Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
  • Eman Mohamed Nabil Alkholy
  • Computer Science & Information Technology
  • 8, 8, May, 2018

  • DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
  • Akella Amarendra Babu
  • Computer Science & Information Technology
  • 8, 8, May, 2018

  • INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
  • Alla Defallah Alrehily
  • Computer Science & Information Technology
  • 8, 8, May, 2018

  • TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
  • Amira GHERBOUDJ
  • Computer Science & Information Technology
  • 8, 8, May, 2018

  • TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
  • Amira GHERBOUDJ
  • Computer Science & Information Technology
  • 8, 8, May, 2018

  • DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
  • Enoch Agyepong
  • Computer Science & Information Technology
  • 8, 8, May, 2018

  • OFF-LINE ARABIC HANDWRITTEN WORDS SEGMENTATION USING MORPHOLOGICAL OPERATORS
  • Nisreen Ali
  • Computer Science & Information Technology
  • Vol.11,, N, Handwritte, December, 2020

  • GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING CONTENT USING BLOCKCHAIN
  • Ahmed Gomaa
  • Computer Science & Information Technology
  • 8, 8, May, 2018

  • IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
  • Suryakanthi Tangirala
  • Computer Science & Information Technology
  • 8, 6, April, 2018

  • UNLIMITED LENGTH RANDOM PASSWORDS FOR EXPONENTIALLY INCREASED SECURITY
  • Cheman Shaik
  • Computer Science & Information Technology
  • 11, 1, February, 2021

  • Adaptive Vocabulary Construction for Frustration Intensity Modelling in Customer Support Dialog Texts
  • Janis Zuters and Viktorija Leonova
  • Computer Science & Information Technology
  • 12, 6, December, 2020

  • A New Approach for Ranking Shadowed Fuzzy Numbers and its Application
  • Mohamed A. H. El-Hawy
  • Computer Science & Information Technology
  • 12, 6, December, 2020

  • Simulation of Package Delivery Optimization using a Combination of Carriers and Drop-Ship
  • Valentyn M. Yanchuk, Andrii G. Tkachuk, Dmytro S. Antoniuk, Tetiana A. Vakaliuk and Anna A. Humeniuk
  • Computer Science & Information Technology
  • 12, 6, December, 2020

  • EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-TYPE EQUATIONS
  • MOHAMMED O. AL-AMR
  • Computer Science & Information Technology
  • 8, 6, April, 2018

  • Counter Challenge Authentication Method: A Defeating Solution to Phishing Attacks
  • Cheman Shaik
  • Computer Science & Information Technology
  • 10, 1, February, 2020

  • Change Back Feature for Consumer Accounts
  • Cheman Shaik
  • Computer Science & Information Technology
  • 10, 5/6, December, 2020

  • AUTOMATED PENETRATION TESTING: AN OVERVIEW
  • Farah Abu-Dabaseh
  • Computer Science & Information Technology
  • 8, 6, April, 2018

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119  120  121  122  123  124  125  126  127  128  129 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals