• Home
  • Archives
Register Login
    Flag icon
  1. Home
  2. Archives
  3. Volume 75
  4. Issue 12
This website uses cookies

We use cookies to personalize your content and to analyze our traffic. We do not share information about your use of our site with any of our partners including Google Scholar, Web of Science and affiliated journals.

By continuing to use our website, you consent to our use of cookies.

Issue 12 of Volume 75

An Efficient Hierarchical Approach for Background Subtraction and Shadow Removal using Adaptive GMM and Color Discrimination

Authors: Kshitij Kumar, Suneeta Agarwal

Modifications in RSA through Positive Justification of Random Components

Authors: Pallavi Jindal, Vikas Gupta

Multi-Dimensional and Multi-Level Authentication Techniques

Authors: Tanvi Naik, Sheetal Koul

A Comprehensive Approach for Embodiment of Security Activities with Agile Methodologies

Authors: Ajay Kumar Rangra, Manik Gupta

An Efficient Binary to Decimal Conversion Approach for Discovering Frequent Patterns

Authors: Kapil Chaturvedi, Ravindra Patel, D. K. Swami

Revisiting Requirements Elicitation Techniques

Authors: Shreta Sharma, S. K. Pandey

Encode Decode Linux based Partitions to Hide and Explore File System

Authors: Ajahar Ismailkha Pathan, Amit Sinhal

Software Reliability Growth Models with Log-logistic Testing-Effort Function: A Comparative Study

Authors: N. Ahmad, Md. Zafar Imam

Journal platform powered by
PhDFocus®
A to Z of Journal Management
API powered by
Web of Science™
PhDFocus® is compliant with United States Education Policy. A part of Foundation of Computer Science. © PhDFocus 2009 - 2025
About PhDFocus®
  • Contact Us
  • FAQ
  • Documentation
  • Privacy
  • Terms
  • Return & Refund