assembling Invariant Moments and SVM in Fingerprint Recognition PDF available

Author(s): Supriya Wable | Chaitali Laulkar
Volume: 2
Issue: 3
Year: 2013
Improved Multimodal Biometric Watermarking in Authentication Systems Based on DCT and Phase Congruency Model PDF available

Author(s): Bairagi Nath Behera | V.K. Govindan
Volume: 2
Issue: 3
Year: 2013
An Approach to Develop Embedded System For Web Based Monitoring & Controlling of Renewable Energy Sources PDF available

Author(s): Akansha S. Fating | T.H. Nagrare
Volume: 2
Issue: 3
Year: 2013
An Overview of the Research on Texture Based Plant Leaf Classification PDF available

Author(s): Vishakha Metre | Jayshree Ghorpade
Volume: 2
Issue: 3
Year: 2013
Evolution of Gi-Fi Technology over other Technologies PDF available

Author(s): Jyoti Tewari | Swati Arya
Volume: 2
Issue: 3
Year: 2013
Artificial Intelligence:Simulated Embodied Agents PDF available

Author(s): Astha Jain | Payal Jain | Jitendra Singh
Volume: 2
Issue: 3
Year: 2013
Contribution to Securing Communications on VOIP PDF available

Author(s): Tahina Ezéchiel Rakotondraina | Ndaohialy Manda-vy Ravonimanantsoa | Andry Auguste Randriamitantsoa
Volume: 2
Issue: 3
Year: 2013
Performance Improvement Using Contention Window Adaptation in IEEE 802.11 WLANs PDF available

Author(s): Swapnil S Tale | Jyoti Kulkarni
Volume: 2
Issue: 3
Year: 2013
Simulation of Un-Symmetrical 2-Phase Induction Motor PDF available

Author(s): S. F. Bandhekar | S. N. Dhurvey | P. P. Ashtankar
Volume: 2
Issue: 3
Year: 2013
Efficient Algorithms for Materialized View Selection in Data Warehousing Environment PDF available

Author(s): Ashish Mohod | Manoj Chaudhari
Volume: 2
Issue: 3
Year: 2013
Digital Data Security and Copyright Protection Using Cellular Automata PDF available

Author(s): M.Khlaif | M.Talb
Volume: 2
Issue: 3
Year: 2013
An Unsupervised Pattern Clustering Approach for Identifying Abnormal User Behaviors in Smart Home PDF available

Author(s): Sukanya P | Gayathri K S
Volume: 2
Issue: 3
Year: 2013
Impact of Server Virtualization on Real Business World PDF available

Author(s): Kapil Saxena
Volume: 2
Issue: 3
Year: 2013
3D Reconstruction of Coronary Arteries from Angiographic Images: A Survey PDF available

Author(s): Mahima Goyal | Jian Yang | Arun PrakashAgrawal
Volume: 2
Issue: 3
Year: 2013
Compensatory Fuzzy Min-Max Neural Network for Object Recognition PDF available

Author(s): Paras A. Tolia
Volume: 2
Issue: 3
Year: 2013
Using Unobtrusive Techniques for Detecting Leakage of Data PDF available

Author(s): Shailaja B. Jadhav | Prachi Joshi
Volume: 2
Issue: 3
Year: 2013
A New Checkpoint Approach for Fault Tolerance in Grid Computing PDF available

Author(s): Gokuldev S | Valarmathi M
Volume: 2
Issue: 3
Year: 2013
An Adaptive Expert System for an Educational Institute PDF available

Author(s): Renuka Agrawal | Jyoti Singh
Volume: 2
Issue: 3
Year: 2013
Algorithm and Approaches to Handle Large Data - A Survey PDF available

Author(s): Chanchal Yadav | Shuliang Wang | Manoj Kumar
Volume: 2
Issue: 3
Year: 2013
Performance of IEEE 802.15.4 in WSN for Monitoring Real Time Air Pollution Parameters PDF available

Author(s): Darshana N. Tambe | Nekita A. Chavhan
Volume: 2
Issue: 3
Year: 2013
Mining Weather Data Using Rattle PDF available

Author(s): Venkata Abhishek Bavirisetty | Avinash Ankireddy | Prasad Seemakurthi | K.V.N. Rajesh
Volume: 2
Issue: 3
Year: 2013
Security Threats in Prepaid Mobile PDF available

Author(s): Arshiya Begum | Mohammed Tanveer Ali
Volume: 2
Issue: 2
Year: 2013
Collision Avoidance Using Inter-Vehicle Ad-hoc Communication PDF available

Author(s): Mahesh Panjwani | Humera Syed | Sumera Qazi
Volume: 2
Issue: 2
Year: 2013
Protection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique PDF available

Author(s): Mr.A.Duraisamy | Mr.M.Sathiyamoorthy | Mr.S.Chandrasekar
Volume: 2
Issue: 2
Year: 2013
Energy-Efficient Cloud Computing: A Vision, Introduction, and Open Challenges PDF available

Author(s): Ms.Jayshri Damodar Pagare | Dr.Nitin A Koli
Volume: 2
Issue: 2
Year: 2013
Wireless Networks Security Using Dispersive Routing Mechanism PDF available

Author(s): Vulupala Sridhar Reddy | M. Venkateswara Rao
Volume: 2
Issue: 2
Year: 2013
An Approach to Authenticate user’s Mobile device and to Preserve Privacy towards Location Proof(A2MP2LP) PDF available

Author(s): Senthilguru S | Blessed Prince P
Volume: 2
Issue: 2
Year: 2013
Noise Suppression in Tele-Lectures using Bi-Modal Feature Extraction PDF available

Author(s): E.S.Selvakumar | S.Shanmuga Priya
Volume: 2
Issue: 2
Year: 2013

Tango Jona
Tangokurs Rapperswil-Jona

    
RPA Switzerland

Robotic Process Automation Switzerland