Skip to main content
Skip to main navigation menu
Skip to site footer
IJRDO -Journal of Computer Science Engineering
Indexing Databases
Current
Archives
Call for Paper
Review Guidelines
Author
Article Publication Charges
Submission Guidelines
Review Process
Publication Ethics
Conference
About
About the Journal
Submissions
Editorial Team
Contact
Search
Search
Register
Login
Home
/
Archives
/
Vol. 3 No. 4 (2017): IJRDO - Journal of Computer Science Engineering
Vol. 3 No. 4 (2017): IJRDO - Journal of Computer Science Engineering
Published:
2017-04-30
Articles
Cross Cloud Computing in Security System
Ankur Gupta, Puneet garg
13-16
21
FULL TEXT PDF
32
Review on Anomaly Detection In Cloud Computing
Ragini *, Mahesh Kumar
17-20
38
FULL TEXT PDF
86
Review on Security Of Peer To Peer & Client-Server Network Using XOR Metrics In Cloud Computing
Rekha1 *, Mahesh Kumar
21-26
52
FULL TEXT PDF
43
Review on Clustering Mechanism For Web Based Data Mining
Ritu *, Mahesh Kumar
27-32
30
FULL TEXT PDF
29
Review on Sentiment Analysis in Natural Language Processing
Neha Gaur, Neetu Sharma
37-46
23
FULL TEXT PDF
68
REVIEW ON METER DATA ACQUISITION SYSTEM
Sonia *, Dr. Neetu Sharma
47-51
46
FULL TEXT PDF
65
Online Hostel Automation
Chandrashekar K.V, Kishor kumar C S, Monisha B, Nikitha A, Impana Appaji
52-57
26
FULL TEXT PDF
547
Scalability of the Wireless Sensor Networks on Hierarchical Routing
Ramya C M, Thejas R J, Vikas B K, Vinutha K M, Impana Appaji
58-65
30
FULL TEXT PDF
62
APPLICATION OF BUSINESS INTELLIGENCE TECHNIQUES TO ANALYZE IT PROJECT MANAGEMENT DATA
Steffi Zachariah, Damini Khadakkar, Vinay Kumar Sharma
66-70
32
FULL TEXT PDF
33
AN OVERVIEW OF CHARACTERISTICS OF MOBILE AD HOC NETWORKS
Vidhiya Madhu, Sriee S.K.M
71-76
37
FULL TEXT PDF
86
Attack of malicious objects in computer network under antivirus and quarantine defence
Anjani Kumar Singha
77-82
27
FULL TEXT PDF
30
Big Data – Concepts, Applications, Challenges and Future Scope
ANJANI KUMAR SINGHA
83-96
23
FULL TEXT PDF
70
Research on Computer Network Virus Defense Technology in Cloud Technology Environment
Anjani Kumar Singha
97-113
22
FULL TEXT PDF
40
Risk Assessment of Computer Network Security in Banks
Anjani Kumar Singha
114-124
31
FULL TEXT PDF
30
Library Management system based on IoT
Mrs. Vandana C.P, Miss Anamika Bhattacharjee, Miss Anubhuti Gupta
125-131
26
FULL TEXT PDF
1392
Basic Principles and Steps of Types of Software Models
Ramanpreet Kaur, Satnam Singh, Harvinder singh, Divya *
132-134
23
FULL TEXT PDF
42
Review on Concepts of Software Testing
Sandeep Kaur, Navdeep Kaur, Harjeet Kaur
135-138
23
FULL TEXT PDF
43
Advantages of Database Management System in Cloud Infrastructure
Rajneesh kumar pandey, Yashwant kumar singh, Ram Milan
139-146
39
FULL TEXT PDF
64
Fuzzy Controlled Architecture for Performance Tuning of Database Management System
Rajneesh kumar pandey, Yashwant kumar singh, Ram Milan
147-151
26
FULL TEXT PDF
35
Make a Submission
Information
For Readers
For Authors
For Librarians
Quick Links
List of Journals
Current Impact Factor: 2.562
Manuscript Template.docx