International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Article of the Month

Downloads: 163 | Views: 406 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 425 - 430

Search Engine Optimization to Increase Website Visibility

Vignesh. J, Deepa. V

Share this article

Volume 3 Issue 2, February 2014: Page 2

Downloads: 123 | Views: 294 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1 | Rating: 7.1 / 10

Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 51 - 56

Geospatial Discriminative Patterns with Principle Direction for Effective Crime Detection

R. Saradha, S. Deepika

Share this article

Downloads: 131 | Views: 291 | Rating: 6.3 / 10

Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 57 - 60

A Proposed Android Based Mobile Application to Monitor Works at Remote Sites

S. Sivasubramanian, S. Sivasankaran, S. Thiru Nirai Senthil

Share this article

Downloads: 130 | Views: 299 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1 | Rating: 6.9 / 10

Statistics, India, Volume 3 Issue 2, February 2014

Pages: 61 - 63

Travelling Viewed Statistically

Nileema Bhalerao

Share this article

Downloads: 141 | Views: 293 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1 | Rating: 6.4 / 10

Mechanical Engineering, India, Volume 3 Issue 2, February 2014

Pages: 64 - 65

Actuating and Sensing Using Piezoelectric Cantilever

R S Bindu, Kushal M Potdar

Share this article

Downloads: 127 | Views: 341 | Rating: 6.9 / 10

Agronomy, Ethiopia, Volume 3 Issue 2, February 2014

Pages: 66 - 72

Feed Resource Assessment and Utilization in Baresa Watershed, Ethiopia

Mergia Abera, Adugna Tolera, Getnet Assefa

Share this article

Downloads: 121 | Views: 266 | Rating: 6.1 / 10

Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 73 - 75

Defensive Security Mechanisms for Cloud Computing Security Risks- A Review

Geethu Krishna, Jyothis T. S

Share this article

Downloads: 115 | Views: 275 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1 | Rating: 6.3 / 10

Bio Mechanics Engineering, India, Volume 3 Issue 2, February 2014

Pages: 76 - 78

Finite Element Analysis of External Ilizarov Ring and Hybrid Fixators

D. Bubesh Kumar, K. G. Muthurajan

Share this article

Downloads: 124 | Views: 271 | Rating: 6.9 / 10

Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 79 - 82

Efficient Routing Strategy for Structured Peer to Peer System using DWT based Steganography

D. Pradeepa, S. Rani Lakshmi

Share this article

Downloads: 137 | Views: 299 | Rating: 6.8 / 10

Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 83 - 87

Exploring Mutational Pathways of HIV Using Genetic Algorithm

K. M. Monica

Share this article

Downloads: 126 | Views: 272 | Rating: 6.3 / 10

Information Technology, India, Volume 3 Issue 2, February 2014

Pages: 88 - 90

WSN: Various Attacks and IDS in WSN

Amol N. Rindhe, Sanjay V. Dhopte

Share this article
Top