An Open Access Journal | Publisher - D-LAR Labs [Digital Library of Academic Research] |
ISSN Under CSIR - NISCAIR
Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us
Latest News
Vol 3, Issue 1 paper submission date declared.

Vol 2, Issue 6 articles published on 01st Dec 2013.

IJCSN Journal impact factor is displayed in Jan 2014.

IJCSN journal articles citated in some insteemed journals.

 


            February 2012

A Statistical analysis of Bubble sort in terms of serial and parallel computation
Sunil Kumar Panigrahi, Dr. Soubhik Chakraborty
Full Text Paper

 

Modified Cocomo Model For Maintenance cost Estimation of Real Time System Software
Sugandha Chakraverti, Prof Sheo Kumar, Dr. S.C. Agarwal, Ashish Kumar Chakraverti
Full Text Paper

 

Analytical Scenario of Software Testing Using Simplistic Cost Model
Er. RAJENDER BATHLA, Dr. ANIL KAPIL
Full Text Paper

 

Performance Evaluation of Dynamic Particle Swarm Optimization
Ms. Hemlata S.Urade, B. Prof. Rahila Patel
Full Text Paper

 

High Performance Efficiency of Distributed Optical Fiber Raman Amplifiers for Different Pumping Configurations in Different Fiber Cable Schemes
Abd ElĖNaser A. Mohamed, Ahmed Nabih Zaki Rashed, Mahmoud M. A. Eid
Full Text Paper

 

Modified Small Business Network Security
Md. Belayet Ali, Oveget Das
Full Text Paper

 

 

            April 2012

A Novel Method for Water irrigation System for paddy fields using ANN
L. Prisilla, P. Simon Vasantha Rooban, Dr. L. Arockiam
Full Text Paper

 

High-speed Multiplier Design Using Multi-Operand Multipliers
Mohammad Reza Reshadi Nezhad,Kaivan Navi
Full Text Paper

 

A Novel Authenticity of an Image Using Visual Cryptography
Prashant Kumar Koshta, Dr. Shailendra Singh Thakur
Full Text Paper

 

Converter Protection Scheme for Doubly-Fed Induction Generators during Disturbances
Kadam D.P., Dr. Kushare B.E.
Full Text Paper

            June 2012

3-Layer Security Using Face Recognition in Cloud
Yogeshwari Chaudhari, Tanaya Dave,Sarita Barade, SupriyaMane
Full Text Paper

 

GPS INTEGRATED NAVIGATION SYSTEM
Swati R. Dhabarde
Full Text Paper

 

Real Time Health Monitoring Using GPRS Technology
Shubhangi M. Verulkar, Maruti Limkar
Full Text Paper

 

Review on Reducing Noise Over Color Image Processing Pipeline for Digital Camera.
Payun S. Tembhurne, Prof. V.K. Shandilya
Full Text Paper

 

Implementation of Human Health Monitoring using Zigbee
Ms. Chetana. P. Dodke , Prof. Trupti. H. Nagrare
Full Text Paper

 

Detection and Classification of QRS and ST segment using WNN
Surendra Dalu , Nilesh Pawar
Full Text Paper

 

RFID based Bill Generation and Payment through Mobile
Swati R.Zope, Prof. Maruti Limkar
Full Text Paper

 

Development of Virtual Experiment on Clipping Circuits
Bhaskar Y. Kathane, Pradeep B. Dahikar
Full Text Paper

 

RELIABILITY ORIENTED TRANSPORT PROTOCOL IN WSN
Bejoy.B.J, Dr.B.Paramasivan
Full Text Paper

 

PC-RC4 Algorithm: An Enhancement Over Standard RC4 Algorithm
Pardeep, Pushpendra Kumar Pateriya
Full Text Paper

 

A Development of an ISG Framework for Mosulís Health Sector
Mohammad Salim, Marini Othman, Maha M.Ablahd
Full Text Paper

 

Detecting Sinking Behavior at MAC and Network Layer Using SVM in Wireless Ad hoc Networks
K.Kiruthika Devi, M.Ravichandran
Full Text Paper

 

DIAGNOSTICS IN HOMEOPATHIC SYSTEM USING NEURO-FUZZY NETWORKS
K.L. Kar, Rajiv Pathak
Full Text Paper

 

Dynamic Cache Compression Technique in Chip Multiprocessors
Prof. H. R. Deshmukh,Dr. G. R. Bamnote
Full Text Paper

 

Dynamic Test Case Design Scenario and analysis of Module Testing Using Manual vs. Automated Technique
Er. RAJENDER KUMAR, Dr. M.K.GUPTA
Full Text Paper

 

CVLEACH: Coverage based energy efficient LEACH algorithm
Prof Ankit Thakkar, Dr K Kotecha
Full Text Paper

 

PC1-RC4 and PC2-RC4 Algorithms: Pragmatic Enrichment Algorithms to Enhance RC4 Stream Cipher Algorithm
Pardeep, Pushpendra Kumar Pateriya
Full Text Paper

 

Pervasive Computing goals and its Challenges for Modern Era
Lalit Prasad, Y.B Joshi
Full Text Paper

 

Minimizing the overhead in the terminode routing protocol in mobile adhoc networks.
Sd Salman Ali, Syed Arfath Ahmed ,Dr. Mohammed Yousuf Khan
Full Text Paper

 

An Efficient Parallel Strategy for Data Forwarding in Event Based Wireless Sensor Networks
Itu Snigdh, Partha Pratim Bhuyan, Nisha Gupta
Full Text Paper

 

Integrating Heterogeneous Data Sources Using XML Mediator
Yogesh R.Rochlani , Prof. A.R. Itkikar
Full Text Paper

 

Use of Inheritance Feature in Relational Database Development
A.V.Saurkar, Prof. A.R. Itkikar
Full Text Paper

 

A Concrete Pipe Manufacturing Control System with a Programmable Logic Controller (PLC) and HMI for Industrial Plants ó an Experimental Setup
Vikas V. Suryavanshi, Prof. R. G. Jamkar
Full Text Paper

 

FCM Based Blood Vessel Segmentation Method for Retinal Images
Nilanjan Dey, Anamitra Bardhan Roy, Moumita Pal, Achintya Das
Full Text Paper

 

Early Pest Identification in Greenhouse Crops using Image Processing Techniques
Mr. S. R. Pokharkar, Dr. Mrs. V. R. Thool
Full Text Paper

 

Implementation of Discrete Wavelet Transform Processor For Image Compression
Ms.Yamini S.Bute, Prof. R.W. Jasutkar
Full Text Paper

 

Interpretation of significant eye blinks with the use of intelligent agent for effective human computer interaction
Suman Deb, Diptendu Bhattacharya, Mrinal Kanti Debbarma
Full Text Paper

 

Hiding Sensitive Association Rule Using Clusters of Sensitive Association Rule
Sanjay keer, Prof. Anju Singh
Full Text Paper

 

Physical modeling of musical synthesiser
Ms.Sofia K.Pillai, Mrs.J.J.Shah
Full Text Paper

 

The Challenges of ICT Graduate Un-Employment in Developing Economies in Africa - Case Study: Ghana
Edward Danso Ansong, Emmanuel A. Affum, James. B. Hayfron-Acquah
Full Text Paper

 

On Line Real Time Health Monitoring of ICU Patients using ARM7
Mrs. Rajashri Patil , Prof.Balaji Hogade
Full Text Paper

            August 2012

Biological Early Brain Cancer Detection Using Artificial Neural Network
Shaikh Afroz Fatima
Full Text Paper

 

Optimized Multi Agent Coordination using Evolutionary Algorithm: Special Impact in Online Education
Subrat P Pattanayak, Dr Sujata Dash, Sanjay Sen
Full Text Paper

 

Distance Measurement with Active & Passive Method
Atul Yadav, Prof. T. B. Mohite-Patil
Full Text Paper

 

A Survey on Spatio-Temporal Data Mining
DIPIKA KALYANI, Prof. Setu Kumar Chaturvedi
Full Text Paper

 

Advent and Importance of Handoff under Wireless Communication Evolution
Sayem Patni, Prof. B. G. Hogade
Full Text Paper

 

MULTI QUERY OPTIMIZATION USING HEURISTIC APPROACH
Prof. Miss. S. D. Pandao , Prof. A. D. Isalkar
Full Text Paper

 

Establishing a Service Model of Private Elastic VPN for cloud computing
Priyanka Gupta, Ashok Verma
Full Text Paper

 

Range free Localization Mechanism using Beacon node Range Level
Shweta Sirothia, Rakesh Tripathi
Full Text Paper

 

Credit Card Fraud: The study of its impact and detection techniques
Khyati Chaudhary, Bhawna Mallick
Full Text Paper

 

Wireless Sensor Network Architectures for Different Systems
Sanjeev Narayan Bal
Full Text Paper

 

Study of Network Layer Attacks and Countermeasures in Wireless Sensor Network
Atul Yadav, Mangesh Gosavi , Parag Joshi
Full Text Paper

 

MODIFIED MUTUAL AUTHENTICATION AND KEMODIFIED KEY AGREEMENT PROTOCOL BASED ON NTRU CRYPTOGRAPHY FOR WIRELESS COMMUNICATIONS
Raj Kumar G.V.S.,Naveen Kumar K, Chandra Sekhar P, Bhargav Nunna V. V. S., Vinod Kumar B
Full Text Paper

 

A Review on New Paradigmís of Parallel Programming Models in High Performance Computing
Mr.Amitkumar S Manekar, Prof.Pankaj Kawadkar, Prof. Malati Nagle
Full Text Paper

 

A Study of the Various Architectures for Natural Language Interface to DBs
B.Sujatha, Dr.S.Viswanadha Raju, Humera Shaziya
Full Text Paper

 

Approach for Application on Cloud Computing
Shiv Kumar, Bimlendu Verma , Archana Neog
Full Text Paper

 

FPGA Based Intruder Detection System Using CMOS Sensor
Ashwin Belure, J. S. Rajashekhar, Basheer Ahmed
Full Text Paper

 

Adaptive Congestion Control status for mobile adhoc network
Dr.V.B.Narsimha
Full Text Paper

 

A Review of the Roles and Importance of Information and Communication Technologies (ICTs) in Supply Chain Management (SCM) of Organizations and Companies
Nana Yaw Asabere, David Oppong, Simonov Kusi-Sarpong
Full Text Paper

 

Accelerating MATLAB Applications on Parallel Hardware
Kavita Chauhan, Javed Ashraf
Full Text Paper

 

Construction of Extended Visual Cryptography Scheme for Secret Sharing
T.Rajitha, Prof P.Pradeep Kumar, V.Laxmi
Full Text Paper

 

Energy efficient cooperative MIMO communication for uncorrelated data transmission at wireless sensor network
Dhawal Beohar
Full Text Paper

 

Design of FIR Filter Using Particle Swarm Optimization Algorithm for Audio Processing
Amanpreet Kaur, Ranjit Kaur
Full Text Paper

 

A Differential Evaluation Algorithm for routing Optimization in Mobile Ad-hoc Networks
Anju Sharma, Madhavi Sinha
Full Text Paper

 

Secured Routing Protocols for Wireless & ATM Networks : An Analysis
Sanyam Agarwal ,Dr.A.K.Gautam
Full Text Paper

 

Classification of Studentís data Using Data Mining Techniques for Training & Placement Department in Technical Education
Samrat Singh, Dr. Vikesh Kumar
Full Text Paper

 

 

 

 

 

 

 

 

 

 

 


            October 2012

Measuring Studentsí Penetration and Usage Trends of Information and Communication Technology (ICT) in Polytechnic Education: Ho Polytechnic, Ghana
Nana Yaw Asabere, Mawuli Kwasi Ahegbebu
Full Text Paper

 

Intelligent Heuristic Search Algorithm for N Queens Problem of constraint satisfaction
Jagdish Prasad, A.K.Bharadwaj, Surendra Kumar Yadav
Full Text Paper

 

The Robust Digital Image Watermarking using Quantization and Fuzzy Logic Approach in DWT Domain
Nallagarla Ramamurthy, Dr.S.Varadarajan
Full Text Paper

 

SINR Based Vertical Handoff Algorithms : A Survey
Jyotsna P. Gabhane
Full Text Paper

 

Improving Memory Space Utilization in Multi-core Embedded Systems using Task Recomputation
Hakduran Koc, Suleyman Tosun, Ozcan Ozturk, Mahmut Kandemir
Full Text Paper

 

Selection of Dual Soft Handoff Leading to Improvements in Wireless Communication
Sayem Patni, B. G. Hogade, D. S. Kurule
Full Text Paper

 

Evaluation of Discrete Event Wireless Sensor Network Simulators
AnilKumar Patil , P. M .Hadalgi
Full Text Paper

 

Prevention of Buffer-overflow Attack Blocker Using IDS
P. B. Pawar, M. Nagle, Pankaj K. Kawadkar
Full Text Paper

 

Motivation To Optical Multistage Interconnection Networks
M. SindhuLakshmi, K.Gayathri
Full Text Paper

 

Automatic PCB Defect Detection Using Image Processing Method
Sonal Kaushik, Javed Ashraf
Full Text Paper

 

Real Time & Secure Video Transmission using Distributed & Parallel Approach
M.B. Narnaware, Trupti A. Dandamwar
Full Text Paper

 

Design and implementation of battery statistics monitoring & analysis for android based system
S. Karmore, Suruchi W. Kitey
Full Text Paper

 

RBFNN Approach for Recognizing Indian License Plate
Manish Manoria, Rani Thakur
Full Text Paper

 

Graphical User Authentication for E-Transaction
Manish Manoria, Ankur Jain
Full Text Paper

 

Way of Marketing of Web Application as Cloud Computing
Shiv Kumar
Full Text Paper

 

Cloud Computing: An Analysis of Its Challenges & Security Issues
D. Kishore Kumar, G.Venkatewara Rao, G.Srinivasa Rao
Full Text Paper

 

Improved location services with cost and delay of Manetís
R.Veerasundari, V.Krishnapriya
Full Text Paper

 

Review on Sharing of Embedded Devices in Lan
Mohini A. Kontamwar, S.P.Karmore
Full Text Paper

 

Implementation of Blind Digital Signature Using ECC
Dhanashree M. Kuthe, Avinash J. Agrawal
Full Text Paper

 

 

 

 

 

 

 

 

            December 2012

Actionable Knowledge Discovery using Multi-Step Mining
DharaniK, Kalpana Gudikandula
Full Text Paper


Privacy Preserving Data Mining Operations without Disrupting Data Quality
B.Swapna, R.VijayaPrakash
Full Text Paper


Throughput Maximization in MANETís using AODV Routing Protocol with coding Opportunity Discovery
M. Nagaratna, Waseem Ahmed
Full Text Paper


Secret Image Sharing System Using Meaningful Covering Shares
Alekya K, Dr.R.V.Krishnaiah
Full Text Paper


Handling Uncertainty Information through Extended Classifiers
Poonam.Khaparde, Farhana Zareen , Dr.R.V.Krishnaiah
Full Text Paper


Minimizing Navigation Cost Through Interactive Data Exploration and Discovery
Srilaxmi Challa, Dr.R.V.Krishnaiah
Full Text Paper


Active Watermark-Based Correlation Scheme for Identifying Source of Attack in Presence of Timing Perturbations
Srikanth Apuri, Md Murtuza Ahmed Khan
Full Text Paper


Extracting TARs from XML for Efficient Query Answering
Chandra Sekhar.K, Dhanasree
Full Text Paper


Self Configurable Re-link Establishment using Continuous Neighbor Discovery in Asynchronous Sensor Networks
Rushikesh B. Shreshtha, Rajeswari Goudar
Full Text Paper


Throughput Maximization Using Portfolio Selection and Jamming-Aware Routing Algorithm
Narasimha Rao Sriramula Md.Murtuza Ahmed Khan
Full Text Paper


Hand Gesture Recognition using Neural Network
Rajesh Mapari, Dr. Govind Kharat
Full Text Paper


Review Paper on Preserving Confidentiality of Data in Cloud Using Dynamic Anonymization
Bhushan Mahajan, Swati Ganar
Full Text Paper


Resource Aware and Quality Aware Secure Location Monitoring Algorithm for WSNs
M.N.Praneswara Rao, G.Radha Devi
Full Text Paper


Perceptions Towards On-line Banking Security: An Empirical Investigation of a Developing Country`s Banking Sector, how secure is On-line Banking
Bongani Ngwenya, Khanyisa Malufu
Full Text Paper


ZigBee : A Promising Wireless Technology
Harleen Kaur Sahota, Sandeep Singh Kang
Full Text Paper


Web Service Integration Using Cloud Data Store
Asfia Mubeen, Mohd Murtuza Ahmed Khan , Sana Mubeen Zubedi
Full Text Paper


Secure Public Key Protocol for Ad-Hoc Wireless Networks
Nazeer Unnisa Nazima, Shahana Tanveer , Abdul Majeed
Full Text Paper


A Methodology for Software Design Quality Assessment of Design Enhancements
Sahar Reda, Hany Ammar, Osman Hegazy
Full Text Paper


Policies Based Intrusion Response System for DBMS
Fatima Nayeem, M.Vijayakamal
Full Text Paper

 


            February 2013

A Survey on Railway Security in Wireless Network
Nisha S.Punekar, Archana Raut
Full Text Paper

 

Fast Speaker Recognition using Efficient Feature Extraction Technique
Sejal Shah, Archana Bhise
Full Text Paper

 

Movement Based Voice Enabled Robotic Chair for Physically Challenged
Ajay Vijaykumar Khake, Vandana B. Malode
Full Text Paper

 

Design and Implementation of Real Time Embedded Tele-Health Monitoring System
Suhas Kale, C. S. Khandelwal
Full Text Paper

 

Image Processing by Preserving a Manifold Structure
Kavitha G L
Full Text Paper

 

A Survey of Encroachment Disclosure in Wireless Sensor Network
Sushma J. Gaurkar, Piyush k. Ingole
Full Text Paper

 

Multi Agent system Randomized in Road Traffic
Gouiouez Mounir, N. Rais, M. Azzouzi Idrissi, Sefrioui Abdelhamid
Full Text Paper

 

Secure and Stable VANET Architecture Model
Ankit Temurnikar, Dr.Sanjeev Sharma
Full Text Paper

 

A Survey on Location Based Authentication Protocols For Mobile Devices
Smruti. P. Patil, S.U. Nimbhorkar
Full Text Paper

 

Traffic-Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
T.Kranthi Kumar, K.Srivani , G.Sai Kumar
Full Text Paper

 

Design of Generalized Discrete Fourier Transform with Non Linear Phase on Real Time System
Mr. Umesh P. Sakhare, Lalit Dole
Full Text Paper

 

Techniques of Data Stream Mining for Health Care Application
Satish Thombre, Snehalata Dongre
Full Text Paper

 

Performance Evaluation of Zigbee Protocol Using Opnet Modeler for Mine Safety
Rana Mahajan, Sudha Nair
Full Text Paper

 

A Framework for Semantic Advertisement over Social Media
Rakesh Kumar Donthi, Vishwesh Nagamalla, Srujan Kumar
Full Text Paper

 

A Study on Cloud Computing and its Security Issues
Mr. Venkata Sreedhar Ventrapragada, Daniel Ravuri, G Jyothi
Full Text Paper

 

Authentication System Securing Index of Image using SVD and ECC
Tahina Ezťchiel Rakotondraina, Dr. Henri Bruno Razafindradina
Full Text Paper

 

Review Paper on Concept Drifting Data Stream Mining
Mr. Sudhir Ramrao Rangari, Ms. Snehlata S Dongre, Dr. Latesh Malik
Full Text Paper

 

Class Imbalance Problem in Data Mining: Review
Mr.Rushi Longadge, Ms. Snehlata S. Dongre, Dr. Latesh Malik
Full Text Paper

 

Survey on security challenges in VANET
Anup Dhamgaye, Nekita Chavhan
Full Text Paper

 

Comparative Analysis of Steinís and Euclidís Algorithm with BIST for GCD Computations
Sachin D.Kohale, Ratnaprabha W.Jasutkar
Full Text Paper

 

Design Approach for Adaptive Car Safety System in Intelligent Transportation System

Pravin P Ashtankar, Dr.Sanjay S.Dorle, M.Chakole, Dinesh K.katole
Full Text Paper

 

Algorithm to handle Concept Drifting in Data Stream Mining

Ms. Snehlata Dongre, Dr. Latesh Malik
Full Text Paper

 

Design Approach for Dynamic Traffic Control System Based on Radio Propagation Model in VANET

Sanjay S. Dorle, Pratima L. Patel
Full Text Paper

 

Literature Review on Path planning in Dynamic Environment

Bhushan Mahajan, Punam Marbate
Full Text Paper

 

Quality Assurance in Open Distance Learning: IGNOU a Case Study

Ganapathi Avabrath
Full Text Paper

 

Secure MANET Communication Using Cluster Based Multicast with Fair Key and Resource Scheduler

D. Anitha
Full Text Paper

 

Sparse Representation through Multi-Resolution Transform for Image Coding

Dr. P. Arockia Jansi Rani
Full Text Paper

 

 

 


            April 2013

Cross-site Scripting Attacks on Android WebView
Bhavani A B
Full Text Paper

 

Analysis of Performance of Broadcasting Protocol in Vehicular Ad-hoc Network Environment
A. Singaravelan, Dr. C. Suresh Gnana Dhas
Full Text Paper

 

Energy Efficient and Mobility Based Clustering for MANET
Rani.V.G, Dr.Punithavalli.M
Full Text Paper

 

Collision Avoidance Using Inter-Vehicle Ad-hoc Communication
Mahesh Panjwani, Humera Syed, Sumera Qazi
Full Text Paper

 

The Performance Evaluation of AODV & DSR (On-Demand-Driven) Routing Protocols using QualNet 5.0 Simulator
Mukesh Kumar Garg, Dr. Ela Kumar
Full Text Paper

 

Towards Designing Multi Agent Mobile and Internet Based Voting System
Mohamed Khlaif
Full Text Paper

 

Preserving User Location Privacy with Safe Zone for Spatial Queries
Sakthi Priya, Dinesh Babu, Karthiga
Full Text Paper

 

Evaluating the Performance of FQM Framework for Supporting Multimedia Applications in MANET
Mohammed Saghir
Full Text Paper

 

Wireless Networks Security Using Dispersive Routing Mechanism
Vulupala Sridhar Reddy, M. Venkateswara Rao
Full Text Paper

 

Protection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique
Mr.A.Duraisamy, Mr.M.Sathiyamoorthy, Mr.S.Chandrasekar
Full Text Paper

 

Security Threats in Prepaid Mobile
Arshiya Begum, Mohammed Tanveer Ali
Full Text Paper

 

Techniques of Data Stream Mining for Health Care Application
Satish Thombre, Snehalata Dongre
Full Text Paper

 

Energy Efficient VM Live Migration in Cloud Data Centers
Jyothi Sekhar, Getzi Jeba
Full Text Paper

 

An Approach to Authenticate userís Mobile device and to Preserve Privacy towards Location Proof(A2MP2LP)
Senthilguru S, Blessed Prince P
Full Text Paper

 

Noise Suppression in Tele-Lectures using Bi-Modal Feature Extraction
E.S.Selvakumar, S.Shanmuga Priya
Full Text Paper

 

An Empirical Study on Classification Using Modified Teaching Learning Based Optimization
Amaresh Sahu, Sushanta Kumar Panigrahi, Sabyasachi Pattnaik
Full Text Paper

 

Energy-Efficient Cloud Computing: A Vision, Introduction, and Open Challenges
Ms.Jayshri Damodar Pagare, Dr.Nitin A Koli
Full Text Paper

 

Scalable ALARM: Anonymous Location Aided Routing in Hostile MANETs
Geethu Mohandas, Dr Salaja Silas
Full Text Paper

 

A reactive protocol for privacy preserving using location based Routing in MANETs
Namrata Marium Chacko, Getzi P. Leelaipushpam
Full Text Paper

 

The Trikey-board - Introduction to and analysis of a new design of touch-sensitive virtual keyboard
Sunil Joshi
Full Text Paper

 

 

 

  List of Computer Science Journals
Computer Science Journal IEEE Journals Conference Alerts
International Conference Alerts Impact Factor List of computer science journal
Engineering Journals IJCSN Electronics Journals
IEEE Papers * Mathematics Journals Call for papers 2013