Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVAL
  • P. Sardey
  • Computer Science & Information Technology
  • Volume 5, Number 15, August, 2015

  • SDL BASED VALIDATION OF A NODE MONITORING PROTOCOL
  • Anandi Giridharan
  • Computer Science & Information Technology
  • Volume 5, Number 14, August, 2015

  • HIERARCHICAL DEEP LEARNING ARCHITECTURE FOR 10K OBJECTS CLASSIFICATION
  • Atul Laxman Katole
  • Computer Science & Information Technology
  • Volume 5, Number 14, August, 2015

  • IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP
  • LIU Ying
  • Computer Science & Information Technology
  • Volume 5, Number 14, August, 2015

  • THE DETERMINANTS OF CLOUD COMPUTING ADOPTION IN SAUDI ARABIA
  • Abdullah Alhammadi
  • Computer Science & Information Technology
  • Volume 5, Number 14, August, 2015

  • X-TREPAN: A MULTI CLASS REGRESSION AND ADAPTED EXTRACTION OF COMPREHENSIBLE DECISION TREE IN ARTIFICIAL NEURAL NETWORKS
  • Awudu Karim
  • Computer Science & Information Technology
  • Volume 5, Number 14, August, 2015

  • A SYSTEM FOR DETECTION OF FABRICATION IN PHOTOCOPY DOCUMENT
  • Suman V Patgar
  • Computer Science & Information Technology
  • Volume 5, Number 14, August, 2015

  • DETECTION OF ORIENTED NUMBER PLATE IN VEHICLE USING AUTOCORRECTION FEATURE FROM GRAY LEVEL CO-OCCURENCE MATRIX
  • Veena M.N
  • Computer Science & Information Technology
  • Volume 5, Number 14, August, 2015

  • A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
  • Parag A. Guruji
  • Computer Science & Information Technology
  • Volume 5, Number 14, August, 2015

  • FRACTAL ANALYSIS OF GOOD PROGRAMMING STYLE
  • Ron Coleman
  • Computer Science & Information Technology
  • Volume 5, Number 14, August, 2015

  • IMPLEMENTATION OF A BPSK MODULATION BASED COGNITIVE RADIO SYSTEM USING THE ENERGY DETECTION TECHNIQUE
  • Sid Ahmed Chouakri
  • Computer Science & Information Technology
  • Volume 5, Number 15, November, 2015

  • IMAGE SEARCH USING SIMILARITY MEASURES BASED ON CIRCULAR SECTORS
  • Jan Masek
  • Computer Science & Information Technology
  • Volume 5, Number 15, November, 2015

  • SENSITIVITY ANALYSIS IN A LIDARCAMERA CALIBRATION
  • Angel-Iván García-Moreno
  • Computer Science & Information Technology
  • Volume 5, Number 15, November, 2015

  • ICU PATIENT DETERIORATION PREDICTION: A DATA-MINING APPROACH
  • Noura AlNuaimi
  • Computer Science & Information Technology
  • Volume 5, Number 15, November, 2015

  • EFFICIENT DISPATCHING RULES BASED ON DATA MINING FOR THE SINGLE MACHINE SCHEDULING PROBLEM
  • Mohamed Habib Zahmani
  • Computer Science & Information Technology
  • Volume 5, Number 15, November, 2015

  • A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL AND DIGITAL SIGNATURE
  • Amine RAHMANI
  • Computer Science & Information Technology
  • Volume 5, no(5), November, 2015

  • A NEW APPROACH BASED ON THE DETECTION OF OPINION BY SENTIWORDNET FOR AUTOMATIC TEXT SUMMARIES BY EXTRACTION
  • Reda Mohamed HAMOU
  • Computer Science & Information Technology
  • Volume 5, Number 15, November, 2015

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119  120  121  122  123  124  125  126  127  128  129  130  131 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals