Author:
Anil Naga Sai P.,Naveen Kumar P.,Velmurugan A.
Reference26 articles.
1. R. Subhashini, J.K. Jeevitha, B.K. Samhitha, Application of data mining techniques to examine quality of water, Int. J. Innovative Technol. Exploring Eng. (IJITEE), ISSN: 2278–3075, 8(5S), Mar 2019
2. E. Brumancia, A. Sylvia, A profile based scheme for security in clustered wireless sensor networks. In 2015 International Conference on Communications and Signal Processing (ICCSP), Apr 2015, pp. 0823–0827. IEEE
3. V.V. Kaveri, V. Maheshwari, P. Geetha, Expertise search system: profile extraction and analysis of doctor’s community. In 2015 International Conference on Communications and Signal Processing (ICCSP), Apr 2015, pp. 1315–1318. IEEE
4. R.J. Manoj, M.A. Praveena, M. Anvesh, M. Pujith, Secured user behaviour based access framework for web service. In IOP Conference Series: Materials Science and Engineering, vol. 590(1) (IOP Publishing, Oct 2019), p. 012016
5. A.S. Sheela, C. Kumar, Duplicate Web Pages Detection with the Support of 2D Table Approach. J. Theor. Appl. Inf. Technol. 67(1), (2014)