• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Science Applications Journas Latest Articles

Computer Science Applications Research Articles

Fuzzy logics as the logics of chains
Fulltext Access 7 Pages 2006
A new protocol to counter online dictionary attacks
Fulltext Access 7 Pages 2006
Security Views - Malware Update
Fulltext Access 7 Pages 2006
An identity management protocol for Internet applications over 3G mobile networks
Fulltext Access 7 Pages 2006
On stratified L-valued filters induced by ⊤-filters
Fulltext Access 7 Pages 2006
On the category Set(JCPos)
Fulltext Access 7 Pages 2006
Recent Literature
Fulltext Access 7 Pages 2006
An answer to Demirci's open question, a clarification of his result, and a correction of his interpretation of the result
Fulltext Access 7 Pages 2006
Undefinability of min-conjunction in MTL
Fulltext Access 7 Pages 2006
Which logic is the real fuzzy logic?
Fulltext Access 7 Pages 2006
Fuzzy logic from the viewpoint of machine intelligence
Fulltext Access 7 Pages 2006
Logical foundations of rule-based systems
Fulltext Access 7 Pages 2006
New Vistas in elliptic curve cryptography
Fulltext Access 7 Pages 2006
What is mathematical fuzzy logic
Fulltext Access 7 Pages 2006
Classification of electro-oculogram signals using artificial neural network
Fulltext Access 7 Pages 2006
Analysis of Doppler ultrasound signals based on fuzzy similarity index
Fulltext Access 7 Pages 2006
Customer segmentation and strategy development based on customer lifetime value: A case study
Fulltext Access 7 Pages 2006
A COM-based expert system for selecting the suitable map projection in ArcGIS
Fulltext Access 7 Pages 2006
Optimal tuning of power systems stabilizers and AVR gains using particle swarm optimization
Fulltext Access 7 Pages 2006
A knowledge-based approach to assign breast cancer treatments in oncology units
Fulltext Access 7 Pages 2006
Optimal fuzzy multi-criteria expansion of competence sets using multi-objectives evolutionary algorithms
Fulltext Access 7 Pages 2006
Stock market trading rule discovery using two-layer bias decision tree
Fulltext Access 7 Pages 2006
Neural networks for animal science applications: Two case studies
Fulltext Access 7 Pages 2006
An overview of RFID tags and new cryptographic developments
Fulltext Access 7 Pages 2006
Accessing embedded program in untestable mobile environment: Experience of a trustworthiness approach
Fulltext Access 7 Pages 2006
Assessment of eco-security in the Knowledge Grid e-science environment
Fulltext Access 7 Pages 2006
Shortcut method for reliability comparisons in RAID
Fulltext Access 7 Pages 2006
Using playing cards to estimate interference in frequency-hopping spread spectrum radio networks
Fulltext Access 7 Pages 2006
An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem
Fulltext Access 7 Pages 2006
Using a role scheme to derive software project metrics
Fulltext Access 7 Pages 2006
Using IT governance and COBIT to deliver value with IT and respond to legal, regulatory and compliance challenges
Fulltext Access 7 Pages 2006
The Computer Misuse Act
Fulltext Access 7 Pages 2006
Preparing Information Security for legal and regulatory compliance (Sarbanes–Oxley and Basel II)
Fulltext Access 7 Pages 2006
Integrity of intention (a theory of types for security APIs)
Fulltext Access 7 Pages 2006
Analysis and visualisation with host-based software – The features of STN®AnaVist™
Fulltext Access 7 Pages 2006
On the potential of high density smart cards
Fulltext Access 7 Pages 2006
Identifying an existing file via KaZaA artefacts
Fulltext Access 7 Pages 2006
An examination into Yahoo Messenger 7.0 contact identification
Fulltext Access 7 Pages 2006
Identifying almost identical files using context triggered piecewise hashing
Fulltext Access 7 Pages 2006
A cyber forensics ontology: Creating a new approach to studying cyber forensics
Fulltext Access 7 Pages 2006
Searching for processes and threads in Microsoft Windows memory dumps
Fulltext Access 7 Pages 2006
A strategy for testing hardware write block devices
Fulltext Access 7 Pages 2006
Application of temporal and spatial role based access control in 802.11 wireless networks
Fulltext Access 7 Pages 2006
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data
Fulltext Access 7 Pages 2006
A quantitative method for ISO 17799 gap analysis
Fulltext Access 7 Pages 2006
Academic response to the European Commission’s Questionnaire on the patent system in Europe: An economic approach
Fulltext Access 7 Pages 2006
Mobile agent strategies for the provision of public goods: An experimental study
Fulltext Access 7 Pages 2006
Material damping vs. radiation damping in soil–structure interaction analysis
Fulltext Access 7 Pages 2006
Expert system for integrity assessment of piping containing defects
Fulltext Access 7 Pages 2006
How a knowledge-based approach might illuminate the notion of human capital and its measurement
Fulltext Access 7 Pages 2006
Surveying kaolin-treated cotton plots with airborne multispectral digital video imagery
Fulltext Access 7 Pages 2006
Mining protein–protein interaction information on the internet
Fulltext Access 7 Pages 2006
Data visualisation tools—a perspective from the pharmaceutical industry
Fulltext Access 7 Pages 2006
WIPO News
Fulltext Access 7 Pages 2006
An evolutionary approach to the combination of multiple classifiers to predict a stock price index
Fulltext Access 7 Pages 2006
US patents in 1856
Fulltext Access 7 Pages 2006
Short communications
Fulltext Access 7 Pages 2006
Albert Einstein’s patents
Fulltext Access 7 Pages 2006
GB innovation since 1950 and the role of the independent inventor: An analysis of completed term patents
Fulltext Access 7 Pages 2006
Neural prediction of hydrocarbon degradation profiles developed in a biopile
Fulltext Access 7 Pages 2006
Generating rules from examples of human multiattribute decision making should be simple
Fulltext Access 7 Pages 2006
A framework for the computerized assessment of university student essays
Fulltext Access 8 Pages 2006
An architecture and development methodology for location-based services
Fulltext Access 8 Pages 2006
The effect of visual complexity when playing a slot-machine simulation: the role of computer experience, computer anxiety, and optimism
Fulltext Access 8 Pages 2006
Evaluation of a computer-based instructional package about eating disorders
Fulltext Access 8 Pages 2006
On two definitions of the factor of safety commonly used in the finite element slope stability analysis
Fulltext Access 8 Pages 2006
Fluctuation responses of saturated porous media subjected to cyclic thermal loading
Fulltext Access 8 Pages 2006
A low-cost microprocessor and infrared sensor system for automating water infiltration measurements
Fulltext Access 8 Pages 2006
Acoustic on-line grain moisture meter
Fulltext Access 8 Pages 2006
From papermaking to aircraft navigation: Significant patent and inventor anniversaries in 2006
Fulltext Access 8 Pages 2006
Meat tenderness evaluation using dual energy X-ray absorptiometry (DEXA)
Fulltext Access 8 Pages 2006
Laboratory measurement of seed drill seed spacing and velocity of fall of seeds using high-speed camera system
Fulltext Access 8 Pages 2006
Classification of vitreousness in durum wheat using soft X-rays and transmitted light images
Fulltext Access 8 Pages 2006
Feasibility of low-cost GPS receivers for ground speed measurement
Fulltext Access 8 Pages 2006
Automatic classification of patent documents for TRIZ users
Fulltext Access 8 Pages 2006
Mapping nanotechnology patents: The EPO approach
Fulltext Access 8 Pages 2006
Using DEA-neural network approach to evaluate branch efficiency of a large Canadian bank
Fulltext Access 8 Pages 2006
Entropy-based fuzzy rough classification approach for extracting classification rules
Fulltext Access 8 Pages 2006
An exploratory project expert system for eliciting correlation coefficient and sequential updating of duration estimation
Fulltext Access 8 Pages 2006
Comparison of clustering algorithms for analog modulation classification
Fulltext Access 8 Pages 2006
An efficient data mining approach for discovering interesting knowledge from customer transactions
Fulltext Access 8 Pages 2006
A GAs based approach for mining breast cancer pattern
Fulltext Access 8 Pages 2006
Subscription fraud prevention in telecommunications using fuzzy rules and neural networks
Fulltext Access 8 Pages 2006
A new hybrid data mining technique using a regression case based reasoning: Application to financial forecasting
Fulltext Access 8 Pages 2006
Representation and share of part feature information in web-based parts library
Fulltext Access 8 Pages 2006
Supporting collaborative learning in engineering design
Fulltext Access 8 Pages 2006
An norm-driven state machine model for CSCW systems
Fulltext Access 8 Pages 2006
Model gene network by semi-fixed Bayesian network
Fulltext Access 8 Pages 2006
The Stroop effect on the internet
Fulltext Access 8 Pages 2006
A new dot plot-based algorithm for genomes sequences comparison: A preliminary study
Fulltext Access 8 Pages 2006
A two-phased semantic optimization modeling approach on supplier selection in eProcurement
Fulltext Access 8 Pages 2006
An expert system for evaluating Siberian Huskies
Fulltext Access 8 Pages 2006
Kernel methods for short-term portfolio management
Fulltext Access 8 Pages 2006
Portfolio algorithm based on portfolio beta using genetic algorithm
Fulltext Access 8 Pages 2006
Artificial neural networks with evolutionary instance selection for financial forecasting
Fulltext Access 8 Pages 2006
Modeling consumer acceptance probabilities
Fulltext Access 8 Pages 2006
Employee churn prediction
Fulltext Access 8 Pages 2006
Comparison of multilayer perceptron training algorithms for portal venous doppler signals in the cirrhosis disease
Fulltext Access 8 Pages 2006
Utilisation of mobile handheld devices for care management at an Australian aged care facility
Fulltext Access 8 Pages 2006
Instructional design for effective and enjoyable computer-supported learning
Fulltext Access 8 Pages 2006
<< < 862 863 864 865 866 > >>
Related Topics
Image processing Articles
3577 Papers
Fuzzy logic Articles
2743 Papers
CAD Articles
2571 Papers
Chemometrics Articles
2077 Papers
Security Articles
2003 Papers
CAM Articles
1272 Papers
Computer simulations Articles
1253 Papers
Computer vision Articles
1193 Papers
Simulations Articles
1129 Papers
Bootstrap Articles
1090 Papers
Multi-Agent Systems Articles
1047 Papers
Geographic information systems Articles
645 Papers
ICT Articles
638 Papers
Multimedia Articles
618 Papers
e-Learning Articles
605 Papers
Multi-agent system Articles
536 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
World Patent Information Journal
Computers and Electronics in Agriculture Journal
Computers and Geotechnics Journal
International Journal of Critical Infrastructure Protection Journal
Journal of Rail Transport Planning & Management Journal
Computers in Human Behavior Journal
Electronic Commerce Research and Applications Journal
Entertainment Computing Journal
Expert Systems with Applications Journal
Fuzzy Sets and Systems Journal
Information Sciences Journal
Information Systems Journal
International Journal of Approximate Reasoning Journal
Robotics and Autonomous Systems Journal
Big Data Research Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Parallel and Distributed Computing Journal
Medical Image Analysis Journal
Computer Standards & Interfaces Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Journal of Information Security and Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Applied Soft Computing Journal
Astronomy and Computing Journal
Computer Methods in Applied Mechanics and Engineering Journal
Computer Physics Communications Journal
Computerized Medical Imaging and Graphics Journal
Computers in Biology and Medicine Journal
Computers, Environment and Urban Systems Journal
Computers & Geosciences Journal
Computers in Industry Journal
Computers & Structures Journal
Engineering Analysis with Boundary Elements Journal
Finite Elements in Analysis and Design Journal
Healthcare Journal
ICT Express Journal
Information Processing & Management Journal
International Journal of Medical Informatics Journal
Journal of the American Medical Informatics Association Journal
Journal of Biomedical Informatics Journal
Journal of Computational Physics Journal
Journal of Informetrics Journal
Journal of Visual Languages & Computing Journal
Parallel Computing Journal
Sustainable Energy, Grids and Networks Journal
Transportation Research Part C: Emerging Technologies Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities