International Journal of Science and Research (IJSR)
Computer Science
Downloads: 107 | Views: 674
Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2228 - 2235SMART: Saliency Map, Moments and Texture Features for Robust Image Authentication
Derroll David | Divya B | Pournami
Downloads: 107 | Views: 511
Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1324 - 1327Improving Security for Digital Signature by Using Steganography
G. Pranitha | Ch. Suman Chakravarthy
Downloads: 107 | Views: 500
Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 931 - 935An Improved Approach for Logo Detection and Recognition from the Images Using SURF
Prajkata Musale | Deepak Gupta
Downloads: 107 | Views: 548
Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1434 - 1436Method for Repossession of Content Based Video using Speech and Text Information
Manasi A. Kabade | U.A. Jogalekar
Downloads: 107 | Views: 610
Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1646 - 1650Performance Analysis of Multi-Node Hadoop Clusters using Amazon EC2 Instances
Ruchi Mittal | Ruhi Bagga
Downloads: 107 | Views: 589
Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 2041 - 2047Adaptive Analysis of Knowledge Engineering and Pattern Recognition on Medical Data
Jani Basha | Dasari. Rajesh
Downloads: 107 | Views: 603
Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 988 - 992A Survey on Attribute Based Encryption to Improve Efficiency in Semantic Search Over Cloud Data
Vina M. Lomte | Gauri S. Patil
Downloads: 107 | Views: 568
Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1175 - 1178Steganographic Method of Data Hiding using JPEG Images
Shabana Vathelil Subair | Fathima A Muhammadali
Downloads: 107 | Views: 558
Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1824 - 1829A Combinational Approach Using Matrix Based Pairwise Key Establishment and Post Deployment Approach in Wireless Sensor Networks
Dinesh Dhakar | Ravi Khatri
Downloads: 107 | Views: 571
Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2002 - 2005A Survey on Barcode Generation and Modulation Techniques
Vidyashree Kokane | Shyam Gupta