- DocumentoPaper-1 Effects of Software Security on Software Development Lifecycle and Related Security Issuescargado porRachel Wheeler
- DocumentoPaper-2 on Generalized Almost Lorentzian Manifoldscargado porRachel Wheeler
- DocumentoPaper-1 on Generalized Nearly Lorentzian Manifoldscargado porRachel Wheeler
- DocumentoPaper-1 April 2015 on a Generalised Almost Contact Metric Structure-II 1cargado porRachel Wheeler
- DocumentoPaper-1 on a Generalised Almost Contact Metric Structure_IIIcargado porRachel Wheeler
- DocumentoPaper-1 a Note on Generalized Almost P-sasakian Structurecargado porRachel Wheeler
- DocumentoPaper-2 on a Generalised Almost Contact Metric Structure Icargado porRachel Wheeler
- DocumentoPaper-1 Classification and Recognition of Handwritten Digits by the Self-Organizing Map of Kohonencargado porRachel Wheeler
- DocumentoPaper-2 Generalised Nearly P-sasakian Manifoldcargado porRachel Wheeler
- DocumentoPaper-1 High Performance Network Intrusion Detection Model Using Graph Databasescargado porRachel Wheeler
- DocumentoPaper-1 Generalised Lorentzian Special Para-Sasakian Manifoldscargado porRachel Wheeler
- DocumentoPaper-1 Machine Learning Algorithms and Their Significance in Sentiment Analysis for Context Based Miningcargado porRachel Wheeler
- DocumentoPaper-3 Generalised LP-Sasakian Manifoldscargado porRachel Wheeler
- DocumentoPaper-2 Multi QoS Routing in Manetcargado porRachel Wheeler
- DocumentoPaper-1 Machine Learning Algorithms and Their Significance in Sentiment Analysis for Context Based Miningcargado porRachel Wheeler
- DocumentoPaper-2 Stochastic Behavior of a Compound Redundant Rolling Systemcargado porRachel Wheeler
- DocumentoPaper-1 Lorentzian Special Para-Sasakian Manifoldscargado porRachel Wheeler
- DocumentoPaper-1 Properties of Lorentzian Paracontact Manifoldscargado porRachel Wheeler
- DocumentoPaper-1 Consistency of a Two-unit Parallel Redundent System Working in Three Different Weather Conditionscargado porRachel Wheeler
- DocumentoPaper-1 Implementing I&a in Multilayer Checkpoints for DB Securitycargado porRachel Wheeler
- DocumentoPaper-2 a Survey on Anonymity Based Solutions for Privacy Issues in Web Mining (2)cargado porRachel Wheeler
- DocumentoPaper-1 Efficient 3n-Bit Dynamic Range Reverse Convertercargado porRachel Wheeler
- DocumentoPaper-2 a Review on Genetic Approach Over Digital Circuitcargado porRachel Wheeler
- DocumentoPaper-1 Service Orchestration Based on QoS and Transactional Properties Using Mixed Integer Programming Modelcargado porRachel Wheeler
- DocumentoPaper-1 Service Orchestration Based on QoS and Transactional Properties Using Mixed Integer Programming Modelcargado porRachel Wheeler
- DocumentoPaper-1 Service Orchestration Based on QoS and Transactional Properties Using Mixed Integer Programming Modelcargado porRachel Wheeler
- DocumentoPaper-6 Securing Enterprise Networks a Multiagent-Based Distributed Intrusion Detection Approachcargado porRachel Wheeler
- DocumentoPaper-5 Evaluation of Rule Based Machine Learning Algorithms on NSL-KDD Datasetcargado porRachel Wheeler
- DocumentoIjciis June 2013 Vol. 4 No. 6cargado porRachel Wheeler
- DocumentoPaper-4 Add-In Macros for Privacy-Preserving Distributed Logrank Test Computationcargado porRachel Wheeler
- DocumentoPaper-3 Modeling and Simulation of Microcode Built-In Self-Test (BIST) Architecture for Fault Diagnosiscargado porRachel Wheeler
- DocumentoPaper-2 Analysis Quality of Service Metrics OverWireless Body Area Networkscargado porRachel Wheeler
- DocumentoPaper-1 Significance of One-Class Classification in Outlier Detectioncargado porRachel Wheeler
- DocumentoPaper-4 High-Speed 64-Bit Binary Comparator Using Three Stagescargado porRachel Wheeler
- DocumentoPaper-2 High-Speed 64-Bit Binary Comparator Using Different Logic Stylescargado porRachel Wheeler
- DocumentoPaper-5 A New High-Speed 64-Bit Binary Comparatorcargado porRachel Wheeler
- DocumentoIjciis May 2013 Vol. 4 No. 5cargado porRachel Wheeler
- DocumentoAn Implementation of Data Mining Techniques in Health Care Industriescargado porRachel Wheeler
- DocumentoEnhancing the Performance of DSR Protocol by the Application of Mobile Agentcargado porRachel Wheeler
- DocumentoIJCIIS April 2013 Vol. 4 No. 4 Contentscargado porRachel Wheeler
- DocumentoPaper-5 Lossless Secret Image Sharing Schemescargado porRachel Wheeler
- DocumentoPaper-4 Voltage Controlled, Low-Pass and High-Pass Filter Using Analog Multipliercargado porRachel Wheeler
- DocumentoPaper-3 Reducing Support Vector Machine Complexity by Implementing Kalman Filtercargado porRachel Wheeler
- DocumentoPaper-3 Reducing Support Vector Machine Complexity by Implementing Kalman Filtercargado porRachel Wheeler
- DocumentoPaper-2 a Novel Graph Based Clustering Approach for Network Intrusion Detectioncargado porRachel Wheeler
- DocumentoPaper-1 a Study on Attacks in Smart Phones and Its Counter Measurescargado porRachel Wheeler
- DocumentoIJCIIS March 2013 Vol. 4 No. 3 Contentscargado porRachel Wheeler
- DocumentoPaper-4 High-Speed 64-Bit Binary Comparator using Three Stagescargado porRachel Wheeler
- DocumentoPaper-2 High-Speed 64-Bit Binary Comparator using Different Logic Stylescargado porRachel Wheeler