×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
proving-search-techniques-do-not-provide-acceptable-performance-for-realistic-retrieval-tasks-in-data-mining-IJERTCONV2IS15006.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
proving-search-techniques-do-not-provide-acceptable-performance-for-realistic-retrieval-tasks-in-data-mining-IJERTCONV2IS15006.pdf
PDF
2 years ago
287.21 kB
Copy Link
web-mining-and-knowledge-detection-of-usage-patterns-IJERTCONV2IS15005.pdf
PDF
2 years ago
349.77 kB
Copy Link
feature-subset-selection-by-using-graph-based-clustering-IJERTCONV2IS15007.pdf
PDF
2 years ago
432.81 kB
Copy Link
significance-of-data-mining-in-bioinformatics-IJERTCONV2IS15004.pdf
PDF
2 years ago
98.91 kB
Copy Link
integration-of-color-and-texture-features-for-content-based-image-retrieval-IJERTCONV2IS15008.pdf
PDF
2 years ago
411.25 kB
Copy Link
overview-of-fusion-techniques-in-multimodal-biometrics-IJERTCONV2IS15013.pdf
PDF
2 years ago
606.90 kB
Copy Link
providing-security-for-multi-clouds-IJERTCONV2IS15001.pdf
PDF
2 years ago
220.01 kB
Copy Link
extracting-the-features-of-web-imageseffective-methods-of-image-mining-techniques-IJERTCONV2IS15012.pdf
PDF
2 years ago
245.72 kB
Copy Link
a-novel-clustering-based-feature-subset-selection-algorithm-for-high-dimensional-data-IJERTCONV2IS15002.pdf
PDF
2 years ago
403.46 kB
Copy Link
nice-network-invasion-detection-and-countermeasure-selection-in-virtual-network-systems-IJERTCONV2IS15011.pdf
PDF
2 years ago
413.92 kB
Copy Link
cluster-based-enhanced-adaptive-acknowledgement-technique-in-manets-for-intrusion-detection-IJERTCONV2IS15003.pdf
PDF
2 years ago
387.55 kB
Copy Link
efficient-techniques-for-mining-association-rules-a-comparative-study-IJERTCONV2IS15010.pdf
PDF
2 years ago
387.63 kB
Copy Link
biometric-authentication-based-attendance-system-using-gps-for-smart-phone-IJERTCONV6IS13007.pdf
PDF
2 years ago
316.80 kB
Copy Link
a-survey-on-image-retrieval-based-on-featuresand-clustering-techniques-IJERTCONV2IS15015.pdf
PDF
2 years ago
226.87 kB
Copy Link
big-data-and-its-predictive-analysis-IJERTCONV2IS13142.pdf
PDF
2 years ago
245.73 kB
Copy Link
secure-multi-party-computation-protocols-for-collaborative-data-publishing-IJERTCONV2IS15014.pdf
PDF
2 years ago
478.82 kB
Copy Link
a-systematic-approach-to-extract-knowledge-types-in-api-reference-documentation-a-survey-IJERTCONV2IS13133.pdf
PDF
2 years ago
227.07 kB
Copy Link
review-of-data-mining-tools-techniques-and-applications-IJERTCONV2IS15021.pdf
PDF
2 years ago
104.29 kB
Copy Link
an-unsupervised-diagnosis-tool-for-locating-fine-grained-performance-anomalies-in-cloud-computing-systems-IJERTCONV2IS13134.pdf
PDF
2 years ago
188.89 kB
Copy Link
data-mining-exploring-the-role-of-discriminant-function-analysis-IJERTCONV2IS15020.pdf
PDF
2 years ago
267.97 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.