International Journal of Computer Science and Business Informatics
Information
For Readers
For Authors
For Librarians
Journal Content
Search
Search Scope
All
Authors
Title
Abstract
Index terms
Full Text
Browse
By Issue
By Author
By Title
Keywords
AODV
BER, Rayleigh Fading Channel, Modulation.
Biometrics
Distributed Multi Hop Clustering Protocol, Cognitive radio, Mobile Wireless Sensor Networks, Handoff Information.
Fingerprint
Graph Mining, Subgraph, Frequent Pattern, Graph indexing
Internet
Iris
Linear Programming Problem
Lingo Solver
MANET
Operational Level Agreements (OLAs), Service Level Agreement (SLAs) and IT Service Catalogues (ITSCs)
Optimum number of machine operators
Sensitivity analysis.
Students
Tree Mining, Inverted Index, Frequent pattern mining, tree patterns
approach, evaluation, quality, satisfaction, test of homogeneity, validation
collaborative filtering approach
e-transparency, Information Sharing
item-based CF system
recommender systems
User
Username
Password
Remember me
Font Size
Home
About
Login
Search
Current
Archives
Announcements
Editorial Board
Editorial Policies
Online Submission
Home
>
Search
>
Author Details
Author Details
Singh, Aishwarya
Vol 1, No 1 (2013): May 2013
- Articles
Implementation of image steganography using 2-level DWT technique
Abstract
PDF
ISSN: 1694-2507 (Print)
ISSN: 1694-2108 (Online)