International Journal of Science and Research (IJSR)
Computer Science
Downloads: 114 | Views: 500
Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 1849 - 1851A Study on Reconstruction Methods and Approaches
Reshma Raj K S | Raj Kumar T
Downloads: 114 | Views: 519
Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 1211 - 1213A Decision Support System for the Design and Evaluation of Durable Wastewater Solutions
Ramnath Zinjurke
Downloads: 114 | Views: 619
Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2046 - 2050Text Categorization using Jaccard Coefficient for Text Messages
Ankita Jadhao | Dr. A. J. Agrawal
Downloads: 114 | Views: 623
Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2345 - 2351Hidden Markovian Model Combined with Dynamic Mode Decomposition for Detecting Deception in Videos
Shyama V S | Mary Linda P A
Downloads: 114 | Views: 606
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 1009 - 1016A Comprehensive Survey on Importance of Web Caching and Pre-Fetching
Rituparna Chandrakar | Shivani Varshney
Downloads: 114 | Views: 516
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 1625 - 1627An Expert Selection System for Medical Diagnosis
Shaly K K | Shahana T
Downloads: 114 | Views: 436
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 1821 - 1853Cloud Computing and Its Advantages
Shaikh Ashapakh Sattar
Downloads: 114 | Views: 606
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 2542 - 2545Myfriend: A User Preference Based Friend Recommendation System for Social Networks
Amrutha O | Mohammed Jaseem N
Downloads: 114 | Views: 571
Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 540 - 543Filtering Recommendation Using Typicality-Based Collaborative Filtering Technology
Harshali U. Chaudhary | Priti Subramanium
Downloads: 114 | Views: 507
Computer Science & Engineering, Indonesia, Volume 5 Issue 7, July 2016
Pages: 1149 - 1152Three-Pass Protocol Concept in Hill Cipher Encryption Technique
Andysah Putera Utama Siahaan