International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Computer Science: Page 230: International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)

Computer Science

Downloads: 117 | Views: 534

Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 366 - 369

Efficient Analysis of Closed Frequent Pattern Set Mining Approach

Javeriya Naaz I. Syed | Rajeshri R. Shelke

Downloads: 117 | Views: 531

Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 434 - 437

Increasing Data Hiding Capacity of Carrier Image Using BPCS Steganography

Vaishali | Abhishek Kajal

Downloads: 117 | Views: 525

Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1449 - 1453

Review on Message Authentication Protocol for Vehicular Ad Hoc Network

Sarika A. Velukar | Dr. M. S. Ali

Downloads: 117 | Views: 587

Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2436 - 2438

Attacking & Preventing an AI Based Disease Identification System

Prasanna Shivaji Shinde | Avinash Shrivas

Downloads: 117 | Views: 549

Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2508 - 2514

Lock and Forward Hierarchical Routing Algorithm in MANET

Vikrant Verma | Dr. Manoj Kumar

Downloads: 117 | Views: 569

Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3109 - 3112

Optimization for a Distributed Query

Parminder Kaur

Downloads: 117 | Views: 612

Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3231 - 3235

A Routing Mechanism for Time Critical Applications in VSN

Abhishek Matmri | Sudhakar K N

Downloads: 117 | Views: 646

Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3271 - 3274

A Review of Captcha and Graphical Passwords to Enhance Security and Usability to Next Level

Vikas K. Kolekar | Milindkumar. B. Vaidya

Downloads: 117 | Views: 594

Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 327 - 331

Authentication in Mobile Ad Hoc Network for Secure Communication

Tejashree Kokate | R.B.Joshi

Downloads: 117 | Views: 549

Computer Science & Engineering, China, Volume 4 Issue 6, June 2015

Pages: 691 - 693

Under the New Media Environment 3D Holographic Image Analysis of Artistic Language

Ying Man Liu

Top