Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
ANALYSIS OF WORMHOLE ATTACK CONFIRMATION SYSTEM DURING EMAIL DUMPING ATTACK
Divya Sai Keerthi T
Computer Science & Information Technology
7, 11, September, 2017
ATTACK ANALYSIS IN VEHICULAR AD HOC NETWORKS
Ömer Mintemur
Computer Science & Information Technology
7, 11, September, 2017
Representation with Word Clouds at the PHD UNS Digital Library
Georgia Kapitsaki1 and Dragan Ivanović
Computer Science & Information Technology
7, 11, September, 2017
CINNAMONS: A COMPUTATION MODEL UNDERLYING CONTROL NETWORK PROGRAMMING
Kostadin Kratchanov
Computer Science & Information Technology
7, 11, September, 2017
Error Estimates for Multi-Penalty Regularization under General Source Condition
Abhishake Rastogi
Computer Science & Information Technology
7, 10, August, 2017
DISTRIBUTED KERNEL K-MEANS FOR LARGE SCALE CLUSTERING
Marco Jacopo Ferrarotti
Computer Science & Information Technology
7, 10, August, 2017
USING THE MANDELBROT SET TO GENERATE PRIMARY POPULATIONS IN THE GENETIC ALGORITHM AND REVERSE ORDER IN ORDER TO ENCRYPT THE IMAGE
Elaheh Aghamohammadi
Computer Science & Information Technology
7, 10, August, 2017
Real-Time Mouth Defects Detection on Military Cartridge Cases
Semra Aydin
Computer Science & Information Technology
7, 10, August, 2017
Investigation the Effect of Using Gray Level and RGB Channels on Brain Tumor Image
Ahmed B Salem Salamh
Computer Science & Information Technology
7, 10, August, 2017
BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY
Maher Alharby
Computer Science & Information Technology
7, 10, August, 2017
A Cohesion Based Friend Recommendation System
Shamsu Shehu
Computer Science & Information Technology
7, 10, August, 2017
A Security Period Update Method Using Evaluation Function for Improving Energy Efficiency of Statistical En-Route Filtering Based WSNs
Jung-Sub Ahn1 and Tae-Ho Cho2
Computer Science & Information Technology
7, 10, August, 2017
A COMPARATIVE EVALUATION OF DATA LEAKAGE/LOSS PREVENTION SYSTEMS (DLPS)
Ashutosh Kumar Singh
Computer Science & Information Technology
7, 10, August, 2017
COMPARING THE CUCKOO ALGORITHM WITH OTHER ALGORITHMS FOR ESTIMATING TWO GLSD PARAMETERS
Jane Jaleel Stephan
Computer Science & Information Technology
7, 10, August, 2017
Experiments on Different Recurrent Neural Networks for English-Hindi Machine Translation
Ruchit Agrawal
Computer Science & Information Technology
7, 10, August, 2017
PD-Fuzzy Control of Single Lower Limb Exoskeleton for Hemiplegia Mobility
Abdullah K Alshatti
Computer Science & Information Technology
7, 10, August, 2017
FMADM SYSTEM FOR MANET ENVIRONMENT
Dhulfiqar A Alwahab
Computer Science & Information Technology
8, 2, April, 2018
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129