jun-12-ijcoa-001
Visual Secret Sharing for Secure Biometric Authentication using Steganography
Filtering of Malicious Traffic with Secret Sharing
Authenticated Technologies for Visually Challenged Candidates
Outcome Based Analysis of An Impact of Parental Conflicts on Development of Children Using Fuzzy Cognitive Maps
Optimizing the Architecture of Artificial Neural Networks in Predicting Indian Stock Prices
Heuristic Algorithm for Constrained 3D Container Loading Problem: A Genetic Approach
An Advanced Bottom up Generalization Approach for Big Data on Cloud
Predicting Movie Success Based on IMDB Data
paper11.pdf
RobustClustering Algorithm Based on Complete LinkApplied To Selection ofBio- Basis forAmino Acid Sequence Analysis
A Comparative Analysis on Credit Card Fraud Techniques Using Data Mining
Domination Number on Balanced Signed Graphs
Associative Analysis of Software Development Phase Dependency
A Review Paper on Outlier Detection using Two-Phase SVM Classifiers with Cross Training Approach for Multi- Disease Diagnosis
Significance of Similarity Measures in Textual Knowledge Mining
An Ill-identified Classification to Predict Cardiac Disease Using Data Clustering
A Study for the Discovery of Web Usage Patterns Using Soft Computing Based Data Clustering Techniques
An Analysis of Data Mining Applications for Fraud Detection in Securities Market