- DokumenText Booksdiunggah oleh
Journal of Computer Applications
- DokumenDetails of studentsdiunggah oleh
Journal of Computer Applications
- DokumenAutomatic Image Annotation Using Semantic with Fuzzy KNNdiunggah oleh
Journal of Computer Applications
- DokumenThree-Dimensional Face Reconstruction from a Single Image using Soft Computing Techniquesdiunggah oleh
Journal of Computer Applications
- DokumenStudy of Knowledge Based Admission Control for a Software-as-a-Service Provider in Cloud Computing Environmentsdiunggah oleh
Journal of Computer Applications
- DokumenA Study on Functional Brain Metabolism using PET Scan Image Datasets – An Analysisdiunggah oleh
Journal of Computer Applications
- DokumenExtracting and Modeling Multi-Granular Uncertain Spatial Expressions in Textdiunggah oleh
Journal of Computer Applications
- DokumenDNA Encryption Mechanism for Data Security Over Transmissiondiunggah oleh
Journal of Computer Applications
- DokumenA Comparative Study of Feature Selection Methods for Cancer Classification using Gene Expression Datasetdiunggah oleh
Journal of Computer Applications
- DokumenCIP Based BOND for Wireless Sensor Networksdiunggah oleh
Journal of Computer Applications
- DokumenEdge Node Calculations using Potential Calculation for OLSR Protocol in MANETdiunggah oleh
Journal of Computer Applications
- DokumenDetecting and Preventing the Malicious System based on DNS Analysisdiunggah oleh
Journal of Computer Applications
- DokumenFeature Selection using Integer and Binary coded Genetic Algorithm to improve the performance of SVM Classifierdiunggah oleh
Journal of Computer Applications
- DokumenDyadic Wavelet Transform based Classification of Microcalcifications Using SVMdiunggah oleh
Journal of Computer Applications
- DokumenMeasuring Vocabulary Consistencydiunggah oleh
Journal of Computer Applications
- DokumenDistributed Detection of Clone Attacks in Wireless Sensor Networks using RED-ANT Algorithmdiunggah oleh
Journal of Computer Applications
- DokumenSecond or Higher Order Associations Between a Name and Candidate Name Aliasesdiunggah oleh
Journal of Computer Applications
- DokumenA Heuristic Approach for Alert Aggregation in Intrusion Detection Systemdiunggah oleh
Journal of Computer Applications
- DokumenA Study on Progress of Citizen’s Centric E-Governance services in West Bengaldiunggah oleh
Journal of Computer Applications
- DokumenSecurity Framework for Wireless Sensor Networksdiunggah oleh
Journal of Computer Applications
- DokumenVision-Based Vehicle Speed Measurement Systemdiunggah oleh
Journal of Computer Applications
- DokumenOptimized Multicasting System to Evade Packet Loss in Mobile Adhoc Networks M.Murali and S.Vijayalakshmi Keywordsdiunggah oleh
Journal of Computer Applications
- DokumenVOL5IE125P13diunggah oleh
Journal of Computer Applications
- DokumenVOL5IE125P12diunggah oleh
Journal of Computer Applications
- DokumenVOL5IE125P11diunggah oleh
Journal of Computer Applications
- DokumenVOL5IE125P10diunggah oleh
Journal of Computer Applications
- DokumenVOL5IE125P9diunggah oleh
Journal of Computer Applications
- DokumenVOL5IE125P8diunggah oleh
Journal of Computer Applications
- DokumenVOL5IE125P7diunggah oleh
Journal of Computer Applications
- DokumenVOL5IE125P6diunggah oleh
Journal of Computer Applications
- DokumenVOL5IE125P5diunggah oleh
Journal of Computer Applications
- DokumenVOL5IE125P4diunggah oleh
Journal of Computer Applications
- DokumenVOL5IE125P3diunggah oleh
Journal of Computer Applications
- DokumenVOL5IE125P2diunggah oleh
Journal of Computer Applications
- DokumenVOL5IE125P1diunggah oleh
Journal of Computer Applications
- DokumenVol5I1p9diunggah oleh
Journal of Computer Applications
- DokumenVol5I1p8diunggah oleh
Journal of Computer Applications
- DokumenVol5I1p7diunggah oleh
Journal of Computer Applications
- DokumenVol5I1p6diunggah oleh
Journal of Computer Applications
- DokumenVol5I1p5diunggah oleh
Journal of Computer Applications
- DokumenVol5I1p4diunggah oleh
Journal of Computer Applications
- DokumenVol5I1p3diunggah oleh
Journal of Computer Applications
- DokumenVol5I1p2diunggah oleh
Journal of Computer Applications
- DokumenVol5I1p1diunggah oleh
Journal of Computer Applications
- DokumenVol5I1p10diunggah oleh
Journal of Computer Applications
- DokumenVOL5E124P24diunggah oleh
Journal of Computer Applications
- DokumenVOL5E124P23diunggah oleh
Journal of Computer Applications
- DokumenVOL5E124P22diunggah oleh
Journal of Computer Applications
- DokumenVOL5E124P21diunggah oleh
Journal of Computer Applications