评论文章
THE USEFULNESS OF RE PRACTICES IN S/W DEVELOPMENT
COMPARATIVE STUDY OF VARIOUS EXISTING SECURITY SCENARIOS IN CLOUD COMPUTING ENVIRONMENT
研究文章
ANALYSIS ON SUSPICIOUS THYROID RECOGNITION USING ASSOCIATION RULE MINING
EFFICIENT SEARCHING FOR GEOGRAPHICAL DATA GATHERING USING KNOWLEDGE MINING
A SURVEY ON CONTENT BASED IMAGE RETRIEVAL USING BDIP, BVLC AND DCD
THE AMAZING DUAL ROLE PLAYER - BIGP
REQUIREMENT ENGINEERING: AN APPROACH TO QUALITY SOFTWARE DEVELOPMENT
ON A KEY EXCHANGE TECHNIQUE, AVOIDING MAN-IN-THE-MIDDLE-ATTACK
A HIGH SENSITIVE APPROACH FOR GENDER PREDICTION BY USING PUPIL DILATON
INFORMATION HIDING WATERMARKING DETECTION TECHNIQUE BY PSNR AND RGB INTENSITY
HIGHLY SECURED AND RANDOMIZED IMAGE STEGANOGRAPHIC ALGORITHM
ANALYSIS AND ASSESSMENT OF SURFACE IMAGE TEXTURE MECHANISMST
A NOVEL APPROACH FOR IMPROVING PERFORMANCE OF WSN USING R-MAC SCHEDULE
查看更多