Войти
Регистрация
Научные статьи
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров - 004.9
Научные статьи
В разделе "Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров"
Suggestive Approaches to Create a Recommender System for GitHub
Surbhi Sharma,
Anuj Mahajan⃰
Comparative Weka Analysis of Clustering Algorithm's
Harjot Kaur,
Prince Verma
An Experimental Analysis on Performance and Energy Saving in Mobile Cloud Computing
Sindhu K,
H.S.Guruprasad
A New Dynamic Data Cleaning Technique for Improving Incomplete Dataset Consistency
Sreedhar Kumar S,
Meenakshi Sundaram S
Variant-Order Statistics based Model for Real-Time Plant Species Recognition
Heba F. Eid,
Ashraf Darwish
Fuzzy Based Multi-Fever Symptom Classifier Diagnosis Model
Ighoyota Ben Ajenaghughrure,
P. Sujatha,
Maureen I. Akazue
ITAAM Framework: An Adaptive Approach to Design, Measure and Improve IT Agility
Yassine Rdiouat,
Wafaa Dachry,
Alami Semma
Ear Biometric System using GLCM Algorithm
Sajal Kumar Goel,
Mrudula Meduri
Model Driven Approach for Test Data Optimization Using Activity Diagram Based On Cuckoo Search Algorithm
Rajesh Ku. Sahoo,
Durga Prasad Mohapatra,
Manas Ranjan Patra
A Statistical Approach for Iris Recognition Using K-NN Classifier
Dolly Choudhary,
Ajay Kumar Singh,
Shamik Tiwari
An Improved Watermarking Scheme for Tiny Tamper Detection of Color Images
Nader H. H. Aldeeb,
Ibrahim S. I. Abuhaiba
The Pre-Processing Techniques for Breast Cancer Detection in Mammography Images
R. Ramani,
N.Suthanthira Vanitha,
S. Valarmathy
A Comparative Analysis of Image Scaling Algorithms
Chetan Suresh,
Sanjay Singh,
Ravi Saini,
Anil K Saini
Performance of Personal Identification System Technique Using Iris Biometrics Technology
V.K. Narendira Kumar,
B. Srinivasan
A Novel Approach to Simulate DDoS Attack
Qing LI,
LeJun CHI,
ZhaoXin ZHANG
A Speech Enhancement Method Based on Kalman Filtering
Chaogang Wu,
Bo Li,
Jin Zheng
A Simple Algorithm to Strengthen the Brightness of Color Images
Hua ZHANG
Privacy Preserving Similarity Measurement
ZHANG Guo-rong
A New R*Q-tree Spatial Index based on the Delaying Selection and Clustering Splitting
Quanyou Song,
Wan-gao Li
Relative Distance Based Routing for Delay Tolerant Mobile Sensor Network
Jieyan Liu,
Jiazhi Zeng
Positioning Algorithm for Wireless Sensor Network Based on Adaptive Genetic Algorithm
Ting Gong,
Xiuying Cao
Identifying Sentiment in Web Multi-topic Documents
Na Fan
Research on Audience Rating Statistics of Two-way Digital TV Based on OpenSSL
Chen Junhua,
Yang Fan
A double auction scheme based on secret sharing and safe comparing protocol
Bin Zhang,
Qiuliang Xu,
Han Jiang
The Comparison of Machine Learning Algorithms on Online Classification of Network Flows
Keji Wei,
Shaolong Cao,
Jian Yu
Design and Implementation of Management Information System of Field and Track Training
Feng Bing
Crash Recovery for Embedded Main Memory Database
Yi-bing Li,
Shuang Wang,
Fang Ye
Study on System Architecture Design of University Students Quality Evaluation
He Yongqiang,
Wang Jiaxin
An Epistemic Model Checking Approach to Web Service Compositions
Xiangyu Luo,
Kun Wang,
Fengchai Wang
Innovative Large Scale Wireless Sensor Network Architecture Using Satellites and High-Altitude Platforms
Yasser Albagory,
Fahad Al Raddady,
Sultan Aljahdali,
Omar Said
Feature Based Image Mosaic Using Steerable Filters and Harris Corner Detector
Mahesh,
Subramanyam M .V
Multiple Objects Tracking Using CAMShift Algorithm and Implementation of Trip Wire
Aditi Jog,
Shirish Halbe
Visual Object Target Tracking Using Particle Filter: A Survey
G.Mallikarjuna Rao,
Ch.Satyanarayana
Enhanced Techniques for Filtering of Wall Messages over Online Social Networks (OSN) User Profiles
Nikhil Sanyog Choudhary,
Himanshu Yadav,
Anurag Jain
An Extended Research on the Blood Donor Community as a Mobile Application
A Bhowmik,
N A Nabila,
M A Imran,
M A U Rahman,
D Karmaker
A Secure and Efficient Client-Side Encryption Scheme in Cloud Computing
Tania Gaur,
Divya sharma
Big Data Compression in Mobile and Pervasive Computing
PankajDeep Kaur,
Sandeep Kaur,
Amneet Kaur
A Survey on Secure Routing Protocols in Wireless Sensor Networks
Yasir Arfat,
Riaz Ahmed Shaikh
A Study and Analysis of Congestion Control Wireless Sensor Networks
Maninder Pal Singh,
Kiranbir Kaur
Providing Useful Data Reliably to Mobile Cloud Users from Random Wireless Sensor Network
Shanthosh Palani
← Предыдущая
Следующая страница →
1
|
...
|
37
|
38
|
39
|
40
|
41
|
42
|
43
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.