Author of the publication

TEXT ANALYZER

, , and . International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), 1, page 09-19. ACM, (April 2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Algorithm To Find The Core Of A CV-Graph., , and . Ars Comb., (1997)Study of chaos functions for their suitability in generating Message Authentication Codes., , and . Appl. Soft Comput., 7 (3): 1064-1071 (2007)Developing Indian Medicinal Plant Ontology Using OWL and SWRL., and . ICDEM, volume 6411 of Lecture Notes in Computer Science, page 131-138. Springer, (2010)Message authentication code algorithm for IP-SEC., and . Comput. Syst. Sci. Eng., (2010)TEXT ANALYZER, , and . International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), 1, page 09-19. ACM, (April 2011)P-IRON for Privacy Preservation in Data Mining., and . KMO, volume 731 of Communications in Computer and Information Science, page 410-423. Springer, (2017)Design of Query-Driven System for Time-Utility Based Data Mining on Medical Data., and . KMO, volume 224 of Lecture Notes in Business Information Processing, page 664-682. Springer, (2015)IMR based Anonymization for Privacy Preservation in Data Mining., and . KMO, page 18. ACM, (2016)Harmony and bio inspired harmony search optimization algorithms for feature selection in classification., , , and . Comput. Syst. Sci. Eng., (2015)Genetic Diversity Studies in Rice for Bacterial Leaf Blight Resistance. International Journal of Trend in Scientific Research and Development, 2 (5): 797-806 (August 2018)