An Open Access Journal | Publisher - D-LAR Labs [Digital Library of Academic Research] |
ISSN Under CSIR - NISCAIR
IJCSN Header
Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us
All Publications
  Volume 4, Issue 4 new
  Volume 4, Issue 3
  Volume 4, Issue 2
  Volume 4, Issue 1
  Volume 3, Issue 6
  Volume 3, Issue 5
  Volume 3, Issue 4
  Volume 3, Issue 3
  Volume 3, Issue 2
  Volume 3, Issue 1
  Volume 2, Issue 6
  Volume 2, Issue 5
  Volume 2, Issue 4
  Volume 2, Issue 3
  Volume 2, Issue 2
  Volume 2, Issue 1
  Volume 1, Issue 6
  Volume 1, Issue 5
  Volume 1, Issue 4
  Volume 1, Issue 3
  Volume 1, Issue 2
  Volume 1, Issue 1
     October 2014 Volume 3, Issue 5 [ Second Call ]
   
  The Solution for Efficient Electricity Management through Wireless Sensor Network
 
Vasundhara Ghate Neha Sathe Vivek Deshpande
 
Full Text Paper | Year: October 2014 | Volume 3 Issue 5 | Pages 279-283
   
   
  Performance Evaluation for Threads Execution in Single and Multi Core Processors
 
V. N. Sahare Dr. M. V. Sarode N. S. Sahare
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 284 - 291
   
   
  Comparative Approaches of Query Optimization for Partitioned Tables
 
Dipmala Salunke Girish Potdar
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 292-297
   
   
  A Comparative Study of Symmetric Key Encryption Algorithms
 
Amit Jain Divya Bhatnagar
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 298-303
   
   
  A Comparative Study of Prediction of Inverse Kinematics Solution of 2-DOF, 3-DOF and 5-DOF Redundant Manipulators by ANFIS
 
Layatitdev Das Jajneswar Nanda S. S. Mahapatra
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 304-308
   
   
  A Survey on Medical Image Watermarking Techniques
 
Balamurugan.G Dr.K.B.Jayarraman Arulalan.V
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 309-317
   
   
  Course File Management System
 
Zyad Shaaban
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 318-320
   
   
  Subspace Based Face Recognition using Clustering
 
Elumalai Gokulakrishnan Seshasayanam Asha
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 321-325
   
   
  Pattern Recognition: Possible Research Areas and Issues
 
Jayashree Rajesh Prasad
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 326-333
   
   
  Image Normalization and Preprocessing for Gujarati Character Recognition
 
Jayashree Rajesh Prasad
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 334-339
   
   
  Handwritten Character Recognition: A Review
 
Jayashree Rajesh Prasad
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 340-351
   
   
  Performance Evolution of Micro-Electro- Mechanical-Systems Switches for High Frequency Applications
 
Nitin K. Ahire
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 352-355
   
   
  Review on Resource Virtualization for Increasing Users Computing Power
 
Radhika R. Nawabasi Dr. V. M. Thakre Dr. U. S. Junghare
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 356-361
   
   
  Mirror Based Framework for Human Body Measurement
 
Takeshi Hashimoto Takayuki Suzuki András Rövid
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 362-367
   
   
  A Study of (QoS) Parameter for Handoff in GSM & CDMA
 
Amit Dixit Sujata Sharma
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 368-376
   
   
  Ameliorate Security by Fifth Factor Authentication
 
Siva Srinivasa Rao Mothukuri
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 377-380
   
   
  Dynamic Port Generation Using Any Communication Protocol over Custom Security Layer
 
Siva Srinivasa Rao Mothukuri
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 381-384
   
   
  Health Care Using Telemedicine: A Case Study of Yobe State, Nigeria
 
Matawalli Ajagana Geidam Ibrahim A. Bello Rajesh Prasad
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 385-392
   
   
  Risk Indicators for Information Security Risk Identification
 
Upasna Saluja Norbik Bashah Idris
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 393-401
   
   
  Formation of Metagraph Using Clustering
 
Seema Gaur Praveen Dhyani
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 402-404
   
   
  A Survey on Intrusion Detection Systems for Android Smartphones
 
Chani Jindal Mukti Chowkwale Rohan Shethia Sohail Ahmed Shaikh
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 405-411
   
   
  Detection of Malicious Nodes in Ad Hoc Network using Statistical Method
 
Rajib Das BipulSyam Purkayastha Sanjeev Kumar Singh
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 412-415
   
   
  A Comparison of Global EDF and LLREF Scheduling Algorithms
 
Valma Prifti Bledar Balla Romina Zane Juliaj Fejzaj Igli Tafa
 
Full Text Paper |Year: October 2014 | Volume 3 Issue 5 | Pages 416-420
   

  List of Computer Science Journals
Computer Science Journal IEEE Journals Conference Alerts
International Conference Alerts Impact Factor List of computer science journal
Engineering Journals IJCSN Electronics Journals
IEEE Papers * Mathematics Journals Call for papers 2013