Войти
Регистрация
Научные статьи
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Программные средства - 004.4
Научные статьи
В разделе "Программные средства"
A framework for ensuring consistency of Web Services Transactions based on WS-BPEL
Pan Shan-liang,
Li Ya-Li,
Li Wen-juan
Design and Implementation of GPU-Based Prim's Algorithm
Wei Wang,
Yongzhong Huang,
Shaozhong Guo
An Analysis of the Effect of Communication for Multi-agent Planning in a Grid World Domain
Satyendra Singh Chouhan,
Rajdeep Niyogi
Skin Diseases Expert System using Dempster-Shafer Theory
Andino Maseleno,
Md. Mahmud Hasan
Real Time Multiple Hand Gesture Recognition System for Human Computer Interaction
Siddharth S. Rautaray,
Anupam Agrawal
Fuzzy SLIQ Decision Tree Based on Classification Sensitivity
Hongze Qiu,
Haitang Zhang
Object Oriented Software Effort Estimate with Adaptive Neuro Fuzzy use Case Size Point (ANFUSP)
Mohammad Saber Iraji,
Homayun Motameni
A Comparison of BA, GA, PSO, BP and LM for Training Feed forward Neural Networks in e-Learning Context
Koffka Khan,
Ashok Sahai
An Intelligent Approach of Regulating Electric-Fan Adapting to Temperature and Relative Humidity
Ali Newaz Bahar,
Mrinal Kanti Baowaly,
Abhijit Chakraborty
Design and Implementation of Face Recognition System in Matlab Using the Features of Lips
Sasikumar Gurumurthy,
B.K.Tripathy
Implementation of Fast and Efficient Mac Unit on FPGA
Sachin Raghav,
Rinkesh Mittal
A Hybrid Approach based on Classification and Clustering for Intrusion Detection System
Jasmeen K. Chahal,
Amanjot Kaur
Two Approaches Based on Genetic Algorithm to Generate Short Iris Codes
Hamed Ghodrati,
Mohammad Javad Dehghani,
Habibolah Danyali
COCOMO Estimates Using Neural Networks
Anupama Kaushik,
Ashish Chauhan,
Deepak Mittal,
Sachin Gupta
Data Clustering Using Wave Atom
Bilal A.Shehada,
Mahmoud Z.Alkurdi,
Wesam M. Ashour
Employing Fuzzy-Histogram Equalization to Combat Illumination Invariance in Face Recognition Systems
Adebayo Kolawole John,
Onifade Onifade Williams
Adaptation of Induced Fuzzy Cognitive Maps to the Problems Faced by the Power Loom Workers
S. Narayanamoorthy,
S. Kalaiselvan
Anti-Spam Software for Detecting Information Attacks
Saadat Nazirova
Hybrid Flow Shop Scheduling Problem Using Artificial Immune System
Mustapha GUEZOURI,
Abdelkrim HOUACINE
Petri Net: A Tool for Modeling and Analyze Multi-agent Oriented Systems
Shiladitya Pujari,
Sripati Mukhopadhyay
Diversity Based on Entropy: A Novel Evaluation Criterion in Multi-objective Optimization Algorithm
Wang LinLin,
Chen Yunfang
Prediction of Missing Associations Using Rough Computing and Bayesian Classification
D. P. Acharjya,
Debasrita Roy,
Md. A. Rahaman
Prediction of Drought Resistance Gene with Clustered Amino Acid Features
Xia Jingbo,
Shi Feng,
Hu Xuehai,
Li Zhi,
Song Chaohong,
Xiong Huijuan
Multiple Features Based Approach to Extract Bio-molecular Event Triggers Using Conditional Random Field
Amit Majumder
Modeling of Multi-Agent Oriented learning System for Impaired Students with JADE
Shiladitya Pujari,
Sripati Mukhopadhyay
Energy-Sustainable Framework and Performance Analysis of Power Scheme for Operating Systems: A Tool
P. K. Gupta,
G. Singh
A link and Content Hybrid Approach for Arabic Web Spam Detection
Heider A. Wahsheh,
Mohammed N. Al-Kabi,
Izzat M. Alsmadi
Intelligent Routing Techniques for Mobile Ad hoc Networks using Swarm Intelligence
CH. V. Raghavendran,
G. Naga Satish,
P. Suresh Varma
Enhanced Face Recognition using Data Fusion
Alaa Eleyan
Perceived Gender Classification from Face Images
Hlaing Htake Khaung Tin
A Frame of Intrusion Detection Learning System Utilizing Radial Basis Function
S.Selvakani Kandeeban,
R.S.Rajesh
Using Virtual Security Lab in Teaching Cryptography
Salma M. Gaffer,
Daniyal M. Alghazzawi
Finding Vulnerabilities in Rich Internet Applications (Flex/AS3) Using Static Techniques
Sreenivasa Rao Basavala,
Narendra Kumar,
Alok Agarrwal
Development of Electronic Passport Scheme for Cryptographic Security and Face, Fingerprint Biometrics using ASP.Net
V.K. Narendira Kumar,
B. Srinivasan
Using Description Logics to specify a Document Synthesis System
Souleymane KOUSSOUBE,
Roger NOUSSI,
Balira O. KONFE
A Type-2 Fuzzy Logic Based Framework for Function Points
Anupama Kaushik,
A.K. Soni,
Rachna Soni
A Near Real-time IP Traffic Classification Using Machine Learning
Kuldeep Singh,
S. Agrawal,
B.S. Sohi
Robust Algorithm for Face Detection in Color Images
Hlaing Htake Khaung Tin
Issues of Technical Support for e-Learning Systems in Higher Education Institutions
Allah Nawaz,
Muhammad Zubair Khan
Undergraduate Program in Network Engineering and Security – A Feasibility Study
Fahed Awad,
Omar Banimelhem,
Eyad Taqieddin,
Raed Bani-Hani
← Предыдущая
Следующая страница →
1
|
...
|
18
|
19
|
20
|
21
|
22
|
23
|
24
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.