|
|
101. |
Employees Characteristics in Knowledge Transfer and Performance
by Saide.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
102. |
Improving Scheduling of Data Transmission in TDMA Systems
by Aslanidis, Timotheos.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
103. |
Measuring Technological, Organizational and Environmental Factors Influencing the Adoption Intentions of Public Cloud Computing Using a Proposed Integrated ModelType: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
104. |
Usability Testing in Mobile Applications Involving People with Down Syndrome : A Literature Review
by Cáliz, Doris.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
105. |
Application for Logical Expression Processing
by Michalak, Marcin.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; June 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
106. |
Efficient Approach for Content Based Image Retrieval Using Multiple SVM in YACBIR
by Laib, Lakhdar.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; June 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
107. |
Image Registration Using Advanced Topology Preserving Relaxation Labeling
by Kim, Chan-Il.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; June 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
108. |
Medical Imaging Mutifractal Analysis in Prediction of Efficiency of Cancer Therapy
by Vasiljevic, Jelena.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; June 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
109. |
Ontology Based Tele-Health Smart Home Care System : Ontosmart to Monitor Elderly
by Nachabe, L.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; June 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
110. |
Turkish Sign Language Recognition Using Hidden Markov Model
by Kakayev, Kakajan.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; June 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
111. |
A Survey on Security Risk Management Frameworks in Cloud Computing
by Alosaimi, Rana.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; July 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
112. |
Analysis of CMOS and MTCMOS Circuits Using 250 Nano Meter Technology
by Suresh, M.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; July 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
113. |
Automated Short Answer Grader Using Friendship Graphs
by Adhya, Soumajit.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; July 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
114. |
Automatic Generation and Optimization of Test Data Using Harmony Search Algorithm
by Sahoo, Rajesh Kumar.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; July 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
115. |
Big Graph : Tools, Techniques, Issues, Challenges and Future Directions
by Singh, Dhananjay.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; July 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
116. |
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove Vulnerabilities in Wireless Sensor Networks
by Bhushan, Bharat.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; July 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
117. |
Dengue Detection and Prediction System Using Data Mining with Frequency Analysis
by V, Nandini.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; July 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
118. |
Design of IEEE 1149.1 Tap Controller IP Core
by S, Shelja.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; July 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
119. |
Glitch Analysis and Reduction in Combinational Circuits
by Shah, Ronak.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; July 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|
|
120. |
IP Core Design of Hight Lightweight Cipher and its Implementation
by N, Sruthi.
Type: Book; Format:
print
; Literary form:
not fiction
Publisher: Computer Science and Information Technology ; July 2016Online Access: Click here to access online Availability: Copies available for loan: College Library (1).
Actions:
Add to cart (remove)
|
No cover image available
|