International Journal of Science and Research (IJSR)
Computer Science
Downloads: 123 | Views: 598
Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017
Pages: 2178 - 2182An Overview of Crypto-Compressive Based on Selective Coding
Enas Kh Alamiry | Faisal G. Mohammed
Downloads: 123 | Views: 551
Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 393 - 395FogScreen: The Walk through Virtual Environment
Naseema Shaik | Mubeena Shaik | Mohra Al alyan
Downloads: 123 | Views: 544
Computer Science & Engineering, Namibia, Volume 6 Issue 8, August 2017
Pages: 1842 - 1846A Preliminary Framework for the Adoption of Mobile Learning Technology in Namibian High Schools: A Case of the Erongo Region
Osakwe Jude Odiakaosa | Nomusa Dlodlo | Norbert Jere
Downloads: 123 | Views: 543
Computer Science & Engineering, Iraq, Volume 6 Issue 9, September 2017
Pages: 1870 - 1873Iraqi Currency Recognition and Identification Using SIFT
Raghad Khalid Mohammed
Downloads: 123 | Views: 602
Computer Science & Engineering, India, Volume 6 Issue 10, October 2017
Pages: 1642 - 1645Novel Framework of Identity Based Encryption with CRA
Latha M R | Dr.Shiva Murthy G | Ramakrishna Prasad A.L
Downloads: 123 | Views: 585
Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 378 - 381Developing Patterns in Security Challenges for Coordination of IOT, Bigdata, Network Security: A Survey
M. Aruna | Vadduri V S N S A D Bhavani | Sanapathi Anusha
Downloads: 123 | Views: 486
Computer Science & Engineering, Iraq, Volume 7 Issue 1, January 2018
Pages: 1845 - 1848Solving Job-Shop Scheduling Problem Using a Developed Particle Swarm Optimization Algorithm
Wathiq N. Abdullah
Downloads: 123 | Views: 594
Computer Science & Engineering, India, Volume 7 Issue 3, March 2018
Pages: 1678 - 1680Role of Computers viz-a-viz Teaching of Physics - An Analysis
Farooq Ahmad Pandith | Audil Hussain
Downloads: 123 | Views: 565
Computer Science & Engineering, India, Volume 7 Issue 5, May 2018
Pages: 1606 - 1610A Survey Based on the Face Recognition Techniques
Rebeiro Caroline Leontia Carlton Christopher | Huda Noordean | Rebeiro Sharlene Sara Carlton
Downloads: 123 | Views: 626
Computer Science & Engineering, India, Volume 7 Issue 5, May 2018
Pages: 1672 - 1675Deceptive Attacks and Anomalies Detection Using Honeypot Enabled Networks
Nimitha Mary Mohan | Kalimuthu M