Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND GEOTAGGING
Manisha Mandal
Computer Science & Information Technology
Vol 7, No 6, December, 2015
CONGESTION AWARE SPRAY AND WAIT PROTOCOL: A CONGESTION CONTROL MECHANISM FOR THE VEHICULAR DELAY TOLERANT NETWORK
Chuka Oham
Computer Science & Information Technology
Vol 7, No 6, December, 2015
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS
Sen-Tarng Lai
Computer Science & Information Technology
Vol 7, No 6, December, 2015
THE EFFECT OF IMPLEMENTING OF NONLINEAR FILTERS FOR ENHANCING MEDICAL IMAGES USING MATLAB
Mohamed Y. Adam
Computer Science & Information Technology
Vol 7, No 6, December, 2015
UML MODELING AND SYSTEM ARCHITECTURE FOR AGENT BASED INFORMATION RETRIEVAL
D. Muhammad Noorul Mubarak
Computer Science & Information Technology
Vol 7, No 6, December, 2015
NEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHM
A. Mouloudi
Computer Science & Information Technology
Vol 7, No 6, December, 2015
SOFTWARE PROJECT SCOPE VERIFICATION THROUGH DELIVERABLE-ORIENTED WORK BREAKDOWN STRUCTURE
Robert T. Hans
Computer Science & Information Technology
Vol 3, Num 6, October, 2013
AN ENTROPIC OPTIMIZATION TECHNIQUE IN HETEROGENEOUS GRID COMPUTING USING BIONIC ALGORITHMS
Saad M. Darwish
Computer Science & Information Technology
Vol 7, No 6, December, 2015
A PREPROCESSING MODEL FOR HAND-WRITTEN ARABIC TEXTS BASED ON VORONOI DIAGRAMS
Atallah M. Al-Shatnawi
Computer Science & Information Technology
Vol 7, No 6, December, 2016
FRAMEWORK FOR EDUCATIONAL COMPETENCE WITH EMERGING SCENARIO
Rakeshh Mohan Bhatt
Computer Science & Information Technology
Vol 8, No 1, February, 2016
EXTRACTING ARABIC RELATIONS FROM THE WEB
Shimaa M. Abd El-salam
Computer Science & Information Technology
Vol 8, No 1, February, 2016
THE STUDY OF STABLE MARRIAGE PROBLEM WITH TIES AND INCOMPLETE BOUNDED LENGTH PREFERENCE LIST UNDER SOCIAL STABILITY
Ashish Shrivastava
Computer Science & Information Technology
Vol 8, No 1, February, 2016
A STUDY OF THE RELIABILITY AND VALIDITY OF THE LEADER-MEMBER EXCHANGE (LMX) INSTRUMENT IN ARABIC
AreejAlshamasi
Computer Science & Information Technology
Vol 8, No 1, February, 2016
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS CLUSTERING
P.Pedda Sadhu Naik
Computer Science & Information Technology
Vol 8, No 1, February, 2016
CONTENT BASED VIDEO CATEGORIZATION USING RELATIONAL CLUSTERING WITH LOCAL SCALE PARAMETER
Mohamed Maher Ben Ismail
Computer Science & Information Technology
Vol 8, No 1, February, 2016
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WITH MISUSE DETECTION
Harvinder Pal Singh Sasan
Computer Science & Information Technology
Vol 8, No 1, February, 2016
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTIC
M.Noorafiza
Computer Science & Information Technology
Vol 8, No 1, February, 2016
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119