- DokumenPaper-1 Effects of Software Security on Software Development Lifecycle and Related Security Issuesdiunggah olehRachel Wheeler
- DokumenPaper-2 on Generalized Almost Lorentzian Manifoldsdiunggah olehRachel Wheeler
- DokumenPaper-1 on Generalized Nearly Lorentzian Manifoldsdiunggah olehRachel Wheeler
- DokumenPaper-1 April 2015 on a Generalised Almost Contact Metric Structure-II 1diunggah olehRachel Wheeler
- DokumenPaper-1 on a Generalised Almost Contact Metric Structure_IIIdiunggah olehRachel Wheeler
- DokumenPaper-1 a Note on Generalized Almost P-sasakian Structurediunggah olehRachel Wheeler
- DokumenPaper-2 on a Generalised Almost Contact Metric Structure Idiunggah olehRachel Wheeler
- DokumenPaper-1 Classification and Recognition of Handwritten Digits by the Self-Organizing Map of Kohonendiunggah olehRachel Wheeler
- DokumenPaper-2 Generalised Nearly P-sasakian Manifolddiunggah olehRachel Wheeler
- DokumenPaper-1 High Performance Network Intrusion Detection Model Using Graph Databasesdiunggah olehRachel Wheeler
- DokumenPaper-1 Generalised Lorentzian Special Para-Sasakian Manifoldsdiunggah olehRachel Wheeler
- DokumenPaper-1 Machine Learning Algorithms and Their Significance in Sentiment Analysis for Context Based Miningdiunggah olehRachel Wheeler
- DokumenPaper-3 Generalised LP-Sasakian Manifoldsdiunggah olehRachel Wheeler
- DokumenPaper-2 Multi QoS Routing in Manetdiunggah olehRachel Wheeler
- DokumenPaper-1 Machine Learning Algorithms and Their Significance in Sentiment Analysis for Context Based Miningdiunggah olehRachel Wheeler
- DokumenPaper-2 Stochastic Behavior of a Compound Redundant Rolling Systemdiunggah olehRachel Wheeler
- DokumenPaper-1 Lorentzian Special Para-Sasakian Manifoldsdiunggah olehRachel Wheeler
- DokumenPaper-1 Properties of Lorentzian Paracontact Manifoldsdiunggah olehRachel Wheeler
- DokumenPaper-1 Consistency of a Two-unit Parallel Redundent System Working in Three Different Weather Conditionsdiunggah olehRachel Wheeler
- DokumenPaper-1 Implementing I&a in Multilayer Checkpoints for DB Securitydiunggah olehRachel Wheeler
- DokumenPaper-2 a Survey on Anonymity Based Solutions for Privacy Issues in Web Mining (2)diunggah olehRachel Wheeler
- DokumenPaper-1 Efficient 3n-Bit Dynamic Range Reverse Converterdiunggah olehRachel Wheeler
- DokumenPaper-2 a Review on Genetic Approach Over Digital Circuitdiunggah olehRachel Wheeler
- DokumenPaper-1 Service Orchestration Based on QoS and Transactional Properties Using Mixed Integer Programming Modeldiunggah olehRachel Wheeler
- DokumenPaper-1 Service Orchestration Based on QoS and Transactional Properties Using Mixed Integer Programming Modeldiunggah olehRachel Wheeler
- DokumenPaper-1 Service Orchestration Based on QoS and Transactional Properties Using Mixed Integer Programming Modeldiunggah olehRachel Wheeler
- DokumenPaper-6 Securing Enterprise Networks a Multiagent-Based Distributed Intrusion Detection Approachdiunggah olehRachel Wheeler
- DokumenPaper-5 Evaluation of Rule Based Machine Learning Algorithms on NSL-KDD Datasetdiunggah olehRachel Wheeler
- DokumenIjciis June 2013 Vol. 4 No. 6diunggah olehRachel Wheeler
- DokumenPaper-4 Add-In Macros for Privacy-Preserving Distributed Logrank Test Computationdiunggah olehRachel Wheeler
- DokumenPaper-3 Modeling and Simulation of Microcode Built-In Self-Test (BIST) Architecture for Fault Diagnosisdiunggah olehRachel Wheeler
- DokumenPaper-2 Analysis Quality of Service Metrics OverWireless Body Area Networksdiunggah olehRachel Wheeler
- DokumenPaper-1 Significance of One-Class Classification in Outlier Detectiondiunggah olehRachel Wheeler
- DokumenPaper-4 High-Speed 64-Bit Binary Comparator Using Three Stagesdiunggah olehRachel Wheeler
- DokumenPaper-2 High-Speed 64-Bit Binary Comparator Using Different Logic Stylesdiunggah olehRachel Wheeler
- DokumenPaper-5 A New High-Speed 64-Bit Binary Comparatordiunggah olehRachel Wheeler
- DokumenIjciis May 2013 Vol. 4 No. 5diunggah olehRachel Wheeler
- DokumenAn Implementation of Data Mining Techniques in Health Care Industriesdiunggah olehRachel Wheeler
- DokumenEnhancing the Performance of DSR Protocol by the Application of Mobile Agentdiunggah olehRachel Wheeler
- DokumenIJCIIS April 2013 Vol. 4 No. 4 Contentsdiunggah olehRachel Wheeler
- DokumenPaper-5 Lossless Secret Image Sharing Schemesdiunggah olehRachel Wheeler
- DokumenPaper-4 Voltage Controlled, Low-Pass and High-Pass Filter Using Analog Multiplierdiunggah olehRachel Wheeler
- DokumenPaper-3 Reducing Support Vector Machine Complexity by Implementing Kalman Filterdiunggah olehRachel Wheeler
- DokumenPaper-3 Reducing Support Vector Machine Complexity by Implementing Kalman Filterdiunggah olehRachel Wheeler
- DokumenPaper-2 a Novel Graph Based Clustering Approach for Network Intrusion Detectiondiunggah olehRachel Wheeler
- DokumenPaper-1 a Study on Attacks in Smart Phones and Its Counter Measuresdiunggah olehRachel Wheeler
- DokumenIJCIIS March 2013 Vol. 4 No. 3 Contentsdiunggah olehRachel Wheeler
- DokumenPaper-4 High-Speed 64-Bit Binary Comparator using Three Stagesdiunggah olehRachel Wheeler
- DokumenPaper-2 High-Speed 64-Bit Binary Comparator using Different Logic Stylesdiunggah olehRachel Wheeler