Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
  • Kingsley K. Ofosu
  • Computer Science & Information Technology
  • 8, 3, February, 2018

  • LOAD BALANCING MANAGEMENT USING FUZZY LOGIC TO IMPROVE THE REPORT TRANSFER SUCCESS RATE
  • Sanghyeok Lim
  • Computer Science & Information Technology
  • 8, 3, February, 2018

  • RELIABILITY OF MECHANICAL SYSTEM OF SYSTEMS
  • El Hami Abdelkhalakl
  • Computer Science & Information Technology
  • 8, 4, February, 2018

  • DISTRIBUTED SYSTEM APPROACH TO EXPERIMENT REGIONAL COMPETITIVENESS
  • Mhamed Itmi
  • Computer Science & Information Technology
  • 8, 4, February, 2018

  • AN ONTOLOGY-BASED DATA WAREHOUSE FOR THE GRAIN TRADE DOMAIN
  • Mhamed Itmi
  • Computer Science & Information Technology
  • 8, 4, February, 2018

  • A PROPOSED HSV-BASED PSEUDOCOLORING SCHEME FOR ENHANCING MEDICAL IMAGES
  • Noura A. Semary
  • Computer Science & Information Technology
  • 8, 4, February, 2018

  • PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
  • Ruchika Gupta
  • Computer Science & Information Technology
  • 8, 4, February, 2018

  • PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR NETWORKS
  • Kaushal Shah
  • Computer Science & Information Technology
  • 8, 4, February, 2018

  • STRATEGY OF THE REMOVE AND EASY TBT IN GCC 6 COUNTRIES
  • Yong-Jae Kim
  • Computer Science & Information Technology
  • 8, 4, February, 2018

  • UNDERSTANDING PEOPLE TITLE PROPERTIES TO IMPROVE INFORMATION EXTRACTION PROCESS
  • Saleem Abulei
  • Computer Science & Information Technology
  • 8, 4, February, 2018

  • GRC-MS: A GENETIC RULE-BASED CLASSIFIER MODEL FOR ANALYSIS OF MASS SPECTRA DATA
  • Sara Al-Osimi
  • Computer Science & Information Technology
  • 8, 4, February, 2018

  • DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
  • Farhad Foroughi
  • Computer Science & Information Technology
  • 8, 4, February, 2018

  • A COMPARATIVE STUDY FOR ICA MULTIUNIT ALGORITHMS
  • Doru CONSTANTIN
  • Computer Science & Information Technology
  • 7, 18, December, 2017

  • A Feature-based Fragile Watermarking for Tamper Detection using Voronoi Diagram Decomposition
  • Nour El-Houda GOLEA
  • Computer Science & Information Technology
  • 10, 10, July, 2020

  • SOFTWARE FOR THE APPLICATION OF MULTIFRACTAL ANALYSIS IN THE CLASSIFICATION OF METASTATIC BONE TUMORS
  • Aleksandar Stančić
  • Computer Science & Information Technology
  • 8, 9, June, 2018

  • A WEB-BASED SOLUTION FOR POWER QUALITY DATA MANAGEMENT
  • Claudiu Popirlan
  • Computer Science & Information Technology
  • 8, 9, June, 2018

  • A COMPARISON OF REAL-TIME TASK SCHEDULING METHODS IN SPACECRAFT SIMULATION
  • Mehmet Emin Güllüoğlu
  • Computer Science & Information Technology
  • 8, 9, June, 2018

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119  120  121  122  123  124  125  126  127  128  129 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals