Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • SECURITY PROTOCOL FOR POLLUTION ATTACK USING NETWORK CODING
  • Kiattikul Sooksomsatarn
  • Computer Science & Information Technology
  • 8, 18, February, 2018

  • BLACK HOLE ATTACK SECURITY ISSUES, CHALLENGES & SOLUTION IN MANET
  • Muneer Bani Yassein
  • Computer Science & Information Technology
  • 8, 18, February, 2018

  • RANDOMIZED DYNAMIC TRICKLE TIMER ALGORITHM FOR INTERNET OF THINGS
  • Muneer Bani Yassein
  • Computer Science & Information Technology
  • 8, 18, February, 2018

  • A PREFERMENT PLATFORM FOR IMPLEMENTING SECURITY MECHANISM FOR AUTOMOTIVE CAN BUS
  • Mabrouka Gmiden
  • Computer Science & Information Technology
  • 8, 18, February, 2018

  • NEAR-DROWNING EARLY PREDICTION TECHNIQUE USING NOVEL EQUATIONS (NEPTUNE) FOR SWIMMING POOLS
  • B David Prakash
  • Computer Science & Information Technology
  • 8, 18, February, 2018

  • VIDEO SEQUENCING BASED FACIAL EXPRESSION DETECTION WITH 3D LOCAL BINARY PATTERN VARIANTS
  • Kennedy Chengeta
  • Computer Science & Information Technology
  • 8, 18, February, 2018

  • A MACHINE LEARNING APPROACH TO DETECT AND CLASSIFY 3D TWO-PHOTON POLYMERIZATION MICROSTRUCTURES USING OPTICAL MICROSCOPY IMAGES
  • Israel Goytom
  • Computer Science & Information Technology
  • 8, 18, February, 2018

  • AN ELASTIC-HYBRID HONEYNET FOR CLOUD ENVIRONMENT
  • Nguyen Khac Bao
  • Computer Science & Information Technology
  • 8, 18, February, 2018

  • Do8Now: An Intelligent Mobile Platform for Time Management using Social Computing and Machine Learning
  • Ruichu Xia
  • Computer Science & Information Technology
  • 10, 12, October, 2020

  • SECURE STRATEGY FOR OPTICAL IMAGE ENCRYPTION SYSTEM BASED ON AMPLITUDE MODULATION, PHASE MODULATION AND MODIFIED LOGISTIC MAP
  • Ahmed M. Elshamy
  • Computer Science & Information Technology
  • 8, 18, February, 2018

  • PREDICTING SECURITY CRITICAL CONDITIONS OF CYBER PHYSICAL SYSTEMS WITH UNOBSERVABLES AND OBSERVATION TIMES
  • Alessio Coletta
  • Computer Science & Information Technology
  • 8, 18, February, 2018

  • CAMOUFLAGED WITH SIZE: A CASE STUDY OF ESPIONAGE USING ACQUIRABLE SINGLE-BOARD COMPUTERS
  • Kiavash Satvat
  • Computer Science & Information Technology
  • 8, 18, February, 2018

  • DATA MANAGEMENT PLATFORM SUPPORTING VOLUNTEER OCCUPATION SERVICES
  • Damien Nicolas
  • Computer Science & Information Technology
  • 8, 18, February, 2018

  • Automated Essay Scoring System using Multi-Model Machine Learning
  • Wilson Zhu, Sun Yu
  • Computer Science & Information Technology
  • 12, 20, October, 2020

  • VIRTUAL AIS GENERATION MANAGEMENT SYSTEM FOR WATERWAY RISK ASSESSMENT
  • Jun Sik Kim
  • Computer Science & Information Technology
  • 8, 18, February, 2018

  • FUZZY BOOLEAN REASONING FOR DIAGNOSIS OF DIABETES
  • Mohamed Benamina
  • Computer Science & Information Technology
  • 8, 18, February, 2018

  • AN ONTOLOGY-BASED HIERARCHICAL BAYESIAN NETWORK CLASSIFICATION MODEL TO PREDICT THE EFFECT OF DNA REPAIRS GENES IN HUMAN AGEING PROCESS
  • Hasanein Alharbi
  • Computer Science & Information Technology
  • 8, 18, February, 2018

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals