• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Science (General) Journas Latest Articles

Computer Science (General) Research Articles

Project Reliability Model Considering Time – Cost – Resource Relationship under Uncertainty
Fulltext Access 8 Pages 2015
Domain Model Validation of Context-aware Mobile Patient Monitoring Systems
Fulltext Access 8 Pages 2015
A Distinctive Genetic Approach for Test-Suite Optimization
Fulltext Access 8 Pages 2015
A Review of Evaluation Methods and Techniques for Simulation Packages
Fulltext Access 8 Pages 2015
Developing a Novel Holistic Taxonomy of Security Requirements
Fulltext Access 8 Pages 2015
Using First-Order Logic to Query Heterogeneous Internet Data Sources
Fulltext Access 8 Pages 2015
Modeling Firewalls for Behavior Analysis
Fulltext Access 8 Pages 2015
Fuzzified Expert System for Employability Assessment
Fulltext Access 8 Pages 2015
Ranking of Fuzzy Similar Faces Using Relevance Matrix and Aggregation Operators
Fulltext Access 8 Pages 2015
High Speed Database Sequence Comparison
Fulltext Access 8 Pages 2015
The Impact of Search Algorithms in Automated Program Repair
Fulltext Access 8 Pages 2015
ANN Based Robotic Arm Visual Servoing Nonlinear System
Fulltext Access 8 Pages 2015
Visualizing Time-based Weighted Coupling Using Particle Swarm Optimization to Aid Program Comprehension
Fulltext Access 8 Pages 2015
Multi-View Human Action Recognition Using Wavelet Data Reduction and Multi-Class Classification
Fulltext Access 8 Pages 2015
Twitter Sentiment to Analyze Net Brand Reputation of Mobile Phone Providers
Fulltext Access 8 Pages 2015
A GIS – Based Approach for Catchment Area Analysis of Convenience Store
Fulltext Access 8 Pages 2015
Distribution Route Optimization of Gallon Water Using Genetic Algorithm and Tabu Search
Fulltext Access 8 Pages 2015
The Direction of Lightweight Ciphers in Mobile Big Data Computing
Fulltext Access 8 Pages 2015
‘Fishing’ for Content in Social Media: A Qualitative Approach
Fulltext Access 8 Pages 2015
A Systematic Review on the Profiling of Digital News Portal for Big Data Veracity
Fulltext Access 8 Pages 2015
Visualisation Application Development for Mosque Financial Report Using Linked Data and Crowd-sourcing
Fulltext Access 8 Pages 2015
Multiclass Classification with Cross Entropy-Support Vector Machines
Fulltext Access 8 Pages 2015
A Viral System to Solve Generalized Orienteering Problem
Fulltext Access 8 Pages 2015
Data Mining in Healthcare – A Review
Fulltext Access 8 Pages 2015
Investigating Users’ Perception of Stakeholder Approach During IT Adoption in Organizations
Fulltext Access 8 Pages 2015
Automated Leukaemia Detection Using Microscopic Images
Fulltext Access 8 Pages 2015
Virtual Reconstruction of Cultural and Historical Monuments of the Middle Volga
Fulltext Access 8 Pages 2015
Integration of Virtual Labs into Science E-learning
Fulltext Access 8 Pages 2015
Using Social Networks: Facebook Usage at the Riau College Students
Fulltext Access 8 Pages 2015
Degree Centrality for Social Network with Opsahl Method
Fulltext Access 8 Pages 2015
The Early Detection of Diabetes Mellitus (DM) Using Fuzzy Hierarchical Model
Fulltext Access 8 Pages 2015
The Notation Scanner Systems Using Resilient Backpropagation Method
Fulltext Access 8 Pages 2015
Fusion of Fuzzy Enhanced Overexposed and Underexposed Images
Fulltext Access 8 Pages 2015
Image Denoising Using Spatial Gradient Based Bilateral Filter and Minimum Mean Square Error Filtering
Fulltext Access 8 Pages 2015
An Impact of Linear Regression Models for Improving the Software Quality with Estimated Cost
Fulltext Access 8 Pages 2015
Neuro-Fuzzy Based Hybrid Model for Web Usage Mining
Fulltext Access 8 Pages 2015
Real Time Strategy Games: A Reinforcement Learning Approach
Fulltext Access 8 Pages 2015
Automatic Identification of Licorice and Rhubarb by Microscopic Image Processing
Fulltext Access 8 Pages 2015
Prediction of Hydrocarbon Using Gaussian Process for Seabed Logging Application
Fulltext Access 8 Pages 2015
Future of Face Recognition: A Review
Fulltext Access 8 Pages 2015
Multi-view Ensemble Learning Using Optimal Feature Set Partitioning: An Extended Experiments and Analysis in Low Dimensional Scenario
Fulltext Access 8 Pages 2015
An Adaptive Approach for Validation in Visual Object Tracking
Fulltext Access 8 Pages 2015
Vision System with Audio Feedback to Assist Visually Impaired to Grasp Objects
Fulltext Access 8 Pages 2015
Robust Spectral Features for Automatic Speaker Recognition in Mismatch Condition
Fulltext Access 8 Pages 2015
A Hybrid Data Clustering Using Firefly Algorithm Based Improved Genetic Algorithm
Fulltext Access 8 Pages 2015
Multi-Camera Activation Scheme for Target Tracking with Dynamic Active Camera Group and Virtual Grid-Based Target Recovery
Fulltext Access 8 Pages 2015
Object Detection and Tracking Based on Trajectory in Broadcast Tennis Video
Fulltext Access 8 Pages 2015
Human Activity Recognition using Binary Motion Image and Deep Learning
Fulltext Access 8 Pages 2015
Modified Self-Learning with Clustering for the Classification of Remote Sensing Images
Fulltext Access 8 Pages 2015
Modeling Pauses for Synthesis of Storytelling Style Speech Using Unsupervised Word Features
Fulltext Access 8 Pages 2015
A Method to Find Optimum Number of Clusters Based on Fuzzy Silhouette on Dynamic Data Set
Fulltext Access 8 Pages 2015
Word Problem Solver System Using Artificial Intelligence
Fulltext Access 8 Pages 2015
A Novel Approach to Deep Packet Inspection for Intrusion Detection
Fulltext Access 8 Pages 2015
Shoulder-surfing Resistant Graphical Password System
Fulltext Access 8 Pages 2015
Animal Classification System: A Block Based Approach
Fulltext Access 8 Pages 2015
Integrated Static and Dynamic Analysis for Malware Detection
Fulltext Access 8 Pages 2015
Aiding Effective Encrypted Document Manipulation Incorporated with Document Categorization Technique in Cloud
Fulltext Access 8 Pages 2015
Clustering Models for Data Stream Mining
Fulltext Access 8 Pages 2015
Biometric Security System for Watchlist Surveillance
Fulltext Access 8 Pages 2015
A Novel Family Genetic Approach for Virtual Machine Allocation
Fulltext Access 8 Pages 2015
Understanding the Usage of Online Forums as Learning Platforms
Fulltext Access 8 Pages 2015
A New Reversible Data Hiding Scheme with Improved Capacity Based on Directional Interpolation and Difference Expansion
Fulltext Access 8 Pages 2015
Metaheuristic Algorithms and Polynomial Turing Reductions: A Case Study Based on Ant Colony Optimization
Fulltext Access 8 Pages 2015
Study on Grid Resource Monitoring and Prediction
Fulltext Access 8 Pages 2015
Ontology-based Document Mining System for IT Support Service
Fulltext Access 8 Pages 2015
Vision Based Pedestrian Detection for Advanced Driver assistance
Fulltext Access 8 Pages 2015
Reinforcement Learning in Adaptive Control of Power System Generation
Fulltext Access 8 Pages 2015
Centroid Mutation Embedded Shuffled Frog-Leaping Algorithm
Fulltext Access 8 Pages 2015
Regularized Extreme Learning Machine for Large-scale Media Content Analysis
Fulltext Access 8 Pages 2015
Building Efficient Probability Transition Matrix Using Machine Learning from Big Data for Personalized Route Prediction
Fulltext Access 8 Pages 2015
Automated Detection of Human Users in Twitter
Fulltext Access 8 Pages 2015
Active Manifold Learning with Twitter Big Data
Fulltext Access 8 Pages 2015
Online behavioural advertising: A comparative study of regulation between the EU and Hong Kong
Fulltext Access 8 Pages 2015
Asia Pacific news
Fulltext Access 8 Pages 2015
Asia-Pacific news
Fulltext Access 8 Pages 2015
Coding of Video Sequences Using Three Step Search Algorithm
Fulltext Access 8 Pages 2015
Design of Embedded Microcontroller for Controlling and Monitoring Blood Pump
Fulltext Access 8 Pages 2015
Simulated Annealing Algorithm for Deep Learning
Fulltext Access 8 Pages 2015
Digital Literacy Learning System for Indonesian Citizen
Fulltext Access 8 Pages 2015
Effort Distribution to Estimate Cost in Small to Medium Software Development Project with Use Case Points
Fulltext Access 8 Pages 2015
Combine Sampling Support Vector Machine for Imbalanced Data Classification
Fulltext Access 8 Pages 2015
A Virtual Interactive Training Application for Supporting Service Technicians in the Field of High Voltage Equipment
Fulltext Access 8 Pages 2015
Towards Knowledge and Information Technology Transfer Concept and its Validation
Fulltext Access 8 Pages 2015
Artificial Neural Network Model for Suspended Rectangular Microstrip Antennas
Fulltext Access 8 Pages 2015
An Approach on Multilateral Automated Negotiation
Fulltext Access 8 Pages 2015
Issues of Data Aggregation Methods in Wireless Sensor Network: A Survey
Fulltext Access 8 Pages 2015
Comparison of Clustering Algorithms to Design New Clustering Approach
Fulltext Access 8 Pages 2015
Faster File Imaging Framework for Digital Forensics
Fulltext Access 8 Pages 2015
Back to basics: The European Court of Justice further defined the concept of personal data and the scope of the right of data subjects to access it
Fulltext Access 8 Pages 2015
Using Criteria Reconstruction for Low-sampling Trajectories as a Tool for Analytics
Fulltext Access 8 Pages 2015
Beta Distributed Preferences in the Comparison of Failure Modes
Fulltext Access 8 Pages 2015
Text Clustering Based on a Divide and Merge Strategy
Fulltext Access 8 Pages 2015
Processes and Benefits of the Application of Information Technology in Supply Chain Management: An Analysis of the Literature
Fulltext Access 8 Pages 2015
Consensus in a Fuzzy Environment: A Bibliometric Study
Fulltext Access 8 Pages 2015
Algorithms for the Implementation of a Dynamic Electrical Energy Pricing Policy
Fulltext Access 8 Pages 2015
Comprehensive Literature Review on Machine Learning Structures for Web Spam Classification
Fulltext Access 8 Pages 2015
A Review on Online Testability for Reversible Logic
Fulltext Access 8 Pages 2015
A Fully on Chip Slewrate Enhanced Low Drop-out Voltage Regulator
Fulltext Access 8 Pages 2015
A Correction Model for Real-word Errors
Fulltext Access 8 Pages 2015
Models for Implementation of Software Configuration Management
Fulltext Access 8 Pages 2015
<< < 77 78 79 80 81 > >>
Related Topics
Genetic algorithm Articles
6327 Papers
Computer simulation Articles
3034 Papers
Productivity Articles
2777 Papers
Fuzzy logic Articles
2743 Papers
synchronization Articles
2257 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Automation Articles
1810 Papers
Cluster Articles
1655 Papers
Virtual reality Articles
1583 Papers
Robotics Articles
1524 Papers
Cloud computing Articles
1472 Papers
Fault detection Articles
1414 Papers
Social networks Articles
1409 Papers
survival analysis Articles
1353 Papers
CAM Articles
1272 Papers
Computer simulations Articles
1253 Papers
Computer vision Articles
1193 Papers
Privacy Articles
1165 Papers
Polymorphisms Articles
1155 Papers
Simulations Articles
1129 Papers
Information retrieval Articles
955 Papers
Scale-up Articles
840 Papers
Social network analysis Articles
712 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
ICT Articles
638 Papers
Multimedia Articles
618 Papers
Semantic web Articles
592 Papers
Computer-mediated communication Articles
569 Papers
Process simulation Articles
531 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
New Scientist Journal
Electronic Notes in Theoretical Computer Science Journal
Future Generation Computer Systems Journal
Physical Communication Journal
Applied Computing and Informatics Journal
Computer Law & Security Review Journal
Computer Methods and Programs in Biomedicine Journal
Computer Science Review Journal
Computers & Mathematics with Applications Journal
Computers & Operations Research Journal
Egyptian Informatics Journal Journal
Engineering Journal
Engineering Science and Technology, an International Journal Journal
European Journal of Operational Research Journal
Informatics in Medicine Unlocked Journal
Journal of the Egyptian Mathematical Society Journal
Journal of King Saud University - Computer and Information Sciences Journal
Karbala International Journal of Modern Science Journal
Operations Research Perspectives Journal
Procedia Computer Science Journal
Procedia Technology Journal
Simulation Modelling Practice and Theory Journal
Sustainable Computing: Informatics and Systems Journal
Swarm and Evolutionary Computation Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities