International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Article of the Month

Downloads: 163 | Views: 180 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 425 - 430

Search Engine Optimization to Increase Website Visibility

Vignesh. J, Deepa. V

Share this article

Volume 3 Issue 2, February 2014: Page 2

Downloads: 122 | Views: 137 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 51 - 56

Geospatial Discriminative Patterns with Principle Direction for Effective Crime Detection

R. Saradha [2] | S. Deepika [3]

Share this article

Downloads: 131 | Views: 150 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 57 - 60

A Proposed Android Based Mobile Application to Monitor Works at Remote Sites

S. Sivasubramanian | S. Sivasankaran [7] | S. Thiru Nirai Senthil

Share this article

Downloads: 128 | Views: 144 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Statistics, India, Volume 3 Issue 2, February 2014

Pages: 61 - 63

Travelling Viewed Statistically

Nileema Bhalerao

Share this article

Downloads: 141 | Views: 159 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Mechanical Engineering, India, Volume 3 Issue 2, February 2014

Pages: 64 - 65

Actuating and Sensing Using Piezoelectric Cantilever

R S Bindu | Kushal M Potdar

Share this article

Downloads: 127 | Views: 145 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Agronomy, Ethiopia, Volume 3 Issue 2, February 2014

Pages: 66 - 72

Feed Resource Assessment and Utilization in Baresa Watershed, Ethiopia

Mergia Abera [2] | Adugna Tolera | Getnet Assefa

Share this article



Downloads: 121 | Views: 132 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 73 - 75

Defensive Security Mechanisms for Cloud Computing Security Risks- A Review

Geethu Krishna [2] | Jyothis T. S

Share this article

Downloads: 115 | Views: 130 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Bio Mechanics Engineering, India, Volume 3 Issue 2, February 2014

Pages: 76 - 78

Finite Element Analysis of External Ilizarov Ring and Hybrid Fixators

D. Bubesh Kumar | K. G. Muthurajan

Share this article

Downloads: 124 | Views: 136 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 79 - 82

Efficient Routing Strategy for Structured Peer to Peer System using DWT based Steganography

D. Pradeepa | S. Rani Lakshmi

Share this article

Downloads: 137 | Views: 153 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 83 - 87

Exploring Mutational Pathways of HIV Using Genetic Algorithm

K. M. Monica

Share this article

Downloads: 126 | Views: 137 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Information Technology, India, Volume 3 Issue 2, February 2014

Pages: 88 - 90

WSN: Various Attacks and IDS in WSN

Amol N. Rindhe | Sanjay V. Dhopte

Share this article





Top