International Journal of Science and Research (IJSR)
Computer Science
Downloads: 121 | Views: 539
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 851 - 854Facial Expression Recognition Using Fuzzy Logic
Sanjay Singh Pal | Muzammil Hasan
Downloads: 121 | Views: 526
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1618 - 1621Ant Colony Optimization: A Survey
Keisam Thoiba Meetei | Dr. Subhajit Ghosh
Downloads: 121 | Views: 505
Computer Science & Engineering, Iraq, Volume 3 Issue 6, June 2014
Pages: 2004 - 2009Image Encryption Based on Pixel Shuffling with 3D Chaotic System
Asia Mahdi Naser Alzubaidi
Downloads: 121 | Views: 724
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2573 - 2578Optimized Load Balancing Mechanism Using Carry Forward Distance
Ramandeep Kaur | Gagandeep Singh | Sahil
Downloads: 121 | Views: 568
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2751 - 2756User-Friendly Keyword Based Search on XML Data
Jeetendra G.Kapase | Sharmila M. Shinde
Downloads: 121 | Views: 812
Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 16 - 20Adaptation to Best Fit Learning Rate in Batch Gradient Descent
Mohan Pandey | B. L. Pal
Downloads: 121 | Views: 468
Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 662 - 665Artificial Intelligence & its Applications for Speech Recognition
G. Harsha Vardhan | G. Hari Charan
Downloads: 121 | Views: 553
Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 786 - 790Study of Text Mining Using Hybrid Agglomerative Clustering With ACO Algorithms
Manpreet Kaur | Sukhpreet Kaur
Downloads: 121 | Views: 649
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2281 - 2284Hiding Image in Image Using LSB Insertion Method with Improved Security and Quality
Mekha Jose
Downloads: 121 | Views: 528
Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1930 - 1937A Cloud Approach for Secure Multi Data sharing between the Users
Deeti Naga Vijay | A. Jyothi