International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Computer Science: Page 249: International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)

Computer Science

Downloads: 116 | Views: 632

Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 2103 - 2106

Minutiae Based Fingerprint Matching for Identification and Verification

Deepika Sahu | Rashmi Shrivas

Downloads: 116 | Views: 485

Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1002 - 1007

Cryptography Techniques based on Security of AODV in MANETs - A Survey

Ankita Singh | Mahima Sharma

Downloads: 116 | Views: 582

Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1625 - 1628

A Hybrid Non Blind Video Watermarking Scheme Based on DWPT and PCA

Shital Khaparde | Shanta Sondor

Downloads: 116 | Views: 460

Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1675 - 1683

Design of a More Efficient and Effective Flip Flop use of K-Map Based Boolean Function

M. Valli | Dr. R. Periyasamy

Downloads: 116 | Views: 562

Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2118 - 2123

QoS Support for Cross-Layer Scheduling Algorithm in Wireless Networks

K. Raghavendra Rao | Vadipina Amarnadh

Downloads: 116 | Views: 459

Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1548 - 1552

Energy Efficient Hierarchical Protocols in Wireless Sensor Networks

Vaishali P Bawage | Deepak C Mehetre

Downloads: 116 | Views: 507

Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1595 - 1599

VANET, its Characteristics, Attacks and Routing Techniques: A Survey

Manjyot Saini | Harjit Singh

Downloads: 116 | Views: 559

Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 345 - 347

Detecting Malicious Posts in Social Networks Using Text Analysis

Neeraja M | John Prakash

Downloads: 116 | Views: 579

Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 379 - 382

Jamming Attacks Detection in Time-Critical Wireless Applications

Prajakta V. Pandhare | Jayant Adhikari

Downloads: 116 | Views: 504

Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 706 - 709

Authorized Secure Deduplication in Cloud Computing

R. V. Argiddi | Prachi Sontakke

Top