schliessen

Filtern

 

Bibliotheken

2.

Data Mining Technology and its Applications to Power Systems
by Kumar, Amit

International Journal of Computer Applications, 12/17/2015, Vol.131(8), pp.1-6

5.

A Review on Various Implemented Techniques for Visual Cryptography
by Kumar, Amit

International Journal of Computer Applications, 12/15/2016, Vol.155(5), pp.27-32

7.

E-Learning Systems Rendering Trustability
by Kumar, Amit

International Journal of Computer Applications, 11/17/2015, Vol.130(10), pp.25-28

10.

Studies on Research and Development in Web Mining
by Singh, Pawan

International Journal of Computer Applications, 2012, Vol.44(9)

11.

Verification of Asynchronous FIFO using System Verilog
by Kumar, Amit

International Journal of Computer Applications, 2014, Vol.86(11)

12.

A New Visual Cryptography Approach using Mosaic and Spread Spectrum Watermarking
by Kumar, Amit

International Journal of Computer Applications, 05/17/2017, Vol.165(10), pp.44-48

13.

A Complete Dynamic Malware Analysis
by Kaur, Navroop

International Journal of Computer Applications, 02/17/2016, Vol.135(4), pp.20-25

14.

Privacy Preservation in Big Data using K-Anonymity Algorithm with Privacy Key
by Kumar, Amit

International Journal of Computer Applications, 11/17/2016, Vol.153(5), pp.25-30

19.

A Novel Approach to use Nano-Sensor in WSN Applications
by Kumar, Neeraj

International Journal of Computer Applications, 2011, Vol.14(2)

1234

Recommended databases

Find more Articles matching your search terms in these recommended databases.

Filter electronic articles 65 Hits

Remove Filters