Vol 10, No. 3, May 2013 (14)
29 July 2012
Fast Window Based Stereo Matching for 3D Scene Reconstruction
Mohammad Chowdhury and Mohammad Bhuiyan
Department of Computer Science and Engineering, Jahangirnagar
Department of Computer Science and Engineering, Jahangirnagar
Published in
Vol 10, No. 3, May 2013
29 July 2012
An Efficient Approach for Effectual Mining of Relational Patterns from Multi-Relational Database
Vimal Dhanasekar1 and Tamilarasi Angamuthu2
1Department of MCA, SAN
1Department of MCA, SAN
Published in
Vol 10, No. 3, May 2013
23 February 2012
Developing a GIS-Based MCE Site Selection Tool in ArcGIS Using COM Technology
Khalid Eldrandaly
Associate Professor of Information Systems, College of
Associate Professor of Information Systems, College of
Published in
Vol 10, No. 3, May 2013
23 February 2012
Enhancements of A Three-Party Password-Based Authenticated Key Exchange Protocol
Shuhua Wu 1,2,3 , Kefei Chen 1, and Yuefei Zhu3
1 Department of Computer Science and
1 Department of Computer Science and
Published in
Vol 10, No. 3, May 2013
23 February 2012
Medical Image Segmentation using a Multi-Agent System Approach
Mahsa Chitsaz and Woo Seng
Faculty of Computer Science and Information Technology, University
Faculty of Computer Science and Information Technology, University
Published in
Vol 10, No. 3, May 2013
23 February 2012
Submesh Allocation in 2D-Mesh Multicomputers:
Partitioning at the Longest Dimension of Requests
Sulieman Bani-Ahmad
Department of Information Technology, Al-Balqa Applied
Department of Information Technology, Al-Balqa Applied
Published in
Vol 10, No. 3, May 2013
23 February 2012
Applying Artificial Neural Network and eXtended Classifier System for Network Intrusion Detection
(ANNXCS-NID)
Wafa’ AlSharafat
Prince Hussein Bin
Prince Hussein Bin
Published in
Vol 10, No. 3, May 2013
23 February 2012
Query Dispatching Tool Supporting Fast Access to Data Warehouse
Anmar Aljanabi1, Alaa Alhamami2, and Basim Alhadidi3
1Computer Sciences Department, University
1Computer Sciences Department, University
Published in
Vol 10, No. 3, May 2013
23 February 2012
A Technique for Handling Range and Fuzzy Match Queries on Encrypted Data
Shaukat Ali, Azhar Rauf, and Huma Javed
Department of
Department of
Published in
Vol 10, No. 3, May 2013
23 February 2012
Semantic Method for Query Translation
Mohd Amin Mohd Yunus, Roziati Zainuddin, and Noorhidawati Abdullah
Faculty of Computer Science and Information Technology,
Faculty of Computer Science and Information Technology,
Published in
Vol 10, No. 3, May 2013
More...
23 February 2012
A Dynamic Linkage Clustering using KD-Tree
Shadi Abudalfa1 and Mohammad Mikki2
1The University Collage of Applied Sciences, Palestine
2The Islamic
1The University Collage of Applied Sciences, Palestine
2The Islamic
Published in
Vol 10, No. 3, May 2013
23 February 2012
Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with
Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities
Bugra Karabey and Nazife Baykal
Middle East Technical
Middle East Technical
Published in
Vol 10, No. 3, May 2013
23 February 2012
Implementing New Approach for Enhancing Performance and Throughput in A Distributed Database
Khaled Maabreh1 and Alaa al Hamami2
1Faculty of Information
1Faculty of Information
Published in
Vol 10, No. 3, May 2013
29 July 2012
Modeling Human Dialogue Transactions in the Context of Declarative Knowledge
Igor Chimir1, Ameed Ghazi2, and Waheeb Abu-Dawwas3
1Department of Computer Science,
1Department of Computer Science,
Published in
Vol 10, No. 3, May 2013
▼
- Diploma Courses
- Business and Enterprise
- Digital Literacy & IT
- Health Literacy
- Business Literacy
Starting from Jun. 14 2016
-
Sonstur aut pereis dolibus Starting from Jun. 14 2016
-
The impact of nursing Starting from Jun. 10 2016
-
English for beginner Starting from Jun. 10 2016
-
How to control the risk Starting from Jun. 10 2016