Skip to main content
Laser scanners have a lot of advantages over conventional video cameras. Data processing in laser scanner system becomes faster and easier because there is no need to record real world videos. Besides, the problem of private life... more
  • Download
    • by  and +1
As an enormous computing power is required to get knowledge from a large volume of data, the parallel and distributed computing is highly recommended to process them. Artificial Neural Networks (ANNs) need as much as possible data to have... more
  • Download
    • by  and +1
    •   3  
      Parallel Computing, Object Tracking (Computer Vision), High Performance Computing (HPC)
    • by  and +1
Page 1. A Methodology of Finding Investment Opportunities in South Asia Through Data Mining And Decision Analysis Jamal Muhammad Fahim-ul-Aqlb', Irfan Manarvt',Jamil Ahmed", KashifKhan4 , Salman Zafar5 1345Iqra ...
    • by  and +1
    •   10  
      Data Mining, South Asia, Quality of life, Decision Analysis
  • Download
    • by 
    •   8  
      Computer Engineering, Data Compression, Routing algorithm, Sensor Network
Sensor networks have been used extensively in many applications to monitor different phenomena in the monitored field. These networks have to continue working without interruption for better monitoring as well as to satisfy the... more
    • by 
  • Download
    • by 
    • by  and +1
    • by 
    • by 
Abstract Sensor networks have been used extensively in many applications to monitor different phenomena in the monitored field. These networks have to continue working without interruption for better monitoring as well as to satisfy the... more
    • by  and +1
    • by 
  • Download
    • by 
Qur'an, AL-Sunnah and Islamic traditional books are the rich resources for Muslims that used as the sole authoritative source of knowledge, wisdom and law. The challenge for computer scientists is to extract and represent these knowledge,... more
    • by 
    •   2  
      Data Mining, Cloud Computing
Abstract We propose a novel approach for the collaborative enforcement of security policies in distributed systems that is based on the dynamic (re-) deployment of multiple PDPs. The policies enforced by the collaborating PDPs are... more
    • by 
    • Network Security.  Risk Management.  Secure Online Banking.  Policy Based Management Systems.  Access Control Systems.
  • Download
    • by 
  • Download
    • by 
  • Download
    • by 
  • Download
    • by 
  • Download
    • by