- DocumentPaper-1 Effects of Software Security on Software Development Lifecycle and Related Security Issuesîncărcat de
Rachel Wheeler
- DocumentPaper-2 on Generalized Almost Lorentzian Manifoldsîncărcat de
Rachel Wheeler
- DocumentPaper-1 on Generalized Nearly Lorentzian Manifoldsîncărcat de
Rachel Wheeler
- DocumentPaper-1 April 2015 on a Generalised Almost Contact Metric Structure-II 1încărcat de
Rachel Wheeler
- DocumentPaper-1 on a Generalised Almost Contact Metric Structure_IIIîncărcat de
Rachel Wheeler
- DocumentPaper-1 a Note on Generalized Almost P-sasakian Structureîncărcat de
Rachel Wheeler
- DocumentPaper-2 on a Generalised Almost Contact Metric Structure Iîncărcat de
Rachel Wheeler
- DocumentPaper-1 Classification and Recognition of Handwritten Digits by the Self-Organizing Map of Kohonenîncărcat de
Rachel Wheeler
- DocumentPaper-2 Generalised Nearly P-sasakian Manifoldîncărcat de
Rachel Wheeler
- DocumentPaper-1 High Performance Network Intrusion Detection Model Using Graph Databasesîncărcat de
Rachel Wheeler
- DocumentPaper-1 Generalised Lorentzian Special Para-Sasakian Manifoldsîncărcat de
Rachel Wheeler
- DocumentPaper-1 Machine Learning Algorithms and Their Significance in Sentiment Analysis for Context Based Miningîncărcat de
Rachel Wheeler
- DocumentPaper-3 Generalised LP-Sasakian Manifoldsîncărcat de
Rachel Wheeler
- DocumentPaper-2 Multi QoS Routing in Manetîncărcat de
Rachel Wheeler
- DocumentPaper-1 Machine Learning Algorithms and Their Significance in Sentiment Analysis for Context Based Miningîncărcat de
Rachel Wheeler
- DocumentPaper-2 Stochastic Behavior of a Compound Redundant Rolling Systemîncărcat de
Rachel Wheeler
- DocumentPaper-1 Lorentzian Special Para-Sasakian Manifoldsîncărcat de
Rachel Wheeler
- DocumentPaper-1 Properties of Lorentzian Paracontact Manifoldsîncărcat de
Rachel Wheeler
- DocumentPaper-1 Consistency of a Two-unit Parallel Redundent System Working in Three Different Weather Conditionsîncărcat de
Rachel Wheeler
- DocumentPaper-1 Implementing I&a in Multilayer Checkpoints for DB Securityîncărcat de
Rachel Wheeler
- DocumentPaper-2 a Survey on Anonymity Based Solutions for Privacy Issues in Web Mining (2)încărcat de
Rachel Wheeler
- DocumentPaper-1 Efficient 3n-Bit Dynamic Range Reverse Converterîncărcat de
Rachel Wheeler
- DocumentPaper-2 a Review on Genetic Approach Over Digital Circuitîncărcat de
Rachel Wheeler
- DocumentPaper-1 Service Orchestration Based on QoS and Transactional Properties Using Mixed Integer Programming Modelîncărcat de
Rachel Wheeler
- DocumentPaper-1 Service Orchestration Based on QoS and Transactional Properties Using Mixed Integer Programming Modelîncărcat de
Rachel Wheeler
- DocumentPaper-1 Service Orchestration Based on QoS and Transactional Properties Using Mixed Integer Programming Modelîncărcat de
Rachel Wheeler
- DocumentPaper-6 Securing Enterprise Networks a Multiagent-Based Distributed Intrusion Detection Approachîncărcat de
Rachel Wheeler
- DocumentPaper-5 Evaluation of Rule Based Machine Learning Algorithms on NSL-KDD Datasetîncărcat de
Rachel Wheeler
- DocumentIjciis June 2013 Vol. 4 No. 6încărcat de
Rachel Wheeler
- DocumentPaper-4 Add-In Macros for Privacy-Preserving Distributed Logrank Test Computationîncărcat de
Rachel Wheeler
- DocumentPaper-3 Modeling and Simulation of Microcode Built-In Self-Test (BIST) Architecture for Fault Diagnosisîncărcat de
Rachel Wheeler
- DocumentPaper-2 Analysis Quality of Service Metrics OverWireless Body Area Networksîncărcat de
Rachel Wheeler
- DocumentPaper-1 Significance of One-Class Classification in Outlier Detectionîncărcat de
Rachel Wheeler
- DocumentPaper-4 High-Speed 64-Bit Binary Comparator Using Three Stagesîncărcat de
Rachel Wheeler
- DocumentPaper-2 High-Speed 64-Bit Binary Comparator Using Different Logic Stylesîncărcat de
Rachel Wheeler
- DocumentPaper-5 A New High-Speed 64-Bit Binary Comparatorîncărcat de
Rachel Wheeler
- DocumentIjciis May 2013 Vol. 4 No. 5încărcat de
Rachel Wheeler
- DocumentAn Implementation of Data Mining Techniques in Health Care Industriesîncărcat de
Rachel Wheeler
- DocumentEnhancing the Performance of DSR Protocol by the Application of Mobile Agentîncărcat de
Rachel Wheeler
- DocumentIJCIIS April 2013 Vol. 4 No. 4 Contentsîncărcat de
Rachel Wheeler
- DocumentPaper-5 Lossless Secret Image Sharing Schemesîncărcat de
Rachel Wheeler
- DocumentPaper-4 Voltage Controlled, Low-Pass and High-Pass Filter Using Analog Multiplierîncărcat de
Rachel Wheeler
- DocumentPaper-3 Reducing Support Vector Machine Complexity by Implementing Kalman Filterîncărcat de
Rachel Wheeler
- DocumentPaper-3 Reducing Support Vector Machine Complexity by Implementing Kalman Filterîncărcat de
Rachel Wheeler
- DocumentPaper-2 a Novel Graph Based Clustering Approach for Network Intrusion Detectionîncărcat de
Rachel Wheeler
- DocumentPaper-1 a Study on Attacks in Smart Phones and Its Counter Measuresîncărcat de
Rachel Wheeler
- DocumentIJCIIS March 2013 Vol. 4 No. 3 Contentsîncărcat de
Rachel Wheeler
- DocumentPaper-4 High-Speed 64-Bit Binary Comparator using Three Stagesîncărcat de
Rachel Wheeler
- DocumentPaper-2 High-Speed 64-Bit Binary Comparator using Different Logic Stylesîncărcat de
Rachel Wheeler