Southville International School and Colleges
81. Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Techniques and Deep Learning Model

by Petricca, Luca.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
82. Effects of The Different Migration Periods on Parallel Multi-Swarm PSO

by Gülcü, Saban.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
83. Enhanced Protocol for Wireless Content-Centric Network

by Park, Chan-Min.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
84. Exploring Peer-To-Peer Data Mining

by Marcozzi, Andrea.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
85. Majority Voting Approach for the Identification of Differentially Expressed Genes to Understand Gender-Related Skeletal Muscle Aging

by Dreder, Abdouladeem.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
86. Management Architecture for Dynamic Federated Identity Management

by Pöhn, Daniela.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
87. Modified Vortex Search Algorithm for Real Parameter Optimization

by Dogˇan, Berat.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
88. Nonlinear Extension of Asymmetric Garch Model within Neural Network Framework

by Arnerić, Josip.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
89. Performance Evaluation of Trajectory Queries on Multiprocessor and Cluster

by Niyizamwiyitira, Christine.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
90. Projection Profile Based Number Plate Localization and Recognition

by Chowdhury, Sandipan.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
91. Semantic Analysis Over Lessons Learned Contained in Social Networks for Generating Organizational Memory in Centers R&D

by Javier, Marco.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
92. Smart as a Cryptographic Processor

by Kanchi, Saroja.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
93. Surveillance Video Based Robust Detection and Notification of Real Time Suspicious Activities in Indoor Scenarios

by Shree, Nithya.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
94. Testing and Improving Local Adaptive Importance Sampling in LFJ Local-JT in Multiply Sectioned Bayesian Networks

by Wu, Dan.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
95. Using Mutation in Fault Localization

by Sun, Chenglong.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
96. Vulnerabilities of the SSL/TLS Protocol

by Ćurguz, Jelena.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
97. Weights Stagnation in Dynamic Local Search for SAT

by Ishtaiwi, Abderaouf.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
98. A Proxy Signature Scheme Based on New Secure Authenticated Key Agreement Protocol

by Ekamchouchi, H.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
99. A Secure Digital Signature Scheme with Fault Tolerance Based on The Improved RSA System

by Ekamchouchi, H.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
100. Avoiding Duplicated Computation to Improve The Performance of PFSP on CUDA GPUs

by Wu, Chao-Chin.

Type: book Book; Format: print ; Literary form: not fiction Publisher: Computer Science and Information Technology ; Mayo-16Online Access: Click here to access online Availability: Copies available for loan: College Library (1).

Actions: Add to cart
No cover image available
Powered by Koha