Войти
Регистрация
Научные статьи
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров - 004.9
Научные статьи
В разделе "Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров"
CVSHR: Enchantment Cloud-based Video Streaming using the Heterogeneous Resource Allocation
Mohamed A. Elsharkawey,
Hosam E. Refaat
Study of Multi-Level Cryptography Algorithm: Multi-Prime RSA and DES
Surinder Kaur,
Pooja Bharadwaj,
Shivani Mankotia
Video Steganography: Secure Data Hiding Technique
Gat Pooja Rajkumar,
V. S. Malemath
A New Technique for Segmentation of Handwritten Numerical Strings of Bangla Language
Md. Aktaruzzaman,
Md. Farukuzzaman Khan,
Ahsan-Ul-Ambia
Study of Techniques used for Medical Image Segmentation and Computation of Statistical Test for Region Classification of Brain MRI
Anamika Ahirwar
Random Connection Based Scale-free Networks
Shun-Li Lou,
Xu-Hua Yang
gSemSim: Semantic Similarity Measure for Intra Gene Ontology Terms
Muhammad Naeem,
Saira Gillani,
Muhammad Abdul Qadir,
Sohail Asghar
Secure and Optimized Authentication Scheme in Proxy Mobile IPv6 (SOAS-PMIPv6) to reduce Handover Latency
Arun Kumar Tripathi,
J. S. Lather,
R. Radhakrishnan
Some Algebraic Properties of Multigranulations and an Analysis of Multigranular Approximations of Classifications
B.K.Tripathy,
R.Raghavan
Systematic Review and Classification on Video Surveillance Systems
Fereshteh Falah Chamasemani,
Lilly Suriani Affendey
Frame Relay versus Asynchronous Transfer Mode: A Comparative Study and Simulation
Ibrahim Ali Ibrahim Diyeb,
Sharaf A. Alhomdy
Fault Persistency and Fault Prediction in Optimization of Software Release
Maurizio Pighin,
Anna Marzona
Priority Based Uplink Scheduling Scheme for WiMAX Service Classes
Kire Jakimoski,
Toni Janevski
Data Mining in Intrusion Detection: A Comparative Study of Methods, Types and Data Sets
Chandrashekhar Azad,
Vijay Kumar Jha
Evaluating Design Patterns of Commercial Web Applications using Net Easy Score
Tharis Thimthong,
Thippaya Chintakovid,
Soradech Krootjohn
Improvement of Component Integration Testing Technique
Khulood Salem Albeladi,
M. Rizwan Jameel Qureshi
A Face Recognition Approach Based on Entropy Estimate of the Nonlinear DCT Features in the Logarithm Domain Together with Kernel Entropy Component Analysis
Arindam Kar,
Debotosh Bhattacharjee,
Dipak Kumar Basu,
Mita Nasipuri,
Mahantapas Kundu
Mechanism and Algorithm for Indirect Schema Mapping Composition
Bo Wang,
Bo Guo
Shape Classification Based on Normalized Distance and Angle Histograms Using PNN
Atefeh Goshvarpour,
Hossein Ebrahimnezhad,
Ateke Goshvarpour
An Approach of Degree Constraint MST Algorithm
Sanjay Kumar Pal,
Samar Sen Sarma
An Improvement over AODV Routing Protocol by Limiting Visited Hop Count
Reza Fotohi,
Shahram Jamali,
Fateme Sarkohaki,
Shahram Behzad
Performance Analysis of Software Effort Estimation Models Using Neural Networks
E.Praynlin,
P.Latha
A Compression & Encryption Algorithm on DNA Sequences Using Dynamic Look up Table and Modified Huffman Techniques
Syed Mahamud Hossein,
S.Roy
A Modified Parallel Heuristic Graph Matching Approach for Solving Task Assignment Problem in Distributed Processor System
R Mohan,
N P Gopalan
On Approximate Equivalences of Multigranular Rough Sets and Approximate Reasoning
B. K. Tripathy,
Anirban Mitra
A New Hybrid Grey Neural Network Based on Grey Verhulst Model and BP Neural Network for Time Series Forecasting
Deqiang Zhou
WEBspike: A New Proposition of Deterministic Finite Automata and Parallel Algorithm Based Web Application for EEG Spike Recognition
Anup Kumar Keshri,
Shamba Chatterjee,
Barda Nand Das,
Rakesh Kumar Sinha
Efficient Algorithm for Destabilization of Terrorist Networks
Nisha Chaurasia,
Akhilesh Tiwari
Goal Str Vinay Kumar, Reema Thareja uctured Requirement Engineering and Traceability Model for Data Warehouses
Vinay Kumar,
Reema Thareja
Social Network Clustering
Narges Azizifard
GPU-Based Volume Rendering for 3D Electromagnetic Environment on Virtual Globe
Chao Yang,
Lingda Wu
A Quantitative Directional Relations Model Considering Topology and Distance
Xuehua TANG
A Machine Learning based Efficient Software Reusability Prediction Model for Java Based Object Oriented Software
Surbhi Maggo,
Chetna Gupta
Traffic Accident Analysis Using Decision Trees and Neural Networks
Olutayo V.A,
Eludire A.A
The Image Recognition of Mobile Robot Based on CIE Lab Space
Xuan Zou,
Bin Ge
An Integrated Agent-Based Architecture and Performance Optimization of VANET using Agent Packet Size Reduction Process
T.Karthikeyan,
N.Sudha Bhuvaneswari
Gender Classification Method Based on Gait Energy Motion Derived from Silhouette Through Wavelet Analysis of Human Gait Moving Pictures
Kohei Arai,
Rosa Andrie Asmara
Syntactic and Sentence Feature Based Hybrid Approach for Text Summarization
D.Y. Sakhare,
Raj Kumar
Approaches to Sensitivity Analysis in MOLP
Sebastian Sitarz
Efficient Analysis of Pattern and Association Rule Mining Approaches
Thabet Slimani,
Amor Lazzez
← Предыдущая
Следующая страница →
1
|
...
|
31
|
32
|
33
|
34
|
35
|
36
|
37
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.