Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров - 004.9
Научные статьи
В разделе "Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров"
Smart Agent Learning based Hotel Search System- Android Environment
Development of Neuro-fuzzy System for Early Prediction of Heart Attack
Image Denoising using Tri Nonlinear and Nearest Neighbor Interpolation with Wavelet Transform
Optical Many Casting Using QoS Depend Layer Aware Mechanism
Location Based Recommendation for Mobile Users Using Language Model and Skyline Query
Determining Contribution of Features in Clustering Multidimensional Data Using Neural Network
A Text Analysis Based Seamless Framework for Predicting Human Personality Traits from Social Networking Sites
Digital Image Enhancement with Fuzzy Interface System
Minimizing Power Consumption by Personal Computers: A Technical Survey
Detection of Plagiarism in Arabic Documents
Artificial Bee Colony and Its Application for Image Fusion
Prediction of Missing Values for Decision Attribute
Validated CMS: Towards New Generation of Web Content Management Systems on Web 2.0
Efficient Networks Communication Routing Using Swarm Intelligence
Real Time Handwritten Marathi Numerals Recognition Using Neural Network
Analysis of Tandem Repeat Patterns in Nlrc4 using a Motif Model
Analysis and Ranking of Software Reliability Models Based on Weighted Criteria Value
On Transforming Business Patterns to Labeled Petri Nets Using Graph Grammars
Knowledge Discovery in Endangered Species Diversification
A Medical Image Watermarking Technique for Embedding EPR and Its Quality Assessment Using No-Reference Metrics
Distributed Defense: An Edge over Centralized Defense against DDos Attacks
Fingerprints, Iris and DNA Features based Multimodal Systems: A Review
Enhancing Quality of Service in Heterogeneous Wireless Network using EDLAS
Anomaly Detection System in Secure Cloud Computing Environment
A Mobile-Based Computer Controller via Android Technology
Implementing Delaunay Triangles and Bezier Curves to Identify Suitable Business Locations in the Presence of Obstacles
Analysis of Requirement Engineering Processes, Tools/Techniques and Methodologies
A Survey on Graph Queries Processing: Techniques and Methods
A Novel and Efficient Method for Protecting Internet Usage from Unauthorized Access Using Map Reduce
Internet of Things: A Review on Technologies, Architecture, Challenges, Applications, Future Trends
Comparison of on Demand Routing Protocols
Toward Constructing Cancellable Templates using K-Nearest Neighbour Method
Application of Cosmos's law of Merge and Split for Data Encryption
PEECA: PSO-Based Energy Efficient Clustering Algorithm for Wireless Sensor Networks
Implementation of GSM Based Security System with IOT Applications
Reciprocity based Energy Efficient Cooperative Routing Protocol for WSNs
Heuristic Algorithms for Task Scheduling in Cloud Computing: A Survey
Distributed Malware Detection Algorithm (DMDA)
CVSHR: Enchantment Cloud-based Video Streaming using the Heterogeneous Resource Allocation
Study of Multi-Level Cryptography Algorithm: Multi-Prime RSA and DES
← Предыдущая
Следующая страница →
1
|
...
|
30
|
31
|
32
|
33
|
34
|
35
|
36
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.