An Open Access Journal | Publisher - D-LAR Labs [Digital Library of Academic Research] |
ISSN Under CSIR - NISCAIR
IJCSN Header
Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us
All Publications
  Volume 4, Issue 4 new
  Volume 4, Issue 3
  Volume 4, Issue 2
  Volume 4, Issue 1
  Volume 3, Issue 6
  Volume 3, Issue 5
  Volume 3, Issue 4
  Volume 3, Issue 3
  Volume 3, Issue 2
  Volume 3, Issue 1
  Volume 2, Issue 6
  Volume 2, Issue 5
  Volume 2, Issue 4
  Volume 2, Issue 3
  Volume 2, Issue 2
  Volume 2, Issue 1
  Volume 1, Issue 6
  Volume 1, Issue 5
  Volume 1, Issue 4
  Volume 1, Issue 3
  Volume 1, Issue 2
  Volume 1, Issue 1
     June 2013 Volume 2, Issue 3
   
  Digital Data Security and Copyright Protection Using Cellular Automata
 
M.Khlaif M.Talb
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 01-04
   
   
  Evolution of Gi-Fi Technology over other Technologies
 
Jyoti Tewari Swati Arya
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 05-08
   
   
  Simulation of Un-Symmetrical 2-Phase Induction Motor
 
S. F. Bandhekar S. N. Dhurvey P. P. Ashtankar
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 09-12
   
   
  Impact of Server Virtualization on Real Business World
 
Kapil Saxena
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 13-19
   
   
  Artificial Intelligence : Simulated Embodied Agents
 
Astha Jain Payal Jain Jitendra Singh
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 20-24
   
   
  An Overview of the Research on Texture Based Plant Leaf Classification
 
Vishakha Metre Jayshree Ghorpade
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 25-36
   
   
  Algorithm and Approaches to Handle Large Data - A Survey
 
Chanchal Yadav Shuliang Wang Manoj Kumar
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 37-41
   
   
  Compensatory Fuzzy Min-Max Neural Network for Object Recognition
 
Paras A. Tolia
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 42-47
   
   
  An Adaptive Expert System for an Educational Institute
 
Renuka Agrawal Jyoti Singh
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 48-55
   
   
  Role of Assembling Invariant Moments and SVM in Fingerprint Recognition
 
Supriya Wable Chaitali Laulkar
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 56-60
   
   
  Performance of IEEE 802.15.4 in WSN for Monitoring Real Time Air Pollution Parameters
 
Darshana N. Tambe Nekita A. Chavhan
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 61-66
   
   
  The Adaptive Optimized Routing Protocol for Vehicular Ad-hoc Networks
 
Kunal Vikas Patil M.R. Dhage
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 67-70
   
   
  Efficient Algorithms for Materialized View Selection in Data Warehousing Environment
 
Ashish Mohod Manoj Chaudhari
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 71-75
   
   
  Contribution to Securing Communications on VOIP
 
Tahina Ezéchiel Rakotondraina Ndaohialy Manda-vy Ravonimanantsoa Andry Auguste Randriamitantsoa
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 76-79
   
   
  Mining Weather Data Using Rattle
 
Venkata Abhishek Bavirisetty Avinash Ankireddy Prasad Seemakurthi K.V.N. Rajesh
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 80-85
   
   
  An Approach to Develop Embedded System For Web Based Monitoring & Controlling of Renewable Energy Sources
 
Akansha S. Fating T.H. Nagrare
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 86-90
   
   
  Using Unobtrusive Techniques for Detecting Leakage of Data
 
Shailaja B. Jadhav Prachi Joshi
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 91-95
   
   
  3D Reconstruction of Coronary Arteries from Angiographic Images: A Survey
 
Mahima Goyal Jian Yang Arun PrakashAgrawal
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 96-101
   
   
  A New Checkpoint Approach for Fault Tolerance in Grid Computing
 
Gokuldev S Valarmathi M
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 102-107
   
   
  Activity Modeling in Smart Home using High Utility Pattern Mining over Data Streams
 
Menaka Gandhi.J Gayathri K.S
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 108-114
   
   
  An Unsupervised Pattern Clustering Approach for Identifying Abnormal User Behaviors in Smart Home
 
Sukanya P Gayathri K.S
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 115-122
   
   
  Improved Multimodal Biometric Watermarking in Authentication Systems Based on DCT and Phase Congruency Model
 
Bairagi Nath Behera V. K. Govindan
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 123-129
   
   
  Performance Improvement Using Contention Window Adaptation in IEEE 802.11 WLANs
 
Swapnil S Tale Jyoti Kulkarni
 
Full Text Paper | Year: June 2013 | Volume 2 Issue 3 | Pages 130-135
   

 

  List of Computer Science Journals
Computer Science Journal IEEE Journals Conference Alerts
International Conference Alerts Impact Factor List of computer science journal
Engineering Journals IJCSN Electronics Journals
IEEE Papers * Mathematics Journals Call for papers 2013