Super User

Content Protection in Video Data Based on Robust Digital Watermarking Resistant to

Written by

PCFA: Mining of Projected Clusters in High Dimensional Data Using Modified FCM

Written by

Person-Independent Facial Expression Recognition Based on Compound Local Binary Pattern (CLBP)

Written by

Simplified   Algorithm  and  Hardware  Implementation  for&

Written by

Employing Machine Learning Algorithms to Detect Unknown Scanning and Email Worms

Written by

A New Hybrid Architecture for the Discovery and Compaction of Knowledge: Breast

Written by

Face Recognition Using Adaptive Margin Fisher’s Criterion and Linear Discriminant

Written by

An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad hoc Networks

Written by

A Cross-Layer Based Intrusion Detection Technique for Wireless Networks

Jatinder Singh1, Lakhwinder
Written by

An Effective Data Warehousing System for RFID using Novel Data Cleaning, Data Transformation and Loading Techniques

Written by
Page 63 of 170

Upcoming courses

Has no item to show!

Free courses

Starting from Jun. 14 2016

the degree finder

in 3 easy steps
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…