•  
  •  
 

International Journal of Computer Science and Informatics

Volume 3, Issue 2 (2013)

Articles

PDF

Image Edge Detection
K. Vikram
DOI: 10.47893/IJCSI.2013.1121

PDF

Face Recognition Based on PCA Algorithm
Taranpreet Singh Ruprah
DOI: 10.47893/IJCSI.2013.1122

PDF

Model Based Software Development: Issues & Challenges
N Md Jubair Basha, Salman Abdul Moiz, and Mohammed Rizwanullah
DOI: 10.47893/IJCSI.2013.1123

PDF

WEB GRAPH BASED SEARCH BY USING DENSITY OF KEYWORD AND AGE FACTOR
GAURAV AGARWAL, SACHI GUPTA, and SAURABH MUKHERJEE
DOI: 10.47893/IJCSI.2013.1124

PDF

GRAPHICAL AUTHENTICATION USING REGION BASED GRAPHICAL PASSWORD
G. NIRANJANA and KUNAL DAWN
DOI: 10.47893/IJCSI.2013.1125

PDF

SECURE FRAMEWORK IN DATA PROCESSING FOR MOBILE CLOUD COMPUTING
MR.ANAND SURENDRA SHIMPI
DOI: 10.47893/IJCSI.2013.1127

PDF

A VELOUR PLEBISCITE TRACING FOR HARDWARE AND SOFTWARE MISCUE REMEDIAL SYSTEMS
B.V.V.S. PRASAD, V. BALAJI, and M.MADHAVA RAO
DOI: 10.47893/IJCSI.2013.1128

PDF

ULTRASOUND LUNG IMAGES AUTOMATIC ANNOTATION
V. RAMACHANDRAN and E.SRINIVASA REDDY
DOI: 10.47893/IJCSI.2013.1129

PDF

REAL-TIME SCHEDULING POLICY IN EMBEDDED SYSTEM DOMAIN: A FRAME WORK
ASHIS KUMAR MISHRA and ZULFIKHAR AHMAD
DOI: 10.47893/IJCSI.2013.1130

PDF

BOOLEAN XOR BASED (K,N) THRESHOLD VISUAL CRYPTOGRAPHY FOR GRAYSCALE IMAGES
RAM KRISHNA JHA and ABHIJIT MUSTAFI
DOI: 10.47893/IJCSI.2013.1131

PDF

ASSOCIATION RULE MINING FOR KDD INTRUSION DETECTION DATA SET
ASIM DAS and S. SIVA SATHYA
DOI: 10.47893/IJCSI.2013.1133

IJCSI Cover Art