Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров - 004.9

Научные статьи

В разделе "Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров"
Semi-Supervised Personal Name Disambiguation Technique for the Web
P.Selvaperumal, A.Suruliandi
Rough Set and Genetic Based Approach for Maximization of Weighted Association Rules
Shrikant Brajesh Sagar, Akhilesh Tiwari
Optimality Test for Multi-Sever Queuing Model with Homogenous Server in the Out-Patient Department (OPD) of Nigeria Teaching Hospitals
Tochukwu A. Ikwunne, Moses O. Onyesolu
GCSTLPP: Face Recognition using Gabor Center-Symmetric Tensor Locality Preservative Projection Approach in Video
Rajeshwari.J, K. Karibasappa, Gopalkrishna M.T
Test Case Prioritization based on Fault Dependency
Samia Jafrin, Dip Nandi, Sharfuddin Mahmood
An Enhanced Digital Image Watermarking Scheme for Medical Images using Neural Network, DWT and RSA
Sujata Nagpal, Shashi Bhushan, Manish Mahajan
An Ensemble of Adaptive Neuro-Fuzzy Kohonen Networks for Online Data Stream Fuzzy Clustering
Zhengbing Hu, Yevgeniy V. Bodyanskiy, Oleksii K. Tyshchenko, Olena O. Boiko
A Novel Approach for Data Cleaning by Selecting the Optimal Data to Fill the Missing Values for Maintaining Reliable Data Warehouse
Raju Dara, Ch. Satyanarayana, A. Govardhan
Empirical Analysis of HPC Using Different Programming Models
Muhammad Usman Ashraf, Fadi Fouz, Fathy Alboraei Eassa
Digital Forensics through Application Behavior Analysis
Shuaibur Rahman, M. N. A. Khan
Detecting Anomalies in Students' Results Using Decision Trees
Hamza O. Salami, Ruqayyah S. Ibrahim, Mohammed O. Yahaya
An Analysis of Performance Testing in Distributed Software Applications
Muhammad Fraz Malik, M. N. A. Khan
Machine Learning Cross Layer Technique to Detect Sink Hole Attacks in MANET
G.Usha, K.Mahalakshmi
Integrating Apple iPads into University Computing Courses
Jeffrey A. Stone
Virtual Examination Supervision System for Nigerian Universities
Akazue Maureen I., Ajenaghughrure Ighoyota Ben.
Random Pattern based sequential bit (RaP-SeB) Steganography with Cryptography for Video Embedding
Ravpreet Kaur, Manish Mahajan
A Comparative Study of Software Inspection Techniques for Quality Perspective
Asad Masood Qazi, Sidra Shahzadi, Mamoona Humayun
A Recursive Binary Tree Method for Age Classification of Child Faces
Olufade F.W. Onifade, Joseph D. Akinyemi, Olashile S. Adebimpe
A Supervised Approach for Automatic Web Documents Topic Extraction Using Well-Known Web Design Features
Kazem Taghandiki, Ahmad Zaeri, Amirreza Shirani
Model for Targeting Customers Based on Analytics in Telecom Domain
Inderpreet Singh, Sukhpal Singh
Review Length Aware Hybrid Approach to Sentiment Analysis
Babaljeet Kaur, Naveen Kumari
AMMAS: Ambient Mobile Multi-Agents System: Simulation of the M-Learning
Shili Mohamed, Moez Chebbi, Santosh Kumar Behera
A New Method for Graph Queries Processing without Index Reconstruction on Dynamic Graph Databases
Hamed Dinari
Towards Semantics-Aware Recommender System: A LOD-Based Approach
Asmaa Fridi, Sidi Mohamed Benslimane
Enhancing Efficient Study Plan for Student with Machine Learning Techniques
Nipaporn Chanamarn, Kreangsak Tamee
Design and Implementation of an Intelligent Mobile Game
Ekin Ekinci, Fidan Kaya Gülağız, Sevinç İlhan Omurca
The Obstacles in Big Data Process
Rasim M. Alguliyev, Rena T. Gasimova, Rahim N. Abbaslı
Investigating Factors that Influence Rice Yields of Bangladesh using Data Warehousing, Machine Learning, and Visualization
Fahad Ahmed, Dip Nandi, Mashiour Rahman, Khandaker Tabin Hasan
Strategies of Nonsolidary Behavior in Teaching Organization
Mindia E. Salukvadze, Guram N. Beltadze
Risk Reduction Activities Identification in Software Component Integration for Component Based Software Development (CBSD)
Fariha Fatima, Saqib Ali, Muhammad Usman Ashraf
Design and Development of IoT Device to Measure Quality of Water
Chandrappa S, Dharmanna L, Shyama Srivatsa Bhatta U V, Sudeeksha Chiploonkar M, Suraksha M N, Thrupthi S
Optimizing Memory using Knapsack Algorithm
Dominic Asamoah, Evans Baidoo, Stephen Opoku Oppong
Fault Repairing Strategy Selector for Service-Oriented Architecture
Guru Prasad Bhandari, Ratneshwer
A Survey on Journey of Topic Modeling Techniques from SVD to Deep Learning
Deepak Sharma, Bijendra Kumar, Satish Chand
Analysis of Students' Performance by Using Different Data Mining Classifiers
Hilal Almarabeh
Building a Natural Disaster Management System based on Blogging Platforms
M.V.Sangameswar, M.Nagabhushana Rao, M.Shiva Kumar
A Framework for Adaptation of Virtual Data Enumeration for Enhancing Census – Tanzania Case Study
Ramadhani A. Duma
A Modified Particle Swarm Optimization Algorithm based on Self-Adaptive Acceleration Constants
Sudip Mandal
A Channel Theory based 2-Step Approach to Semantic Alignment in a Complex Environment
Andreas Bildstein, Junkang Feng
Sentiment Analysis of Twitter User Data on Punjab Legislative Assembly Election, 2017
Akhilesh Kumar Singh, Deepak Kumar Gupta, Raj Mohan Singh