A review of machine learning based anomaly detection techniques H Kaur, G Singh, J Minhas arXiv preprint arXiv:1307.7286, 2013 | 96 | 2013 |
Factors that affect cloud computing adoption by small and medium enterprises in Kenya JN Makena International Journal of Computer Applications Technology and Research 2 (5 …, 2013 | 83 | 2013 |
Performance comparison of digital Image watermarking techniques: a survey N Chandrakar, J Bagga International Journal of Computer Applications Technology and Research 2 (2 …, 2013 | 63 | 2013 |
Survey on image enhancement techniques P Suganya, S Gayathri, N Mohanapriya International Journal of Computer Applications Technology and Research 2 (5 …, 2013 | 52 | 2013 |
Applying data mining techniques on soil fertility prediction SS Baskar, L Arockiam, S Charles Int. J. Comput. Appl. Technol. Res 2 (6), 660-662, 2013 | 38 | 2013 |
An evaluation of two-step techniques for positive-unlabeled learning in text classification A Kaboutari, J Bagherzadeh, F Kheradmand Int. J. Comput. Appl. Technol. Res 3 (9), 592-594, 2014 | 35 | 2014 |
New Approach for K-mean and K-medoids Algorithm A Patel, P Singh International Journal of Computer Applications Technology and Research 2 (1 …, 2013 | 35 | 2013 |
Literature survey on image deblurring techniques M Poulose International Journal of Computer Applications Technology and Research 2 (3 …, 2013 | 35 | 2013 |
Survey on dynamic resource allocation strategy in cloud computing environment N Krishnaveni, G Sivakumar International Journal of Computer Applications Technology and Research 2 (6 …, 2013 | 33 | 2013 |
Visual image quality assessment technique using FSIM R Kumar, V Moyal International Journal of Computer Applications Technology and Research 2 (3 …, 2013 | 33 | 2013 |
Automatic seed classification by shape and color features using machine vision technology N Pandey, S Krishna, S Sharma International Journal of Computer Applications Technology and Research 2 (2 …, 2013 | 33 | 2013 |
Speed determination of moving vehicles using Lucas-Kanade algorithm D Shukla, E Patel International Journal of Computer Applications Technology and Research 2 (1 …, 2013 | 30 | 2013 |
Knowledge management in the cloud: benefits and risks MS Aksoy, D Algawiaz International Journal of Computer Applications Technology and Research 3 (11 …, 2014 | 29 | 2014 |
Analysis of cryptographic algorithms for network security K Acharya, M Sajwan, S Bhargava International Journal of Computer Applications Technology and Research 3 (2 …, 2013 | 29 | 2013 |
Detect breast cancer using fuzzy c means techniques in wisconsin prognostic breast cancer (WPBC) data sets PB Tintu, R Paulin International Journal of Computer Applications Technology and Research 2 (5 …, 2013 | 28 | 2013 |
Flood prediction model using artificial neural network A Paul, P Das International Journal of Computer Applications Technology and Research 3 (7 …, 2014 | 27 | 2014 |
Shape oriented feature selection for tomato plant identification A Hazra, K Deb, S Kundu, P Hazra International Journal of Computer Applications Technology and Research 2 (4 …, 2013 | 25 | 2013 |
Brain tumor detection using artificial neural network fuzzy inference system (ANFIS) RJ Deshmukh, RS Khule International Journal of Computer Applications Technology and Research 3 (3 …, 2014 | 24 | 2014 |
A review on wireless sensor network protocol for disaster management MS Dawood, J Suganya, RK Devi, G Athisha International Journal of Computer Applications Technology and Research 2 (2 …, 2013 | 23 | 2013 |
Knowledge transfer in a municipality study on baby boomer exodus from the workforce I Cummings-White, IS Diala International Journal of Computer Applications Technology and Research 2 (3 …, 2013 | 22 | 2013 |