Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • RESEARCH ON CRO'S DILEMMA IN SAPIENS CHAIN: A GAME THEORY METHOD
  • Jinyu Shi
  • Computer Science & Information Technology
  • 8, 15, November, 2018

  • AUDIO ENCRYPTION ALGORITHM USING HYPERCHAOTIC SYSTEMS OF DIFFERENT DIMENSIONS
  • S. N. Lagmiri
  • Computer Science & Information Technology
  • 8, 15, November, 2018

  • AN INTELLIGENT APPROACH OF THE FISH FEEDING SYSTEM
  • Mohammed M. Alammar
  • Computer Science & Information Technology
  • 8, 15, November, 2018

  • LEARNING TRAJECTORY PATTERNS BY SEQUENTIAL PATTERN MINING FROM PROBABILISTIC DATABASES
  • Josky Aïzan
  • Computer Science & Information Technology
  • 8, 15, November, 2018

  • DISASTER INITIAL RESPONSES MINING DAMAGES USING FEATURE EXTRACTION AND BAYESIAN OPTIMIZED SUPPORT VECTOR CLASSIFIERS
  • Yasuno Takato
  • Computer Science & Information Technology
  • 8, 15, November, 2018

  • A Proactive Flow Admission and Re-Routing Scheme for Load Balancing and Mitigation of Congestion Propagation in SDN Data Plane
  • Sminesh C. N., Grace Mary Kanaga E., and Ranjitha K.
  • Computer Science & Information Technology
  • 10, 6, November, 2018

  • ENHANCE NMF-BASED RECOMMENDATION SYSTEMS WITH SOCIAL INFORMATION IMPUTATION
  • Fatemah Alghamedy
  • Computer Science & Information Technology
  • 8, 15, November, 2018

  • IMPUTING ITEM AUXILIARY INFORMATION IN NMF-BASED COLLABORATIVE FILTERING
  • Fatemah Alghamedy
  • Computer Science & Information Technology
  • 8, 15, November, 2018

  • COMPARISON OF FOUR ALGORITHMS FOR ONLINE CLUSTERING
  • Xinchun Yang
  • Computer Science & Information Technology
  • 8, 15, November, 2018

  • SECURE OUTSOURCED CALCUALTIONS WITH HOMOMORPHIC ENCRYPTION
  • Qi Wang, Dehua Zhou and Yanling Li
  • Computer Science & Information Technology
  • Volume 9, Number 6, November, 2018

  • CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE VULNERABILITIES IN WIRELESS SENSOR NETWORKS
  • Bharat Bhushan
  • Computer Science & Information Technology
  • 6, 9, July, 2016

  • OBIA ON COASTAL LANDFORM BASED ON STRUCTURE TENSOR
  • Sun Shuting
  • Computer Science & Information Technology
  • 6, 9, July, 2016

  • DENGUE DETECTION AND PREDICTION SYSTEM USING DATA MINING WITH FREQUENCY ANALYSIS
  • Nandini. V
  • Computer Science & Information Technology
  • 6, 9, July, 2016

  • AUTOMATED VISUALIZATION OF INPUT/ OUTPUT FOR PROCESSES IN SOFL FORMAL SPECIFICATIONS
  • Yu Chen
  • Computer Science & Information Technology
  • 8, 9, June, 2018

  • SIMULATION AND MODELING OF ANNBASED PROGNOSIS TOOL FOR A TYPICAL AIRCRAFT FUEL SYSTEM HEALTH MANAGEMENT
  • Vijaylakshmi S. Jigajinni
  • Computer Science & Information Technology
  • 8, 10, July, 2018

  • RESEARCH ON CRO'S DILEMMA IN SAPIENS CHAIN: A GAME THEORY METHOD
  • Jinyu Shi, Zhongru Wang, Qiang Ruan, Yue Wu and Binxing Fang
  • Computer Science & Information Technology
  • 8, 15, November, 2018

  • Sapiens Chain: A Blockchain-based Cybersecurity Framework
  • Yu Han, Zhongru Wang, Qiang Ruan and Binxing Fang
  • Computer Science & Information Technology
  • 8, 15, November, 2018

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119  120  121  122  123  124  125  126  127  128  129 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals