Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров - 004.9

Научные статьи

В разделе "Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров"
Novel Cloud Architecture to Decrease Problems Related to Big Data
Entesar Althagafy, M. Rizwan Jameel Qureshi
Integrating Non-Functional Properties in Model Driven Development: A Stepwise Refinement View
Maryam Nooraei Abade, Zeinab Rajabi
Smart Agent Learning based Hotel Search System- Android Environment
Wayne Lawrence, Suresh Sankaranarayanan
Development of Neuro-fuzzy System for Early Prediction of Heart Attack
Obanijesu Opeyemi, Emuoyibofarhe O. Justice
Image Denoising using Tri Nonlinear and Nearest Neighbor Interpolation with Wavelet Transform
Sachin D Ruikar, Dharmpal D Doye
Optical Many Casting Using QoS Depend Layer Aware Mechanism
R.C. Arun Chander, P.Karunakaran, S.Venkatraman, I.Hameem Shanavas
Location Based Recommendation for Mobile Users Using Language Model and Skyline Query
Qiang Pu, Ahmed Lbath, Daqing He
Determining Contribution of Features in Clustering Multidimensional Data Using Neural Network
Suneetha Chittineni, Raveendra Babu Bhogapathi
A Text Analysis Based Seamless Framework for Predicting Human Personality Traits from Social Networking Sites
Ramya Sharada K, Arti Arya, Ragini S, Harish Kumar, Abinaya G
Digital Image Enhancement with Fuzzy Interface System
Amanpreet Singh, Preet Inder Singh, Prabhpreet Kaur
Minimizing Power Consumption by Personal Computers: A Technical Survey
P. K. Gupta, G. Singh
Detection of Plagiarism in Arabic Documents
Mohamed El Bachir Menai
Artificial Bee Colony and Its Application for Image Fusion
Prabhat Kumar Sharma, Bhavya V S, Navyashree K M, Sunil K S, Pavithra P
Prediction of Missing Values for Decision Attribute
T. Medhat
Validated CMS: Towards New Generation of Web Content Management Systems on Web 2.0
Zakaria Itahriouan, Anouar Abtoy, Kamal Eddine El Kadiri, Noura Aknin
Efficient Networks Communication Routing Using Swarm Intelligence
Koushal Kumar
Real Time Handwritten Marathi Numerals Recognition Using Neural Network
Sandeep B. Patil, G.R. Sinha
Analysis of Tandem Repeat Patterns in Nlrc4 using a Motif Model
Sim-Hui Tee
Analysis and Ranking of Software Reliability Models Based on Weighted Criteria Value
Mohd. Anjum, Md. Asraful Haque, Nesar Ahmad
On Transforming Business Patterns to Labeled Petri Nets Using Graph Grammars
Karima Mahdi, Raida Elmansouri, Allaoua Chaoui
Knowledge Discovery in Endangered Species Diversification
Muhammad Naeem, Sohail Asghar
A Medical Image Watermarking Technique for Embedding EPR and Its Quality Assessment Using No-Reference Metrics
Rupinder Kaur
Distributed Defense: An Edge over Centralized Defense against DDos Attacks
Karanbir Singh, Kanwalvir Singh Dhindsa, Bharat Bhushan
Fingerprints, Iris and DNA Features based Multimodal Systems: A Review
Prakash Chandra Srivastava, Anupam Agrawal, Kamta Nath Mishra, P. K. Ojha, R. Garg
Enhancing Quality of Service in Heterogeneous Wireless Network using EDLAS
Divya, Suman
Anomaly Detection System in Secure Cloud Computing Environment
Zhengbing Hu, Sergiy Gnatyuk, Oksana Koval, Viktor Gnatyuk, Serhii Bondarovets
A Mobile-Based Computer Controller via Android Technology
Siew-Chin Chong, Lee-Ying Chong, Stephanie Bosede Ajiroba
Implementing Delaunay Triangles and Bezier Curves to Identify Suitable Business Locations in the Presence of Obstacles
Tejas Pattabhi, Arti Arya, Pradyumna N, Swati Singh, Sukanya D
Analysis of Requirement Engineering Processes, Tools/Techniques and Methodologies
Tousif ur Rehman, Muhammad Naeem Ahmed Khan, Naveed Riaz
A Survey on Graph Queries Processing: Techniques and Methods
Hamed Dinari
A Novel and Efficient Method for Protecting Internet Usage from Unauthorized Access Using Map Reduce
P. Srinivasa Rao, K. Thammi Reddy, MHM. Krishna Prasad
Internet of Things: A Review on Technologies, Architecture, Challenges, Applications, Future Trends
Jaideep Kaur, Kamaljit Kaur
Comparison of on Demand Routing Protocols
Bharat Bhushan, Shailender Gupta, C.K.Nagpal
Toward Constructing Cancellable Templates using K-Nearest Neighbour Method
Qinghai Gao
Application of Cosmos's law of Merge and Split for Data Encryption
Sanjay Kr. Pal, Nupur Chakraborty
PEECA: PSO-Based Energy Efficient Clustering Algorithm for Wireless Sensor Networks
Santar Pal Singh, Subhash Chander Sharma
Implementation of GSM Based Security System with IOT Applications
Seelam Vasavi Sai Viswanada Prabhu Deva Kumar, Shyam Akashe
Reciprocity based Energy Efficient Cooperative Routing Protocol for WSNs
Prasanna Shete, R. N. Awale
Heuristic Algorithms for Task Scheduling in Cloud Computing: A Survey
Nasim Soltani, Behzad Soleimani, Behrang Barekatain
Distributed Malware Detection Algorithm (DMDA)
Aiman A. Abu Samra, Hasan N. Qunoo, Alaa M. Al Salehi