International Journal of Science and Research (IJSR)
Computer Science
Downloads: 137 | Views: 454
Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 1043 - 1046Deadline Constraint Heuristics based Workflow Scheduling in Cloud Computing
Ranjitha R | P. Krishnamoorthy
Downloads: 137 | Views: 537
Computer Science & Engineering, India, Volume 6 Issue 12, December 2017
Pages: 462 - 464Facing Security Problems in Big Data and Hadoop
P. S. Vijayalakshmi | T. Arunambika
Downloads: 137 | Views: 534
Computer Science & Engineering, India, Volume 7 Issue 8, August 2018
Pages: 1310 - 1314Content Based Image Retrieval System using HSV Color Space to Support Fake News Analysis
S. D. Samantaray | Ashish Tyagi
Downloads: 137 | Views: 635
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1922 - 1925Review the Digital Forensic Techniques for Cloud Computing Environment
Sonali Ogra | Prof. Praneet Khare
Downloads: 137 | Views: 866
Computer Science & Engineering, India, Volume 8 Issue 2, February 2019
Pages: 1132 - 1134The Error Correction Learning with Delta Rule
Jogimol Joseph
Downloads: 137 | Views: 560
Computer Science & Engineering, India, Volume 8 Issue 4, April 2019
Pages: 1692 - 1696MongoDB with Encryption Techniques
Ch. Srilatha | P. Asha
Downloads: 136 | Views: 661
Computer Science & Engineering, India, Volume 1 Issue 3, December 2012
Pages: 220 - 223Medial Axis Transformation based Skeletonzation of Image Patterns using Image Processing Techniques
Navjot Mann | Parminder Singh
Downloads: 136 | Views: 572
Computer Science & Engineering, India, Volume 2 Issue 3, March 2013
Pages: 345 - 349Efficient Image Mining Techniques using Spatial Information
Hemavathy R | Shobha G
Downloads: 136 | Views: 710
Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 170 - 174A Survey on Performance Analysis of DES; AES and RSA Algorithm along with LSB Substitution Technique
B. Padmavathi | S. Ranjitha Kumari
Downloads: 136 | Views: 518
Computer Science & Engineering, India, Volume 2 Issue 7, July 2013
Pages: 235 - 240An Emerging Anomaly Detection Technique to Diminish the Routing Misbehavior in Mobile Ad hoc Network (MANET)
Chinmaya Kumar Nayak | Banchhanidhi Dash | Manoranjan Pradhan