Introduction of computer systems and applications
| Other Authors: | Shah, Asadullah |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/23759/ http://irep.iium.edu.my/23759/3/Book.pdf |
Similar Items
E-Learning: Introduction To Personal Computers/ Anwar Ahmad
by: Anwar, Ahmad
Published: (2001)
by: Anwar, Ahmad
Published: (2001)
Introduction
by: Kabir, M. Nomani, et al.
Published: (2019)
by: Kabir, M. Nomani, et al.
Published: (2019)
Computer applications: theories and applications
Published: (2011)
Published: (2011)
Introduction of affinity set and its application in data-mining example of delayed diagnosis
by: Chen, Yuh-Wen, et al.
Published: (2009)
by: Chen, Yuh-Wen, et al.
Published: (2009)
Computational intelligence: It’s application in digital watermarking
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
Internal structure of computer systems
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Network and traffic engineering in emerging distributed computing applications
by: Abawajy, Jemal H., et al.
Published: (2013)
by: Abawajy, Jemal H., et al.
Published: (2013)
DNA Computing and Its Application on NP Completeness
Problem
by: Hasudungan, Rofilde, et al.
Published: (2013)
by: Hasudungan, Rofilde, et al.
Published: (2013)
Out-of-core simplification with appearance preservation for computer game applications
by: Tan, Kim Heok
Published: (2006)
by: Tan, Kim Heok
Published: (2006)
Issues of human computer interactions and system developments
Published: (2011)
Published: (2011)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Computational power of probabilistic bidirectional sticker system in DNA computing
by: Selvarajoo, Mathuri, et al.
Published: (2015)
by: Selvarajoo, Mathuri, et al.
Published: (2015)
Interactive learning application for computer programming
by: Chong, Nui Mei
Published: (2018)
by: Chong, Nui Mei
Published: (2018)
A lightweight heterogeneous hybrid mobile cloud computing framework for compute-intensive mobile applications / Zohreh Sanaei Moghaddam
by: Moghaddam, Zohreh Sanaei
Published: (2014)
by: Moghaddam, Zohreh Sanaei
Published: (2014)
Final Year Project Management System For Faculty Of Computing
by: Nurayuni, Nordin Sin
Published: (2023)
by: Nurayuni, Nordin Sin
Published: (2023)
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
by: Muhammad Habib , Ur Rehman
Published: (2016)
by: Muhammad Habib , Ur Rehman
Published: (2016)
The development of level of detail (LOD) technique in 3D computer graphics application
by: Ismail, Nor Anita Fairos, et al.
Published: (2009)
by: Ismail, Nor Anita Fairos, et al.
Published: (2009)
Computational power of weighted splicing systems
by: Gan, Yee Siang, et al.
Published: (2014)
by: Gan, Yee Siang, et al.
Published: (2014)
Vision System for Item Recognition: Case Study Computer Peripherals
by: Yap, Choi Sen, et al.
Published: (2019)
by: Yap, Choi Sen, et al.
Published: (2019)
A Review on Soft Computing Technique in Intrusion Detection System
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
E-Computer Shop System (ECSS) / Lor Chee Loong
by: Lor , Chee Loong
Published: (2003)
by: Lor , Chee Loong
Published: (2003)
Introduction to E- learning
by: Aldhlan, Kawther A., et al.
Published: (2011)
by: Aldhlan, Kawther A., et al.
Published: (2011)
Invigilator system for UMP examination problem based on Faculty of Computer System & Software Engineering (FSKKP)
by: Noor Khairunnisa, Mat Yusof
Published: (2015)
by: Noor Khairunnisa, Mat Yusof
Published: (2015)
Simulating Electrohydrodynamic Ion-Drag Pumping on Distributed Parallel Computing Systems
by: Shakeel Ahmed, Kamboh, et al.
Published: (2017)
by: Shakeel Ahmed, Kamboh, et al.
Published: (2017)
Detecting and preventing unauthorised computer access on a physical network system
by: Mohd. Shariff, Muhammad Reza
Published: (2008)
by: Mohd. Shariff, Muhammad Reza
Published: (2008)
CST 102 - INTRODUCTION TO OPERATING SYSTEMS & DATA COMMUNICATIONS OKT 04
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
CST102 - INTRODUCTION TO OPERATING SYSTEMS & DATA COMMUNICATIONS APRIL 08.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CST102 - INTRODUCTION TO OPERATING SYSTEMS AND DATA COMMUNICATIONS - SEPT. 2002
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
CST 102 - INTRODUCTION TO OPERATING SYSTEMS AND DATA COMMUNICATIONS - OKT. 2004
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
Test case selection for penetration testing in mobile cloud computing applications: A proposed technique
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
Internet and distributed computing advancements : theoretical frameworks and practical applications
by: Abawajy, Jemal, et al.
Published: (2012)
by: Abawajy, Jemal, et al.
Published: (2012)
Computer security factors effects towards online usage of internet banking system
by: Al-Shawabkeh, Mahmoud M. M., et al.
Published: (2014)
by: Al-Shawabkeh, Mahmoud M. M., et al.
Published: (2014)
Computer security factors effects towards online usage of internet banking system
by: Al-Shawabkeh, Mahmoud, et al.
Published: (2015)
by: Al-Shawabkeh, Mahmoud, et al.
Published: (2015)
Advisory system on how to start small computer business / Ahmad Mawardi Amran
by: Ahmad Mawardi , Amran
Published: (2001)
by: Ahmad Mawardi , Amran
Published: (2001)
A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment
by: Al-Zarqawee, Aws Naser
Published: (2018)
by: Al-Zarqawee, Aws Naser
Published: (2018)
A theoretical framework for the adoption of cloud computing in hospital information systems /Shady Gomaa Abdulaziz
by: Shady Gomaa , Abdulaziz
Published: (2021)
by: Shady Gomaa , Abdulaziz
Published: (2021)
Grid portal technology for web based education of parallel computing courses, applications and researches
by: Alias, Norma, et al.
Published: (2009)
by: Alias, Norma, et al.
Published: (2009)
Monitoring Unusual Activity Using Remote-Controlled Computer and Android Based Application
by: Chitra, Batumalai, et al.
Published: (2019)
by: Chitra, Batumalai, et al.
Published: (2019)
An anthology of applied computer technologies
Published: (2011)
Published: (2011)
Visual computer: guest editorial
by: Shamsuddin, Siti Mariyam, et al.
Published: (2007)
by: Shamsuddin, Siti Mariyam, et al.
Published: (2007)
Similar Items
-
E-Learning: Introduction To Personal Computers/ Anwar Ahmad
by: Anwar, Ahmad
Published: (2001) -
Introduction
by: Kabir, M. Nomani, et al.
Published: (2019) -
Computer applications: theories and applications
Published: (2011) -
Introduction of affinity set and its application in data-mining example of delayed diagnosis
by: Chen, Yuh-Wen, et al.
Published: (2009) -
Computational intelligence: It’s application in digital watermarking
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)