Items where Subject is "T Technology > T Technology (General)"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: D | G | H | I | J | K | L | M | O | S | T | W | Y
Number of items at this level: 22.

D

Das, Ramakrishna and Dutta, Saurabh (2013) An Approach of Private-Key Encryption Technique Based on Multiple Operators And Nth Even or Odd Term For Even or Odd Bit Position's Value of A Plain Text's Character. An Approach of Private-Key Encryption Technique Based on Multiple Operators And Nth Even or Odd Term For Even or Odd Bit Position's Value of A Plain Text's Character. p. 15. ISSN 2249 – 8958

Durbin, Paul T., Durbin, Paul T. (2012) A contrarian view of postmodern society and information technologies. Ai & Society, 28 (1). pp. 51-54.

G

Gupta, Ankit and M., Mahesh (2013) A Novel Recommendation Trust Proxy (RTP) Based Pre-emptive Malicious Node Detection Mechanism for AODV in MANET. A Novel Recommendation Trust Proxy (RTP) Based Pre-emptive Malicious Node Detection Mechanism for AODV in MANET, 2. pp. 1-6. ISSN 2278-733X

H

Harrison, William S, - and Tilbury, Dawn M, - (2011) A formal characterization and analysis for hardware-in-the-loop and hybrid process simulation during manufacturing system deployment. Springer-Verlag. pp. 151-169.

I

Indirani, G. and Selvakumar, K. (2013) Performance of Swarm Based Intrusion Detection System Under Different Mobility Conditions in MANET. Performance of Swarm Based Intrusion Detection System Under Different Mobility Conditions in MANET. pp. 1-7. ISSN 2250-2459

J

Jabbar, Emad K. (2013) Classification ofImages Using Decision Tree. Classification ofImages Using Decision Tree , 31 (6). pp. 1-12.

K

Kumar, Bhargav (2013) ON-CHIP ADDRESS AND TEST PATTERN GENERATION FOR IMAGE WATERMARKING SRAM. ON-CHIP ADDRESS AND TEST PATTERN GENERATION FOR IMAGE WATERMARKING SRAM. ISSN 2249-9954

L

L. Serna, - and C. Merlo, - and M. Zolghadri, - and S. Minel, - (2011) Actors’ networks management for design co-ordination. Springer-Verlag.

Liang, Qixuan and Chen, Shizhan and Feng, Zhiyong (2013) Application of Services Relation Tracing to Automated Web Service Composition. Application of Services Relation Tracing to Automated Web Service Composition.

M

Madalina Ioana Toma, - and Florin Gîrbacia, - and Csaba Antonya, - (2012) A comparative evaluation of human interaction for design and assembly of 3D CAD models in desktop and immersive. Springer-Verlag. pp. 179-193.

Massimo Martorelli, - (2013) A new approach in CT artifact removal: three cases study in maxillofacial surgery. Springer-Verlag. pp. 115-124.

Mishra, Sasmita and Mahapatra, Amitav (2013) A Survey on Digital Watermarking Techniques. A Survey on Digital Watermarking Techniques. pp. 1-6.

O

O.E. , Oguike (2013) Recursive Shortest Route Algorithm Using Abstract Data Type, Graph. Recursive Shortest Route Algorithm Using Abstract Data Type, Graph, 6 (2). pp. 1-12. ISSN 2006-1781

S

S. Scherer, - and M.Wabner, - (2008) Advanced visualization for finite elements analysis in virtual reality environments. Advanced visualization for finite elements analysis in virtual reality environments. pp. 169-172.

Shahana, Shahana T (2013) An Enhanced Security Technique for Steganography Using DCT and RSA. An Enhanced Security Technique for Steganography Using DCT and RSA.

Shaikh, Atique (2013) AGV routing using Dijkstra’s Algorithm. AGV routing using Dijkstra’s Algorithm. ISSN 2229-5518

Shojanazeri, Hamid and Azizun, Wan and Syed Ahmad, Sharifah Mumtadzah (2013) Video Watermarking Techniques for Copyright protection and Content Authentication. Video Watermarking Techniques for Copyright protection and Content Authentication, 5. pp. 652-660. ISSN 2150-7988

Singh, Jatinder Pal and Gupta, Anuj Kr. (2013) Protocol Stack based Security Vulnerabilities in MANETs. Protocol Stack based Security Vulnerabilities in MANETs, 69 (21). p. 17. ISSN 0975 – 8887

Singh , Gurvinder and Kaur, Talvinder (2013) A Duplication Based List Scheduling Genetic Algorithm for Scheduling Task on Parallel Processors. A Duplication Based List Scheduling Genetic Algorithm for Scheduling Task on Parallel Processors. pp. 1-10.

T

Thomas, Lintu Liz and Gopakumar, Dr. C. Gopakumar and Thomas, Antu Annam (2013) Face Recognition based on Gabor Wavelet and Backpropagation Neural Network. Face Recognition based on Gabor Wavelet and Backpropagation Neural Network, 4. pp. 1-6. ISSN 2229-5518

W

Wise, Alicia, - (2009) An Industry Copyright Infringement Portal to Combat Online Piracy. An Industry Copyright Infringement Portal to Combat Online Piracy. pp. 205-207.

Y

Yoshiyuki Shiroma, - and Masayuki Sakai, - and Tetsuo Sugi, - and Satoshi Masuda, - and Mutsuro Iwakoshi, - (2009) A Prototype manufacturing process for a health care IT appliance: a case study on an artery pulse monitoring system (APMOS). Springer-Verlag. pp. 135-146.

This list was generated on Tue Jun 15 22:21:24 2021 WIT.