Home
About NCS
Publications
Journal of Computer Science and Its Applications
Journal of Information Security, Privacy and Digital Forensics
Conference Proceedings
Technical Reports
Downloads
Journal Subscription
Home
About NCS
Publications
Journal of Computer Science and Its Applications
Journal of Information Security, Privacy and Digital Forensics
Conference Proceedings
Technical Reports
Downloads
Journal Subscription
Home
About NCS
Publications
Journal of Computer Science and Its Applications
Journal of Information Security, Privacy and Digital Forensics
Conference Proceedings
Technical Reports
Downloads
Journal Subscription
Category:
JCSA
Home
/
Category:
JCSA
Order By:
Publish Date
Title
Update Date
Downloads
Views
Order:
Descending
Ascending
Apply Filter
PARAMETRIC ANALYSIS OF CENTRIFUGAL PUMPS FOR HEAVY END RECOVERY USING RESPONSE SURFACE METHODOLOGY
1 file(s)
1.02 MB
JCSA/V24N2/DECEMBER2017/08
SECURITY AND ETHICAL ISSUES TO CLOUD DATABASE
1 file(s)
347.15 KB
JCSA/V24N2/DECEMBER2017/07
IMPLEMENTATION OF VEHICLE MOVEMENT NOTIFICATION AND LOCATION USING GSM, GPS AND WEB BASED INFORMATION SYSTEM
1 file(s)
378.97 KB
Download
A MODEL-BASED COLLABORATIVE FILTERING WITH DIMENSIONALITY REDUCTION
1 file(s)
375.35 KB
JCSA/V24N2/DECEMBER2017/05
DESIGN AND IMPLEMENTATION OF A BIOMETRIC ATTENDANCE SYSTEM USING FACIAL RECOGNITION
1 file(s)
212.95 KB
JCSA/V24N2/DECEMBER2017/04
CHARACTER RECOGNITION FROM IMAGE USING RADIAL BASIS FUNCTION NEURAL
1 file(s)
497.48 KB
JCSA/V24N2/DECEMBER2017/03
SIMPLIFIED COOLEY-TUKEY NUMERICAL FAST FOURIER TRANSFORMS ALGORITHM FOR DIGITAL SIGNAL PROCESSING
1 file(s)
336.47 KB
JCSA/V24N2/DECEMBER2017/02
ALGORITHM DEVELOPMENT SIMULATOR FOR HUMAN HEART BEAT RATE
1 file(s)
287.45 KB
JCSA/V24N2/DECEMBER2017/01
An Information Technology (IT) Equipment Fault Prediction System for an IT Support Unit
1 file(s)
448.50 KB
JCSA/V25N1/JUNE2018/14
MEPLN E-Learning: Mesh-Based Peer-to-Peer Collaborative E-Learning System for Limited Capacity Networks
1 file(s)
717.61 KB
JCSA/V25N1/JUNE2018/13
Optimized Model for Comparing Two Intrusion Logs
1 file(s)
543.27 KB
JCSA/V25N1/JUNE2018/12
Time Series Prediction Using Artificial Neural Network
1 file(s)
609.56 KB
JCSA/V25N1/JUNE2018/11
A Promethee Based Evaluation of Software Defect Predictors
1 file(s)
267.41 KB
JCSA/V25N1/JUNE2018/10
UGMAP: A Web and Mobile Application for Navigation and Notification: The University Of Ghana, Legon Campus
1 file(s)
1.01 MB
JCSA/V25N1/JUNE2018/09
Evaluating Industrial Control System (ICS) Security Vulnerability Through Functional Dependency Analysis
1 file(s)
32.00 KB
JCSA/V25N1/JUNE2018/08
1
2
…
11
12
13
14