- DocumentText Bookstéléversé parJournal of Computer Applications
- DocumentDetails of studentstéléversé parJournal of Computer Applications
- DocumentAutomatic Image Annotation Using Semantic with Fuzzy KNNtéléversé parJournal of Computer Applications
- DocumentThree-Dimensional Face Reconstruction from a Single Image using Soft Computing Techniquestéléversé parJournal of Computer Applications
- DocumentStudy of Knowledge Based Admission Control for a Software-as-a-Service Provider in Cloud Computing Environmentstéléversé parJournal of Computer Applications
- DocumentA Study on Functional Brain Metabolism using PET Scan Image Datasets – An Analysistéléversé parJournal of Computer Applications
- DocumentExtracting and Modeling Multi-Granular Uncertain Spatial Expressions in Texttéléversé parJournal of Computer Applications
- DocumentDNA Encryption Mechanism for Data Security Over Transmissiontéléversé parJournal of Computer Applications
- DocumentA Comparative Study of Feature Selection Methods for Cancer Classification using Gene Expression Datasettéléversé parJournal of Computer Applications
- DocumentCIP Based BOND for Wireless Sensor Networkstéléversé parJournal of Computer Applications
- DocumentEdge Node Calculations using Potential Calculation for OLSR Protocol in MANETtéléversé parJournal of Computer Applications
- DocumentDetecting and Preventing the Malicious System based on DNS Analysistéléversé parJournal of Computer Applications
- DocumentFeature Selection using Integer and Binary coded Genetic Algorithm to improve the performance of SVM Classifiertéléversé parJournal of Computer Applications
- DocumentDyadic Wavelet Transform based Classification of Microcalcifications Using SVMtéléversé parJournal of Computer Applications
- DocumentMeasuring Vocabulary Consistencytéléversé parJournal of Computer Applications
- DocumentDistributed Detection of Clone Attacks in Wireless Sensor Networks using RED-ANT Algorithmtéléversé parJournal of Computer Applications
- DocumentSecond or Higher Order Associations Between a Name and Candidate Name Aliasestéléversé parJournal of Computer Applications
- DocumentA Heuristic Approach for Alert Aggregation in Intrusion Detection Systemtéléversé parJournal of Computer Applications
- DocumentA Study on Progress of Citizen’s Centric E-Governance services in West Bengaltéléversé parJournal of Computer Applications
- DocumentSecurity Framework for Wireless Sensor Networkstéléversé parJournal of Computer Applications
- DocumentVision-Based Vehicle Speed Measurement Systemtéléversé parJournal of Computer Applications
- DocumentOptimized Multicasting System to Evade Packet Loss in Mobile Adhoc Networks M.Murali and S.Vijayalakshmi Keywordstéléversé parJournal of Computer Applications
- DocumentVOL5IE125P13téléversé parJournal of Computer Applications
- DocumentVOL5IE125P12téléversé parJournal of Computer Applications
- DocumentVOL5IE125P11téléversé parJournal of Computer Applications
- DocumentVOL5IE125P10téléversé parJournal of Computer Applications
- DocumentVOL5IE125P9téléversé parJournal of Computer Applications
- DocumentVOL5IE125P8téléversé parJournal of Computer Applications
- DocumentVOL5IE125P7téléversé parJournal of Computer Applications
- DocumentVOL5IE125P6téléversé parJournal of Computer Applications
- DocumentVOL5IE125P5téléversé parJournal of Computer Applications
- DocumentVOL5IE125P4téléversé parJournal of Computer Applications
- DocumentVOL5IE125P3téléversé parJournal of Computer Applications
- DocumentVOL5IE125P2téléversé parJournal of Computer Applications
- DocumentVOL5IE125P1téléversé parJournal of Computer Applications
- DocumentVol5I1p9téléversé parJournal of Computer Applications
- DocumentVol5I1p8téléversé parJournal of Computer Applications
- DocumentVol5I1p7téléversé parJournal of Computer Applications
- DocumentVol5I1p6téléversé parJournal of Computer Applications
- DocumentVol5I1p5téléversé parJournal of Computer Applications
- DocumentVol5I1p4téléversé parJournal of Computer Applications
- DocumentVol5I1p3téléversé parJournal of Computer Applications
- DocumentVol5I1p2téléversé parJournal of Computer Applications
- DocumentVol5I1p1téléversé parJournal of Computer Applications
- DocumentVol5I1p10téléversé parJournal of Computer Applications
- DocumentVOL5E124P24téléversé parJournal of Computer Applications
- DocumentVOL5E124P23téléversé parJournal of Computer Applications
- DocumentVOL5E124P22téléversé parJournal of Computer Applications
- DocumentVOL5E124P21téléversé parJournal of Computer Applications