Search Result Save to File Save as CSV
Your search for 20697 returns 3637 document(s)
An Anomaly detection algorithm for hyperspectral imagery using modified background error data, Hal. 3119-3122
Author: Ying Wang; Chunhul Zhao, Yulei Wang; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
White LED illumination for improving outdoor image analysis for palm oil fruit ripeness detection, 99-103
Author: N.M.A. Nik Haron, Z. Abdul Halim, I Mohd Saleh, H. Ibrahim, K. Musa and N. Fadzilah; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient incomplete ellipse detection based on minor axis for ultrasound fetal head approximation
Author: I Putu Satwika, M. Iqbal Tawakal, Zaki Imaduddin, Wisnu Jatmiko; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Cattle's fur detection based on gaussian mixture model in complex background: application of automatic race classification of beef cattle
Author: Ary Noviyanto, Aniati Murni Arymurthy; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Implementasi algoritma breadth first search dan obstacle detection dalam penelusuran labirin dinamis dengan menggunakan robot lego
Author: Budianto, Lasguido, Fahry Fathurrahman, Adi Wibowo | Call Number: JURNAL ILMU KOMPUTER DAN INFORMASI, Vol. 4 No. 1 2011 | Type: UI-ana Indek Artikel
Find Similar |  Add To Favorites |  Detail in New Window 
Attention : attackER traceback using MAC layer abnormalilty detection, (LNCS-Lecture Notes in Computer Science 5576) Hal. 239-249
Author: Yongjin Kim; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Deployment value model for inrusion detection sensors, (LNCS-Lecture Notes in Computer Science 5576) Hal. 250-260
Author: Siraj A. Shaikh; Howard Chivers; Philip Nobles; John A. Clark; Hao Chen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A data mining framework for building intrusion detection models based on IPv6, (LNCS-Lecture Notes in Computer Science 5576) Hal 608-618
Author: Zenghui Liu; Yingxu Lai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Automatic detection of variable and value symmetries, (LNCS-Lecture Notes in Computer Science 3709) Hal 475-489
Author: Jean-Francois Puget; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient detection of vacuity in ACTL formulas, (LNCS-Lecture Notes in Computer Science 1254) Hal 279-290
Author: Ilan Beer; Shoham Ben-David; Cindy Eisner; Yoav Rodeh; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   18 19 20 21 22 23 24 25 26 27  Next