PDF-International Journal of Computer Applications (0975
Author : ellena-manuel | Published Date : 2016-07-04
x2013 888 Volume 47 x2013 No5 June 2012 6 Steganography Detection u sing Functional Link Artificial Neural Networks ABSTRACT Secu rity in message transfer over the
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "International Journal of Computer Applic..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
International Journal of Computer Applications (0975: Transcript
x2013 888 Volume 47 x2013 No5 June 2012 6 Steganography Detection u sing Functional Link Artificial Neural Networks ABSTRACT Secu rity in message transfer over the netwoek has been a cons. – 8887) Volume 9 – No. 1 2 , November 2010 1 Edge - o dd Gracefulness o f t he Graph S 2 □S n Dr. A. S olairaju Associate Professor of Mathematics Jamal Mohamed College, Tiruch – 8887) Volume 2 – No. 2 , May 2010 36 Artificial Neural Network for Human Behavior Prediction through Handwriting Analysis Champa H N Assistant Professor, Department of Computer Sci – 8887) Volume 20 – No. 7 , April 2011 1 Neural N etworks for H andwritten English A lphabet R ecognition Yusuf Perwej Department of Compute r Science Singhania University Rajsthan, – 8887) Volume 7 – No.1 3 , October 2010 34 New Julia Sets of Ishikawa Iterates Yashwant S Chauhan Asst. Professor Computer Science & Engg. Department G. B. Pant Engg. College, Paur – 8887) Volume 57 – No.17, November 2012 33 A Survey on Ontology Reasoners and Comparison Sunitha Abburu , PhD. Professor &Director, Dept. of M.C.A Ad hiyamaan College of Engineering – 8 887) Volume 2 – No. 8 , June 2010 9 M/M/1 Retrial Queueing System with Two Types of Vacation Policies under Erlang – K Type Se rvice G.AYYAPPAN PONDICHERRY ENGINEERING – 8887) Volume 82 – No. 9 , November 2013 12 Investigation of Data M ining T echniques in Fraud Detection: Credit Card R. Gayathri Assistant Professor School of IT and Science Dr. G. – 8887) Volume 106 – No. 7 , November 2014 1 Compressed Chatting Over Internet Swapnil Sonawane Student, University of Mumbai M.E.Information Tech nology VIT, Mumbai , India Dilip Mo – 8887) Volume 116 – No. 11 , April 2015 25 A Survey of Different Strategies to Pacify ARP Poisoning Attacks in Wireless Networks Jaideep Singh ECE Department GNDU RC Jalandhar Vini – 8887) Volume 3 – No.7, June 2010 7 Thickness b ased Characterization of Ultrasound Placenta Images u sing Regression Analysis G. Malathi Affiliated to Anna University Velammal Eng – 8887) Volume 105 – No. 3, November 2014 35 A Review of Studies on Change Proneness Prediction in Object Oriented Software Deepa Godara Computer Science Engineering Uttarakhan Journal of Computer Applications (0975 – 8887) Volume 17 – No. 5 , March 2011 26 Implementation of Object Oriented Data Warehousing using a N arrower C ompassed D ata M odel in – 8887) Volume 9 – No. 1 1 , November 2010 1 Edge - o dd Gracefulness o f P M S N , for M = 5, 6, 7, 8 Dr. A. S olairaju Associate Professor of Mathematics Jamal Mohamed Col – 8887) Volume 10 – No. 6 , November 2010 5 Even Vertex Graceful o f Path, Circuit, Star, Wheel , some Extension - friendship Graphs and Helm Graph A. Solairaju 1 , P. Muruganantham
Download Document
Here is the link to download the presentation.
"International Journal of Computer Applications (0975"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents