Follow
WWW.IJCAT.COM
WWW.IJCAT.COM
IJCATR
Verified email at IJCAT.COM - Homepage
Title
Cited by
Cited by
Year
A review of machine learning based anomaly detection techniques
H Kaur, G Singh, J Minhas
arXiv preprint arXiv:1307.7286, 2013
922013
Factors that affect cloud computing adoption by small and medium enterprises in Kenya
JN Makena
International Journal of Computer Applications Technology and Research 2 (5 …, 2013
822013
Performance comparison of digital Image watermarking techniques: a survey
N Chandrakar, J Bagga
International Journal of Computer Applications Technology and Research 2 (2 …, 2013
632013
Survey on image enhancement techniques
P Suganya, S Gayathri, N Mohanapriya
International Journal of Computer Applications Technology and Research 2 (5 …, 2013
552013
Applying data mining techniques on soil fertility prediction
SS Baskar, L Arockiam, S Charles
Int. J. Comput. Appl. Technol. Res 2 (6), 660-662, 2013
382013
New Approach for K-mean and K-medoids Algorithm
A Patel, P Singh
International Journal of Computer Applications Technology and Research 2 (1 …, 2013
372013
An evaluation of two-step techniques for positive-unlabeled learning in text classification
A Kaboutari, J Bagherzadeh, F Kheradmand
Int. J. Comput. Appl. Technol. Res 3 (9), 592-594, 2014
332014
Survey on dynamic resource allocation strategy in cloud computing environment
N Krishnaveni, G Sivakumar
International Journal of Computer Applications Technology and Research 2 (6 …, 2013
332013
Literature survey on image deblurring techniques
M Poulose
International Journal of Computer Applications Technology and Research 2 (3 …, 2013
332013
Automatic seed classification by shape and color features using machine vision technology
N Pandey, S Krishna, S Sharma
International Journal of Computer Applications Technology and Research 2 (2 …, 2013
292013
Analysis of cryptographic algorithms for network security
K Acharya, M Sajwan, S Bhargava
International Journal of Computer Applications Technology and Research 3 (2 …, 2013
292013
Speed determination of moving vehicles using Lucas-Kanade algorithm
D Shukla, E Patel
International Journal of Computer Applications Technology and Research 2 (1 …, 2013
292013
Visual image quality assessment technique using FSIM
R Kumar, V Moyal
International Journal of Computer Applications Technology and Research 2 (3 …, 2013
282013
Detect breast cancer using fuzzy c means techniques in wisconsin prognostic breast cancer (WPBC) data sets
PB Tintu, R Paulin
International Journal of Computer Applications Technology and Research 2 (5 …, 2013
282013
Knowledge management in the cloud: benefits and risks
MS Aksoy, D Algawiaz
International Journal of Computer Applications Technology and Research 3 (11 …, 2014
272014
Shape oriented feature selection for tomato plant identification
A Hazra, K Deb, S Kundu, P Hazra
International Journal of Computer Applications Technology and Research 2 (4 …, 2013
272013
Brain tumor detection using artificial neural network fuzzy inference system (ANFIS)
RJ Deshmukh, RS Khule
International Journal of Computer Applications Technology and Research 3 (3 …, 2014
232014
Flood prediction model using artificial neural network
A Paul, P Das
International Journal of Computer Applications Technology and Research 3 (7 …, 2014
232014
A review on wireless sensor network protocol for disaster management
MS Dawood, J Suganya, RK Devi, G Athisha
International Journal of Computer Applications Technology and Research 2 (2 …, 2013
222013
Knowledge transfer in a municipality study on baby boomer exodus from the workforce
I Cummings-White, IS Diala
International Journal of Computer Applications Technology and Research 2 (3 …, 2013
222013
The system can't perform the operation now. Try again later.
Articles 1–20