Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
ANALYSIS OF LITHOGRAPHY BASED APPROACHES IN DEVELOPMENT OF SEMICONDUCTORS
Jatin Chopra
Computer Science & Information Technology
Vol 6, No 6, December, 2014
A DESIGN OF A FAST PARALLEL-PIPELINED IMPLEMENTATION OF AES: ADVANCED ENCRYPTION STANDARD
Ghada F.Elkabbany
Computer Science & Information Technology
Vol 6, No 6, December, 2014
A DESIGN OF A FAST PARALLEL-PIPELINED IMPLEMENTATION OF AES: ADVANCED ENCRYPTION STANDARD
Ghada F.Elkabbany
Computer Science & Information Technology
Vol 6, No 6, December, 2014
ITCM: A REAL TIME INTERNET TRAFFIC CLASSIFIER MONITOR
Silas Santiago Lopes Pereira
Computer Science & Information Technology
Vol 6, No 6, December, 2014
PERFORMANCE AND POWER COMPARISONS BETWEEN NVIDIA AND ATI GPUS
Ying Zhang
Computer Science & Information Technology
Vol 6, No 6, December, 2014
TESTABILITY MEASUREMENT MODEL FOR OBJECT ORIENTED DESIGN (TMMOOD)
Abdullah
Computer Science & Information Technology
Vol 7, No 1, February, 2015
A NOVEL METHODOLOGY FOR CONSTRUCTING RULE-BASED NAÏVE BAYESIAN CLASSIFIERS
Abdallah Alashqur
Computer Science & Information Technology
Vol 7, No 1, February, 2015
AUTHORING SYSTEM OF DRILL & PRACTICE ELEARNING MODULES FOR HEARING IMPAIRED STUDENTS
Dr. Karim Q Hussein
Computer Science & Information Technology
Vol 7, No 1, February, 2015
EFFICIENT DATA PROTECTION FOR ENTERPRISE DATA CENTERS
Khaled Aldossari
Computer Science & Information Technology
Vol 7, No 1, February, 2015
ANALYSIS OF KEY CONSIDERATIONS OF THE PUBLIC WHEN CHOOSING RECREATIONAL ACTIVITIES
Han-Chen Huang
Computer Science & Information Technology
Vol 7, No 1, February, 2015
AN ITERATIVE MORPHOLOGICAL DECOMPOSITION ALGORITHM FOR REDUCTION OF SKELETON POINTS
Dr. A. Sri Krishna
Computer Science & Information Technology
Vol 7, No 1, February, 2015
A RULE BASED APPROACH TOWARDS DETECTING HUMAN TEMPERAMENT
ShomoyeAbiodun R
Computer Science & Information Technology
Vol 7, No 1, February, 2015
THE ANALYSIS OF THE TIME TABLE STRUCTURE WITHIN A STUDENT INFORMATION SYSTEM (SIS)
Dr. Issa S. I. Ottoum
Computer Science & Information Technology
Vol 7, No 1, February, 2015
NEW APPROACH IN SYMMETRIC BLOCK CIPHER SECURITY USING A NEW CUBICAL TECHNIQUE
Ali M Alshahrani
Computer Science & Information Technology
Vol 7, No 1, February, 2015
IMPROVING INITIAL GENERATIONS IN PSO ALGORITHM FOR TRANSPORTATION NETWORK DESIGN PROBLEM
Navid Afkar
Computer Science & Information Technology
Vol 7, No 1, February, 2015
Predictive Modelling of Crime data set using Data Mining Techniques
Prajakta Yerpude and Vaishnavi Gudur
Computer Science & Information Technology
7, 4, July, 2017
PERFORMANCE COMPARISON OF HYBRID WAVELET TRANSFORMS FORMED USING DCT, WALSH, HAAR AND DKT IN WATERMARKING
Dr. H. B. Kekre
Computer Science & Information Technology
Vol 7, No 1, February, 2015
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119