An Open Access Journal | Publisher - D-LAR Labs [Digital Library of Academic Research] |
ISSN Under CSIR - NISCAIR
IJCSN Header
Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us
All Publications
  Volume 5, Issue 3
  Volume 5, Issue 2
  Volume 5, Issue 1
  Volume 4, Issue 6
  Volume 4, Issue 5
  Volume 4, Issue 4
  Volume 4, Issue 3
  Volume 4, Issue 2
  Volume 4, Issue 1
  Volume 3, Issue 6
  Volume 3, Issue 5
  Volume 3, Issue 4
  Volume 3, Issue 3
  Volume 3, Issue 2
  Volume 3, Issue 1
  Volume 2, Issue 6
  Volume 2, Issue 5
  Volume 2, Issue 4
  Volume 2, Issue 3
  Volume 2, Issue 2
  Volume 2, Issue 1
  Volume 1, Issue 6
  Volume 1, Issue 5
  Volume 1, Issue 4
  Volume 1, Issue 3
  Volume 1, Issue 2
  Volume 1, Issue 1
     June 2016, Volume 5, Issue 3 - Full Volume
 
  Deafness Removal for Directional MAC in Ad-hoc Network
 
Gopal Singh Bhadoriya Reena Chauhan
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 424-428
   
 
  A Comparative Study of Multi Scale Transform based Fusion Techniques
 
Arwinder Kaur Ramanjeet Kaur Manish Mahajan Shalini Singh
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 429-436
   
 
  Neighbor Node Discovery for Wireless Ad-Hoc Network
 
Snehal V. Ambatkar Pravin Kulkarni
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 437-440
   
 
  Home Automation Using the Concept of IoT
 
Tejal Deshpande Nitin Ahire
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 441-445
   
 
  Wireless Multi-Hop Dynamic Live Video Sharing using Android Gadgets
 
Suvarna L. Kattimani Deepa Deshpande Nazeera Madabhavi Rohini Naganur Savitri Seeparamatti
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 446-453
   
 
  Hybrid Approach for Anonymity based Secured Routing in MANET with Effective Resource Utilization
 
Charulata Ahir Dr. Hemant Deshmukh
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 454-457
   
 
  An Efficient Multipath Routing Protocol with Replication for On-demand Video Streaming in MANETs
 
R. Raja Sekhar Dr. P. Chennareddy
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 458-466
   
 
  Directions Aids for the Visually Challenged Using Image Processing Using Image Recognition
 
Riya Mishra Sampurna Mondal Aditi Kuchnure Risha Shah
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 467-471
   
 
  Prioritizing Emails and Protect from Spam by Effectively Using Identity and Address Book Features
 
Venkata SanyasiRao Sasipalli Krishnam Raju Gottumukkala K.S. Murthy Naidu
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 472-476
   
 
  Statistical Approach for Sentiment Analysis of Product Reviews
 
Nilesh Shelke Shriniwas Deshpande Vilas Thakare
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 477-482
   
 
  Mash-Up in Multiple Cloud Computing With Security
 
Mrunali Khedikar Sulbha Patil Rajiv Dharasakar
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 483-488
   
 
  Improved Technique for Simulation of Digital Forensic Architecture Framework in Cloud
 
Smita Kamble Sulabha Patil Rajiv Dharaskar
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 489-496
   
 
  Technique for Proficiently Yielding Deep-Web Interfaces Using Smart Crawler
 
Devendra Hapase M. D. Ingle
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 497-503
   
 
  E-learning Optimization by Improving Education Cloud Using the Grid
 
Abbas Taheri Morteza Zolfpour-Arokhlo Farhad Rad
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 504-508
   
 
  Review on Secure Proof of Retrievability
 
Saurabhee Wandhekar Aradhana Deshmukh
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 509-512
   
 
  Internet Usage by Distance Students in Private University Libraries in GHANA
 
Samuel Ameyaw Edward Asante
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 513-522
   
 
  Effective Sampling Selection Strategy with Reduced Effort Implied, In Tuning Large Scale Deduplication
 
Ashwini R. Sridevi S.
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 523-525
   
 
  A Review on Development of Real Time Algorithm using Mobile Adhoc Networks for Disaster Management
 
Moresh M Mukhedkar Dr. Uttam Kolekar
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 526-534
   
 
  An Approach for Integrating Data with Uncertainty Schema in a Slow Network Connection
 
Vitalis Ndume Jesuk Ko
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 535-543
   
 
  Approach Using Genetic Algorithm for Intrusion Detection System
 
Abhijeet Karve
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 544-548
   
 
  Data Preserving and Sharing in a Multi Owner Environment While Preserving Identity Privacy
 
Swapnil N. Naidu Sunilkumar N. Jaiswal
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 549-553
   
 
  Rules Based Intrusion Detection System Using Genetic Algorithm
 
Pawan S. Maniyar Dr. Vijaya Musande
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 554-558
   
 
  Authorized Deduplication in Hybrid Cloud
 
Jagadish P Shryavani K Anand R Dr. M V Vijaykumar
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 559-563
   
 
  Torrent Based Content Streaming and Image Compression in WSN
 
Bhushan Mahajan Dr. A. R. Mahajan A. Thomas
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 564-573
   
 
  Comparison of Routing Protocols in MANET- A Review
 
Indu Sharma Shaina Pundir
 
Full Text Paper | Year: June 2016 | Volume 5 Issue 3 | Pages 574-577
   

  List of Computer Science Journals
Computer Science Journal IEEE Journals Conference Alerts
International Conference Alerts Impact Factor List of computer science journal
Engineering Journals IJCSN Electronics Journals
IEEE Papers * Mathematics Journals Call for papers 2013