An Open Access Journal | Publisher - D-LAR Labs [Digital Library of Academic Research] |
ISSN Under CSIR - NISCAIR
IJCSN Header
Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us
All Publications
  Volume 4, Issue 4 new
  Volume 4, Issue 3
  Volume 4, Issue 2
  Volume 4, Issue 1
  Volume 3, Issue 6
  Volume 3, Issue 5
  Volume 3, Issue 4
  Volume 3, Issue 3
  Volume 3, Issue 2
  Volume 3, Issue 1
  Volume 2, Issue 6
  Volume 2, Issue 5
  Volume 2, Issue 4
  Volume 2, Issue 3
  Volume 2, Issue 2
  Volume 2, Issue 1
  Volume 1, Issue 6
  Volume 1, Issue 5
  Volume 1, Issue 4
  Volume 1, Issue 3
  Volume 1, Issue 2
  Volume 1, Issue 1
     April 2014 Volume 3, Issue 2
   
  Four Wheel Accident Prevention and Alert System
 
Samrudhi Bahatkar Shital Patil Priya Nagose Mrs.Nilima Jichkar
 
Full Text Paper | Year: April 2014 | Volume 3 Issue 2 | Pages 01-05
   
   
  A Review on Manipulation Techniques for Book Detection
 
Mittal Patne Minal Kamble
 
Full Text Paper | April 2014 | Volume 3 Issue 2 | Pages 06-08
   
   
  A Best Fit Mathematical Model for Maximizing GridFTP Throughput Based on Real and Simulated Network Conditions
 
Ioannis Barbounakis Pantelis Askordalakis Michael Zervakis Demosthenes Akoumianakis
 
Full Text Paper | April 2014 | Volume 3 Issue 2 | Pages 09-15
   
   
  Personality Trait Identification - A Survey
 
Syeda Asra Dr.Shubhangi D.C
 
Full Text Paper | April 2014 | Volume 3 Issue 2 | Pages 16-29
   
   
  A Survey on Authentication Protocols and Security Techniques for Wireless Sensor Networks
 
Aaisha Jabeen Siddiqui Jagdish pimple Aarti Rabindrasingh Thakur Priyanka Chandrakant Waghmare
 
Full Text Paper | April 2014 | Volume 3 Issue 2 | Pages 30-34
   
   
  Evaluation of LSB Data Hiding in Various Images
 
ELTYEB E. ABED ELGABAR
 
Full Text Paper | April 2014 | Volume 3 Issue 2 | Pages 35-42
   
   
  Using WASSEC to Analysis and Evaluate Open Source Web Application Security Scanners
 
Fakhreldeen Abbas Saeed
 
Full Text Paper | April 2014 | Volume 3 Issue 2 | Pages 43-49
   
   
  Matching Sketches to Facial Photographs
 
Mrunali Khedikar Sarita Shivarkar Dipali Tayde Gayatri Bhure
 
Full Text Paper | April 2014 | Volume 3 Issue 2 | Pages 50-53
   
   
  Secured Data Storage with Enhanced TPA Auditing Scheme using Merkle Hash Tree in Cloud Computing
 
R.Logashree S.Brintha Rajakumari
 
Full Text Paper | April 2014 | Volume 3 Issue 2 | Pages 54-59
   
   
  Security Surface Analysis and Patching
 
Pritish Niranjan Apurva Mangrulkar Tejaswini Bhandarkar Krushna Gupta
 
Full Text Paper | April 2014 | Volume 3 Issue 2 | Pages 60-63
   
   
  Image Based Authentication for Phishing using Visual Cryptography
 
Ritika Ogra Niharika Limaye Vrushali Deshmukh
 
Full Text Paper | April 2014 | Volume 3 Issue 2 | Pages 64-69
   
   
  Comparison Result of Songket Motives Retrieval through Sketching Technique with Keyword Technique
 
Nadiah btYusof Tengku SitiMeriambtTengkuWook Siti Fadzilahbt Mat Noor
 
Full Text Paper | April 2014 | Volume 3 Issue 2 | Pages 70-76
   
   
  The Impact of Creativity on Organizational Knowledge Management Processes
 
Soodabeh Radfard Maryam Haghshenas Ali Rostami
 
Full Text Paper | April 2014 | Volume 3 Issue 2 | Pages 77-81
   
   
  Adoption of Information and Communication Technology in Road Accident Reduction
 
Asha Murali Ajaya Kumar K
 
Full Text Paper | April 2014 | Volume 3 Issue 2 | Pages 82-89
   
   
  Self-Learning and Assessment Platform
 
Kriti Sharma Hitesh Yadav
 
Full Text Paper | April 2014 | Volume 3 Issue 2 | Pages 90-94
   
   
  Review of Code Clone Detection
 
Jyoti Khanna Rajvir Singh Ritu Garg
 
Full Text Paper | April 2014 | Volume 3 Issue 2 | Pages 95-98
   
   
  Implementation of Websocket over p2p Network As Review Paper
 
Ms.Kalyani Dhodre Mr.Sudhakar Parate Mr. Ashish Sambare
 
Full Text Paper | April 2014 | Volume 3 Issue 2 | Pages 99-103
   
   
  Analysis of Ants Agent and their Characteristics
 
Nancy Khanna Sharnjeet Kaur
 
Full Text Paper | April 2014 | Volume 3 Issue 2 | Pages 104-108
   
   
  Semantic Web Architecture and their Issues
 
Nancy Khanna Sharnjeet Kaur
 
Full Text Paper | April 2014 | Volume 3 Issue 2 | Pages 109-113
   
   
  Evaluation of Web Mining Approach
 
Sharnjeet Kaur Nancy Khanna
 
Full Text Paper | April 2014 | Volume 3 Issue 2 | Pages 114-117
   

 

  List of Computer Science Journals
Computer Science Journal IEEE Journals Conference Alerts
International Conference Alerts Impact Factor List of computer science journal
Engineering Journals IJCSN Electronics Journals
IEEE Papers * Mathematics Journals Call for papers 2013