Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • EFFICIENT SIMILARITY JOIN METHOD USING UNSUPERVISED LEARNING
  • Bilal Hawashin
  • Computer Science & Information Technology
  • Vol 4, No 5, October, 2015

  • DANGER OF HEXAVALENT CHROMIUM AND STRATEGY FOR THE REMEDITATION
  • Aniruddha Roy
  • Computer Science & Information Technology
  • 2, 3, September, 2013

  • STUDIED ON A MULTICLADDED ERBIUM DOPED DISPERSION COMPENSATING FIBER AMPLIFIER
  • Mithun De
  • Computer Science & Information Technology
  • 2, 3, September, 2013

  • KINETIC STUDY OF CHROMIUM (III) – PVP COMPLEX BY USING RADIO-TRACER TECHNIQUE
  • Ayan Das
  • Computer Science & Information Technology
  • 2, 3, September, 2013

  • IMPROVING COMPUTER-MEDIATED SYNCHRONOUS COMMUNICATION OF DOCTORS IN RURAL COMMUNITIES THROUGH CLOUD COMPUTING: A CASE STUDY OF RURAL HOSPITALS IN SOUTH AFRICA
  • Alfred Coleman
  • Computer Science & Information Technology
  • Vol 4, No 5, October, 2012

  • BIOMETRIC AUTHENTICATION THROUGH A VIRTUAL KEYBOARD FOR SMARTPHONES
  • Matthias Trojahn
  • Computer Science & Information Technology
  • Vol 4, No 5, October, 2012

  • IMPROVED SPATIAL GRAY LEVEL DEPENDENCE MATRICES FOR TEXTURE ANALYSIS
  • Olfa Ben Sassi
  • Computer Science & Information Technology
  • Vol 4, No 6, December, 2012

  • SHAPING OF LOCATION CONSCIOUS INFORMATION
  • Palson Kennedy .R
  • Computer Science & Information Technology
  • Vol 4, No 6, December, 2012

  • DENOISING OF MEDICAL ULTRASOUND IMAGES USING SPATIAL FILTERING AND MULTISCALE TRANSFORMS
  • V N Prudhvi Raj
  • Computer Science & Information Technology
  • Vol 4, No 6, December, 2012

  • TOMOGRAPHY OF HUMAN BODY USING EXACT SIMULTANEOUS ITERATIVE RECONSTRUCTION ALGORITHM
  • Sayantika Saha
  • Computer Science & Information Technology
  • 2, 3, August, 2013

  • HARMONICS AND INTERHARMONICS ESTIMATION OF A PASSIVE MAGNETIC FAULT CURRENT LIMITER USING MORLET WAVELET TRANSFORM
  • Raju Patwary
  • Computer Science & Information Technology
  • 2, 3, August, 2013

  • R-HASH: HASH FUNCTION USING RANDOM QUADRATIC POLYNOMIALS OVER GF(2)
  • Dhananjoy Dey
  • Computer Science & Information Technology
  • Vol 4, No 6, December, 2012

  • ADAPTIVE BACKSTEPPING CONTROLLER AND SYNCHRONIZER DESIGN FOR ARNEODO CHAOTIC SYSTEM WITH UNKNOWN PARAMETERS
  • Sundarapandian Vaidyanathan
  • Computer Science & Information Technology
  • Vol 4, No 6, December, 2012

  • AN EXPERIMENTAL SURVEY TOWARDS ENGAGING TRUSTABLE HYPERVISOR LOG EVIDENCE WITHIN A CLOUD FORENSIC ENVIRONMENT
  • Sean Thorpe
  • Computer Science & Information Technology
  • Vol 4, No 6, December, 2012

  • COMPUTING INSTALLATION PARAMETERS OF CCTV CAMERAS FOR TRAFFIC SURVEILLANCE
  • Pratishtha Gupta
  • Computer Science & Information Technology
  • Vol 4, No 6, December, 2012

  • EAR RECOGNITION AND OCCLUSION
  • B. S. El-Desouky
  • Computer Science & Information Technology
  • Vol 4, No 6, December, 2012

  • HARMONICS AND INTERHARMONICS ESTIMATION OF A PASSIVE MAGNETIC FAULT CURRENT LIMITER USING MORLET WAVELET TRANSFORM
  • Raju Patwary
  • Computer Science & Information Technology
  • 2, 3, June, 2013

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals