International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Computer Science: Page 307: International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)

Computer Science

Downloads: 112 | Views: 467

Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2133 - 2135

Private Secure, Trusted, Flexible Personal Storage System in Cloud Computing

Nilesh G. Gawande | Dr. Rakesh Pandit

Downloads: 112 | Views: 502

Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2417 - 2420

Hybridization of Particle Swarm Optimization - A Survey

Geetika | Jaswinder Singh

Downloads: 112 | Views: 675

Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2613 - 2617

Improved Intelligence Surveillance System for Object Detection, Classification of Human Behaviour using GMM and Open CV

Rajkumar Bhimrao Pawar | Praveen R. Barapatre

Downloads: 112 | Views: 453

Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 928 - 931

Mobility Prediction with Minimum Energy Consumption

Chinju Ansu Tharian

Downloads: 112 | Views: 522

Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1367 - 1370

Energy Efficient Routing Scheme for WSN

Aman Preet Singh | Harsimran Kaur

Downloads: 112 | Views: 596

Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2222 - 2227

Net Asset Value Prediction using FLANN Model

C. M. Anish | Babita Majhi

Downloads: 112 | Views: 434

Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1074 - 1077

A Secure and Efficient Way of Accessing Encrypted Cloud Databases Using Adaptive Encryption Scheme

Seethal K S | Siddana Gowda

Downloads: 112 | Views: 415

Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1295 - 1298

Detecting Selfish Node over the Active Path using Neighbor Analysis based Technique

Sumiti | Dr. Sumit Mittal

Downloads: 112 | Views: 472

Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1602 - 1607

SSO-Key Distribution Center Based Implementation Using Symmetric Encryption Technique for Distributed Network (Securing SSO in Distributed Network)

M Durga Prasanna | Roopa S R

Downloads: 112 | Views: 601

Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 685 - 689

Secure Routing in Wireless Sensor Networks through the Identified Trusted Node

D. Latha | K. Palanivel

Top