Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • EFFECTIVENESS OF U-NET IN DENOISING RGB IMAGES
  • Rina Komatsu and Tad Gonsalves
  • Computer Science & Information Technology
  • 9, 2, February, 2019

  • MAGNETIC ANOMALIES DUE TO 2-D CYLINDRICAL STRUCTURES - AN ARTIFICIAL NEURAL NETWORK BASED INVERSION
  • Bhagwan Das Mamidala
  • Computer Science & Information Technology
  • 9, 1, January, 2019

  • ORDER PRESERVING STREAM PROCESSING IN FOG COMPUTING ARCHITECTURES
  • K. Vidyasankar
  • Computer Science & Information Technology
  • 9, 1, January, 2019

  • GENE-GENE INTERACTION ANALYSIS IN ALZHEIMER
  • Rishi Yadav
  • Computer Science & Information Technology
  • 10, 3, June, 2018

  • Developing a Framework for Online Practice Examination and Automated Score Generation
  • Enoch Agyepong
  • Computer Science & Information Technology
  • 10, 3, June, 2018

  • A New Context-Sensitive Decision Making System for Mobile Cloud Offloading
  • Mustafa Tanrıverdi and M. Ali Akcayol2
  • Computer Science & Information Technology
  • 10, 5, June, 2018

  • Curvelet Based Speech Recognition System in Noisy Environment : A Statistical Approach
  • Nidamanuru Srinivasa Rao
  • Computer Science & Information Technology
  • 10, 3, June, 2019

  • Data Mining Model Performance of Sales Predictive Algorithms Based on Rapidminer Workflows
  • Alessandro Massaro
  • Computer Science & Information Technology
  • 10, 3, June, 2018

  • Integration of Importance - Performance Analysis and Fuzzy Dematel
  • Chin-Yi Chen
  • Computer Science & Information Technology
  • 10, 3, June, 2018

  • An Algorithm for Automatically Detecting Dyslexia on the Fly
  • Suraj Shrestha and Pietro Murano
  • Computer Science & Information Technology
  • 10, 3, June, 2018

  • INTER-APPLICATION COMMUNICATION: A PROTOTYPE IMPLEMENTATION
  • Kalaiselvi Arunachalam
  • Computer Science & Information Technology
  • 9, 1, January, 2019

  • A SURVEY ON IMAGE SPAM DETECTION TECHNIQUES
  • Shadi Khawandi, Firas Abdallah,Anis Ismail
  • Computer Science & Information Technology
  • 9, 1, January, 2019

  • A SURVEY ON IMAGE SPAM DETECTION TECHNIQUES
  • Shadi Khawandi, Firas Abdallah,Anis Ismail
  • Computer Science & Information Technology
  • 9, 1, January, 2019

  • A SURVEY ON IMAGE SPAM DETECTION TECHNIQUES
  • Shadi Khawandi, Firas Abdallah,Anis Ismail
  • Computer Science & Information Technology
  • 9, 1, January, 2019

  • A SURVEY ON THE DIFFERENT IMPLEMENTED CAPTCHAS
  • Shadi Khawandi, Firas Abdallah and Anis Ismail
  • Computer Science & Information Technology
  • 9, 1, January, 2019

  • BLACK HOLE ATTACK SECURITY ISSUES, CHALLENGES & SOLUTION IN MANET
  • Muneer Bani Yassein
  • Computer Science & Information Technology
  • 8, 18, December, 2018

  • ANONYMOUS AUCTIO PROTOCOL BASED ON TIME-RELEASED ENCRYPTION ATOP CONCORTIUM BLOCKCHAIN
  • Jie Xiong and Qi Wang
  • Computer Science & Information Technology
  • Volume 9, number 1, February, 2019

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals