Issue | Title | |
Vol 5, No 7 (2013) | Prediction of Stock Market Price Using Classification Rules and Graph Based Analysis | Abstract |
Jageshwer Shriwas, Shagufta Farzana | ||
Vol 7, No 6 (2015) | Prediction of User Navigation Patterns Using Knowledge from Web Log Data | Abstract |
S. UmaMaheswari, Dr.S.K. Srivatsa | ||
Vol 8, No 9 (2016) | Prediction of Web Users Browsing Behaviour Using Fast Longest Common Sub-Sequence | Abstract |
M. Chandran, K. Karthika | ||
Vol 5, No 3 (2013) | Preprocessing and Generation of Association Rules for Bone Marrow Analysis Data of Hematology using Abnormal Attribute Values | Abstract |
D. Minnie, S. Srinivasan | ||
Vol 4, No 3 (2012) | Preserving Privacy by Quantizing | Abstract |
Korra Sathya Babu, Sanjay Kumar Jena | ||
Vol 6, No 3 (2014) | Preserving the Value of SMS Texting: A Survey on Mobile SMS Spam Classification Techniques and Algorithms | Abstract |
Khuteja Farha I. Kazi, Shweta C. Dharmadhikari | ||
Vol 7, No 4 (2015) | Privacy Preservation in Data Mining Using Hybrid Approach | Abstract |
S. Deepajothi, Dr. S. Selvarajan | ||
Vol 5, No 3 (2013) | Privacy Preserving Data Mining at Different Trust Levels | Abstract |
M. Narmadha, R. Kavitha, K. Uma Maheshwari, K. Divya | ||
Vol 6, No 2 (2014) | Privacy Preserving Decision Tree Mining based on Mixed Attributes | Abstract |
J. Ragaventhiran, G. Sharmila, Dr.B. Muthu Kumar | ||
Vol 7, No 3 (2015) | Privacy Preserving in Association Rule Mining On Horizontally Partitioned Database | Abstract |
R. Manvar Sagar, P. Desai Sonali, B. Hathi Karishma | ||
Vol 8, No 8 (2016) | Privacy Preserving Similarity-based Text Retrieval through Blind Storage in Cloud | Abstract |
N. Ananth Rao, U. Deepak Shankar, S. Gowtham Pradeep, MR. Jeyamohan | ||
Vol 11, No 4 (2019) | Privacy Protection and Interruption Avoidance for Cloud-Based Medical Data Sharing | Abstract |
K. Nandhini, S. Jayanthi | ||
Vol 3, No 8 (2011) | Privacy-Preserving Online Feedback System | Abstract |
Reena S. Kharat, B.N. Jagdale, Swati Tonge | ||
Vol 2, No 12 (2010) | Privacy-Preserving Updates to Generalization-Based K-Anonymous and Confidential Database | Abstract |
D. Radha | ||
Vol 3, No 6 (2011) | Process Mining in Dyeing Unit Using Control Flow Perspective: A Case Study | Abstract |
M.S. Saravanan, R.J. Rama Sree | ||
Vol 7, No 8 (2015) | Product Aspect Rating of E-Commerce Feedback Comments | Abstract |
Pooja A. Rangari, Kalyani Waghmare | ||
Vol 4, No 8 (2012) | Profile Based Ontology Tool for Web Information Retrieval | Abstract |
M. Uma, B. Muruganantham | ||
Vol 3, No 4 (2011) | Profit and Quantity Oriented Two Efficient Approaches for Utility Pattern Mining | Abstract |
Parvinder S. Sandhu, Dalvinder Singh Dhaliwal, S.N. Panda | ||
Vol 3, No 1 (2011) | Protection of Data from a Semi-Honest Party Using Fast Association Rule Hiding | Abstract |
John Blesswin, Cyju Varghese, Navitha Navitha, Sonia Sonia | ||
Vol 2, No 9 (2010) | Protection of Database Security VIA Collaborative Inference Detection | Abstract |
P. Kamakshi, J. Ramadevi, S. Gopala Krishna Murthy | ||
Vol 7, No 9 (2015) | Providing Enhanced Security on Monitoring Using Multifeature Background Subtraction with Support Vector Machine | Abstract |
M. Sabareesan, B. Lekka, U. Saranya Devi, P. Sujatha | ||
Vol 2, No 1 (2010) | Providing Secured Data Storage by Privacy and Third Party Auditing in Cloud | Abstract |
Lingaraj Dhabale, Priti Pavale | ||
Vol 3, No 14 (2011) | PurposeNet – A Semantic Knowledgebase | Abstract |
P. Kiran Mayee | ||
Vol 2, No 12 (2010) | QoS Localized Routing for Guarantee Reliability in Wireless Sensor Networks using Data Fusion Method with Different Data Traffic Types | Abstract |
S.J. Kavitha, J. Roselin, Dr.P. Latha | ||
Vol 12, No 2 (2020) | QoS of Security Threats and Solution in Cloud Computing Organization | Abstract |
M. Bhavani Preetha | ||
701 - 725 of 883 Items | << < 24 25 26 27 28 29 30 31 32 33 > >> |
ISSN: 0974 – 9578