Search Paper here
  • Home
  • Login
  • Categories
  • Post URL
  • Archive
  • Contact Us

 

The result for

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • Digital Signature and Watermark Methods for Image Authentication Using Cryptography Analysis
  • M. Sreerama Murty, D. Veeraiah and A. Srinivas Rao
  • Digital Signal & Image Processing
  • 2, 2, June, 2011

  • Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcement Learning
  • Bayarmaa Ragchaa and Kazuhiko Kinoshita
  • Networks & Communications
  • 15, 1, January, 2023

  • Runtime Potential Updater File(S) Identification: Does Your Software Updates Automatically With Application Whitelisting?
  • Janardhan Reddy, Amit Kumar Jha and Sandeep Romana
  • Networks & Communications
  • 7, 1, January, 2015

  • Understanding the Worldwide Paths Towards the Creation of True Intelligence for Machines
  • Kouassi Konan Jean-Claude
  • Computer Science & Information Technology
  • 15, 1, February, 2023

  • An advantageous and user-friendly mobile program to benefit students in seeking their suitable colleges through the use of web scraping, machine learning, and frontend design
  • Sibo Tao, Yu Sun
  • Computer Science & Information Technology
  • 13, 5, March, 2023

  • An Overview of Copy Move Forgery Detection Approaches
  • Gayathri K S, 2 and Deepthi P S
  • Computer Science & Information Technology
  • 12, 6, December, 2023

  • Business Value Impact of AI-Powered Service Operations (AIServiceOps)
  • Harsha Vijayakumar
  • Information Technology Management
  • 13, 5, March, 2023

  • Scaled Quantization for the Vision Transformer
  • Yangyang Chang and Gerald E. Sobelman
  • Computer Science & Information Technology
  • 12, 1, February, 2023

  • An Efficient Method to Compute the Rate Matrix for Multi-Server Retrial Queues with Cloud Computing Systems
  • Dang Thanh Chuong1 , Hoa Ly Cuong1 , Hoang Dinh Long2 and Duong Duc Hung3
  • Networks & Communications
  • 15, 1, January, 2023

  • Dynamic Interference Suppression for TV White Space: the Case of Thailand
  • Prathana Thaopanya 1 and Teerapat Sanguankotchakorn2
  • Networks & Communications
  • 15, 1, January, 2023

  • Evaluating the Accuracy of a Linear Regression Model in Predicting the Dissolution of Tablets Based on Raman Maps
  • Gábor Knyihár, Kristóf Csorba and Hassan Charaf
  • Digital Signal & Image Processing
  • 14, 1, February, 2023

  • Robust Outdoor Positioning via Ray Tracing
  • Vladislav Ryzhov
  • Networks & Communications
  • 13, 5, March, 2023

  • A COMPARATIVE STUDY OF FEATURE SELECTION METHODS
  • Wanwan Zheng, Mingzhe Jin
  • NLP
  • 7, 5, October, 2018

  • Active Noise Cancellation in Microsoft Teams Using AI & NLP Powered Algorithms
  • Pawankumar Sharma and Bibhu Dash
  • Computer Science & Information Technology
  • 15, 1, February, 2023

  • Service Oriented Configuration Management of ‎Software ‎Architecture
  • Razie Alidoosti, Shahrouz Moaven and Jafar Habibi
  • Software Engineering & Security
  • 7, 1, January, 2015

  • Service Oriented Configuration Management of ‎Software ‎Architecture
  • Razie Alidoosti, Shahrouz Moaven and Jafar Habibi
  • Software Engineering & Security
  • 7, 1, January, 2015

  • Addressing Class Variable Imbalance in Federated Semi-Supervised Learning
  • Zehui Dong, Wenjing Liu, Siyuan Liu, Xingzhi Chen
  • Artificial Intelligence
  • 12th Inte, 12th Inte, March, 2023

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals