International Journal of Science and Research (IJSR)
Computer Science
Downloads: 116 | Views: 632
Computer Science & Engineering, India, Volume 5 Issue 3, March 2016
Pages: 2103 - 2106Minutiae Based Fingerprint Matching for Identification and Verification
Deepika Sahu | Rashmi Shrivas
Downloads: 116 | Views: 485
Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 1002 - 1007Cryptography Techniques based on Security of AODV in MANETs - A Survey
Ankita Singh | Mahima Sharma
Downloads: 116 | Views: 582
Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 1625 - 1628A Hybrid Non Blind Video Watermarking Scheme Based on DWPT and PCA
Shital Khaparde | Shanta Sondor
Downloads: 116 | Views: 460
Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 1675 - 1683Design of a More Efficient and Effective Flip Flop use of K-Map Based Boolean Function
M. Valli | Dr. R. Periyasamy
Downloads: 116 | Views: 562
Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 2118 - 2123QoS Support for Cross-Layer Scheduling Algorithm in Wireless Networks
K. Raghavendra Rao | Vadipina Amarnadh
Downloads: 116 | Views: 459
Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 1548 - 1552Energy Efficient Hierarchical Protocols in Wireless Sensor Networks
Vaishali P Bawage | Deepak C Mehetre
Downloads: 116 | Views: 507
Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 1595 - 1599VANET, its Characteristics, Attacks and Routing Techniques: A Survey
Manjyot Saini | Harjit Singh
Downloads: 116 | Views: 559
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 345 - 347Detecting Malicious Posts in Social Networks Using Text Analysis
Neeraja M | John Prakash
Downloads: 116 | Views: 579
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 379 - 382Jamming Attacks Detection in Time-Critical Wireless Applications
Prajakta V. Pandhare | Jayant Adhikari
Downloads: 116 | Views: 504
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 706 - 709Authorized Secure Deduplication in Cloud Computing
R. V. Argiddi | Prachi Sontakke