×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
ijcseit documents
Documents
An Enhanced Chaotic Image Encryption
Documents
Distributed Denial of Service (DDOS) Attacks Detection Mechanism
Technology
Model of solutions for data security in Cloud computing
Technology
A robust iris recognition method on adverse conditions
Technology
Optimization of latency of temporal key Integrity protocol (tkip) using graph theory And hardware software co-design
Technology
Survey of network anomaly detection using markov chain
Technology
ZERNIKE MOMENT-BASED FEATURE EXTRACTION FOR FACIAL RECOGNITION OF IDENTICAL TWINS
Technology
Energy efficient approach based on evolutionary algorithm for coverage control in heterogeneous wireless sensor
Technology
Survey on caching and replication algorithm for content distribution in peer to peer networks
Documents
FPGA ARCHITECTURE FOR FACIAL-FEATURES AND COMPONENTS EXTRACTION
Technology
Current services in cloud computing a survey
Technology
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
Technology
Candidate solutions to improve Wireless Mesh Networks WMNs performance to meet the needs of Smart Grid applications - Survey paper
Technology
Sentiment analysis by using fuzzy logic
Technology
Comparing reinforcement learning and access points with rowel
Technology
Detect sqli attacks in web apps using nvs
Technology
WEB SERVICES COMPOSITION METHODS AND TECHNIQUES: A REVIEW
Technology
Configuration inerpsaas multi tenancy
Technology
Web service discovery methods and techniques a review
Technology
Technology Adoption In The Arabian Gulf Countries: The Case Of E-Government
Documents
Devnagari Document Segmentation using histogram approach
Next >