An anthology of applied computer technologies
| Other Authors: | Muhammed Yusof, Zulkefli |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/20467/ http://irep.iium.edu.my/20467/1/toc_-_an_anthology.pdf |
Similar Items
Applying Neural Network to U2R Attacks
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Applying Fuzziness in Neural Symbolic-Integration
by: Farah Liyana, Azizan, et al.
Published: (2012)
by: Farah Liyana, Azizan, et al.
Published: (2012)
Applying Rough Set Theory for Student Clustering on Assessment Datasets
by: Suhirman, na, et al.
Published: (2013)
by: Suhirman, na, et al.
Published: (2013)
Knowledge management framework for Faculty of Computer Science & Information Technology University of Malaya / Vijayan Venggadasallam
by: Vijayan, Venggadasallam
Published: (2004)
by: Vijayan, Venggadasallam
Published: (2004)
Securely connecting student's computer into faculty network : case study : Faculty of Science and Technology, USIM
by: Abdullah, Zulhilmi
Published: (2007)
by: Abdullah, Zulhilmi
Published: (2007)
Applying Bayesian probability for Android malware detection using permission features
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
Cloud Computing Technology Setups to Support: The
Learning Management System (LMS) in Higher Education
Institutions in Oman
by: Alajmi, Qasim, et al.
Published: (2016)
by: Alajmi, Qasim, et al.
Published: (2016)
Applying multiple case studies research to investigate IT development outsourcing project risks.
by: Abdullah, Lili Marziana
Published: (2011)
by: Abdullah, Lili Marziana
Published: (2011)
An algebraic approach for sentence based feature extraction applied for automatic text summarization
by: Batcha, Nowshath Kadhar, et al.
Published: (2014)
by: Batcha, Nowshath Kadhar, et al.
Published: (2014)
Filtering approaches and mish activation function applied on handwritten chinese character recognition
by: Yingna, Zhong, et al.
Published: (2024)
by: Yingna, Zhong, et al.
Published: (2024)
Stock prediction by applying hybrid Clustering-GWO-NARX neural network technique
by: Das, Debashish, et al.
Published: (2017)
by: Das, Debashish, et al.
Published: (2017)
Applying covert channel in TCP Fast Open (TFO) / Mohamed Azran Aziz
by: Mohamed Azran , Aziz
Published: (2019)
by: Mohamed Azran , Aziz
Published: (2019)
Performance of different operation techniques applied in genetic algorithm towards benchmark functions
by: Ong, Chin Hwa
Published: (2018)
by: Ong, Chin Hwa
Published: (2018)
Grid portal technology for web based education of parallel computing courses, applications and researches
by: Alias, Norma, et al.
Published: (2009)
by: Alias, Norma, et al.
Published: (2009)
Preventing persistent cross-site scripting (XSS) attack by applying pattern filtering approach
by: Yusof, Imran, et al.
Published: (2014)
by: Yusof, Imran, et al.
Published: (2014)
Model-based hybrid variational level set method applied to lung cancer detection
by: Jing, Wang, et al.
Published: (2024)
by: Jing, Wang, et al.
Published: (2024)
Model-based hybrid variational level set method applied to object detection in grey scale images
by: Wang, Jing
Published: (2024)
by: Wang, Jing
Published: (2024)
Internal structure of computer systems
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Computer applications: theories and applications
Published: (2011)
Published: (2011)
Introduction of computer systems and applications
Published: (2011)
Published: (2011)
Visual computer: guest editorial
by: Shamsuddin, Siti Mariyam, et al.
Published: (2007)
by: Shamsuddin, Siti Mariyam, et al.
Published: (2007)
Rivisit grid computing security
by: Ismail, Saiful Adli, et al.
Published: (2008)
by: Ismail, Saiful Adli, et al.
Published: (2008)
CERT Technologies
by: Alenezi, Khalid, et al.
Published: (2015)
by: Alenezi, Khalid, et al.
Published: (2015)
CIT546 – Applied Informatics (Informatik Gunaan)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
Green computing: The importance of sustaining the peopleware
by: Noordin, Mohamad Fauzan
Published: (2015)
by: Noordin, Mohamad Fauzan
Published: (2015)
Metrics evaluation for context-aware computing
by: Mantoro, Teddy
Published: (2009)
by: Mantoro, Teddy
Published: (2009)
Cloud Computing: Analysis of Various Platforms
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Grid computing is a work in progress
by: Oxley, A.
Published: (2009)
by: Oxley, A.
Published: (2009)
Designing a Computer Literacy Course
by: Oxley, A.
Published: (2010)
by: Oxley, A.
Published: (2010)
Computational power of probabilistic bidirectional sticker system in DNA computing
by: Selvarajoo, Mathuri, et al.
Published: (2015)
by: Selvarajoo, Mathuri, et al.
Published: (2015)
A lightweight heterogeneous hybrid mobile cloud computing framework for compute-intensive mobile applications / Zohreh Sanaei Moghaddam
by: Moghaddam, Zohreh Sanaei
Published: (2014)
by: Moghaddam, Zohreh Sanaei
Published: (2014)
Investigating computer forensic tools and their searching technique
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Issues of human computer interactions and system developments
Published: (2011)
Published: (2011)
Brain & heart from computer science perspective
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015)
by: Pathan, Al-Sakib Khan
Published: (2015)
The computational power of Watson-Crick grammars: Revisited
by: Mohamad Zulkufli, Nurul Liyana, et al.
Published: (2016)
by: Mohamad Zulkufli, Nurul Liyana, et al.
Published: (2016)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Computational intelligence: It’s application in digital watermarking
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Cloud Computing: Architecture for Efficient Provision of Services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Similar Items
-
Applying Neural Network to U2R Attacks
by: Iftikhar , Ahmad, et al.
Published: (2010) -
Applying Fuzziness in Neural Symbolic-Integration
by: Farah Liyana, Azizan, et al.
Published: (2012) -
Applying Rough Set Theory for Student Clustering on Assessment Datasets
by: Suhirman, na, et al.
Published: (2013) -
Knowledge management framework for Faculty of Computer Science & Information Technology University of Malaya / Vijayan Venggadasallam
by: Vijayan, Venggadasallam
Published: (2004) -
Securely connecting student's computer into faculty network : case study : Faculty of Science and Technology, USIM
by: Abdullah, Zulhilmi
Published: (2007)