International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Article of the Month

Downloads: 163 | Views: 345 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 425 - 430

Search Engine Optimization to Increase Website Visibility

Vignesh. J, Deepa. V

Share this article

Volume 3 Issue 2, February 2014: Page 4

Downloads: 123 | Views: 244 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1 | Rating: 7.1 / 10

Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 51 - 56

Geospatial Discriminative Patterns with Principle Direction for Effective Crime Detection

R. Saradha [2] | S. Deepika [3]

Share this article

Downloads: 131 | Views: 251 | Rating: 6.3 / 10

Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 57 - 60

A Proposed Android Based Mobile Application to Monitor Works at Remote Sites

S. Sivasubramanian | S. Sivasankaran [7] | S. Thiru Nirai Senthil

Share this article

Downloads: 130 | Views: 265 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1 | Rating: 6.9 / 10

Statistics, India, Volume 3 Issue 2, February 2014

Pages: 61 - 63

Travelling Viewed Statistically

Nileema Bhalerao [2]

Share this article

Downloads: 141 | Views: 255 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1 | Rating: 6.4 / 10

Mechanical Engineering, India, Volume 3 Issue 2, February 2014

Pages: 64 - 65

Actuating and Sensing Using Piezoelectric Cantilever

R S Bindu | Kushal M Potdar

Share this article

Downloads: 127 | Views: 273 | Rating: 6.9 / 10

Agronomy, Ethiopia, Volume 3 Issue 2, February 2014

Pages: 66 - 72

Feed Resource Assessment and Utilization in Baresa Watershed, Ethiopia

Mergia Abera [2] | Adugna Tolera | Getnet Assefa

Share this article

Downloads: 121 | Views: 219 | Rating: 6.1 / 10

Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 73 - 75

Defensive Security Mechanisms for Cloud Computing Security Risks- A Review

Geethu Krishna [2] | Jyothis T. S

Share this article

Downloads: 115 | Views: 238 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1 | Rating: 6.3 / 10

Bio Mechanics Engineering, India, Volume 3 Issue 2, February 2014

Pages: 76 - 78

Finite Element Analysis of External Ilizarov Ring and Hybrid Fixators

D. Bubesh Kumar | K. G. Muthurajan

Share this article

Downloads: 124 | Views: 235 | Rating: 6.9 / 10

Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 79 - 82

Efficient Routing Strategy for Structured Peer to Peer System using DWT based Steganography

D. Pradeepa | S. Rani Lakshmi

Share this article

Downloads: 137 | Views: 259 | Rating: 6.8 / 10

Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 83 - 87

Exploring Mutational Pathways of HIV Using Genetic Algorithm

K. M. Monica

Share this article

Downloads: 126 | Views: 228 | Rating: 6.3 / 10

Information Technology, India, Volume 3 Issue 2, February 2014

Pages: 88 - 90

WSN: Various Attacks and IDS in WSN

Amol N. Rindhe | Sanjay V. Dhopte

Share this article
Top