International Journal of Science and Research (IJSR)
Computer Science
Downloads: 140 | Views: 499
Computer Science & Engineering, India, Volume 6 Issue 2, February 2017
Pages: 878 - 881A Novel Approach to Anti-Phishing Using Visual Cryptography
Sofia Backiya B. | Geetha M. | Sathya M. | Preethika D.
Downloads: 140 | Views: 527
Computer Science & Engineering, India, Volume 6 Issue 3, March 2017
Pages: 1047 - 1051Designing of Virtual Environment for Analysing Drivers Behaviour
Akanksha Joshi | Dr. Shubhangi Giripunje
Downloads: 140 | Views: 638
Computer Science & Engineering, Iraq, Volume 7 Issue 4, April 2018
Pages: 1140 - 1142Design and Development DataBase System of E-Learning Platform for Iraqi Higher Education
Enas Khalid Adnan | Dr. Amer Saleem Elameer | Dr. Ashwaq Q. Hame
Downloads: 140 | Views: 507
Computer Science & Engineering, India, Volume 8 Issue 4, April 2019
Pages: 693 - 695Review on Smart Stick
Arvind Lal | Roshan Acharya | Bal Badhur Sewakoti | Durga Badhur Kami | Binod Niroula | Tseten Namgyal Bhutia
Downloads: 140 | Views: 434
Computer Science, India, Volume 9 Issue 2, February 2020
Pages: 898 - 901Image Steganography with Text Compression
Akanshi Srivastava | Vansh Badkul | Lohan Koka
Downloads: 140 | Views: 879
Computer Science, India, Volume 9 Issue 10, October 2020
Pages: 44 - 48IoT based Heart Disease Prediction using Higher Order Boltzmann Deep Belief Neural Network
Shabeena T
Downloads: 139 | Views: 816
Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 580 - 585Hand Gesture Recognition Technique
Malav Raj Solanki | Shailendra Mishra
Downloads: 139 | Views: 657
Computer Science & Engineering, India, Volume 2 Issue 6, June 2013
Pages: 416 - 418Security Issues in Hybrid Cloud Computing
Kalpit Soni | Parulben D. Sindha
Downloads: 139 | Views: 596
Computer Science & Engineering, India, Volume 2 Issue 8, August 2013
Pages: 185 - 189Detection of Cysts in Ultrasonic Images of Ovary
Ashika Raj
Downloads: 139 | Views: 523
Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 372 - 376Image Steganography using DWT and Data Encryption Standard (DES)
Ketan Shah | Swati Kaul | Manoj S.Dhande