Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров - 004.9

Научные статьи

В разделе "Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров"
A Robust Skin Colour Segmentation Using Bivariate Pearson Type IIαα (Bivariate Beta) Mixture Model
B.N.Jagadesh, K.Srinivasa Rao, Ch.Satyanarayana
Integration of Clustering, Optimization and Partial Differential Equation Method for Improved Image Segmentation
Jaskirat Kaur, Sunil Agrawal, Renu Vig
Multi-Feature Segmentation and Cluster based Approach for Product Feature Categorization
Bharat Singh, Saroj Kushwah, Sanjoy Das
Extension of K-Modes Algorithm for Generating Clusters Automatically
Anupama Chadha, Suresh Kumar
A Novel Software Tool to Generate Customer Needs for Effective Design of Online Shopping Websites
Ashish K. Sharma, Sunanda Khandait
Virtual Machine Monitor Indigenous Memory Reclamation Technique
Muhammad Shams Ul Haq, Lejian Liao, Ma Lerong
The Use of ANFIS and RBF to Model and Predict the Inhibitory Concentration Values Determined by MTT Assay on Cancer Cell Lines
A. Rezaei, L. Noori, M. Taghipour
Biometric Verification, Security Concerns and Related Issues - A Comprehensive Study
Sheela Shankar, V.R Udupi, Rahul Dasharath Gavas
Covering Based Pessimistic Multigranular Rough Equalities and their Properties
B.K.Tripathy, S.C.Parida
A Parallel Ring Method for Solving a Large-scale Traveling Salesman Problem
Roman Bazylevych, Bohdan Kuz, Roman Kutelmakh, Rémy Dupas, Bhanu Prasad, Yll Haxhimusa, Lubov Bazylevych
A Hybrid Approach for Detecting Suspicious Accounts in Money Laundering Using Data Mining Techniques
Ch.Suresh, K.Thammi Reddy, N. Sweta
A Review of Coupling Simulator for Vehicular Ad-hoc Networks
Ramesh C. Poonia, Deepshikha Bhargava
Myanmar-English Bidirectional Machine Translation System with Numerical Particles Identification
Yin Yin Win, Aye Thida
Deployment of Coordinated Multiple Sensors to Detect Stealth Man-in-the-Middle Attack in WLAN
Ravinder Saini, Surinder S. Khurana
A Multi-Objective Optimization of Cloud Based SLA-Violation Prediction and Adaptation
Vivek Gaur, P. Dhyani, O.P. Rishi
Parkinson's Brain Disease Prediction Using Big Data Analytics
N. Shamli, B. Sathiyabhama
Evaluation of Meta-Heuristic Algorithms for Stable Feature Selection
Maysam Toghraee, Hamid parvin, Farhad rad
Occluded Human Tracking and Identification Using Image Annotation
Devinder Kumar, Amarjot Singh
Fast Width Detection in Corridor Using Hough Transform
Mehrdad Javadi, Mehdi Ebrahimi
A New Approach for Texture Classification Based on Average Fuzzy Left Right Texture Unit Approach
Y Venkateswarlu, B Sujatha, J V R Murthy
Wavelet Based Image Fusion for Detection of Brain Tumor
CYN Dwith, Vivek Angoth, Amarjot Singh
A Fully Adaptive and Hybrid Method for Image Segmentation Using Multilevel Thresholding
Salima Ouadfel, Souham Meshoul
Performance Analysis of Texture Image Classification Using Wavelet Feature
Dolly Choudhary, Ajay Kumar Singh, Shamik Tiwari, V P Shukla
An Algorithm to Count Nodes in Wireless Networks Using their Actual Position
Manuel Contreras, Eric Gamess
On the Use of Rough Set Theory for Mining Periodic Frequent Patterns
Manjeet Samoliya, Akhilesh Tiwari
Pre-Recommendation Clustering and Review Based Approach for Collaborative Filtering Based Movie Recommendation
Saudagar L. Jadhav, Manisha P. Mali
Enhancing Big Data Value Using Knowledge Discovery Techniques
Mai Abdrabo, Mohammed Elmogy, Ghada Eltaweel, Sherif Barakat
IP Camera Based Video Surveillance Using Object's Boundary Specification
Natalia Chaudhry, Kh. M. Umar Suleman
Kernel Contraction and Consolidation of Alignment under Ontology Change
Ahmed ZAHAF, Mimoun MALKI
Analyzing Cost Parameters Affecting Map Reduce Application Performance
N.K. Seera, S. Taruna
Multi Objective Test Suite Reduction for GUI Based Software Using NSGA-II
Neha Chaudhary, O.P. Sangwan
Developing an Efficient Model for Building Data Warehouse Using Mobile Agent
Tarig Mohammed Ahmed, Mohammed Hassan Fadhul
Combining Naïve Bayes and Modified Maximum Entropy Classifiers for Text Classification
Hanika Kashyap, Bala Buksh
Heterogeneous Energy Efficient Protocol for Enhancing the Lifetime in WSNs
Samayveer Singh, Aruna Malik
Intelligent Mobile Application for Route Finding and Transport Cost Analysis
Omisore M. O., Ofoegbu E. O., Fayemiwo M. A., Olokun F. R., Babalola A. E
Face Recognition Based on Principal Component Analysis
Ali Javed
Brain Tumor Classification Using Back Propagation Neural Network
N. Sumitra, Rakesh Kumar Saxena
Graph Based Data Governance Model for Real Time Data Ingestion
Hiren Dutta
Facial Image Super Resolution Using Weighted Patch Pairs
Payman Moallem, Sayed Mohammad Mostafavi Isfahani, Javad Haddadnia
Mining Frequent Itemsets with Weights over Data Stream Using Inverted Matrix
Long Nguyen Hung, Thuy Nguyen Thi Thu