Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • ANALYSIS OF KEY CONSIDERATIONS OF THE PUBLIC WHEN CHOOSING RECREATIONAL ACTIVITIES
  • Han-Chen Huang
  • Computer Science & Information Technology
  • Vol 7, No 1, February, 2015

  • AN ITERATIVE MORPHOLOGICAL DECOMPOSITION ALGORITHM FOR REDUCTION OF SKELETON POINTS
  • Dr. A. Sri Krishna
  • Computer Science & Information Technology
  • Vol 7, No 1, February, 2015

  • A RULE BASED APPROACH TOWARDS DETECTING HUMAN TEMPERAMENT
  • ShomoyeAbiodun R
  • Computer Science & Information Technology
  • Vol 7, No 1, February, 2015

  • THE ANALYSIS OF THE TIME TABLE STRUCTURE WITHIN A STUDENT INFORMATION SYSTEM (SIS)
  • Dr. Issa S. I. Ottoum
  • Computer Science & Information Technology
  • Vol 7, No 1, February, 2015

  • NEW APPROACH IN SYMMETRIC BLOCK CIPHER SECURITY USING A NEW CUBICAL TECHNIQUE
  • Ali M Alshahrani
  • Computer Science & Information Technology
  • Vol 7, No 1, February, 2015

  • IMPROVING INITIAL GENERATIONS IN PSO ALGORITHM FOR TRANSPORTATION NETWORK DESIGN PROBLEM
  • Navid Afkar
  • Computer Science & Information Technology
  • Vol 7, No 1, February, 2015

  • Predictive Modelling of Crime data set using Data Mining Techniques
  • Prajakta Yerpude and Vaishnavi Gudur
  • Computer Science & Information Technology
  • 7, 4, July, 2017

  • PERFORMANCE COMPARISON OF HYBRID WAVELET TRANSFORMS FORMED USING DCT, WALSH, HAAR AND DKT IN WATERMARKING
  • Dr. H. B. Kekre
  • Computer Science & Information Technology
  • Vol 7, No 1, February, 2015

  • CROSS PLATFORM APP A COMPARATIVE STUDY
  • Paulo R. M. de Andrade
  • Computer Science & Information Technology
  • Vol 7, No 1, February, 2015

  • ANALYSIS OF SELECTION INDICATORS OF BADMINTON PLAYERS BY THE DELPHI METHOD AND ANALYTIC HIERARCHY PROCESS
  • Han-Chen Huang
  • Computer Science & Information Technology
  • Vol 7, No 1, February, 2015

  • AN EMPLOYING A MULTISTAGE FUZZY ARCHITECTURE FOR USABILITY OF OPEN SOURCE SOFTWAR
  • Roba Al-Soub
  • Computer Science & Information Technology
  • Vol 7, No 1, February, 2015

  • IRIS RECOGNITION FOR PERSONAL IDENTIFICATION USING LAMSTAR NEURAL NETWORK
  • Shideh Homayon
  • Computer Science & Information Technology
  • Vol 7, No 1, February, 2015

  • APPLY HIBERNATE TO MODEL AND PERSIST ASSOCIATIONS MAPPINGS IN DOCUMENT VERSION SYSTEM
  • Neetu Gupta
  • Computer Science & Information Technology
  • Vol 3, Num 5, September, 2013

  • PREDICTION FOR SHORT-TERM TRAFFIC FLOW BASED ON OPTIMIZED WAVELET NEURAL NETWORK MODEL
  • Tao Li
  • Computer Science & Information Technology
  • Vol 7, No 2, April, 2015

  • EMOTION INTERACTION WITH VIRTUAL REALITY USING HYBRID EMOTION CLASSIFICATION TECHNIQUE TOWARD BRAIN SIGNALS
  • Faris A. Abuhashish
  • Computer Science & Information Technology
  • Vol 7, No 2, April, 2015

  • A SURVIVABILITY MODEL FOR SAUDI ICT STARTUPS
  • Sara Almakenzi
  • Computer Science & Information Technology
  • Vol 7, No 2, April, 2015

  • TAXONOMY OF OPTIMIZATION APPROACHES OF RESOURCE BROKERS IN DATA GRIDS
  • Rafah M. Almuttairi
  • Computer Science & Information Technology
  • Vol 7, No 2, April, 2015

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119  120  121  122  123  124  125  126  127  128  129  130  131 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals