Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
Eman Mohamed Nabil Alkholy
Computer Science & Information Technology
8, 8, May, 2018
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
Akella Amarendra Babu
Computer Science & Information Technology
8, 8, May, 2018
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
Alla Defallah Alrehily
Computer Science & Information Technology
8, 8, May, 2018
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
Amira GHERBOUDJ
Computer Science & Information Technology
8, 8, May, 2018
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
Amira GHERBOUDJ
Computer Science & Information Technology
8, 8, May, 2018
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
Enoch Agyepong
Computer Science & Information Technology
8, 8, May, 2018
OFF-LINE ARABIC HANDWRITTEN WORDS SEGMENTATION USING MORPHOLOGICAL OPERATORS
Nisreen Ali
Computer Science & Information Technology
Vol.11,, N, Handwritte, December, 2020
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING CONTENT USING BLOCKCHAIN
Ahmed Gomaa
Computer Science & Information Technology
8, 8, May, 2018
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
Suryakanthi Tangirala
Computer Science & Information Technology
8, 6, April, 2018
UNLIMITED LENGTH RANDOM PASSWORDS FOR EXPONENTIALLY INCREASED SECURITY
Cheman Shaik
Computer Science & Information Technology
11, 1, February, 2021
Adaptive Vocabulary Construction for Frustration Intensity Modelling in Customer Support Dialog Texts
Janis Zuters and Viktorija Leonova
Computer Science & Information Technology
12, 6, December, 2020
A New Approach for Ranking Shadowed Fuzzy Numbers and its Application
Mohamed A. H. El-Hawy
Computer Science & Information Technology
12, 6, December, 2020
Simulation of Package Delivery Optimization using a Combination of Carriers and Drop-Ship
Valentyn M. Yanchuk, Andrii G. Tkachuk, Dmytro S. Antoniuk, Tetiana A. Vakaliuk and Anna A. Humeniuk
Computer Science & Information Technology
12, 6, December, 2020
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-TYPE EQUATIONS
MOHAMMED O. AL-AMR
Computer Science & Information Technology
8, 6, April, 2018
Counter Challenge Authentication Method: A Defeating Solution to Phishing Attacks
Cheman Shaik
Computer Science & Information Technology
10, 1, February, 2020
Change Back Feature for Consumer Accounts
Cheman Shaik
Computer Science & Information Technology
10, 5/6, December, 2020
AUTOMATED PENETRATION TESTING: AN OVERVIEW
Farah Abu-Dabaseh
Computer Science & Information Technology
8, 6, April, 2018
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129