- DocumentoMultiple Disease Diagnosis by Using Fuzzy Pattern Applications on Large Databasecaricato daeditor_ijcat
- DocumentoParallelization of BFS Graph Algorithm Using CUDAcaricato daeditor_ijcat
- DocumentoMissing Value Estimation and Impact on Heterogeneous Data Setcaricato daeditor_ijcat
- DocumentoVarious Pitch Extraction Techniques of Audio Files for Audio Information Retrievalcaricato daeditor_ijcat
- DocumentoNIOS II Based Embedded Web Server Development for Networking Applicationscaricato daeditor_ijcat
- DocumentoText Cryptosystem Based on Elliptic Curve Cryptography for Networkscaricato daeditor_ijcat
- DocumentoVarious Methods for Preventing Flooding Attack in MANET a Comparative Analysiscaricato daeditor_ijcat
- DocumentoPreserving Privacy and Illegal Content Distribution for Cloud Environmentcaricato daeditor_ijcat
- DocumentoReview on Brain Tumor Detection Techniques From MRI Images and Rough Set Theorycaricato daeditor_ijcat
- DocumentoPerformance Evaluation of Wireless Sensor Network Under Black Hole Attackcaricato daeditor_ijcat
- DocumentoMulti Region Extraction Image Segmentation Based on Centroid Clustering Techniquecaricato daeditor_ijcat
- DocumentoParallel K Means Clustering Based on Hadoop and Hamacaricato daeditor_ijcat
- DocumentoUser-Deadline-Based-Job-Scheduling-in-Grid-Computing.pdfcaricato daeditor_ijcat
- DocumentoAndroid-Help-Alert-System-using-Speech-Recognition.pdfcaricato daeditor_ijcat
- DocumentoAnalysis-of-Noise-Exposure-from-Different-Machines-by-Graph-Based-Clustering-Method.pdfcaricato daeditor_ijcat
- DocumentoTowards-A-Statistical-Context-for-Source-Obscurity-in-Sensor-Network.pdfcaricato daeditor_ijcat
- DocumentoStudy-on-Security-Breaches-in-Php-Applications.pdfcaricato daeditor_ijcat
- DocumentoRejection-of-Harmonics-in-LNA-for-Broadband-Application.pdfcaricato daeditor_ijcat
- DocumentoTwo-Ways-Security-on-Cloud-Computing-using-Cryptography-and-Intrusion-Detection-A-Review.pdfcaricato daeditor_ijcat
- DocumentoSelf-Improved-ODMP-Protocol-(ODMP-E).pdfcaricato daeditor_ijcat
- DocumentoA-Distributed-Method-to-Protect-Disruption-Tolerant-Networks-from-the-Effects-of-Packet-Overflow.pdfcaricato daeditor_ijcat
- DocumentoSecuring-Websites-through-Multi-CAPTCHA.pdfcaricato daeditor_ijcat
- DocumentoSelection-of-Accurate-&-Robust-Model-for-Binary-Classification-Problems.pdfcaricato daeditor_ijcat
- DocumentoRelative-Study-on-Malayalam-English-Translation-using-Transfer-Based-Approach.pdfcaricato daeditor_ijcat
- DocumentoSecure-Sharing-of-Data-over-Cloud-Computing-using-Different-Encryption-Schemes-An-Overview.pdfcaricato daeditor_ijcat
- DocumentoSecuring-Images-using-Encryption-Techniques-A-Survey.pdfcaricato daeditor_ijcat
- DocumentoReal-Time-Eye-Tracking-System-for-People-with-Several-Disabilities-using-Single-Web-Cam.pdfcaricato daeditor_ijcat
- DocumentoPower-Quality-Monitoring-of-Induction-Motor-using-Lab-VIEW.pdfcaricato daeditor_ijcat
- DocumentoRecognizing-Character-using-Bayesian-Network-in-Data-Mining.pdfcaricato daeditor_ijcat
- DocumentoPerformance-Analysis-of-Tree-Classifiers-using-on-Engineering-Students-Recruitment-Dataset.pdfcaricato daeditor_ijcat
- DocumentoProposed-Model-of-Encryption-Technique-using-Block-Cipher-Concept-to-Enhance-Avalanche-Effect.pdfcaricato daeditor_ijcat
- DocumentoParallel-Workload-Scheduling-in-Cloud-A-Survey.pdfcaricato daeditor_ijcat
- DocumentoImprovement-of-Transient-Stability-using-Fuzzy-Logic-Controller-for-Permanent-Magnet-Wind-Generator-Connected-to-the-Grid.pdfcaricato daeditor_ijcat
- DocumentoPrivate-NUBE-(Private-Cloud-for-Particular-Organization).pdfcaricato daeditor_ijcat
- DocumentoPreserving-Source-Location-Privacy-in-Wireless-Sensor-Network.pdfcaricato daeditor_ijcat
- DocumentoImplementation-of-Modified-RSA-Cryptosystem-Based-on-Offline-Storage-and-Prime-Number.pdfcaricato daeditor_ijcat
- DocumentoImplementation-of-Least-Latency-Routing-over-Time-Dependent-Wireless-Sensor-Networks.pdfcaricato daeditor_ijcat
- DocumentoLocation-Update-Schemes-in-Mobile-Ad-Hoc-Networks.pdfcaricato daeditor_ijcat
- DocumentoModelling-and-Simulation-of-Pressure-Sensitivity-of-Bragg-Grating-Sensor-for-Structural-Health-Monitoring-Application.pdfcaricato daeditor_ijcat
- DocumentoImplementing-Deletion-Recovery-on-Android.pdfcaricato daeditor_ijcat
- DocumentoGraphical-Password-Authentication.pdfcaricato daeditor_ijcat
- DocumentoModeling-of-Sigma-Delta-Modulator-Non-Idealities-with-Two-Step-Quantization-in-MATLAB-SIMULINK.pdfcaricato daeditor_ijcat
- DocumentoEnergy Economization Using Multimedia Cloud Computingcaricato daeditor_ijcat
- DocumentoEmergency-App-using-Voice-Recognition.pdfcaricato daeditor_ijcat
- DocumentoFuzzy-Logic-Based-Control-of-Wind-Turbine-Driven-Squirrel-Cage-Induction-Generator-Connected-to-Grid.pdfcaricato daeditor_ijcat
- DocumentoDesign of Human Emotion Recognition System From Speech Using Particle Swarm Optimizationcaricato daeditor_ijcat
- DocumentoImplement-a-Mining-Web-Document-through-New-Data-Clustering-Algorithm.pdfcaricato daeditor_ijcat
- DocumentoIdentification-of-Diabetic-Retinopathy-in-Retinal-Images-using-Support-Vector-Machine.pdfcaricato daeditor_ijcat
- DocumentoConcealing Information Using Image Steganographycaricato daeditor_ijcat