- DocumentMultiple Disease Diagnosis by Using Fuzzy Pattern Applications on Large Databaseîncărcat deeditor_ijcat
- DocumentMissing Value Estimation and Impact on Heterogeneous Data Setîncărcat deeditor_ijcat
- DocumentParallelization of BFS Graph Algorithm Using CUDAîncărcat deeditor_ijcat
- DocumentNIOS II Based Embedded Web Server Development for Networking Applicationsîncărcat deeditor_ijcat
- DocumentVarious Pitch Extraction Techniques of Audio Files for Audio Information Retrievalîncărcat deeditor_ijcat
- DocumentText Cryptosystem Based on Elliptic Curve Cryptography for Networksîncărcat deeditor_ijcat
- DocumentVarious Methods for Preventing Flooding Attack in MANET a Comparative Analysisîncărcat deeditor_ijcat
- DocumentPreserving Privacy and Illegal Content Distribution for Cloud Environmentîncărcat deeditor_ijcat
- DocumentReview on Brain Tumor Detection Techniques From MRI Images and Rough Set Theoryîncărcat deeditor_ijcat
- DocumentPerformance Evaluation of Wireless Sensor Network Under Black Hole Attackîncărcat deeditor_ijcat
- DocumentMulti Region Extraction Image Segmentation Based on Centroid Clustering Techniqueîncărcat deeditor_ijcat
- DocumentParallel K Means Clustering Based on Hadoop and Hamaîncărcat deeditor_ijcat
- DocumentAndroid-Help-Alert-System-using-Speech-Recognition.pdfîncărcat deeditor_ijcat
- DocumentUser-Deadline-Based-Job-Scheduling-in-Grid-Computing.pdfîncărcat deeditor_ijcat
- DocumentSelf-Improved-ODMP-Protocol-(ODMP-E).pdfîncărcat deeditor_ijcat
- DocumentStudy-on-Security-Breaches-in-Php-Applications.pdfîncărcat deeditor_ijcat
- DocumentAnalysis-of-Noise-Exposure-from-Different-Machines-by-Graph-Based-Clustering-Method.pdfîncărcat deeditor_ijcat
- DocumentTowards-A-Statistical-Context-for-Source-Obscurity-in-Sensor-Network.pdfîncărcat deeditor_ijcat
- DocumentSecuring-Websites-through-Multi-CAPTCHA.pdfîncărcat deeditor_ijcat
- DocumentRejection-of-Harmonics-in-LNA-for-Broadband-Application.pdfîncărcat deeditor_ijcat
- DocumentTwo-Ways-Security-on-Cloud-Computing-using-Cryptography-and-Intrusion-Detection-A-Review.pdfîncărcat deeditor_ijcat
- DocumentA-Distributed-Method-to-Protect-Disruption-Tolerant-Networks-from-the-Effects-of-Packet-Overflow.pdfîncărcat deeditor_ijcat
- DocumentRelative-Study-on-Malayalam-English-Translation-using-Transfer-Based-Approach.pdfîncărcat deeditor_ijcat
- DocumentRecognizing-Character-using-Bayesian-Network-in-Data-Mining.pdfîncărcat deeditor_ijcat
- DocumentSecuring-Images-using-Encryption-Techniques-A-Survey.pdfîncărcat deeditor_ijcat
- DocumentSecure-Sharing-of-Data-over-Cloud-Computing-using-Different-Encryption-Schemes-An-Overview.pdfîncărcat deeditor_ijcat
- DocumentSelection-of-Accurate-&-Robust-Model-for-Binary-Classification-Problems.pdfîncărcat deeditor_ijcat
- DocumentReal-Time-Eye-Tracking-System-for-People-with-Several-Disabilities-using-Single-Web-Cam.pdfîncărcat deeditor_ijcat
- DocumentPower-Quality-Monitoring-of-Induction-Motor-using-Lab-VIEW.pdfîncărcat deeditor_ijcat
- DocumentProposed-Model-of-Encryption-Technique-using-Block-Cipher-Concept-to-Enhance-Avalanche-Effect.pdfîncărcat deeditor_ijcat
- DocumentPerformance-Analysis-of-Tree-Classifiers-using-on-Engineering-Students-Recruitment-Dataset.pdfîncărcat deeditor_ijcat
- DocumentPrivate-NUBE-(Private-Cloud-for-Particular-Organization).pdfîncărcat deeditor_ijcat
- DocumentPreserving-Source-Location-Privacy-in-Wireless-Sensor-Network.pdfîncărcat deeditor_ijcat
- DocumentParallel-Workload-Scheduling-in-Cloud-A-Survey.pdfîncărcat deeditor_ijcat
- DocumentImprovement-of-Transient-Stability-using-Fuzzy-Logic-Controller-for-Permanent-Magnet-Wind-Generator-Connected-to-the-Grid.pdfîncărcat deeditor_ijcat
- DocumentLocation-Update-Schemes-in-Mobile-Ad-Hoc-Networks.pdfîncărcat deeditor_ijcat
- DocumentModelling-and-Simulation-of-Pressure-Sensitivity-of-Bragg-Grating-Sensor-for-Structural-Health-Monitoring-Application.pdfîncărcat deeditor_ijcat
- DocumentImplementation-of-Least-Latency-Routing-over-Time-Dependent-Wireless-Sensor-Networks.pdfîncărcat deeditor_ijcat
- DocumentImplementation-of-Modified-RSA-Cryptosystem-Based-on-Offline-Storage-and-Prime-Number.pdfîncărcat deeditor_ijcat
- DocumentImplementing-Deletion-Recovery-on-Android.pdfîncărcat deeditor_ijcat
- DocumentGraphical-Password-Authentication.pdfîncărcat deeditor_ijcat
- DocumentModeling-of-Sigma-Delta-Modulator-Non-Idealities-with-Two-Step-Quantization-in-MATLAB-SIMULINK.pdfîncărcat deeditor_ijcat
- DocumentImplement-a-Mining-Web-Document-through-New-Data-Clustering-Algorithm.pdfîncărcat deeditor_ijcat
- DocumentIdentification-of-Diabetic-Retinopathy-in-Retinal-Images-using-Support-Vector-Machine.pdfîncărcat deeditor_ijcat
- DocumentFuzzy-Logic-Based-Control-of-Wind-Turbine-Driven-Squirrel-Cage-Induction-Generator-Connected-to-Grid.pdfîncărcat deeditor_ijcat
- DocumentEmergency-App-using-Voice-Recognition.pdfîncărcat deeditor_ijcat
- DocumentA New Topology for Power Quality Improvement for Hybrid Wind Solar and Diesel Generator Energy System Using D STATCOMîncărcat deeditor_ijcat
- DocumentDesign-of-512-bitKeccak-Hash-Function-Encryption-for-High-Throughput-Core.pdfîncărcat deeditor_ijcat
- DocumentDesign of Human Emotion Recognition System From Speech Using Particle Swarm Optimizationîncărcat deeditor_ijcat