International Journal of Science and Research (IJSR)
Computer Science
Downloads: 110 | Views: 520
Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 1579 - 1582MANET, Security Attacks and Routing Protocol: A Survey
Navanpreet Kaur | Harjit Singh
Downloads: 110 | Views: 553
Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 1701 - 1703Multi-Server Authentication and Key Exchange
Muzammil M. Ahmad
Downloads: 110 | Views: 755
Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2333 - 2338Identifying Semantic Category of Distorted Images along with Text Recognition
Anu E | Anu K S
Downloads: 110 | Views: 488
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 1518 - 1522Implementation of M2M Communication Protocol for IoT Based Email System
Swatee D. Sonwane | V. V. Kimbahune
Downloads: 110 | Views: 479
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 1539 - 1542Privacy Based Association Rules in Secure Horizontal Database
Zameena R | Nitha L Rozario
Downloads: 110 | Views: 633
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 1709 - 1713Rider: A Multi Layer Framework for Road Condition Estimation
Sona P | Divya M
Downloads: 110 | Views: 487
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 2092 - 2096Defective Product Detection Using Image Processing
Hema L. Chavan | Santosh A. Shinde
Downloads: 110 | Views: 581
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 2424 - 2427An Encryption Scheme for Privacy Preserving in Data Mining using different classification Algorithm
Anu Verma | Jyoti Arora
Downloads: 110 | Views: 501
Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1222 - 1227Nearest Neighbor Search Technique for Novel Queries
P. R. Shejawal | J. R. Pansare | G. S. Pole
Downloads: 110 | Views: 643
Computer Science & Engineering, Nigeria, Volume 5 Issue 7, July 2016
Pages: 2104 - 2106A Manipulated Cyclic Permutation Data Scrambling Approach for Data Security
OYINLOYE Oghenerukevwe Elohor | Benson Ojedayo