Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • ROBUST REAL TIME FACE RECOGNITION AND TRACKING ON GPU USING FUSION OF RGB AND DEPTH IMAGE
  • Narmada Naik
  • Computer Science & Information Technology
  • Volume 5, no(6), March, 2015

  • TORQUE RIPPLES MINIMIZATION ON DTC CONTROLLED INDUCTION MOTOR WITH ADAPTIVE BANDWIDTH APPROACH
  • Fatih Korkmaz
  • Computer Science & Information Technology
  • Volume 5, Number 7, April, 2015

  • NETWORK FAULT DIAGNOSIS USING DATA MINING CLASSIFIERS
  • Eleni Rozaki
  • Computer Science & Information Technology
  • Volume 5, Number 7, April, 2015

  • AL-HARM EXPANSION MOVIE BASED ON VIRTUAL REALITY
  • Alanoud Salem
  • Computer Science & Information Technology
  • Volume 5, Number 7, April, 2015

  • EXTENDED FAST SEARCH CLUSTERING ALGORITHM: WIDELY DENSITY CLUSTERS, NO DENSITY PEAKS
  • Zhang WenKai
  • Computer Science & Information Technology
  • Volume 5, Number 7, April, 2015

  • GRAMMAR-BASED PRE-PROCESSING FOR PPM
  • William J. Teahan and Nojood O. Aljehane
  • Computer Science & Information Technology
  • Vol 9, No 1, February, 2017

  • CORRELATION BASED FUNDAMENTAL FREQUENCY EXTRACTION METHOD IN NOISY SPEECH SIGNAL
  • Mirza A. F. M. Rashidul Hasan
  • Computer Science & Information Technology
  • Vol 7, No 1, February, 2017

  • QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
  • M.Vijayalakshmi
  • Computer Science & Information Technology
  • Vol 7, No 1, February, 2017

  • WCTFR : WRAPPING CURVELET TRANSFORM BASED FACE RECOGNITION
  • Ramachandra
  • Computer Science & Information Technology
  • Volume 5, Number 8, March, 2015

  • TEXT MINING AND CLASSIFICATION OF PRODUCT REVIEWS USING STRUCTURED SUPPORT VECTOR MACHINE
  • Jincy B
  • Computer Science & Information Technology
  • Volume 5, Number 8, March, 2015

  • CRITICAL ASSESSMENT OF AUDITING CONTRIBUTIONS TO EFFECTIVE AND EFFICIENT SECURITY IN DATABASE SYSTEMS
  • Carl Dudley
  • Computer Science & Information Technology
  • Volume 5, Number 8, March, 2015

  • Fault Tolerant Leader Election in Distributed Systems
  • Marius Rafailescu
  • Computer Science & Information Technology
  • 9, 1, February, 2017

  • DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODEWORDS FOR STORAGE MEDIA
  • Kilavo Hassan , Kisangiri Michael , and Salehe . Mrutu
  • Computer Science & Information Technology
  • Vol 7, No 1, February, 2017

  • MEDICAL IMAGING MUTIFRACTAL ANALYSIS IN PREDICTION OF EFFICIENCY OF CANCER THERAPY
  • Jelena Vasiljevic
  • Computer Science & Information Technology
  • Volume 6, Number 8, June, 2016

  • ONTOLOGY BASED TELE-HEALTH SMART HOME CARE SYSTEM: ONTOSMART TO MONITOR ELDERLY
  • B. ElHassan
  • Computer Science & Information Technology
  • Volume 6, Number 8, June, 2016

  • EFFICIENT APPROACH FOR CONTENT BASED IMAGE RETRIEVAL USING MULTIPLE SVM IN YACBIR
  • Samy Ait-Aoudia
  • Computer Science & Information Technology
  • Volume 6, Number 8, June, 2016

  • TURKISH SIGN LANGUAGE RECOGNITION USING HIDDEN MARKOV MODEL
  • Kakajan Kakayev
  • Computer Science & Information Technology
  • Volume 6, Number 8, June, 2016

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119  120  121  122  123  124  125  126  127  128  129 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals