Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • EXAMINING RISK COMMUNICATION OF SAMSUNG BY ANALYSING CUSTOMER REACTION ON SOCIAL MEDIA: FROM GALAXY NOTE 7 EXPLOSION TO GALAXY S8 RELEASE
  • Jaewon Lim
  • Computer Science & Information Technology
  • 8, 3, February, 2018

  • PERCEPTION OF HOME-SHARING INDUSTRY: A STUDY OF COMPARING AIRBNB AND COUCHSURFING
  • JinTao Huang
  • Computer Science & Information Technology
  • 8, 3, February, 2018

  • ON THE DUALITY FEATURE OF P-CLASS PROBLEMS AND NP COMPLETE PROBLEMS
  • WenhongTian
  • Computer Science & Information Technology
  • 8, 3, February, 2018

  • PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
  • Kingsley K. Ofosu
  • Computer Science & Information Technology
  • 8, 3, February, 2018

  • LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SUCCESS RATE
  • Sanghyeok Lim
  • Computer Science & Information Technology
  • 8, 3, February, 2018

  • RELIABILITY OF MECHANICAL SYSTEM OF SYSTEMS
  • El Hami Abdelkhalakl
  • Computer Science & Information Technology
  • 8, 4, February, 2018

  • DISTRIBUTED SYSTEM APPROACH TO EXPERIMENT REGIONAL COMPETITIVENESS
  • Mhamed Itmi
  • Computer Science & Information Technology
  • 8, 4, February, 2018

  • AN ONTOLOGY-BASED DATA WAREHOUSE FOR THE GRAIN TRADE DOMAIN
  • Mhamed Itmi
  • Computer Science & Information Technology
  • 8, 4, February, 2018

  • A PROPOSED HSV-BASED PSEUDOCOLORING SCHEME FOR ENHANCING MEDICAL IMAGES
  • Noura A. Semary
  • Computer Science & Information Technology
  • 8, 4, February, 2018

  • PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
  • Ruchika Gupta
  • Computer Science & Information Technology
  • 8, 4, February, 2018

  • PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR NETWORKS
  • Kaushal Shah
  • Computer Science & Information Technology
  • 8, 4, February, 2018

  • STRATEGY OF THE REMOVE AND EASY TBT IN GCC 6 COUNTRIES
  • Yong-Jae Kim
  • Computer Science & Information Technology
  • 8, 4, February, 2018

  • UNDERSTANDING PEOPLE TITLE PROPERTIES TO IMPROVE INFORMATION EXTRACTION PROCESS
  • Saleem Abulei
  • Computer Science & Information Technology
  • 8, 4, February, 2018

  • GRC-MS: A GENETIC RULE-BASED CLASSIFIER MODEL FOR ANALYSIS OF MASS SPECTRA DATA
  • Sara Al-Osimi
  • Computer Science & Information Technology
  • 8, 4, February, 2018

  • DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
  • Farhad Foroughi
  • Computer Science & Information Technology
  • 8, 4, February, 2018

  • A COMPARATIVE STUDY FOR ICA MULTIUNIT ALGORITHMS
  • Doru CONSTANTIN
  • Computer Science & Information Technology
  • 7, 18, December, 2017

  • A Feature-based Fragile Watermarking for Tamper Detection using Voronoi Diagram Decomposition
  • Nour El-Houda GOLEA
  • Computer Science & Information Technology
  • 10, 10, July, 2020

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals