Skip to main content
Skip to main navigation menu
Skip to site footer
IJRDO -Journal of Computer Science Engineering
Indexing Databases
Current
Archives
Call for Paper
Review Guidelines
Author
Article Publication Charges
Submission Guidelines
Review Process
Publication Ethics
Conference
About
About the Journal
Submissions
Editorial Team
Contact
Search
Search
Register
Login
Home
/
Archives
/
Vol. 1 No. 3 (2015): IJRDO - Journal of Computer Science Engineering
Vol. 1 No. 3 (2015): IJRDO - Journal of Computer Science Engineering
Published:
2015-03-31
Articles
Lossless compression of repetitive and non repetitive DNA sequences using A Novel first Art methodology
V Hari prasad, Dr.P V Kumar
01-09
22
FULL TEXT PDF
22
Swearing in Peak catalog via Probing Fusion in Vehicular Cognitive Radio Respite
C BALA SARAVANAN,, A ARAVINDAN
10-13
13
FULL TEXT PDF
9
CONSUMERS AND COSMETICS - BUYING PATTERN ANALYSIS IN ERODE CITY
Dr.(Mrs) S Kalaiselvi
14-26
11
FULL TEXT PDF
25
Jaina System of Knowledge Management A Comparative Study with Modern Knowledge Management System
Dr Alka Jain
27-32
12
FULL TEXT PDF
14
E-HRM IN AN E-BUSINESS ENVIRONMENT
Megha Sharma
33-45
16
FULL TEXT PDF
17
Review: Detection and Classification of Plants Leaf Diseases
Twinkle Shahir, Monali Raut, Shraddha Khode, Runali Bhagat, Vaishnavi Charde
46-49
13
FULL TEXT PDF
20
EFFECTIVE USE OF ATM WITH SECURITY
Shiv Kumar, Shrawan kumar shrama, Awanit kumar
50-56
15
FULL TEXT PDF
26
Secure Data Transfer in Personal Area Network
Shiv Kumar, Shrawan kumar shrama, Awanit kumar
57-64
14
FULL TEXT PDF
35
Exploration on Service Matching Methodology Based On Description Logic using Similarity Performance Parameters
K. Jayasri, R Rajmohan, D Dinagaran
65-69
12
FULL TEXT PDF
9
Comparison Based Analysis of Advanced Tree Structures
Monika *
70-78
10
FULL TEXT PDF
41
SECURE AND EFFICIENT DATA TRANSMISSION IN WIRELESS MEDICAL SENSOR NETWORKS
M. Prasanth, S Madhavi
79-87
10
FULL TEXT PDF
11
Real Time Motion Detection Video Surveillance For Categorizing Between Human and Non-Human
Meghna Jain, Kriti Agarwal, Vrajesh Sheth, ,Vaishali Gaikwad (Mohite)
88-93
12
FULL TEXT PDF
11
FUZZY REGRESSION BASED CLUSTERING ON UNCERTAIN DATA
R. Ramya, Dr.R Kalpana
94-101
25
FULL TEXT PDF
18
Cloud Cluster
Mr Roshan Thakur, Avinash Khadatkar, Ajinkya Kulkarni, Chinmay Giradkar, Vicky Humne
102-109
14
FULL TEXT PDF
14
INFORMATION SECURITY POLICY UPDATES AND INFORMATION SECURITY BREACH INCIDENTS OF SACCOS IN KENYA
Jerotich Sirma, George Raburu, N. B Okelo
110-124
14
FULL TEXT PDF
11
RELATIONSHIP BETWEEN INDUSTRY BEST PRACTICES AND INFORMATION SECURITY BREACH INCIDENTS OF SACCOS IN KENYA
Jerotich Sirma, George Raburu, N. B Okelo
125-136
14
FULL TEXT PDF
15
GOOGLE FIBER
Sanjana Singh, Surbhi Bhardwaj, Shivansh Mudgil
137-142
9
FULL TEXT PDF
15
HUMMING BIRD SEARCH ALGORITHM
Sanjana Singh, Surbhi Bhardwaj, Shivansh Mudgil
143-149
11
FULL TEXT PDF
45
SECURITY BREACH INCIDENCES OF SACCOS WITH OR WITHOUT SECURITY POLICY WITH A BROAD SCOPE: A CASE OF SACCOS IN KENYA
Jerotich Sirma, George Raburu, N. B Okelo
150-164
11
FULL TEXT PDF
24
Retrieving Information for Urgency Medical Services using Abundant Data Processing Method
V Balaji, D Dinagaran, R Rajmohan
165-173
9
FULL TEXT PDF
10
A REVIEW ON SCHEMES FOR USER AUTHENTICATION
Thamraj N Ghorsad, Ravi Singh Pippal
98-103
13
FULL TEXT PDF
12
Make a Submission
Information
For Readers
For Authors
For Librarians
Quick Links
List of Journals
Current Impact Factor: 2.562
Manuscript Template.docx