International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Article of the Month

Downloads: 352 | Views: 535 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 629 - 632

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall

Share this article

Volume 3 Issue 6, June 2014: Page 36

Downloads: 108 | Views: 172

Computer Science & Engineering, Morocco, Volume 3 Issue 6, June 2014

Pages: 1777 - 1781

An Approach to Software Quality Model Based (SQuaM): (QMGenerator a Framework Supporting this Approach)

Youness BOUKOUCHI [2] | Adil KHAMAL [2] | Abdalaziz MARZAK [2] | Hicham MOUTACHAOUIK [2]

Share this article

Downloads: 116 | Views: 199

Botany, Pakistan, Volume 3 Issue 6, June 2014

Pages: 1782 - 1788

Ethnobotanical Studies of Plant Resources of Cholistan Desert; Pakistan

Saeed Ahmad [3] | Hafiz Muhammad Wariss [3] | Khurshid Alam [3] | Shazia Anjum [3] | Muhammad Mukhtar

Share this article

Downloads: 2 | Views: 104 | Today Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte | Saloni Shah [4]

Share this article

Downloads: 113 | Views: 189

Biology, India, Volume 3 Issue 6, June 2014

Pages: 1792 - 1800

Functional Characterization and Structure Prediction of HDAC-10: A Bioinformatics Approach

Sabeena M | Kaiser Jamil [4]

Share this article

Downloads: 115 | Views: 167

Medicine Science, India, Volume 3 Issue 6, June 2014

Pages: 1801 - 1810

USG in Gall Bladder Disease Prediction of Difficult Laparoscopic Cholecystectomy

Suryawanshi Pravin.R | Sude Nandkishor.S. | Bahure Upasna

Share this article

Downloads: 118 | Views: 188

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1811 - 1816

A Video Steganography Approach using Random Least Significant Bit Algorithm

Arijit Basu | Gaurav Kumar [19] | Soumyajit Sarkar

Share this article

Downloads: 125 | Views: 191

Management, Sri Lanka, Volume 3 Issue 6, June 2014

Pages: 1817 - 1820

A Theoretical Approach to the Competitive Advantage Moderating Effects of Strategies: Innovation and IT

S.W.G.K. Bulankulama | Ali Khatibi [4]

Share this article

Downloads: 100 | Views: 181

Nutrition Science, India, Volume 3 Issue 6, June 2014

Pages: 1821 - 1822

Importance of Nutrients Taken By the Age Group (3 - 6) Year

Reena [87] | Mishra Sunita [13]

Share this article

Downloads: 107 | Views: 227

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1823 - 1826

Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2

Manju Ojha | Dr. Rajendra Singh Kushwah

Share this article

Downloads: 87 | Views: 209

Medicine Science, Albania, Volume 3 Issue 6, June 2014

Pages: 1827 - 1830

Albanian Doctors Extended Knowledge and Restricted Resources in Management of Breast Cancers High Risk Women

Albana SHAHINI PhD | Erinda KOSTURI MD [2]

Share this article
Top