Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • ANALYSIS OF WORMHOLE ATTACK CONFIRMATION SYSTEM DURING EMAIL DUMPING ATTACK
  • Divya Sai Keerthi T
  • Computer Science & Information Technology
  • 7, 11, September, 2017

  • ATTACK ANALYSIS IN VEHICULAR AD HOC NETWORKS
  • Ömer Mintemur
  • Computer Science & Information Technology
  • 7, 11, September, 2017

  • Representation with Word Clouds at the PHD UNS Digital Library
  • Georgia Kapitsaki1 and Dragan Ivanović
  • Computer Science & Information Technology
  • 7, 11, September, 2017

  • CINNAMONS: A COMPUTATION MODEL UNDERLYING CONTROL NETWORK PROGRAMMING
  • Kostadin Kratchanov
  • Computer Science & Information Technology
  • 7, 11, September, 2017

  • Error Estimates for Multi-Penalty Regularization under General Source Condition
  • Abhishake Rastogi
  • Computer Science & Information Technology
  • 7, 10, August, 2017

  • DISTRIBUTED KERNEL K-MEANS FOR LARGE SCALE CLUSTERING
  • Marco Jacopo Ferrarotti
  • Computer Science & Information Technology
  • 7, 10, August, 2017

  • USING THE MANDELBROT SET TO GENERATE PRIMARY POPULATIONS IN THE GENETIC ALGORITHM AND REVERSE ORDER IN ORDER TO ENCRYPT THE IMAGE
  • Elaheh Aghamohammadi
  • Computer Science & Information Technology
  • 7, 10, August, 2017

  • Real-Time Mouth Defects Detection on Military Cartridge Cases
  • Semra Aydin
  • Computer Science & Information Technology
  • 7, 10, August, 2017

  • Investigation the Effect of Using Gray Level and RGB Channels on Brain Tumor Image
  • Ahmed B Salem Salamh
  • Computer Science & Information Technology
  • 7, 10, August, 2017

  • BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY
  • Maher Alharby
  • Computer Science & Information Technology
  • 7, 10, August, 2017

  • A Cohesion Based Friend Recommendation System
  • Shamsu Shehu
  • Computer Science & Information Technology
  • 7, 10, August, 2017

  • A Security Period Update Method Using Evaluation Function for Improving Energy Efficiency of Statistical En-Route Filtering Based WSNs
  • Jung-Sub Ahn1 and Tae-Ho Cho2
  • Computer Science & Information Technology
  • 7, 10, August, 2017

  • A COMPARATIVE EVALUATION OF DATA LEAKAGE/LOSS PREVENTION SYSTEMS (DLPS)
  • Ashutosh Kumar Singh
  • Computer Science & Information Technology
  • 7, 10, August, 2017

  • COMPARING THE CUCKOO ALGORITHM WITH OTHER ALGORITHMS FOR ESTIMATING TWO GLSD PARAMETERS
  • Jane Jaleel Stephan
  • Computer Science & Information Technology
  • 7, 10, August, 2017

  • Experiments on Different Recurrent Neural Networks for English-Hindi Machine Translation
  • Ruchit Agrawal
  • Computer Science & Information Technology
  • 7, 10, August, 2017

  • PD-Fuzzy Control of Single Lower Limb Exoskeleton for Hemiplegia Mobility
  • Abdullah K Alshatti
  • Computer Science & Information Technology
  • 7, 10, August, 2017

  • FMADM SYSTEM FOR MANET ENVIRONMENT
  • Dhulfiqar A Alwahab
  • Computer Science & Information Technology
  • 8, 2, April, 2018

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119  120  121  122  123  124  125  126  127  128  129 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals