- DocumentData Warehouse Creation for Preparing an Electricity Statistics Dashboarduploaded byijcsn
- DocumentJPEG versus GIF Images in forms of LSB Steganographyuploaded byijcsn
- DocumentAn Analysis of Artificial Intelligence in Machines & Chinese Room Problemuploaded byijcsn
- DocumentA Survey on Communication Gap between Hearing and Speech Impaired Persons and Normal Personsuploaded byijcsn
- DocumentThe Adoption of Information and Communications Technology in the Administration of Health Insurance Schemes in Ghanauploaded byijcsn
- DocumentDPMAP for Abrupt Manuscript Clustering with Attribute Partitionuploaded byijcsn
- DocumentVulnerability, Human Behaviour, Hazards and Expected Utility in the Context of Risk Management “The case of Limpopo River Basin in Mozambique”uploaded byijcsn
- DocumentPerformance Evolution of EACP Protocol for System Optimization in Heterogeneous Sensor Networkuploaded byijcsn
- DocumentDetection of Bias, Drift, Freeze and Abrupt Sensor Failure using Intelligent Dedicated Observer Based Fault Detection and Isolation for Three Interacting Tank Processuploaded byijcsn
- DocumentData Minder using Steganographyuploaded byijcsn
- DocumentA Survey on Algorithms for Optimal Path Search in Dynamic Networksuploaded byijcsn
- DocumentAssessing the Organizations’ Disaster Recovery Preparednessuploaded byijcsn
- DocumentImprovised Security for RDF using Random Salt and Levels with Bi-Directional Translation to Relational Databaseuploaded byijcsn
- DocumentMobile Robot Navigation with Obstacle Avoidance in Unknown Indoor Environment using MATLABuploaded byijcsn
- DocumentIJCSN-2013-2-6-144uploaded byijcsn
- DocumentDistributed Conditional Multicast Access for IP TV in High-Speed Wireless Networks (Destination Specific Multicast)uploaded byijcsn
- DocumentReview of Various Algorithms Used in Hybrid Cryptographyuploaded byijcsn
- DocumentIJCSN-2013-2-6-155uploaded byijcsn
- DocumentIJCSN-2013-2-6-141.pdfuploaded byijcsn
- DocumentIJCSN-2013-2-6-152uploaded byijcsn
- DocumentIJCSN-2013-2-6-150.pdfuploaded byijcsn
- DocumentIJCSN-2013-2-6-149.pdfuploaded byijcsn
- DocumentIJCSN-2013-2-6-147uploaded byijcsn
- DocumentIJCSN-2013-2-6-142uploaded byijcsn
- DocumentIJCSN-2013-2-6-125.pdfuploaded byijcsn
- DocumentIJCSN-2013-2-6-105.pdfuploaded byijcsn
- DocumentIJCSN-2013-2-6-115.pdfuploaded byijcsn
- DocumentIJCSN-2013-2-6-161.pdfuploaded byijcsn
- DocumentIJCSN-2013-2-6-119.pdfuploaded byijcsn
- DocumentIJCSN-2013-2-6-150.pdfuploaded byijcsn
- DocumentIJCSN-2013-2-6-140.pdfuploaded byijcsn
- DocumentIJCSN-2013-2-6-124.pdfuploaded byijcsn
- DocumentIJCSN-2013-2-6-158.pdfuploaded byijcsn
- DocumentIJCSN-2013-2-6-121.pdfuploaded byijcsn
- DocumentIJCSN-2013-2-6-114.pdfuploaded byijcsn
- DocumentIJCSN-2013-2-6-151.pdfuploaded byijcsn
- DocumentIJCSN-2013-2-6-138uploaded byijcsn
- DocumentIJCSN-2013-2-6-153.pdfuploaded byijcsn
- DocumentIJCSN-2013-2-6-142.pdfuploaded byijcsn
- DocumentIJCSN-2013-2-6-152.pdfuploaded byijcsn
- DocumentIJCSN-2013-2-6-141uploaded byijcsn
- DocumentIJCSN-2013-2-6-132uploaded byijcsn
- DocumentIJCSN-2013-2-6-149.pdfuploaded byijcsn
- DocumentIJCSN-2013-2-6-131.pdfuploaded byijcsn
- DocumentIJCSN-2013-2-6-147uploaded byijcsn
- DocumentIJCSN-2013-2-6-155.pdfuploaded byijcsn
- DocumentIJCSN-2013-2-6-144uploaded byijcsn
- DocumentIJCSN-2013-2-6-126uploaded byijcsn
- DocumentReinforcement Learning Framework for Opportunistic Routing in WSNsuploaded byijcsn