An Open Access Journal | Publisher - D-LAR Labs [Digital Library of Academic Research] |
ISSN Under CSIR - NISCAIR
IJCSN Header
Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us
All Publications
  Volume 4, Issue 4 new
  Volume 4, Issue 3
  Volume 4, Issue 2
  Volume 4, Issue 1
  Volume 3, Issue 6
  Volume 3, Issue 5
  Volume 3, Issue 4
  Volume 3, Issue 3
  Volume 3, Issue 2
  Volume 3, Issue 1
  Volume 2, Issue 6
  Volume 2, Issue 5
  Volume 2, Issue 4
  Volume 2, Issue 3
  Volume 2, Issue 2
  Volume 2, Issue 1
  Volume 1, Issue 6
  Volume 1, Issue 5
  Volume 1, Issue 4
  Volume 1, Issue 3
  Volume 1, Issue 2
  Volume 1, Issue 1
     December 2013 Volume 2, Issue 6
   
  Vulnerability, Human Behaviour, Hazards and Expected Utility in the Context of Risk Management
 
Avelino Mondlane Oliver Popov Karin Hansson
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 01-11
   
   
  An Analysis of Artificial Intelligence in Machines & Chinese Room Problem
 
Priyanka Yedluri A.Nagarjuna
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 12-16
   
   
  Performance Evolution of EACP Protocol for System Optimization in Heterogeneous Sensor Network
 
Shashi Kant Gupta Dr. S.P Singh Dr. Saurabh Shrivastva
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 17-24
   
   
  Mobile Robot Navigation with Obstacle Avoidance in Unknown Indoor Environment using MATLAB
 
Hedjar Ramdane Mohammed Faisal Mohammed Algabri Khalid Al-Mutib
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 25-31
   
   
  A Survey on Communication Gap between Hearing and Speech Impaired Persons and Normal Persons
 
Nisha Advani Sayali Bora Apeksha Bhat Shubhangi Yerolkar
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 32-36
   
   
  Detection of Bias, Drift, Freeze and Abrupt Sensor Failure using Intelligent Dedicated Observer Based Fault Detection and Isolation for Three Interacting Tank Process
 
C. Amritha U. Sabura Banu
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 37-46
   
   
  Data Minder using Steganography : Technology of Data Encryption
 
Bhushan Walke Riddhi Naik Dhara Desai
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 47-51
   
   
  Assessing the Organizationsí Disaster Recovery Preparedness : A study of SMEs in Zimbabwe
 
Khanyisa Malufu
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 52-58
   
   
  Data Warehouse Creation for Preparing an Electricity Statistics Dashboard
 
Shivani Khedikar Purva Kirolikar Supriya Thombre
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 59-72
   
   
  The Adoption of Information and Communications Technology in the Administration of Health Insurance Schemes in Ghana
 
Jeffrey Mingle Michael Dzigbordi Dzandu
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 72-81
   
   
  Improvised Security for RDF using Random Salt and Levels with Bi-Directional Translation to Relational Database
 
Siva Srinivasa Rao Mothukuri Sai Ganesh Repaka
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 82-85
   
   
  JPEG versus GIF Images in forms of LSB Steganography
 
Eltyeb E. Abed Algabar Fakhreldeen A. Mohammed
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 86-93
   
   
  A Survey on Privacy Enhancement in Cloud Computing using Identity Management
 
M. Janaki Dr.M.Ganaga Durga
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 94-102
   
   
  Designing of a Tool for String Matching using Regular Expressions
 
Panthadeep Bhattacharjee Hussain Ahmed Choudhury Nasima Aktar Laskar
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 103-107
   
   
  Back Propagation Neural Network Based Gender Classification Technique Based on Facial Features
 
Ms. Anushri Jaswante Dr. Asif Ullah Khan Dr. Bhupesh Gour
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 108-113
   
   
  Analytical Modeling of Social Network Growth Using Multilayer Network Projection
 
Kambiz Behfar Ekaterina Turkina Patrick Cohendet Animesh Animesh
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 114-119
   
   
  A Survey on Schedule-Based MAC Protocols for Wireless Sensor Networks
 
Abul Kalam Azad M. Humayun Kabir Md. Bellal Hossain
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 120-128
   
   
  A Review on Metamorphic Cryptography for Video Files
 
Dhananjay M. Dumbere Nitin J. Janwe
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 129-136
   
   
  Distributed Conditional Multicast Access for IP TV in High-Speed Wireless Networks (Destination Specific Multicast)
 
Jan Fesl Richard Klee Marie Dolezalova
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 137-141
   
   
  A Review on the Various Recent Steganography Techniques
 
Sandeep Singh Aman Singh
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 142-156
   
   
  Review of Various Algorithms Used in Hybrid Cryptography
 
Veerpal Kaur Aman Singh
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 157-173
   
   
  Taxonomy of Dummy Generation Techniques for Preserving Location Privacy
 
Priti Jagwani Ranjan Kumar
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 174-178
   
   
  DPMAP for Abrupt Manuscript Clustering with Attribute Partition
 
K.Nithya G.PadmaPriya
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 179-183
   
   
  A Survey on Algorithms for Optimal Path Search in Dynamic Networks
 
Neeraj Navlakha Manisha J. Nene
 
Full Text Paper | Year: December 2013 | Volume 2 Issue 6 | Pages 184-195
   

 

  List of Computer Science Journals
Computer Science Journal IEEE Journals Conference Alerts
International Conference Alerts Impact Factor List of computer science journal
Engineering Journals IJCSN Electronics Journals
IEEE Papers * Mathematics Journals Call for papers 2013