- DokumentPaper-1 Effects of Software Security on Software Development Lifecycle and Related Security Issueshochgeladen vonRachel Wheeler
- DokumentPaper-2 on Generalized Almost Lorentzian Manifoldshochgeladen vonRachel Wheeler
- DokumentPaper-1 on Generalized Nearly Lorentzian Manifoldshochgeladen vonRachel Wheeler
- DokumentPaper-1 April 2015 on a Generalised Almost Contact Metric Structure-II 1hochgeladen vonRachel Wheeler
- DokumentPaper-1 on a Generalised Almost Contact Metric Structure_IIIhochgeladen vonRachel Wheeler
- DokumentPaper-1 a Note on Generalized Almost P-sasakian Structurehochgeladen vonRachel Wheeler
- DokumentPaper-2 on a Generalised Almost Contact Metric Structure Ihochgeladen vonRachel Wheeler
- DokumentPaper-1 Classification and Recognition of Handwritten Digits by the Self-Organizing Map of Kohonenhochgeladen vonRachel Wheeler
- DokumentPaper-2 Generalised Nearly P-sasakian Manifoldhochgeladen vonRachel Wheeler
- DokumentPaper-1 High Performance Network Intrusion Detection Model Using Graph Databaseshochgeladen vonRachel Wheeler
- DokumentPaper-1 Generalised Lorentzian Special Para-Sasakian Manifoldshochgeladen vonRachel Wheeler
- DokumentPaper-1 Machine Learning Algorithms and Their Significance in Sentiment Analysis for Context Based Mininghochgeladen vonRachel Wheeler
- DokumentPaper-3 Generalised LP-Sasakian Manifoldshochgeladen vonRachel Wheeler
- DokumentPaper-2 Multi QoS Routing in Manethochgeladen vonRachel Wheeler
- DokumentPaper-1 Machine Learning Algorithms and Their Significance in Sentiment Analysis for Context Based Mininghochgeladen vonRachel Wheeler
- DokumentPaper-2 Stochastic Behavior of a Compound Redundant Rolling Systemhochgeladen vonRachel Wheeler
- DokumentPaper-1 Lorentzian Special Para-Sasakian Manifoldshochgeladen vonRachel Wheeler
- DokumentPaper-1 Properties of Lorentzian Paracontact Manifoldshochgeladen vonRachel Wheeler
- DokumentPaper-1 Consistency of a Two-unit Parallel Redundent System Working in Three Different Weather Conditionshochgeladen vonRachel Wheeler
- DokumentPaper-1 Implementing I&a in Multilayer Checkpoints for DB Securityhochgeladen vonRachel Wheeler
- DokumentPaper-2 a Survey on Anonymity Based Solutions for Privacy Issues in Web Mining (2)hochgeladen vonRachel Wheeler
- DokumentPaper-1 Efficient 3n-Bit Dynamic Range Reverse Converterhochgeladen vonRachel Wheeler
- DokumentPaper-2 a Review on Genetic Approach Over Digital Circuithochgeladen vonRachel Wheeler
- DokumentPaper-1 Service Orchestration Based on QoS and Transactional Properties Using Mixed Integer Programming Modelhochgeladen vonRachel Wheeler
- DokumentPaper-1 Service Orchestration Based on QoS and Transactional Properties Using Mixed Integer Programming Modelhochgeladen vonRachel Wheeler
- DokumentPaper-1 Service Orchestration Based on QoS and Transactional Properties Using Mixed Integer Programming Modelhochgeladen vonRachel Wheeler
- DokumentPaper-6 Securing Enterprise Networks a Multiagent-Based Distributed Intrusion Detection Approachhochgeladen vonRachel Wheeler
- DokumentPaper-5 Evaluation of Rule Based Machine Learning Algorithms on NSL-KDD Datasethochgeladen vonRachel Wheeler
- DokumentIjciis June 2013 Vol. 4 No. 6hochgeladen vonRachel Wheeler
- DokumentPaper-4 Add-In Macros for Privacy-Preserving Distributed Logrank Test Computationhochgeladen vonRachel Wheeler
- DokumentPaper-3 Modeling and Simulation of Microcode Built-In Self-Test (BIST) Architecture for Fault Diagnosishochgeladen vonRachel Wheeler
- DokumentPaper-2 Analysis Quality of Service Metrics OverWireless Body Area Networkshochgeladen vonRachel Wheeler
- DokumentPaper-1 Significance of One-Class Classification in Outlier Detectionhochgeladen vonRachel Wheeler
- DokumentPaper-4 High-Speed 64-Bit Binary Comparator Using Three Stageshochgeladen vonRachel Wheeler
- DokumentPaper-2 High-Speed 64-Bit Binary Comparator Using Different Logic Styleshochgeladen vonRachel Wheeler
- DokumentPaper-5 A New High-Speed 64-Bit Binary Comparatorhochgeladen vonRachel Wheeler
- DokumentIjciis May 2013 Vol. 4 No. 5hochgeladen vonRachel Wheeler
- DokumentAn Implementation of Data Mining Techniques in Health Care Industrieshochgeladen vonRachel Wheeler
- DokumentEnhancing the Performance of DSR Protocol by the Application of Mobile Agenthochgeladen vonRachel Wheeler
- DokumentIJCIIS April 2013 Vol. 4 No. 4 Contentshochgeladen vonRachel Wheeler
- DokumentPaper-5 Lossless Secret Image Sharing Schemeshochgeladen vonRachel Wheeler
- DokumentPaper-4 Voltage Controlled, Low-Pass and High-Pass Filter Using Analog Multiplierhochgeladen vonRachel Wheeler
- DokumentPaper-3 Reducing Support Vector Machine Complexity by Implementing Kalman Filterhochgeladen vonRachel Wheeler
- DokumentPaper-3 Reducing Support Vector Machine Complexity by Implementing Kalman Filterhochgeladen vonRachel Wheeler
- DokumentPaper-2 a Novel Graph Based Clustering Approach for Network Intrusion Detectionhochgeladen vonRachel Wheeler
- DokumentPaper-1 a Study on Attacks in Smart Phones and Its Counter Measureshochgeladen vonRachel Wheeler
- DokumentIJCIIS March 2013 Vol. 4 No. 3 Contentshochgeladen vonRachel Wheeler
- DokumentPaper-4 High-Speed 64-Bit Binary Comparator using Three Stageshochgeladen vonRachel Wheeler
- DokumentPaper-2 High-Speed 64-Bit Binary Comparator using Different Logic Styleshochgeladen vonRachel Wheeler