Search
Now showing items 81-87 of 87
Forensic handwritten document management system
(
IEEE
, 2008 , Conference Paper)
[No abstract available]
Data Mining, Reasoning and Incremental Information Retrieval through Non Enlargeable Rectangular Relation Coverage
(
Springer Berlin / Heidelberg
, 2009 , Conference Paper)
Association rules extraction from a binary relation as well as reasoning and information retrieval are generally based on the initial representation of the binary relation as an adjacency matrix. This presents some ...
A new construction technique of a triangle-free 3-colored K16’s
(
Elsevier Inc
, 2006 , Article)
In this paper, we propose a new coloring technique of the edges of the complete graph on 16 vertices, K16, with three different colors, without producing any monochromatic triangle. This method is totally different from ...
Fuzzy Expert System for Defect Classification for Non-Destructive Evaluation of Petroleum Pipes
(
IEEE
, 2007 , Conference Paper)
In this paper, an expert system has been outlined to classify the defects in metallic petroleum pipelines using acoustic techniques with non-destructive evaluation (NDE) protocols, the proposed system maps the quantitative ...
Cross-Layer Optimal Rate Allocation for Heterogeneous Wireless Multicast
(
Hindawi Publishing Corporation
, 2009 , Article)
Heterogeneous multicast is an efficient communication scheme especially for multimedia applications running over multihop networks. The term heterogeneous refers to the phenomenon when multicast receivers in the same session ...
Security Dynamics of Cloud Computing
(
Cutter Consortium
, 2009 , Article)
This paper explores various dimensions of cloud computing security. It argues that security concerns of cloud computing need to be addressed from the perspective of individual stakeholder. Security focuses of cloud computing ...
MB-C: Check-in mobile application using barcodes
(
International Business Information Management Association, IBIMA
, 2008 , Conference Paper)
This project involves the design and development of a mobile application, called Mobile Bar-Code (MB-C) that uses the bar-code concept in the process of check-in to the provider's venue or facility. The MB-C integrates ...