Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             33 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Backpropagation Neural Network for Computer Network Security Khalil Shihab
2006
9 p. 710-715
artikel
2 Adaptive Control of Networked Systems in the Presence of Bounded Disturbances A. H. Tahoun
2007
9 p. 693-699
artikel
3 Adaptive Hybrid Mobile Agent Protocol for Wireless Multihop Internet Access A. Velmurugan
2006
9 p. 676-682
artikel
4 A framework to Deal with Missing Data in Data Sets Luai Al Shalabi
2006
9 p. 740-745
artikel
5 A Large Block Cipher Using Modular Arithmetic Inverse of a Key Matrix and Mixing of the Key Matrix and the Plaintext V. U. K. Sastry
2006
9 p. 698-703
artikel
6 Analysis of Hierarchical Diff-EDF Schedulability over Heterogeneous Real-Time Packet Networks Moutaz Saleh
2007
9 p. 673-684
artikel
7 An Entropy Based Method for Removing Web Query Ambiguity in Hindi Language S.K. Dwivedi
2008
9 p. 762-767
artikel
8 A New Type of Network Security Protocol Using Hybrid Encryption in Virtual Private Networking E. Ramaraj
2006
9 p. 672-675
artikel
9 An Integrated Approach to Digital Objects Storage and Retrieval Khalil Shihab
2006
9 p. 683-689
artikel
10 Arabic Speech Pathology Therapy Computer Aided System Z.A. Benselama
2007
9 p. 685-692
artikel
11 Architectural Review of Load Balancing Single System Image Bestoun S. Ahmed
2008
9 p. 752-761
artikel
12 A Survey of Protein Fold Recognition Algorithms Mohammed Said Abual-Rub
2008
9 p. 768-776
artikel
13 A Swarm-based Distance Vector Routing to Support Multiple Quality of Service (QoS) Metrics in Mobile Adhoc Networks R.Asokan
2007
9 p. 700-707
artikel
14 Back Propagation Neural Network Arabic Characters Classification Module Utilizing Microsoft Word Hamza, Ali A.
2008
9 p. 744-751
artikel
15 Combined DWT-DCT Digital Image Watermarking Ali Al-Haj
2007
9 p. 740-746
artikel
16 Control Techniques in Heating, Ventilating and Air Conditioning Systems Hossein Mirinejad
2008
9 p. 777-783
artikel
17 Data-Driven Forecasting Schemes: Evaluation and Applications Josip Vrbanek Jr.
2007
9 p. 747-753
artikel
18 Data Mining: A Preprocessing Engine Luai Al Shalabi
2006
9 p. 735-739
artikel
19 Design of an IP Library for the Synthesis of Image Compression Systems Chokri Souani
2006
9 p. 746-753
artikel
20 Experimental Comparison Between Evolutionary Algorithm and Barycenter Heuristic for the Bipartite Drawing Problem Zoheir Ezziane
2007
9 p. 717-722
artikel
21 Extending the Concepts of Normalization from Relational Databases to Extensible-Markup-Language Databases Model Hosam Farouk El-Sofany
2008
9 p. 729-740
artikel
22 Impact of MD5 Authentication on Routing Traffic for the Case of: EIGRP, RIPv2 and OSPF Khalid Abu Al-Saud
2008
9 p. 721-728
artikel
23 MFTPM: Maximum Frequent Traversal Pattern Mining with Bidirectional Constraints Jiadong Ren
2006
9 p. 704-709
artikel
24 Object Oriented and Multi-Scale Image Analysis: Strengths, Weaknesses, Opportunities and Threats-A Review B. Naga Jyothi
2008
9 p. 706-712
artikel
25 Ontology-based Knowledge Networks for Users' Training: The Enterprise Resource Planning (ERP) Case Macris Aristomenis
2006
9 p. 690-697
artikel
26 Parallel Algorithms for String Matching Problem on Single and Two Dimensional Reconfigurable Pipelined Bus Systems S.Viswanadha Raju
2007
9 p. 754-759
artikel
27 Parsing Arabic Texts Using Rhetorical Structure Theory Hassan I. Mathkour
2008
9 p. 713-720
artikel
28 Performance Comparison of Different Image Sizes for Recognizing Unconstrained Handwritten Tamil Characters using SVM N. Shanthi
2007
9 p. 760-764
artikel
29 Policy-Based Security for Wireless Components in High Assurance Computer Systems Luay A. Wahsheh
2007
9 p. 726-735
artikel
30 Rotational Linear Discriminant Analysis Using Bayes Rule for Dimensionality Reduction Alok Sharma
2006
9 p. 754-757
artikel
31 Support Measure Admissibility Based on Operations on Instance Graphs Ford Lumban Gaol
2007
9 p. 708-716
artikel
32 The Relationship between Exclusive-Or and the Unique Existential Quantifier Maher A. Nabulsi
2008
9 p. 741-743
artikel
33 Tolerances Applied in Combinatorial Optimization Boris Goldengorin
2006
9 p. 716-734
artikel
                             33 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland