- DocumentoText Bookscargado porJournal of Computer Applications
- DocumentoDetails of studentscargado porJournal of Computer Applications
- DocumentoAutomatic Image Annotation Using Semantic with Fuzzy KNNcargado porJournal of Computer Applications
- DocumentoThree-Dimensional Face Reconstruction from a Single Image using Soft Computing Techniquescargado porJournal of Computer Applications
- DocumentoStudy of Knowledge Based Admission Control for a Software-as-a-Service Provider in Cloud Computing Environmentscargado porJournal of Computer Applications
- DocumentoA Study on Functional Brain Metabolism using PET Scan Image Datasets – An Analysiscargado porJournal of Computer Applications
- DocumentoExtracting and Modeling Multi-Granular Uncertain Spatial Expressions in Textcargado porJournal of Computer Applications
- DocumentoDNA Encryption Mechanism for Data Security Over Transmissioncargado porJournal of Computer Applications
- DocumentoA Comparative Study of Feature Selection Methods for Cancer Classification using Gene Expression Datasetcargado porJournal of Computer Applications
- DocumentoCIP Based BOND for Wireless Sensor Networkscargado porJournal of Computer Applications
- DocumentoEdge Node Calculations using Potential Calculation for OLSR Protocol in MANETcargado porJournal of Computer Applications
- DocumentoDetecting and Preventing the Malicious System based on DNS Analysiscargado porJournal of Computer Applications
- DocumentoFeature Selection using Integer and Binary coded Genetic Algorithm to improve the performance of SVM Classifiercargado porJournal of Computer Applications
- DocumentoDyadic Wavelet Transform based Classification of Microcalcifications Using SVMcargado porJournal of Computer Applications
- DocumentoMeasuring Vocabulary Consistencycargado porJournal of Computer Applications
- DocumentoDistributed Detection of Clone Attacks in Wireless Sensor Networks using RED-ANT Algorithmcargado porJournal of Computer Applications
- DocumentoSecond or Higher Order Associations Between a Name and Candidate Name Aliasescargado porJournal of Computer Applications
- DocumentoA Heuristic Approach for Alert Aggregation in Intrusion Detection Systemcargado porJournal of Computer Applications
- DocumentoA Study on Progress of Citizen’s Centric E-Governance services in West Bengalcargado porJournal of Computer Applications
- DocumentoSecurity Framework for Wireless Sensor Networkscargado porJournal of Computer Applications
- DocumentoVision-Based Vehicle Speed Measurement Systemcargado porJournal of Computer Applications
- DocumentoOptimized Multicasting System to Evade Packet Loss in Mobile Adhoc Networks M.Murali and S.Vijayalakshmi Keywordscargado porJournal of Computer Applications
- DocumentoVOL5IE125P13cargado porJournal of Computer Applications
- DocumentoVOL5IE125P12cargado porJournal of Computer Applications
- DocumentoVOL5IE125P11cargado porJournal of Computer Applications
- DocumentoVOL5IE125P10cargado porJournal of Computer Applications
- DocumentoVOL5IE125P9cargado porJournal of Computer Applications
- DocumentoVOL5IE125P8cargado porJournal of Computer Applications
- DocumentoVOL5IE125P7cargado porJournal of Computer Applications
- DocumentoVOL5IE125P6cargado porJournal of Computer Applications
- DocumentoVOL5IE125P5cargado porJournal of Computer Applications
- DocumentoVOL5IE125P4cargado porJournal of Computer Applications
- DocumentoVOL5IE125P3cargado porJournal of Computer Applications
- DocumentoVOL5IE125P2cargado porJournal of Computer Applications
- DocumentoVOL5IE125P1cargado porJournal of Computer Applications
- DocumentoVol5I1p9cargado porJournal of Computer Applications
- DocumentoVol5I1p8cargado porJournal of Computer Applications
- DocumentoVol5I1p7cargado porJournal of Computer Applications
- DocumentoVol5I1p6cargado porJournal of Computer Applications
- DocumentoVol5I1p5cargado porJournal of Computer Applications
- DocumentoVol5I1p4cargado porJournal of Computer Applications
- DocumentoVol5I1p3cargado porJournal of Computer Applications
- DocumentoVol5I1p2cargado porJournal of Computer Applications
- DocumentoVol5I1p1cargado porJournal of Computer Applications
- DocumentoVol5I1p10cargado porJournal of Computer Applications
- DocumentoVOL5E124P24cargado porJournal of Computer Applications
- DocumentoVOL5E124P23cargado porJournal of Computer Applications
- DocumentoVOL5E124P22cargado porJournal of Computer Applications
- DocumentoVOL5E124P21cargado porJournal of Computer Applications