Войти
Регистрация
Научные статьи
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров - 004.9
Научные статьи
В разделе "Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров"
A Proxy based Framework for Efficient Range Query Processing in a Cellular Network
Muhamed Ilyas,
Vijayakumar
Low Level Performance Evaluation of InfiniBand with Benchmarking Tools
Eric Gamess,
Humberto Ortiz-Zuazaga
A Quality Assessment of Watermarked Color Image Based on Vision Masking
Hongmei Yang
TempR: Application of Stricture Dependent Intelligent Classifier for Fast Flux Domain Detection
Prabhjot Singh Chahal,
Surinder Singh Khurana
AuMID: An Authentication Mechanism based on Identity Tag under Future Internet Architecture
Ming Wan,
Ying Liu,
Hongke Zhang
A Hybrid P2P Approach to Service Discovery in the Cloud
Jing Zhou,
Nor Aniza Abdullah,
Zhongzhi Shi
Reliable and Power Efficient Routing Protocol for MANETs
V.Sowmya Devi,
Nagaratna P Hegde
Real-time Flame Rendering with GPU and CUDA
Wei Wei,
Yanqiong Huang
Optimization for manufacturing system based on Pheromone
Lei Wang,
Dunbing Tang
Application of Cloud Theory in Association Rules
Zhaohong Wang
Several cancer classifiers combined with PLS-DR for base on gene expression profile
JianGeng Li,
Hui Li
Research on Virtual Vehicle Driven with Vision
Youquan Liu,
Yu Cui,
Enhua Wu
NoC Research and Practice: Design and Implementation of 2×4 2D-Torus Topology
Xingang Ju,
Liang Yang
A Novel Method for Grayscale Image Segmentation by Using GIT-PCANN
Haiyan Li,
Guo Lei,
Zhang Yufeng,
Xinling Shi,
Chen Jianhua
Real-Time Air Pollutants Rendering based on Image Processing
Demin Wang,
Yan Huang,
Weitao Li
A Data Mining-Based Response Model for Target Selection in Direct Marketing
Eniafe Festus Ayetiran,
Adesesan Barnabas Adeyemo
Recognition of Marrow Cell Images Based on Fuzzy Clustering
Xitao Zheng,
Yongwei Zhang,
Yehua Yu,
Jing Zhang,
Jun Shi
Using Logic Programming to Represent Information Content Inclusion Relations
Doug Salt,
Junkang Feng
Algorithmic Aspects for Total Connected Dominating Sets in Mobile Ad Hoc Wireless Networks
C.D.Guruprakash,
B.P.Mallikarjunaswamy
Ear Biometrics in Human Identification System
V.K. Narendira Kumar,
B. Srinivasan
Classification of Electroencephalographic Changes in Meditation and Rest: using Correlation Dimension and Wavelet Coefficients
Atefeh Goshvarpour,
Ateke Goshvarpour
Evaluation of the Design Metric to Reduce the Number of Defects in Software Development
M. Rizwan Jameel Qureshi,
Waseem A. Qureshi
Advance Mining of Temporal High Utility Itemset
Swati Soni,
Sini shibu
Web Refinding Support System Based on Process Recollective Activity
Masashi Toda
Feature Selection using a Novel Particle Swarm Optimization and It’s Variants
R. Parimala,
R. Nallaswamy
Image Classification using Support Vector Machine and Artificial Neural Network
Le Hoang Thai,
Tran Son Hai,
Nguyen Thanh Thuy
Survey on an Efficient Coverage and Connectivity of Wireless Sensor Networks using Intelligent Algorithms
M.Siddappa,
Channakrishna raju
Multi Population Hybrid Genetic Algorithms for University Course Timetabling Problem
Meysam Shahvali Kohshori,
Dariush Zeynolabedini,
Mehrnaz Shirani Liri,
Leila Jadidi
Intelligent Reduction in Signaling Load of Location Management in Mobile Data Networks
Kashif Munir,
Ehtesham Zahoor,
Waseem Shahzad,
Syed Junaid Hussain
Analogue Wavelet Transform Based the Predicted Imaginary Part of the Dynamics of Rational Map Having Zeros
Jean-Bosco Mugiraneza
Dynamic High Level Cross Layer Security Mechanisms for Wireless Sensor Networks
Sanjeev Puri,
S.P Tripathi
Artificial Neural Networks for Diagnosis of Kidney Stones Disease
Koushal Kumar,
Abhishek
Development of a Web Based Environmental Health Tracking System for Nigeria
Adebayo P. Idowu,
Emmanuel R. Adagunodo,
Olapeju A. Esimai
Empirical Estimation of Hybrid Model: A Controlled Case Study
Sadaf Un Nisa,
M. Rizwan Jameel Qureshi
Using Negative Binomial Regression Analysis to Predict Software Faults: A Study of Apache Ant
Liguo Yu
Delay Tolerant Networks: An Analysis of Routing Protocols with ONE Simulator
Richa Thakur,
K.L. Bansal
Social Engineering: I-E based Model of Human Weakness for Attack and Defense Investigations
Wenjun Fan,
Kevin Lwakatare,
Rong Rong
Analysis of User Identity Privacy in LTE and Proposed Solution
Abdulrahman A. Muthana,
Mamoon M. Saeed
Limitations of Passively Mapping Logical Network Topologies
Ayodeji J. Akande,
Colin Fidge,
Ernest Foo
Pre-quarantine Approach for Defense against Propagation of Malicious Objects in Networks
ChukwuNonso H. Nwokoye,
Godwin C. Ozoegwu,
Virginia E. Ejiofor
← Предыдущая
Следующая страница →
1
|
...
|
29
|
30
|
31
|
32
|
33
|
34
|
35
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.