Skip to main content
Skip to main navigation menu
Skip to site footer
IJRDO -Journal of Computer Science Engineering
Indexing Databases
Current
Archives
Call for Paper
Review Guidelines
Author
Article Publication Charges
Submission Guidelines
Review Process
Publication Ethics
Conference
About
About the Journal
Submissions
Editorial Team
Contact
Search
Search
Register
Login
Home
/
Archives
/
Vol. 1 No. 4 (2015): IJRDO - Journal of Computer Science Engineering
Vol. 1 No. 4 (2015): IJRDO - Journal of Computer Science Engineering
Published:
2015-04-30
Articles
Review on Iris Based Security System Using Edge Detection Mechanism
Pooja1 *, Mahesh Kumar
01-06
24
FULL TEXT PDF
26
Review on multilayer security on Cloud Server
Preeti *, Mahesh Kumar
07-12
19
FULL TEXT PDF
16
A PROBABILISTIC APPROACH TO METADATA FILTER IN SOCIAL NETWORK
S. Lavanya, P. Kanimozhi
01-04
10
FULL TEXT PDF
12
VHDL BEHAVIORAL MODEL
Shivangi Shandilya, Surekha Sangwan, Ritu Yadav
05-08
15
FULL TEXT PDF
14
Semi-Trusted Authentication for Health Data in Cloud
Rajeswari M, Anjelin Lilly J asmine.P, V. Komaladevi, K. Monika
09-13
9
FULL TEXT PDF
25
ARTIFICIAL INTELLIGENCE AND BIG DATA
Shivangi Shandilya, Surekha Sangwan, Ritu Yadav
14-17
11
FULL TEXT PDF
12
A STUDY OF PRIVACY PRESERVATION IN DATA MINING
G Sowmya, B. Vamshi, G. Navya, Dr K.V Naganjaneyulu
18-21
27
FULL TEXT PDF
26
INTERNET OF THINGS: APPLICATIONS, BARRIERS AND ITS STATUS
G Sowmya, B.Akash Kumar, K.V Naganjaneyulu, S Chandrakanth
22-25
14
FULL TEXT PDF
27
Deduce of ZigBee Wireless Sensor Obscure Into Snooty Wallop Discord
C BALA SARAVANAN, R.AJITH KUMAR
26-29
45
FULL TEXT PDF
13
ARTIFICIAL INTELLIGENCE
VARUN x VARUN TYAGI, SHUBAM VERMA, PANKAJ SINGH
30-38
9
FULL TEXT PDF
17
Intelligent Robotics
Tushar Mehmi, Taruna Rohdia, Upender Yadav
39-48
11
FULL TEXT PDF
12
Efficient Architecture Design For Connecting and Automating of work flows and Cloud Security Control
N.Ashok Kumar, R Ganga Sagar
49-58
9
FULL TEXT PDF
11
SOFTWARE ENGINNERING
AARTI SINGH, ANANYA ANIKESH
59-63
11
FULL TEXT PDF
7
WEB DEVELOPMENT
AARTI SINGH, ANANYA ANIKESH
64-74
17
FULL TEXT PDF
43
ARTIFICIAL INTELLIGENCE
AARTI SINGH, ANANYA ANIKESH
75-82
10
FULL TEXT PDF
32
A review paper on cocomo model
Gajender pal, Manish kumar, Kuldeep barala, Dce ggn
83-87
16
FULL TEXT PDF
166
A Review Paper on Wireless Network
Gajender pal, Kuldeep kumar, Manish kumar, DCE GGN
88-90
11
FULL TEXT PDF
28
A Review Paper On Unix
Gajender pal, Kuldeep kumar, Manish kumar, DCE, GGN
91-94
21
FULL TEXT PDF
13
Efficient Implementation of a Demultiplexer
Saksham wason, piyush kumar, shubham rathi
95-98
11
FULL TEXT PDF
14
Dynamic Memory Allocation
Saksham wason, piyush kumar, shubham rathi
99-103
20
FULL TEXT PDF
42
Generic Access Network(GAN)
Simran Bhatti, Vandana Tayal, Pooja Gulia
104-107
20
FULL TEXT PDF
57
Agile Software Development
Simran Bhatti, Vandana Tayal, Pooja Gulia
108-112
19
FULL TEXT PDF
25
SOFTWARE PROJECT MANAGEMENT
RONIT YADAV, SACHIN SOLANKI, SAHIB ARORA
113-118
12
FULL TEXT PDF
14
AN EMPIRICAL STUDY OF SOFTWARE ENGINEERING MODEL FOR SOFTWARE DEVELOPMENT
V Rajiv Jetson, Dr.G Satyanarayana Prasad
119-139
13
FULL TEXT PDF
16
A novel approach for congestion control in wireless network
Mehta Ishani, Udit Narayan Kar, Dr Atul Gonsai
140-143
11
FULL TEXT PDF
12
SOFTWARE TESTING
Pooja Nayak, Sahil Mudgal, Rajat Wason
144-154
16
FULL TEXT PDF
13
Robotics And Artificial Intelligence
Sahil Munjal, Sachin Malik, Sahil Bhardwaj
155-157
14
FULL TEXT PDF
11
Performance Evaluation of Sort Algorithm
Sahil Bhardwaj, Sachin Malik, Sahil Munjal
158-161
12
FULL TEXT PDF
26
Various Software Development Life Cycle Models
Sahil Jindal, Puneet Gulati, Praveen Rohilla
162-167
11
FULL TEXT PDF
35
System Programming in Loaders
Komal *, Karuna Hazrati, Priyanka Mittal
168-171
14
FULL TEXT PDF
14
Game Playing
Komal *, Karuna Hazrati, Priyanka Mittal
172-175
11
FULL TEXT PDF
12
ISDN
Rashika Kaul, Nonika Sharma
176-179
12
FULL TEXT PDF
13
Wireless Networks : Research Issues
Nikhil Singla, Paras Thakral, Nipun Jain
12
FULL TEXT PDF
8
Software Defect Predication using Classifier Mining
K.B.S Sastry, Dr. R Satya Prasad
185-205
15
FULL TEXT PDF
66
Network Security : Attacks and Defence.
Sahil Mudgal, Pooja Nayak
206-214
12
FULL TEXT PDF
28
A STUDY APPROACH THROUGH SEGMENTATION BY USING ROUGHNESS INDEX AND MRI
Mr. Athar Hussain, Anjali B Raut
215-224
10
FULL TEXT PDF
12
SYNCHRONIZATION IN DIGITAL SYSTEM DESIGN
RONIT YADAV, SACHIN SOLANKI, SAHIB ARORA
225-229
13
FULL TEXT PDF
9
AN INTRODUCTION TO TIME COMPLEXITY AND NP-COMPLETE
Upender Yadav, Vikash Verma, Parmod Saha
230-239
18
FULL TEXT PDF
16
A CONCEPTUAL PAPER ON SOFTWARE PLATFORM DEVELOPMENT TO ACHIEVE HEALTH MANAGEMENT
S Jayabharathi, A Appandairaj
240-245
14
FULL TEXT PDF
12
TACTICAL EXECUTION OF CLOUD SERVICES: TARGETING CLIENT ESPOUSAL BEHAVIOR
S PAVITHRAA, A APPANDAIRAJ
246-250
14
FULL TEXT PDF
22
Make a Submission
Information
For Readers
For Authors
For Librarians
Quick Links
List of Journals
Current Impact Factor: 2.562
Manuscript Template.docx