•  
  •  
 

International Journal of Computer Science and Informatics

Volume 2, Issue 4 (2013)

Articles

PDF

A Lime Light on the Emerging Trends of Web Mining
Udayasri. B, Sushmitha. N, and Padmavathi. S

PDF

Frequent Itemsets Used in Mining of Train Delays
D. Kishore Babu, Y Naga Satish, and G. L. N. V. S. Kumar

PDF

Implementation of RED Algorithm to Detect Malicious Packet Losses
G. Sanjay Gandhi, S. S. V. Appa Rao, and V.V.V. Satyanarayana Reddy

PDF

Analysis of SQL Injection Attack
Jayeeta Majumder and Gargi Saha

PDF

Comparative Study of Text Line Segmentation Algorithms on Low Quality Documents
P. Soujanya, Vijaya Kumar Koppula, and Kishore Gaddam

PDF

Intelligent Software Agent Applied To Digital Forensic and Its Usefulness
Inikpi O. Ademu, Chris O. Imafidon, and David S. Preston

PDF

Flaws in Endair-A Secure Routing Protocol for MANETS
B. Swetha, S. Ajay Kumar, and TVS Prasad Gupta

IJCSI Cover Art