International Journal of Science and Research (IJSR)
Computer Science
Downloads: 112 | Views: 486
Computer Science & Engineering, India, Volume 6 Issue 4, April 2017
Pages: 1889 - 1893Improving the Stable Period of Leach Protocol in Wireless Sensor Network Using Dynamic Stable Election Protocol
Palak Agnihotri | Manju
Downloads: 112 | Views: 490
Computer Science & Engineering, India, Volume 6 Issue 5, May 2017
Pages: 1223 - 1228Predication of Students Performance Using Data Mining
A. V. Kadu | Dr. G. R. Bamnote
Downloads: 112 | Views: 521
Computer Science & Engineering, India, Volume 6 Issue 5, May 2017
Pages: 2025 - 2027Attribute-Based Access Control Scheme for Security of Cloud Storage Systems Using RNS Cryptography
Priya Thomas
Downloads: 112 | Views: 462
Computer Science & Engineering, India, Volume 6 Issue 6, June 2017
Pages: 1288 - 1292Textual Description for Annotating Videos
Shama P S | Pattan Prakash
Downloads: 112 | Views: 572
Computer Science & Engineering, India, Volume 6 Issue 7, July 2017
Pages: 2070 - 2072Evapotranspiration: Implementation in NetLogo
Lubna Ansari | Sonal Anand
Downloads: 112 | Views: 594
Computer Science & Engineering, India, Volume 6 Issue 7, July 2017
Pages: 2156 - 2159Review on Reversible Data Hiding With Distributed Source Encoding Using Identity Hiding Mechanism for Image and Data Owner
Sanjyot A. Biranje | Dr. D S. Bhosle
Downloads: 112 | Views: 582
Computer Science & Engineering, India, Volume 6 Issue 9, September 2017
Pages: 1445 - 1449Secure VoIP Network by Fusion of Irises
S. Bhuvaneshwari | Dr. P. Arul
Downloads: 112 | Views: 454
Computer Science & Engineering, India, Volume 6 Issue 10, October 2017
Pages: 1509 - 1511N-HUB Routing with Bandwidth and Energy based QOS and Link Optimization in Wireless Networks
Priyanka | Shameem Akthar
Downloads: 112 | Views: 500
Computer Science & Engineering, India, Volume 6 Issue 10, October 2017
Pages: 1778 - 1781A Novel Message Encryption Strategy using Random Numbers for Point-To-Point Message Transfer
Surya Ahuja | Nishit Angrish
Downloads: 112 | Views: 412
Computer Science & Engineering, Turkiye, Volume 6 Issue 11, November 2017
Pages: 1673 - 1679Outlander Algorithm Based on Integrated Aggressive Selection Method
Mashar Cenk Gencal | Mustafa Oral