Системы письма и письменности. Знаки и символы. Семиотика в целом. Коды. Графическое представление мысли - 003

Научные статьи

В разделе "Системы письма и письменности. Знаки и символы. Семиотика в целом. Коды. Графическое представление мысли"
Ensembles of Classification Methods for Data Mining Applications
M.Govindarajan
New Operations on Intuitionistic Fuzzy Soft Sets based on Second Zadeh's logical Operators
Said Broumi, Pinaki Majumdar, Florentin Smarandache
An Introduction of Two and Three Dimensional Imprecise Numbers
Sahalad Borgoyary
Survey of Region-Based Text Extraction Techniques for Efficient Indexing of Image/Video Retrieval
Samabia Tehsin, Asif Masood, Sumaira Kausar
Design and Implementation of an Android SMS Virtual Keyboard for the Berber Language
Jaafar EL Bakkali, EL Mehdi Stouti, Tarek EL Bardouni
Copy Move Forgery Detection in Contrast Variant Environment using Binary DCT Vectors
Sunil Kumar, J. V. Desai, Shaktidev Mukherjee
A Case Study of Web Based Application by Analyzing Performance of a Testing Tool
Hafsah Mahmood, Mehreen Sirshar
A Review on Digital Image Watermarking Techniques
Anuja Dixit, Rahul Dixit
Face Super Resolution: A Survey
Sithara Kanakaraj, V.K. Govindan, Saidalavi Kalady
Revisited Quantum Protocols
Shyam Sihare, V V Nath
Cryptographic Security using Various Encryption and Decryption Method
Ritu Goyal, Mehak Khurana
Calculation of Failure Probability of Series and Parallel Systems for Imprecise Probability
Bin Suo, Yong-sheng Cheng, Chao Zeng, Jun Li
An Empirical Study on Consumers’ Continuance Intention Model of Online Group-buying
Gang Li, Xin Shi
DataViz Model: A Novel Approach towards Big Data Analytics and Visualization
Rohit More, R H Goudar
Performance Evaluation on the Effect of Combining DCT and LBP on Face Recognition System
Dasari Haritha, Kraleti Srinivasa Rao, Chittipotula Satyanarayana
Software Testing Resource Allocation and Release Time Problem: A Review
Md. Nasar, Prashant Johri, Udayan Chanda
Defect Management in Agile Software Development
Rida Noor, Muhammad Fahad Khan
Information Interpretation Code For Providing Secure Data Integrity On Multi-Server Cloud Infrastructure
Sathiya Moorthy Srinivsan, Chandrasekar Chaillah
Semantic Question Generation Using Artificial Immunity
Ibrahim E. Fattoh, Amal E. Aboutabl, Mohamed H. Haggag
Towards Improving Recommender System: A Social Trust-Aware Approach
Naziha Abderrahim, Sidi Mohamed Benslimane
Security Improvement of Object Oriented Design using Refactoring Rules
Suhel Ahmad Khan, Raees Ahmad Khan
Improving the Efficiency of Term Weighting in Set of Dynamic Documents
Mehdi Jabalameli, Ala Arman, Mohammadali Nematbakhsh
A GA-Tabu Based User Centric Approach for Discovering Optimal Qos Composition
Vivek Gaur, Praveen Dhyani, O. P. Rishi
Perspective of Database Services for Managing Large-Scale Data on the Cloud: A Comparative Study
Narinder K. Seera, Vishal Jain
An Insight to Soft Computing based Defect Prediction Techniques in Software
Kritika Verma, Pradeep Kumar Singh
Two Way Question Classification in Higher Education Domain
Vaishali Singh, Sanjay K. Dwivedi
Semi-Supervised Personal Name Disambiguation Technique for the Web
P.Selvaperumal, A.Suruliandi
Review Length Aware Hybrid Approach to Sentiment Analysis
Babaljeet Kaur, Naveen Kumari
SXP: Simplified Extreme Programing Process Model
Faiza Anwer, Shabib Aftab
A Classification Framework for Context-aware Mobile Learning Systems
Richard A.W. Tortorella, Kinshuk, Nian-Shing Chen, Sabine Graf
A Framework for Adaptation of Virtual Data Enumeration for Enhancing Census – Tanzania Case Study
Ramadhani A. Duma
An Identity-based Blind Signature Approach for E-voting System
Mahender Kumar, C.P. Katti, P. C. Saxena
Validation of an adaptive risk-based access control model for the internet of things
Hany F. Atlam, Ahmed Alenezi, Raid Khalid Hussein, Gary B. Wills
Fuzzy rule based inference system for implementation of naval military mission
Rashmi Singh, Vipin Saxena
Video e-commerce: large scale online video advertising based on user preference
Gunavathie. M.A., Kamalot Baavi.P., Saranya.J., Pratheepa.P., Roshini Suryadharshini.R.
Design and development of image security technique by using cryptography and steganography: a combine approach
Aumreesh Kumar Saxena, Sitesh Sinha, Piyush Shukla
American sign language recognition system: an optimal approach
Shivashankara S., Srinath S.
Discrete complex fuzzy transform based face image recognition method
Turker Tuncer, Sengul Dogan, Erhan Akbal
The proposed L-ScrumBan methodology to improve the efficiency of agile software development
Aysha Abdullah Albarqi, Rizwan Qureshi
ICT training recommendation using web usage mining
Susi Maulidiah, Imas S. Sitanggang, Heru Sukoco