Archive

Vol-5  Issue-3  May  2017

2) Privacy-Preserving in FiDoop, Mining of Frequent Itemsets from Outsourced Transaction Databases

Nithin C, A V Krishna Mohan

DOI: 10.21276/ijircst.2017.5.3.2
DOI URL: https://doi.org/10.21276/ijircst.2017.5.3.2

Download PDF View Abstract

No. of Downloads: 11 | No. of Views: 1181

3) Review of Data Integrity Checking in Cloud Computing

HanumanthaRao.Galli, Padmanabham.P,

DOI: 10.21276/ijircst.2017.5.3.3
DOI URL: https://doi.org/10.21276/ijircst.2017.5.3.3

Download PDF View Abstract

No. of Downloads: 12 | No. of Views: 1251

4) Light Fidelity: A New Prototype in Wireless Communication

Riya Kaushik, Rashmi Jaiswal, Rakhi Joon

DOI: 10.21276/ijircst.2017.5.3.4
DOI URL: https://doi.org/10.21276/ijircst.2017.5.3.4

Download PDF View Abstract

No. of Downloads: 16 | No. of Views: 1152

5) Practicing LSB Steganography in PCA Transform Field

Mahdi Koohi

DOI: 10.21276/ijircst.2017.5.3.5
DOI URL: https://doi.org/10.21276/ijircst.2017.5.3.5

Download PDF View Abstract

No. of Downloads: 13 | No. of Views: 1253

6) Analysis of Various Software Reliability Models and Proposing a New Model of Software Reliability for Embedded Systems

Dr. Rajender Kumar Sharma, Dr. Archana Kumar, Sapna Bajaj

DOI: 10.21276/ijircst.2017.5.3.6
DOI URL: https://doi.org/10.21276/ijircst.2017.5.3.6

Download PDF View Abstract

No. of Downloads: 11 | No. of Views: 1176

7) Data Mining Over Encrypted Data of Database Client Engine Using Hybrid Classification Approach

Bhagyashree Ambulkar, Prof. Gunjan Agre

DOI: 10.21276/ijircst.2017.5.3.7
DOI URL: https://doi.org/10.21276/ijircst.2017.5.3.7

Download PDF View Abstract

No. of Downloads: 12 | No. of Views: 6372

Indexed by

Crossref logo