Issue | Title | |
Vol 2, No 5 (2014) | Classification Techniques Applied to Hydrocarbon Data | Abstract |
J. G. Sumrall, R. R. Chakravarthy, B. B. Joshi | ||
Vol 4, No 2 (2016) | CLOMAINT: A Data Mining Algorithm Applied in Maintenance SONATRACH | Abstract |
R. Sid Ahmed, K. Salim, B. Hafida | ||
Vol 5, No 5 (2017) | Cluster-Based Self-Organization Scheme for Mobile Wireless Sensor Networks | Abstract |
M. Lehsaini, H. Guyennet, M. Feham | ||
Vol 3, No 4 (2015) | Comparison on Routing Processing Performance between Shortest Paths Tree (SPT) and Minimum Spanning Tree (MST) | Abstract |
Santi Pattanavichai | ||
Vol 5, No 5 (2017) | Complementary Unipolar Duty Cycle Division Multiplexing (CUDCDM): a Novel and Economical Multiplexing Technique | Abstract |
M. K. Abdullah, A. Malek Mohammadi, A. F. Abas, G. A. Mahdiraji, M. Mokhtar | ||
Vol 2, No 4 (2014) | Control/Data Driven Embedded Systems High Level Modeling, Formal Verification and Simulation | Abstract |
Fateh Boutekkouk, Mohammed Benmohammed | ||
Vol 1, No 1 (2013) | Dependency Analysis of Risks in Information Security | Abstract |
Suleyman Kondakci | ||
Vol 1, No 2 (2013) | Design of Navigation Map Model for Intelligent Vehicle Combined with the Traffic Sign Recognition | Abstract |
Ying Xia, Sutong Liu, Jiangfan Feng | ||
Vol 1, No 2 (2013) | Detection and Demodulation of AM Signals Using Two Dimensional Spectral Surface | Abstract |
Majed Omar Al-Dwairi, Dmitriy E. Skopin | ||
Vol 5, No 1 (2017) | Detection of Lines in Images by Curve Fitting Using Hough Transform | Abstract |
Adel A. Sewisy | ||
Vol 2, No 3 (2014) | Determining Optimal Blocking Sizes for Large Exam Groups When Data Matching | Abstract |
George Anderson, Audrey Naledi Masizana, Dimane Mpoeleng | ||
Vol 4, No 1 (2016) | Development of Information Systems Design Models: an Empirical Investigation of Indian Electronic Industry | Abstract |
A. Kalia, D. P. Goyal | ||
Vol 1, No 5 (2013) | Development of Machine Learning Models to Predict Student Performance in Computer Literacy Courses | Abstract |
George Anderson, Oduronke T. Eyitayo | ||
Vol 1, No 2 (2013) | Digital Library System in the Academic Libraries: it’s User Friendliness | Abstract |
Mathews Stephen, V. S. Kunjumuhammed | ||
Vol 5, No 1 (2017) | Easy and Secure Login by CAPTCHA | Abstract |
Sajad Shirali-Shahreza, Mohammad Shirali-Shahreza, M. T. Manzuri-Shalmani | ||
Vol 1, No 2 (2013) | Engineering Design and Validation of an Innovative Bionic CD Rack | Abstract |
Carlos A. M. Versos, Denis A. Coelho | ||
Vol 1, No 4 (2013) | Environment for Single Photon Counting X-Ray Imaging System Design | Abstract |
Sang Don Kim, Seung Eun Lee | ||
Vol 6, No 2 (2018) | Evaluating of a Fuzzy Chip by Hardware-In-the-Loop (HIL) Simulation | Abstract |
E. Duman, H. Can, E. Akın | ||
Vol 5, No 5 (2017) | Evaluation of the Disydent Co-Design Flow for an MJPEG Case Study | Abstract |
K. Smiri, A. Jemai, A. C. Ammari | ||
Vol 2, No 4 (2014) | E-Voting Systems to Facilitate Elections in Iraq | Abstract |
Mohammed Hassan Chalabi, Muriati Mukhtar, Yazrina Yahya | ||
Vol 2, No 1 (2014) | Experiences from Pilot Implementation of AMI Systems in Poland | Abstract |
Krzysztof Billewicz | ||
Vol 5, No 2 (2017) | Fail-Silent Assumptions in Fault-Tolerant Systems | Abstract |
A. Ademaj | ||
Vol 3, No 6 (2015) | Fast, Simple and Memory Efficient Algorithm for Mining Association Rules | Abstract |
M. H. Marghny, A. A. Shakour | ||
Vol 5, No 3 (2017) | Formal Semantics of BPMN Process Models Using CPN | Abstract |
Malek M. Ibrahim | ||
Vol 2, No 5 (2014) | Fully Distributed Security Architecture for MANET | Abstract |
A. Shajin Nargunam, M. P. Sebastian | ||
51 - 75 of 160 Items | << < 1 2 3 4 5 6 7 > >> |
Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize