Your search for 20697 returns 3637 document(s) |
An Anomaly detection algorithm for hyperspectral imagery using modified background error data, Hal. 3119-3122 |
Author: Ying Wang; Chunhul Zhao, Yulei Wang; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
White LED illumination for improving outdoor image analysis for palm oil fruit ripeness detection, 99-103 |
Author: N.M.A. Nik Haron, Z. Abdul Halim, I Mohd Saleh, H. Ibrahim, K. Musa and N. Fadzilah; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Efficient incomplete ellipse detection based on minor axis for ultrasound fetal head approximation |
Author: I Putu Satwika, M. Iqbal Tawakal, Zaki Imaduddin, Wisnu Jatmiko; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cattle's fur detection based on gaussian mixture model in complex background: application of automatic race classification of beef cattle |
Author: Ary Noviyanto, Aniati Murni Arymurthy; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementasi algoritma breadth first search dan obstacle detection dalam penelusuran labirin dinamis dengan menggunakan robot lego |
Author: Budianto, Lasguido, Fahry Fathurrahman, Adi Wibowo | Call Number: JURNAL ILMU KOMPUTER DAN INFORMASI, Vol. 4 No. 1 2011 | Type: UI-ana Indek Artikel
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Attention : attackER traceback using MAC layer abnormalilty detection, (LNCS-Lecture Notes in Computer Science 5576) Hal. 239-249 |
Author: Yongjin Kim; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Deployment value model for inrusion detection sensors, (LNCS-Lecture Notes in Computer Science 5576) Hal. 250-260 |
Author: Siraj A. Shaikh; Howard Chivers; Philip Nobles; John A. Clark; Hao Chen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A data mining framework for building intrusion detection models based on IPv6, (LNCS-Lecture Notes in Computer Science 5576) Hal 608-618 |
Author: Zenghui Liu; Yingxu Lai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Automatic detection of variable and value symmetries, (LNCS-Lecture Notes in Computer Science 3709) Hal 475-489 |
Author: Jean-Francois Puget; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Efficient detection of vacuity in ACTL formulas, (LNCS-Lecture Notes in Computer Science 1254) Hal 279-290 |
Author: Ilan Beer; Shoham Ben-David; Cindy Eisner; Yoav Rodeh; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|