Found: 13
Select item for more details and to access through your institution.
Performance Evaluation of Superscalar Processor Architecture Through UML.
- Published in:
- BVICAM's International Journal of Information Technology, 2013, v. 5, n. 1, p. 519
- By:
- Publication type:
- Article
Secure Data Storage and Retrieval over the Encrypted Cloud Computing.
- Published in:
- International Journal of Computer Network & Information Security, 2024, v. 16, n. 4, p. 52, doi. 10.5815/ijcnis.2024.04.04
- By:
- Publication type:
- Article
Secure Access of Folders and Files after Removal of Duplicacy over the Cloud.
- Published in:
- International Journal of Computer Network & Information Security, 2024, v. 16, n. 1, p. 48, doi. 10.5815/ijcnis.2024.01.04
- By:
- Publication type:
- Article
UML Modeling of Network Topologies for Distributed Computer System.
- Published in:
- Journal of Computing & Information Technology, 2009, v. 17, n. 4, p. 327, doi. 10.2498/cit.1001319
- By:
- Publication type:
- Article
Poloxamer 407/TPGS mixed micelles for delivery of gambogic acid to breast and multidrug-resistant cancer.
- Published in:
- International Journal of Nanomedicine, 2012, v. 7, p. 713, doi. 10.2147/IJN.S28745
- By:
- Publication type:
- Article
A DIAGRAMMATIC TOOL FOR REPRESENTING USER INTERACTION IN UML.
- Published in:
- Australasian Journal of Information Systems, 2005, v. 12, n. 2, p. 5
- By:
- Publication type:
- Article
A Fine Tuned Pre-trained Model for Classification of Brain Tumor using Magnetic Resonance Imaging.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, p. 463
- By:
- Publication type:
- Article
Cloud Data Security through BB84 Protocol and Genetic Algorithm.
- Published in:
- Baghdad Science Journal, 2022, v. 19, p. 1445, doi. 10.21123/bsj.2022.7281
- By:
- Publication type:
- Article
Asymmetric Encryption Scheme to Protect Cloud Data Using Paillier-Cryptosystem.
- Published in:
- International Journal of Applied Evolutionary Computation, 2021, v. 12, n. 2, p. 1, doi. 10.4018/IJAEC.2021040104
- By:
- Publication type:
- Article
A New Data Transfer Approach Through Fuzzy Vogel's Approximation Method.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 515
- By:
- Publication type:
- Article
Identification of Fake Currency: A Case Study of Indian Scenario.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 213
- By:
- Publication type:
- Article
Power Management in the Computer Centre Under Distributed Environment.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 107
- By:
- Publication type:
- Article
Effective Test Cases Generation with Harmony Search and RBF Neural Network.
- Published in:
- International Arab Journal of Information Technology (IAJIT), 2024, v. 21, n. 5, p. 786, doi. 10.34028/iajit/21/5/2
- By:
- Publication type:
- Article