564 results on '"M. Alim"'
Search Results
202. Poster: RailCop: Detecting Missing Rail on Railway Using Wireless Sensor Networks.
203. Poster: Power Attack in Body Area Networks: Dream or Reality?
204. Securing Firearms inside An Arsenal through Using A Remotely-Operated Sensor-Based Safety Mechanism
205. ”A Tale on Abuse and Its Detection over Online Platforms, Especially over Emails”: From the Context of Bangladesh
206. Feature and Performance Based Comparative Study on Serverless Frameworks
207. DhakaNet: Unstructured Vehicle Detection using Limited Computational Resources
208. Fault Tolerance Analysis of Car-Following Models for Autonomous Vehicles.
209. Emergency Planning for UAV-Controlled Crowd Evacuations
210. Identification of Plant Leaf Diseases using Deep Convolutional Neural Network with Less Computational Power
211. Citadel: An Automated Abuse Detection System to Detect and Prevent Abusive Behaviors over Emails [Poster]
212. Pulmonary Alveolar Microlithiasis and Rheumatoid Arthritis: A Case Report and Review of the Literature
213. Orchestrating Image Retrieval and Storage over A Cloud System
214. 'Is It Really Dead?' -Digging into Dead Brains through Analyzing Its Behavior in Response to Inducing External Impulses
215. Telaah Hadits Hak-Hak Istri Dalam Rumah Tangga
216. Crowd Evacuation in Hajj Stoning Area: Planning through Modeling and Simulation
217. Dakter Bari
218. Towards Greening MapReduce Clusters Considering Both Computation Energy and Cooling Energy
219. Oxygen flow rate effect on copper oxide thin films deposited by radio frequency magnetron sputtering
220. Névralgie du trijumeau
221. Human-Survey Interaction (HSI): A Study on Integrity of Human Data Collectors in a Mass-Scale Hajj Pilgrimage Survey
222. Scaling Up Bit-Flip Quantum Error Correction
223. Solving The Maze of Diagnosing Parkinson’s Disease based on Portable EEG Sensing to be Adaptable to Go In-The-Wild
224. Network Intrusion Detection System based on Conditional Variational Laplace AutoEncoder
225. Enhancing Fidelity of Quantum Cryptography using Maximally Entangled Qubits
226. Leveraging Free-Hand Sketches for Potential Screening of PTSD
227. Learning from Tweets: Opportunities and Challenges to Inform Policy Making During Dengue Epidemic
228. Asian CHI Symposium: HCI Research from Asia and on Asian Contexts and Cultures
229. Improvement in Electromechanical and Electrochemical of Low Carbon Steel Samples by PIII Treatment
230. Template-Based Space-Saving Approach for SMS Storage in A Server
231. As You Are, So Shall You Move Your Head: A System-Level Analysis between Head Movements and Corresponding Traits and Emotions
232. Telaah Hadits Hak-Hak Istri Dalam Rumah Tangga
233. The erosion groove effects on RF planar magnetron sputtering
234. Interference Aware Reliable Cooperative Cognitive Networks for Real-Time Applications
235. Abstract C098: Racial disparity in the prevalence of BCL-2 expression and associations with breast cancer survival in the Breast Cancer Care in Chicago study
236. INTERAKSI DAN PEMAHAMAN HADIS (TELAAH HERMENEUTIS PEMIKIRAN YUSUF AL-QARADAWI)
237. Gas pressure effect on plasma transport in a magnetic-filtered radio-frequency plasma source
238. A Sweet Recipe for Consolidated Vulnerabilities: Attacking a Live Website by Harnessing a Killer Combination of Vulnerabilities for Greater Harm
239. A New Approach for Selecting Aggregated Multicast Trees to Reduce Forwarding States
240. Conjugate Congestion Control Based Transport Layer Protocol for Molecular Communication in Body Area Nanonetworks (BANs)
241. Super-savior: An Independent Open Platform Wearable for Generating Emergency Alarms
242. svLoad: An Automated Test-Driven Architecture for Load Testing in Cloud Systems
243. GMC: Greening MapReduce Clusters Considering Both Computational Energy and Cooling Energy
244. A Digitally Generated 3D Dental Model for Assessment of Radiotherapy Doses to the Dentition in Oropharyngeal Cancer Patients for Pre-IMRT Dental Treatment Planning
245. Fault-tolerant design method for tizen applications considering core- and API-level faults
246. A framework for extractive text summarization using semantic graph based approach
247. As you are, so shall you move your head
248. Template-Based Space-Saving Approach for SMS Storage in A Server
249. How smart your smartphone is in lie detection?
250. HEliOS
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.