关注
WWW.IJCAT.COM
WWW.IJCAT.COM
IJCATR
在 IJCAT.COM 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A review of machine learning based anomaly detection techniques
H Kaur, G Singh, J Minhas
arXiv preprint arXiv:1307.7286, 2013
962013
Factors that affect cloud computing adoption by small and medium enterprises in Kenya
JN Makena
International Journal of Computer Applications Technology and Research 2 (5 …, 2013
832013
Performance comparison of digital Image watermarking techniques: a survey
N Chandrakar, J Bagga
International Journal of Computer Applications Technology and Research 2 (2 …, 2013
632013
Survey on image enhancement techniques
P Suganya, S Gayathri, N Mohanapriya
International Journal of Computer Applications Technology and Research 2 (5 …, 2013
522013
Applying data mining techniques on soil fertility prediction
SS Baskar, L Arockiam, S Charles
Int. J. Comput. Appl. Technol. Res 2 (6), 660-662, 2013
382013
An evaluation of two-step techniques for positive-unlabeled learning in text classification
A Kaboutari, J Bagherzadeh, F Kheradmand
Int. J. Comput. Appl. Technol. Res 3 (9), 592-594, 2014
352014
New Approach for K-mean and K-medoids Algorithm
A Patel, P Singh
International Journal of Computer Applications Technology and Research 2 (1 …, 2013
352013
Literature survey on image deblurring techniques
M Poulose
International Journal of Computer Applications Technology and Research 2 (3 …, 2013
352013
Survey on dynamic resource allocation strategy in cloud computing environment
N Krishnaveni, G Sivakumar
International Journal of Computer Applications Technology and Research 2 (6 …, 2013
332013
Visual image quality assessment technique using FSIM
R Kumar, V Moyal
International Journal of Computer Applications Technology and Research 2 (3 …, 2013
332013
Automatic seed classification by shape and color features using machine vision technology
N Pandey, S Krishna, S Sharma
International Journal of Computer Applications Technology and Research 2 (2 …, 2013
332013
Speed determination of moving vehicles using Lucas-Kanade algorithm
D Shukla, E Patel
International Journal of Computer Applications Technology and Research 2 (1 …, 2013
302013
Knowledge management in the cloud: benefits and risks
MS Aksoy, D Algawiaz
International Journal of Computer Applications Technology and Research 3 (11 …, 2014
292014
Analysis of cryptographic algorithms for network security
K Acharya, M Sajwan, S Bhargava
International Journal of Computer Applications Technology and Research 3 (2 …, 2013
292013
Detect breast cancer using fuzzy c means techniques in wisconsin prognostic breast cancer (WPBC) data sets
PB Tintu, R Paulin
International Journal of Computer Applications Technology and Research 2 (5 …, 2013
282013
Flood prediction model using artificial neural network
A Paul, P Das
International Journal of Computer Applications Technology and Research 3 (7 …, 2014
272014
Shape oriented feature selection for tomato plant identification
A Hazra, K Deb, S Kundu, P Hazra
International Journal of Computer Applications Technology and Research 2 (4 …, 2013
252013
Brain tumor detection using artificial neural network fuzzy inference system (ANFIS)
RJ Deshmukh, RS Khule
International Journal of Computer Applications Technology and Research 3 (3 …, 2014
242014
A review on wireless sensor network protocol for disaster management
MS Dawood, J Suganya, RK Devi, G Athisha
International Journal of Computer Applications Technology and Research 2 (2 …, 2013
232013
Knowledge transfer in a municipality study on baby boomer exodus from the workforce
I Cummings-White, IS Diala
International Journal of Computer Applications Technology and Research 2 (3 …, 2013
222013
系统目前无法执行此操作,请稍后再试。
文章 1–20