International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Computer Science: Page 398: International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)

Computer Science

Downloads: 106 | Views: 540

Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1386 - 1389

Congestion Control Protocols for Wireless Multimedia Sensor Networks

Snehal R. Ranesankpal | Manisha R. Dhage

Downloads: 106 | Views: 738

Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2451 - 2458

Regenerating Code Based on Public Auditing Scheme with Security Preserving for Cloud Storage

Dr. K. Sundeep Kumar | Anupama P. V

Downloads: 106 | Views: 626

Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2398 - 2403

Text Document Annotation and Retrieval Based on Content of the Document and Query Workload

Arunima P V | Ravinarayana B

Downloads: 106 | Views: 443

Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1094 - 1096

A Survey on By-Passing Techniques in Wireless Sensor Network

Shazia Almas | Arudra.A

Downloads: 106 | Views: 611

Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1211 - 1215

A Review on Data Mining, Its Applications and Approaches

Anu Verma | Jyoti Arora

Downloads: 106 | Views: 487

Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1371 - 1376

Optimized Storage and Secured Data Transaction in Cloud Environment using ECC and Huffman Encoding

Saket Nigam | Rekhansh Rao

Downloads: 106 | Views: 570

Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2539 - 2541

Classification of Data Using LAD

Aishwarya Jadhav | Vaishali Nandedkar

Downloads: 106 | Views: 435

Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1325 - 1328

A Survey on Copy Move Forgery Detection in Images

Rameeza M Ashraf | Veena K Viswam

Downloads: 106 | Views: 632

Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1448 - 1453

Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator

Anil | Dr. Sudesh Kumar

Downloads: 106 | Views: 654

Computer Science & Engineering, Sudan, Volume 5 Issue 12, December 2016

Pages: 1653 - 1660

Cloud Computing Strategy in Sudan

Yousif Eltahir Sharaf Eldin Ahmed

Top