Journal of Artificial Intelligence & Data Mining papers،vol 4،issue 2
4.Introducing an algorithm for use to hide sensitive association rules through perturb technique FullText
8.Development of a framework to evaluate service-oriented architecture governance using COBIT approach FullText
10.Bridging the semantic gap for software effort estimation by hierarchical feature selection techniques FullText
12.Application of statistical techniques and artificial neural network to estimate force from sEMG signals FullText
13.Plagiarism checker for Persian (PCP) texts using hash-based tree representative fingerprinting FullText
تاریخ نمایه سازی مقالات: 19 تیر 1398 - تعداد نمایش اطلاعات ژورنال: 703