- DocumentPaper-1 Effects of Software Security on Software Development Lifecycle and Related Security Issuestéléversé parRachel Wheeler
- DocumentPaper-2 on Generalized Almost Lorentzian Manifoldstéléversé parRachel Wheeler
- DocumentPaper-1 on Generalized Nearly Lorentzian Manifoldstéléversé parRachel Wheeler
- DocumentPaper-1 April 2015 on a Generalised Almost Contact Metric Structure-II 1téléversé parRachel Wheeler
- DocumentPaper-1 on a Generalised Almost Contact Metric Structure_IIItéléversé parRachel Wheeler
- DocumentPaper-1 a Note on Generalized Almost P-sasakian Structuretéléversé parRachel Wheeler
- DocumentPaper-2 on a Generalised Almost Contact Metric Structure Itéléversé parRachel Wheeler
- DocumentPaper-1 Classification and Recognition of Handwritten Digits by the Self-Organizing Map of Kohonentéléversé parRachel Wheeler
- DocumentPaper-2 Generalised Nearly P-sasakian Manifoldtéléversé parRachel Wheeler
- DocumentPaper-1 High Performance Network Intrusion Detection Model Using Graph Databasestéléversé parRachel Wheeler
- DocumentPaper-1 Generalised Lorentzian Special Para-Sasakian Manifoldstéléversé parRachel Wheeler
- DocumentPaper-1 Machine Learning Algorithms and Their Significance in Sentiment Analysis for Context Based Miningtéléversé parRachel Wheeler
- DocumentPaper-3 Generalised LP-Sasakian Manifoldstéléversé parRachel Wheeler
- DocumentPaper-2 Multi QoS Routing in Manettéléversé parRachel Wheeler
- DocumentPaper-1 Machine Learning Algorithms and Their Significance in Sentiment Analysis for Context Based Miningtéléversé parRachel Wheeler
- DocumentPaper-2 Stochastic Behavior of a Compound Redundant Rolling Systemtéléversé parRachel Wheeler
- DocumentPaper-1 Lorentzian Special Para-Sasakian Manifoldstéléversé parRachel Wheeler
- DocumentPaper-1 Properties of Lorentzian Paracontact Manifoldstéléversé parRachel Wheeler
- DocumentPaper-1 Consistency of a Two-unit Parallel Redundent System Working in Three Different Weather Conditionstéléversé parRachel Wheeler
- DocumentPaper-1 Implementing I&a in Multilayer Checkpoints for DB Securitytéléversé parRachel Wheeler
- DocumentPaper-2 a Survey on Anonymity Based Solutions for Privacy Issues in Web Mining (2)téléversé parRachel Wheeler
- DocumentPaper-1 Efficient 3n-Bit Dynamic Range Reverse Convertertéléversé parRachel Wheeler
- DocumentPaper-2 a Review on Genetic Approach Over Digital Circuittéléversé parRachel Wheeler
- DocumentPaper-1 Service Orchestration Based on QoS and Transactional Properties Using Mixed Integer Programming Modeltéléversé parRachel Wheeler
- DocumentPaper-1 Service Orchestration Based on QoS and Transactional Properties Using Mixed Integer Programming Modeltéléversé parRachel Wheeler
- DocumentPaper-1 Service Orchestration Based on QoS and Transactional Properties Using Mixed Integer Programming Modeltéléversé parRachel Wheeler
- DocumentPaper-6 Securing Enterprise Networks a Multiagent-Based Distributed Intrusion Detection Approachtéléversé parRachel Wheeler
- DocumentPaper-5 Evaluation of Rule Based Machine Learning Algorithms on NSL-KDD Datasettéléversé parRachel Wheeler
- DocumentIjciis June 2013 Vol. 4 No. 6téléversé parRachel Wheeler
- DocumentPaper-4 Add-In Macros for Privacy-Preserving Distributed Logrank Test Computationtéléversé parRachel Wheeler
- DocumentPaper-3 Modeling and Simulation of Microcode Built-In Self-Test (BIST) Architecture for Fault Diagnosistéléversé parRachel Wheeler
- DocumentPaper-2 Analysis Quality of Service Metrics OverWireless Body Area Networkstéléversé parRachel Wheeler
- DocumentPaper-1 Significance of One-Class Classification in Outlier Detectiontéléversé parRachel Wheeler
- DocumentPaper-4 High-Speed 64-Bit Binary Comparator Using Three Stagestéléversé parRachel Wheeler
- DocumentPaper-2 High-Speed 64-Bit Binary Comparator Using Different Logic Stylestéléversé parRachel Wheeler
- DocumentPaper-5 A New High-Speed 64-Bit Binary Comparatortéléversé parRachel Wheeler
- DocumentIjciis May 2013 Vol. 4 No. 5téléversé parRachel Wheeler
- DocumentAn Implementation of Data Mining Techniques in Health Care Industriestéléversé parRachel Wheeler
- DocumentEnhancing the Performance of DSR Protocol by the Application of Mobile Agenttéléversé parRachel Wheeler
- DocumentIJCIIS April 2013 Vol. 4 No. 4 Contentstéléversé parRachel Wheeler
- DocumentPaper-5 Lossless Secret Image Sharing Schemestéléversé parRachel Wheeler
- DocumentPaper-4 Voltage Controlled, Low-Pass and High-Pass Filter Using Analog Multipliertéléversé parRachel Wheeler
- DocumentPaper-3 Reducing Support Vector Machine Complexity by Implementing Kalman Filtertéléversé parRachel Wheeler
- DocumentPaper-3 Reducing Support Vector Machine Complexity by Implementing Kalman Filtertéléversé parRachel Wheeler
- DocumentPaper-2 a Novel Graph Based Clustering Approach for Network Intrusion Detectiontéléversé parRachel Wheeler
- DocumentPaper-1 a Study on Attacks in Smart Phones and Its Counter Measurestéléversé parRachel Wheeler
- DocumentIJCIIS March 2013 Vol. 4 No. 3 Contentstéléversé parRachel Wheeler
- DocumentPaper-4 High-Speed 64-Bit Binary Comparator using Three Stagestéléversé parRachel Wheeler
- DocumentPaper-2 High-Speed 64-Bit Binary Comparator using Different Logic Stylestéléversé parRachel Wheeler