Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
EFFICIENT SIMILARITY JOIN METHOD USING UNSUPERVISED LEARNING
Bilal Hawashin
Computer Science & Information Technology
Vol 4, No 5, October, 2015
DANGER OF HEXAVALENT CHROMIUM AND STRATEGY FOR THE REMEDITATION
Aniruddha Roy
Computer Science & Information Technology
2, 3, September, 2013
STUDIED ON A MULTICLADDED ERBIUM DOPED DISPERSION COMPENSATING FIBER AMPLIFIER
Mithun De
Computer Science & Information Technology
2, 3, September, 2013
KINETIC STUDY OF CHROMIUM (III) – PVP COMPLEX BY USING RADIO-TRACER TECHNIQUE
Ayan Das
Computer Science & Information Technology
2, 3, September, 2013
IMPROVING COMPUTER-MEDIATED SYNCHRONOUS COMMUNICATION OF DOCTORS IN RURAL COMMUNITIES THROUGH CLOUD COMPUTING: A CASE STUDY OF RURAL HOSPITALS IN SOUTH AFRICA
Alfred Coleman
Computer Science & Information Technology
Vol 4, No 5, October, 2012
BIOMETRIC AUTHENTICATION THROUGH A VIRTUAL KEYBOARD FOR SMARTPHONES
Matthias Trojahn
Computer Science & Information Technology
Vol 4, No 5, October, 2012
IMPROVED SPATIAL GRAY LEVEL DEPENDENCE MATRICES FOR TEXTURE ANALYSIS
Olfa Ben Sassi
Computer Science & Information Technology
Vol 4, No 6, December, 2012
SHAPING OF LOCATION CONSCIOUS INFORMATION
Palson Kennedy .R
Computer Science & Information Technology
Vol 4, No 6, December, 2012
DENOISING OF MEDICAL ULTRASOUND IMAGES USING SPATIAL FILTERING AND MULTISCALE TRANSFORMS
V N Prudhvi Raj
Computer Science & Information Technology
Vol 4, No 6, December, 2012
TOMOGRAPHY OF HUMAN BODY USING EXACT SIMULTANEOUS ITERATIVE RECONSTRUCTION ALGORITHM
Sayantika Saha
Computer Science & Information Technology
2, 3, August, 2013
HARMONICS AND INTERHARMONICS ESTIMATION OF A PASSIVE MAGNETIC FAULT CURRENT LIMITER USING MORLET WAVELET TRANSFORM
Raju Patwary
Computer Science & Information Technology
2, 3, August, 2013
R-HASH: HASH FUNCTION USING RANDOM QUADRATIC POLYNOMIALS OVER GF(2)
Dhananjoy Dey
Computer Science & Information Technology
Vol 4, No 6, December, 2012
ADAPTIVE BACKSTEPPING CONTROLLER AND SYNCHRONIZER DESIGN FOR ARNEODO CHAOTIC SYSTEM WITH UNKNOWN PARAMETERS
Sundarapandian Vaidyanathan
Computer Science & Information Technology
Vol 4, No 6, December, 2012
AN EXPERIMENTAL SURVEY TOWARDS ENGAGING TRUSTABLE HYPERVISOR LOG EVIDENCE WITHIN A CLOUD FORENSIC ENVIRONMENT
Sean Thorpe
Computer Science & Information Technology
Vol 4, No 6, December, 2012
COMPUTING INSTALLATION PARAMETERS OF CCTV CAMERAS FOR TRAFFIC SURVEILLANCE
Pratishtha Gupta
Computer Science & Information Technology
Vol 4, No 6, December, 2012
EAR RECOGNITION AND OCCLUSION
B. S. El-Desouky
Computer Science & Information Technology
Vol 4, No 6, December, 2012
HARMONICS AND INTERHARMONICS ESTIMATION OF A PASSIVE MAGNETIC FAULT CURRENT LIMITER USING MORLET WAVELET TRANSFORM
Raju Patwary
Computer Science & Information Technology
2, 3, June, 2013
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119