Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • AUTHENTICATION AND KEY AGREEMENT IN 3GPP NETWORKS
  • Krishna Prakash
  • Computer Science & Information Technology
  • Volume 5, Number 13, July, 2015

  • SINGLE IMAGE FOG REMOVAL BASED ON FUSION STRATEGY
  • V. Thulasika
  • Computer Science & Information Technology
  • Volume 5, Number 13, July, 2015

  • ENHANCEMENT AND SEGMENTATION OF HISTORICAL RECORDS
  • Soumya A
  • Computer Science & Information Technology
  • Volume 5, Number 13, July, 2015

  • HASHTAG RECOMMENDATION SYSTEM IN A P2P SOCIAL NETWORKING APPLICATION
  • Keerthi Nelaturu
  • Computer Science & Information Technology
  • Volume 5, Number 13, July, 2015

  • FAULT-TOLERANCE AWARE MULTI OBJECTIVE SCHEDULING ALGORITHM FOR TASK SCHEDULING IN COMPUTATIONAL GRID
  • Dinesh Prasad Sahu
  • Computer Science & Information Technology
  • Volume 5, Number 13, July, 2015

  • STABLE DRUG DESIGNING BY MINIMIZING DRUG PROTEIN INTERACTION ENERGY USING PSO
  • Anupam Ghosh
  • Computer Science & Information Technology
  • Volume 5, Number 13, July, 2015

  • COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS
  • Deepa B
  • Computer Science & Information Technology
  • Volume 5, Number 13, July, 2015

  • WEB MINING BASED FRAMEWORK FOR ONTOLOGY LEARNING
  • C.Ramesh
  • Computer Science & Information Technology
  • Volume 5, Number 13, July, 2015

  • TURNOVER PREDICTION OF SHARES USING DATA MINING TECHNIQUES: A CASE STUDY
  • Shashaank D.S
  • Computer Science & Information Technology
  • Volume 5, Number 13, July, 2015

  • TOPIC MODELING: CLUSTERING OF DEEP WEBPAGES
  • Muhunthaadithya C
  • Computer Science & Information Technology
  • Volume 5, Number 13, July, 2015

  • DESIGNING A ROUTING PROTOCOL FOR UBIQUITOUS NETWORKS USING ECA SCHEME
  • Chandrashekhar Pomu Chavan
  • Computer Science & Information Technology
  • Volume 5, Number 13, July, 2015

  • A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVAL
  • P. Sardey
  • Computer Science & Information Technology
  • Volume 5, Number 15, August, 2015

  • SDL BASED VALIDATION OF A NODE MONITORING PROTOCOL
  • Anandi Giridharan
  • Computer Science & Information Technology
  • Volume 5, Number 14, August, 2015

  • HIERARCHICAL DEEP LEARNING ARCHITECTURE FOR 10K OBJECTS CLASSIFICATION
  • Atul Laxman Katole
  • Computer Science & Information Technology
  • Volume 5, Number 14, August, 2015

  • IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP
  • LIU Ying
  • Computer Science & Information Technology
  • Volume 5, Number 14, August, 2015

  • THE DETERMINANTS OF CLOUD COMPUTING ADOPTION IN SAUDI ARABIA
  • Abdullah Alhammadi
  • Computer Science & Information Technology
  • Volume 5, Number 14, August, 2015

  • X-TREPAN: A MULTI CLASS REGRESSION AND ADAPTED EXTRACTION OF COMPREHENSIBLE DECISION TREE IN ARTIFICIAL NEURAL NETWORKS
  • Awudu Karim
  • Computer Science & Information Technology
  • Volume 5, Number 14, August, 2015

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119  120  121  122  123  124  125  126  127  128  129 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals