International Journal of Science and Research (IJSR)
Computer Science
Downloads: 110 | Views: 522
Computer Science & Engineering, India, Volume 6 Issue 1, January 2017
Pages: 1790 - 1794A Multi-Objective Unsupervised Feature Selection using Genetic Algorithm
Rizwan Ahmed Khan | Indu Mandwi
Downloads: 110 | Views: 517
Computer Science & Engineering, India, Volume 6 Issue 2, February 2017
Pages: 1328 - 1334Survey on Soft Computing Approaches for Human Activity Recognition
Manisha V. Kharat | K. H. Walse | Dr. R. V. Dharaskar
Downloads: 110 | Views: 589
Computer Science & Engineering, India, Volume 6 Issue 3, March 2017
Pages: 1206 - 1209Improved Fuzzy Rule Based Classification System Using Feature Selection and Bagging for Large Datasets
Akil Kumar A. | Mithunkumar P. | Kiruthiga R. | Anitha R. | V. Priya
Downloads: 110 | Views: 444
Computer Science & Engineering, India, Volume 6 Issue 3, March 2017
Pages: 1942 - 1946Hallmarks of Effective Implementation of Agile Practices and Agile Transformation Chronicles
V. Esther Jyothi | K. Nageswara Rao
Downloads: 110 | Views: 618
Computer Science & Engineering, India, Volume 6 Issue 3, March 2017
Pages: 2071 - 2077Plant Species Identification using SIFT and SURF Technique
Dr. Sandeep Kumar | Samrity
Downloads: 110 | Views: 409
Computer Science & Engineering, India, Volume 6 Issue 4, April 2017
Pages: 1662 - 1665Study of Applications of Underwater Wireless Sensor Networks
M. Kiranmayi | Dr. Kathirvel Ayyaswamy
Downloads: 110 | Views: 506
Computer Science & Engineering, India, Volume 6 Issue 4, April 2017
Pages: 2008 - 2012An Intellectual System for Human Personality Identification Using Soft - Computing
Anupam Varshney | Chetan Kumar
Downloads: 110 | Views: 526
Computer Science & Engineering, India, Volume 6 Issue 5, May 2017
Pages: 1216 - 1222Performance Analysis of AODV and AOMDV Routing Protocols for Reducing the Energy Consumption in MANET
Durgashankar Saini | G. L. Saini
Downloads: 110 | Views: 672
Computer Science & Engineering, India, Volume 6 Issue 5, May 2017
Pages: 2530 - 2533Shadow Attacks Based On Password Patterns Password Reuses
Bhavika Garse | N. D. Kale
Downloads: 110 | Views: 494
Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 1109 - 1112Combined Security and Service Overloading Fusion Model for Cloud Environment
Ramesh Prasad Vishwakarma | Dr. Sitendra Tamrakar | Rishi Kumar Sharma