International Journal of Computer
Trends and Technology
Query Optimization Approach in SQL to prepare Data Sets for Data Mining Analysis
Rajesh Reddy Muley, Sravani Achanta, Prof.S.V.Achutha Rao
Venkatarao Matte, L. Ravi Kumar
Data Security Threat Evaluation Using Bayesian Prioritization Method
R.Anusha, Ch.Sivaramamohana Rao
Improved VEDA and Unwanted Edge Removal approaches for License Plate Detection
A.Sravya,P.Ramesh Babu
A Novel Homomorphic Against Intersession Coding attacks Using InterMac
P.Sravani, D.Deewena Raju
Improved Background Matching Framework for Motion Detection
K.Amaleswarao, G.Vijayadeep,U.Shivaji
Improved Password Authentication System against Password attacks for web Applications
Dr.P.Pandarinath, Vaishnavi Yalamanchili
A Review: Wireless Sensor Networks and Its Application, Platforms, Standards and Tools
K.Sarammal, R.A.Roseline
A Hybrid Approach for Data Hiding using Cryptography Schemes
Gurtaptish Kaur, Sheenam Malhotra