|
Journal | Issue |
Title |
|
Journal of Culture, Society and Development | Vol 49 (2019) |
Dansinkran Hairstyle Fashion and Its Socio-Cultural Significance in Akan Traditional Ruling |
Abstract
PDF
|
Kennedy Asenso |
|
Journal of Education and Practice | Vol 10, No 30 (2019) |
Darfur Crisis: Platforms, Partners and Peace Agreements - The Pending Question: What Are the Reasons Behind the Failure? |
Abstract
PDF
|
Anwar Yousif Atta Al-Mannan |
|
Advances in Physics Theories and Applications | Vol 14 (2013) |
Dark Energy, Super Yang Mills Theory, Schrödinger’s Equations And Black Scholes Theory |
Abstract
|
K.N.P. Kumar, B.S. Kiranagi, J.S. Sadananda, B.J. Gireesha |
|
Advances in Physics Theories and Applications | Vol 14 (2013) |
Dark Matter, Super Yang Mills Theory, Supermassive Black Holes And Other Topics |
Abstract
|
K.N.P. Kumar, B.S. Kiranagi |
|
Advances in Physics Theories and Applications | Vol 14 (2013) |
Dark Matter, Complexity, Supergravity Constraints And Supersymmetric Particle, Calabi-Yau Manifold And Other Topics |
Abstract
|
K.N.P. Kumar |
|
Advances in Physics Theories and Applications | Vol 14 (2013) |
Dark Photons Behind Biophotons? , Spatial Relationships Are The Specialty Of The Right Hemisphere, Quantum Mechanics Flout The Laws Of Thermodynamics?, Landauer’s Erasure, Entanglement And Negative Entropy, Discrete Spacetime Vis-A Vis Relativistic Quantu |
Abstract
|
K.N.P. Kumar, C.J. Prabhakara, S.K. Narasimha Murthy, B.J. Gireesha |
|
Mathematical Theory and Modeling | Vol 10, No 3 (2020) |
Data Analytics for Numeric Modeling and Its Application to an Offsite Concrete Block Production Operation |
Abstract
PDF
|
Ronald Ekyalimpa, Isaiah Tugumenawe |
|
Network and Complex Systems | Vol 6, No 4 (2016) |
Data and Telecommunication Problems in Sub-Saharan Africa |
Abstract
PDF
|
Harrison Adjei Quaye, Welborn Amoako Marful |
|
Mathematical Theory and Modeling | Vol 5, No 8 (2015) |
Data Based Mechanistic modelling optimal utilisation of raingauge data for rainfall-riverflow modelling of sparsely gauged tropical basin in Ghana |
Abstract
PDF
|
Boateng Ampadu, Nick A. Chappell, Wlodek Tych |
|
Control Theory and Informatics | Vol 10 (2021) |
Data Encryption and Decryption by Using Hill Cipher Algorithm |
Abstract
PDF
|
Mebratu Fana Bedasa |
|
Network and Complex Systems | Vol 11 (2020) |
Data Encryption and Decryption by Using Hill Cipher Algorithm |
Abstract
PDF
|
Mebratu Fana Bedasa |
|
European Journal of Business and Management | Vol 8, No 23 (2016) |
Data Envelopment Analysis on Performance Measurement of Municipals |
Abstract
PDF
|
Vildan Kistik, Habip Kocak |
|
Computer Engineering and Intelligent Systems | Vol 2, No 3 (2011) |
Data Hiding in Binary Images Using Orthogonal Embedding - A High Capacity Approach |
Abstract
PDF
|
Bharti Gawali, Rupali Kasar |
|
Computer Engineering and Intelligent Systems | Vol 4, No 13 (2013) |
Data Hiding in Color Images: A High Capacity Data Hiding Technique for Covert Communication |
Abstract
PDF
|
Shabir A. Parah, Javaid A. Sheikh, G. M. Bhat |
|
Research on Humanities and Social Sciences | Vol 12, No 8 (2022) |
Data Literacy Scale Development for High School Students |
Abstract
PDF
|
Gürbüz OCAK, Burak OLUR, Ayşegül KUTLU ÇAKIN |
|
Information and Knowledge Management | Vol 10, No 1 (2020) |
Data Management of Indonesian Warship’s Electronic Support Measures in Supporting Naval Operation |
Abstract
PDF
|
Bekti Sutiarso |
|
Computer Engineering and Intelligent Systems | Vol 2, No 8 (2011) |
Data Mining Tools and Techniques: a review |
Abstract
PDF
|
Karimella Vikram, Niraj Upadhayaya |
|
Journal of Marketing and Consumer Research | Vol 9 (2015) |
Data Mining for Marketing |
Abstract
PDF
|
Rafi Ahmad Khan |
|
Computing, Information Systems, Development Informatics and Allied Research Journal | Vol 3, No 2 (2012) |
Data Mining Technique for Predicting Telecommunications Industry Customer Churn Using both Descriptive and Predictive Algorithms |
Abstract
PDF
|
Kolajo Taiwo, Adeyemo, A.B. |
|
Network and Complex Systems | Vol 6, No 1 (2016) |
Data Safety Contact Control Model of Cloud Computing |
Abstract
PDF
|
Muhammad Tariq |
|
Computer Engineering and Intelligent Systems | Vol 11, No 5 (2020) |
Data Science and Ethics |
Abstract
PDF
|
Uchenna Nzenwata, Olugbohungbe Rotimi, Adetunji Oluwatofunmi, Adedeji Adegbenle, Johnson Hinmikaiye |
|
Research Journal of Finance and Accounting | Vol 6, No 3 (2015) |
Data search and discovery process for financial statement fraud |
Abstract
PDF
|
Mahmoud Lari Dashtbayaz, Shaban Mohammad |
|
Computer Engineering and Intelligent Systems | Vol 3, No 4 (2012) |
Data Security Using Cryptosteganography in Web Application |
Abstract
PDF
|
Abhishek Patidar, Gajendra Jagnade, Laxmi Madhuri, Pranay Mehta, Ronak Seth |
|
Network and Complex Systems | Vol 2, No 2 (2012) |
Data Security Using Stegnography and Quantum Cryptography |
Abstract
PDF
|
Mohit Kumar, Abhishek Gupta, Kinjal Shah, Atul Saurabh, Pravesh Saxena, Vikas Kumar Tiwari |
|
Journal of Economics and Sustainable Development | Vol 10, No 10 (2019) |
Data Structure Model on the Quality of Public Passenger Transport Services by Bus in Vietnam |
Abstract
PDF
|
Thi Hong Le Hoang, Van Lam Hoang, Thi Bich Hanh Chu, Thi Thai An Nguyen, Thi Bach Tuyet Vuong, Thi Huyen Do, Vu Hoang Nguyen, Manh Dung Tran |
|
13076 - 13100 of 61711 Items |
<< < 519 520 521 522 523 524 525 526 527 528 > >> |