Classify Participants in Online Communities |
Xuequn Wang1 and Yanjun Yu2 |
Information Technology Management |
4, 1, February, 2012 |
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC |
Eman Mohamed Nabil Alkholy |
Computer Science & Information Technology |
8, 8, May, 2018 |
CONCURRENT TERNARY GALOIS-BASED COMPUTATION USING NANO-APEX MULTIPLEXING NIBS OF REGULAR THREE-DIMENSIONAL NETWORKS, PART III: LAYOUT CONGESTIONFREE EFFECTUATION |
Anas N. Al-Rabadi |
Multimedia, Computer Graphics & Animation |
11, 6, December, 2020 |
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS |
Akella Amarendra Babu |
Computer Science & Information Technology |
8, 8, May, 2018 |
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS |
Alla Defallah Alrehily |
Computer Science & Information Technology |
8, 8, May, 2018 |
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC |
Amira GHERBOUDJ |
Computer Science & Information Technology |
8, 8, May, 2018 |
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC |
Amira GHERBOUDJ |
Computer Science & Information Technology |
8, 8, May, 2018 |
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN |
Enoch Agyepong |
Computer Science & Information Technology |
8, 8, May, 2018 |
OFF-LINE ARABIC HANDWRITTEN WORDS SEGMENTATION USING MORPHOLOGICAL OPERATORS |
Nisreen Ali |
Computer Science & Information Technology |
Vol.11,, N, Handwritte, December, 2020 |
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING CONTENT USING BLOCKCHAIN |
Ahmed Gomaa |
Computer Science & Information Technology |
8, 8, May, 2018 |
The Covid-19 Pandemic Impact on Children’s Education in Disadvantaged and Rural Area Across Indonesia |
Mega Indrawati, Cahyo Prihadi and Ayu Siantoro |
Education |
8, 4, December, 2020 |
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM |
Suryakanthi Tangirala |
Computer Science & Information Technology |
8, 6, April, 2018 |
UNLIMITED LENGTH RANDOM PASSWORDS FOR EXPONENTIALLY INCREASED SECURITY |
Cheman Shaik |
Computer Science & Information Technology |
11, 1, February, 2020 |
Adaptive Vocabulary Construction for Frustration Intensity Modelling in Customer Support Dialog Texts |
Janis Zuters and Viktorija Leonova |
Computer Science & Information Technology |
12, 6, December, 2020 |
A New Approach for Ranking Shadowed Fuzzy Numbers and its Application |
Mohamed A. H. El-Hawy |
Computer Science & Information Technology |
12, 6, December, 2020 |
Simulation of Package Delivery Optimization using a Combination of Carriers and Drop-Ship |
Valentyn M. Yanchuk, Andrii G. Tkachuk, Dmytro S. Antoniuk, Tetiana A. Vakaliuk and Anna A. Humeniuk |
Computer Science & Information Technology |
12, 6, December, 2020 |
Determining Business Intelligence Usage Success |
Javier N. Montero and Mary L. Lind |
Information Technology Management |
12, 6, December, 2020 |
Framework Architecture for Improving Healthcare Information Systems using Agent Technology |
Hasan Omar Al-Sakran |
Information Technology Management |
7, 1, February, 2015 |
FPGA IMPLEMENTATION OF HUANG HILBERT TRANSFORM FOR CLASSIFICATION OF EPILEPTIC SEIZURES USING ARTIFICIAL NEURAL NETWORK |
G.Deepika |
Digital Signal & Image Processing |
10, 3, June, 2019 |
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-TYPE EQUATIONS |
MOHAMMED O. AL-AMR |
Computer Science & Information Technology |
8, 6, April, 2018 |