Neural Network Based Multi-Agent Semantic Web Content Mining |
Click Here |
A Review of Artificial Neural Network for Secure Access Authorization |
Click Here |
Genetic Algorithm Based Similarity Transitivity in Collaborative Filtering |
Click Here |
A Survey on Steganography Techniques |
Click Here |
A Neuro Fuzzy Approach for Personalized Multi Interest Information Filtering |
Click Here |
Hierarchical Data Stream Clustering With Diversed Parameters |
Click Here |
Privacy Preservation of Social Network Data |
Click Here |
Data Hiding In Video Stream By Text Substitution |
Click Here |
Message Authentication and Source Privacy in Wireless Sensor Networks |
Click Here |
A Review on Black Hole Attack Detection and Prevention Schemes in Wireless Sensor Network |
Click Here |
Penalty parameter selection for hierarchical data stream clustering |
Click Here |
Cut-based Classification for User Behavioral Analysis on Social Websites |
Click Here |
Analysis of Various Segmentation Techniques for Object Detection and Recognition |
Click Here |
Neuro Fuzzy based user queries categorization |
Click Here |
Neuro - Fuzzy Approach For Dynamic |
Click Here |
Privacy Preservation of e-health System in Cloud |
Click Here |
A Review on Robotics Applications for Agriculture Crop Improvement |
Click Here |
An Adaptive Approach for Speed Regulation of DC Motor |
Click Here |
Comparative Analysis of Power Theft Isolation and Detection Techniques |
Click Here |
Microcontroller-based GSM Models for Theft Analysis and Detection |
Click Here |
Network Analysis Model for Power Fault Isolation |
Click Here |
Query Processing over Large RDF using SPARQL in Big Data |
Click Here |
Interactive Learning using Open Source Learning Management Systems |
Click Here |
Network Analysis Model based on Canny Communication System for Theft Detection |
Click Here |
Neuro Fuzzy Intelligent e-Learning Systems |
Click Here |
A Review on Transmission Line Protection using Wavelet Transform |
Click Here |
Multi-terminal Transmission Line Protection Using Neural Network |
Click Here |
Privacy Preserved Data Access in Cloud |
Click Here |
Privacy Preservation of e-health care system in cloud |
Click Here |
An Approach to Fault Tolerant Key Generation and Secure Spread Spectrum |
Click Here |
Fault Detection in Railway Tracks Using Artificial Neural Networks |
Click Here |
Tracking User Behavior in Network |
Click Here |
Data mining Approach to Job Recommendation Systems |
Click Here |
Twitter Sentiment Analysis |
Click Here |
Deep Learning Intelligent IR Related with COVID Pandemic |
Click Here |