கட்டுரையை பரிசீலி
THE USEFULNESS OF RE PRACTICES IN S/W DEVELOPMENT
COMPARATIVE STUDY OF VARIOUS EXISTING SECURITY SCENARIOS IN CLOUD COMPUTING ENVIRONMENT
ஆய்வுக் கட்டுரை
ANALYSIS ON SUSPICIOUS THYROID RECOGNITION USING ASSOCIATION RULE MINING
EFFICIENT SEARCHING FOR GEOGRAPHICAL DATA GATHERING USING KNOWLEDGE MINING
A SURVEY ON CONTENT BASED IMAGE RETRIEVAL USING BDIP, BVLC AND DCD
THE AMAZING DUAL ROLE PLAYER - BIGP
REQUIREMENT ENGINEERING: AN APPROACH TO QUALITY SOFTWARE DEVELOPMENT
ON A KEY EXCHANGE TECHNIQUE, AVOIDING MAN-IN-THE-MIDDLE-ATTACK
A HIGH SENSITIVE APPROACH FOR GENDER PREDICTION BY USING PUPIL DILATON
INFORMATION HIDING WATERMARKING DETECTION TECHNIQUE BY PSNR AND RGB INTENSITY
HIGHLY SECURED AND RANDOMIZED IMAGE STEGANOGRAPHIC ALGORITHM
ANALYSIS AND ASSESSMENT OF SURFACE IMAGE TEXTURE MECHANISMST
A NOVEL APPROACH FOR IMPROVING PERFORMANCE OF WSN USING R-MAC SCHEDULE
மேலும் பார்க்க