×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
secure-multi-party-computation-protocols-for-collaborative-data-publishing-IJERTCONV2IS15014.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
secure-multi-party-computation-protocols-for-collaborative-data-publishing-IJERTCONV2IS15014.pdf
PDF
2 years ago
478.82 kB
Copy Link
review-of-data-mining-tools-techniques-and-applications-IJERTCONV2IS15021.pdf
PDF
2 years ago
104.29 kB
Copy Link
a-survey-on-image-retrieval-based-on-featuresand-clustering-techniques-IJERTCONV2IS15015.pdf
PDF
2 years ago
226.87 kB
Copy Link
data-mining-exploring-the-role-of-discriminant-function-analysis-IJERTCONV2IS15020.pdf
PDF
2 years ago
267.97 kB
Copy Link
efficient-techniques-for-mining-association-rules-a-comparative-study-IJERTCONV2IS15010.pdf
PDF
2 years ago
387.63 kB
Copy Link
application-of-data-mining-techniques-for-information-security-in-a-cloud-IJERTCONV2IS15019.pdf
PDF
2 years ago
559.91 kB
Copy Link
nice-network-invasion-detection-and-countermeasure-selection-in-virtual-network-systems-IJERTCONV2IS15011.pdf
PDF
2 years ago
413.92 kB
Copy Link
an-implementation-of-multi-prime-rsa-algorithm-in-data-cloud-using-cloud-sql-IJERTCONV2IS15018.pdf
PDF
2 years ago
112.60 kB
Copy Link
extracting-the-features-of-web-imageseffective-methods-of-image-mining-techniques-IJERTCONV2IS15012.pdf
PDF
2 years ago
245.72 kB
Copy Link
rough-sets-in-spatiotemporal-multimedia-outlier-detection-IJERTCONV2IS15017.pdf
PDF
2 years ago
543.57 kB
Copy Link
overview-of-fusion-techniques-in-multimodal-biometrics-IJERTCONV2IS15013.pdf
PDF
2 years ago
606.90 kB
Copy Link
a-study-on-information-retrieval-methods-in-text-mining-IJERTCONV2IS15028.pdf
PDF
2 years ago
535.14 kB
Copy Link
significance-of-data-mining-in-bioinformatics-IJERTCONV2IS15004.pdf
PDF
2 years ago
98.91 kB
Copy Link
data-mining-in-android-devices-through-web-services-IJERTCONV2IS15027.pdf
PDF
2 years ago
378.61 kB
Copy Link
web-mining-and-knowledge-detection-of-usage-patterns-IJERTCONV2IS15005.pdf
PDF
2 years ago
349.77 kB
Copy Link
grid-computing-introduction-and-overview-IJERTCONV2IS15026.pdf
PDF
2 years ago
193.70 kB
Copy Link
proving-search-techniques-do-not-provide-acceptable-performance-for-realistic-retrieval-tasks-in-data-mining-IJERTCONV2IS15006.pdf
PDF
2 years ago
287.21 kB
Copy Link
privacy-preserving-of-data-in-m-health-application-for-diabetes-mellitus-IJERTCONV2IS15025.pdf
PDF
2 years ago
322.54 kB
Copy Link
feature-subset-selection-by-using-graph-based-clustering-IJERTCONV2IS15007.pdf
PDF
2 years ago
432.81 kB
Copy Link
applications-and-techniques-in-wireless-sensor-networks-a-survey-IJERTCONV2IS15024.pdf
PDF
2 years ago
248.27 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.