International Journal of Science and Research (IJSR)
Computer Science
Downloads: 118 | Views: 549
Computer Science & Engineering, India, Volume 3 Issue 3, March 2014
Pages: 317 - 322User Authentication Using Hand Images
Aditya Pratap Singh | Ranjan Kumar Thakur | Arabind Kumar | Ram Baksh
Downloads: 118 | Views: 532
Computer Science & Engineering, India, Volume 3 Issue 3, March 2014
Pages: 459 - 462Dynamic Key for Secure Communication among the Flexible Nodes
Vijay Kumar Mahto | D. Praveen Kumar
Downloads: 118 | Views: 720
Computer Science & Engineering, India, Volume 3 Issue 3, March 2014
Pages: 718 - 721Writer Adaptation for Handwriting Recognition in Hindi Language - A Survey
Nupur Gulalkari | Shreya Prabhu | Anjali Pachpute | Rekha Sugandhi | Kapil Mehrotra
Downloads: 118 | Views: 595
Computer Science & Engineering, India, Volume 3 Issue 4, April 2014
Pages: 682 - 688Enhancing Quality in Scrum Software Projects
Amrita Raj Mukker | Anil Kumar Mishra | Latika Singh
Downloads: 118 | Views: 557
Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1320 - 1325Gray Scale Image Authentication Using SSS Technique
Vandana Navale | Archana Lomte
Downloads: 118 | Views: 582
Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1660 - 1664Pattern Discovery Techniques for the Text Mining and its Applications
Minakshi R. Shinde | Parmeet C. Gill
Downloads: 118 | Views: 524
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 356 - 357Fraud Analytics for Wireless Sensor Networks
V. N. Niranjan | K. V. D. Kiran
Downloads: 118 | Views: 506
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 380 - 383Fast for Feature Subset Selection Over Dataset
Jesna Jose | Reeba R
Downloads: 118 | Views: 501
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 506 - 509A Random Walk through the Dark Side of NoSQL Databases in Big Data Analytics
Kudakwashe Zvarevashe | Tatenda Trust Gotora
Downloads: 118 | Views: 488
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1811 - 1816A Video Steganography Approach using Random Least Significant Bit Algorithm
Arijit Basu | Gaurav Kumar | Soumyajit Sarkar