Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров - 004.9

Научные статьи

В разделе "Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров"
A Study of Black Hole Attack on MANET Performance
C. K. Nagpal, Chirag Kumar, Bharat Bhushan, Shailender Gupta
Performance Comparison of Routing protocols Using Different Mobility Models
Shailender Gupta, Chirag Kumar, Seema Rani, Bharat Bhushan
A Naïve Based approach of Model Pruned trees on Learner’s Response
S.Anupama Kumar, Vijayalakshmi M.N.
Research on the Quick Construction of the Edge-balance Index Sets of a Nested Graph with Infinite Paths and Power Circles
Hongjuan Tian, Yuge Zheng
Performance Evaluation on the Effect of Combining DCT and LBP on Face Recognition System
Dasari Haritha, Kraleti Srinivasa Rao, Chittipotula Satyanarayana
Gender Identification in Human Gait Using Neural Network
Richa Shukla, Reenu Shukla, Anupam Shukla, Sanjeev Sharma, Nirupama Tiwari
Designing a Universal Data-Oriented Random Number Generator
Rasoul Farjami Nezhad, Mehdi Effatparvar, Mohammad Rahimzadeh
An Evaluation of the Critical Factors Affecting the Efficiency of Some Sorting Techniques
Olabiyisi S.O., Adetunji A.B., Oyeyinka F.I.
An Assessment of Extreme Programming Based Requirement Engineering Process
Muhammad Khalid, Sami ul Haq, Muhammad Naeem Ahmed Khan
A Review of Fully Automated Techniques for Brain Tumor Detection From MR Images
Anjum Hayat Gondal, Muhammad Naeem Ahmed Khan
EMCAR: Expert Multi Class Based on Association Rule
Wa'el Hadi
Solution and Level Identification of Sudoku Using Harmony Search
Satyendra Nath Mandal, Saumi Sadhu
Bitwise Operations Related to a Combinatorial Problem on Binary Matrices
Krasimir Yankov Yordzhev
Bio-inspired Ant Algorithms: A review
Sangita Roy, Sheli Sinha Chaudhuri
An Efficient and Effective New Generation Objective Quality Model for Mobile Applications
Sobia Zahra, Asra Khalid, Ali Javed
Activity Recognition with Multi-tape Fuzzy Finite Automata
H. Karamath Ali, D. I. George Amalarethinam
Networked Control System – A Survey
M. Brindha, J K Mendiratta
Improving Teaching Methodology in System Analysis and Design using Problem Based Learning for ABET
Sara Fatima, Salha Abdullah
Contours Matching with A Text-based Method
Saliha Aouat, Slimane Larabi
On the Edge-balanced Index Set of a class of Power-cycle Nested Network Graph
Qingwen Zhang, Yuge Zheng
Age Dependent Face Recognition using Eigenface
Hlaing Htake Khaung Tin
Development of A New Efficient Routing Scheme for WiMAX Mesh Networks
Sk. Md. Abdullah Al Subail, Sk. Md. Masudul Ahsan, Mostafa Enayetullah
A New Method for Content based Image Retrieval using Primitive Features
S.Maruthuperumal, G. Rosline Nesa Kumari
Empirical Analysis of Bagged SVM Classifier for Data Mining Applications
M.Govindarajan
A Biometric Based: 3-D Ear Recognition System Combining Local and Holistic Features
Akkas Ali, Mohammad. Mahfuzul Islam
Cuckoo Search Algorithm using Lèvy Flight: A Review
Sangita Roy, Sheli Sinha Chaudhuri
Spam Mail Detection through Data Mining – A Comparative Performance Analysis
Megha Rathi, Vikas Pareek
Improvised Scout Bee Movements in Artificial Bee Colony
Tarun Kumar Sharma, Millie Pant
Mobile Communication Evolution
Kuboye Bamidele Moses
Evaluating the Effect of JPEG and JPEG2000 on Selected Face Recognition Algorithms
Adebayo Kolawole John, Onifade Olufade Williams, Adekoya Adewale M.
Software Testing Resource Allocation and Release Time Problem: A Review
Md. Nasar, Prashant Johri, Udayan Chanda
A Novel Hybrid Flower Pollination Algorithm with Chaotic Harmony Search for Solving Sudoku Puzzles
Osama Abdel-Raouf, Ibrahim El-henawy, Mohamed Abdel-Baset
A Review of Interventions to Recruit and Retain ICT Students
Leo A. Siiman, Margus Pedaste, Eno Tõnisson, Raivo Sell, Tomi Jaakkola, Dimitris Alimisis
A Metaheuristic Algorithm for Job Scheduling in Grid Computing
Hedieh Sajedi, Maryam Rabiee
An Investigation into Mobile Application Development Processes: Challenges and Best Practices
Harleen K. Flora, Xiaofeng Wang, Swati V.Chande
An Automatic Approach to Detect Software Anomalies in Cloud Computing Using Pragmatic Bayes Approach
Nethaji V, Chandrasekar C
Human Computation: Object Recognition for Mobile Games Based on Single Player
Mohamed Sakr, Hany Mahgoub, Arabi Keshk
Identification of the Control Chart Patterns Using the Optimized Adaptive Neuro-Fuzzy Inference System
Abdolhakim Nikpey, Somayeh Mirzaei, Masoud Pourmandi, Jalil Addeh
A Face Recognition System by Embedded Hidden Markov Model and Discriminating Set Approach
Vitthal Suryakant Phad, Prakash S. Nalwade, Prashant M. Suryavanshi
Malware Propagation on Social Time Varying Networks: A Comparative Study of Machine Learning Frameworks
A.A. Ojugo, E. Ben-Iwhiwhu, O. Kekeje, M.O. Yerokun, I.J.B. Iyawa