Super User
16 January 2013
Content Protection in Video Data Based on Robust Digital Watermarking Resistant to
Published in
Vol 11, No.2, March 2014
16 January 2013
PCFA: Mining of Projected Clusters in High Dimensional Data Using Modified FCM
Published in
Vol 11, No.2, March 2014
16 January 2013
Person-Independent Facial Expression Recognition Based on Compound Local Binary Pattern (CLBP)
Published in
Vol 11, No.2, March 2014
16 January 2013
Simplified Algorithm and Hardware Implementation for&
Published in
Vol 11, No.2, March 2014
16 January 2013
Employing Machine Learning Algorithms to Detect Unknown Scanning and Email Worms
Published in
Vol 11, No.2, March 2014
16 January 2013
A New Hybrid Architecture for the Discovery and Compaction of Knowledge: Breast
Published in
Vol 11, No.2, March 2014
16 January 2013
Face Recognition Using Adaptive Margin Fisher’s Criterion and Linear Discriminant
Published in
Vol 11, No.2, March 2014
08 March 2012
An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad hoc Networks
Published in
Vol 11, No.4, July 2014
15 November 2011
A Cross-Layer Based Intrusion Detection Technique for Wireless Networks
Jatinder Singh1, Lakhwinder
Published in
Vol 11, No.4, July 2014
15 November 2011
An Effective Data Warehousing System for RFID using Novel Data Cleaning, Data Transformation and Loading Techniques
Published in
Vol 11, No.4, July 2014
Has no item to show!
Starting from Jun. 14 2016
-
Sonstur aut pereis dolibus Starting from Jun. 14 2016
-
The impact of nursing Starting from Jun. 10 2016
-
English for beginner Starting from Jun. 10 2016
-
How to control the risk Starting from Jun. 10 2016