SINDH UNIVERSITY RESEARCH JOURNAL (SCIENCE SERIES)
暂无分享,去创建一个
A. N. Khizer | Amir Mahmood Soomro | Shahnawaz Farhan Khahro | Amjad Ali Syed | Arbab Nighat Khizer | Kavita Tabbassum | A. M. Soomro | Kavita Tabbassum | A. Soomro | Multiphase Boost-Half-Bridge | A. A. Syed | Multiphase Boost-Half-Bridge | S. F. Khahro
[2] Andy Hopper,et al. A new location technique for the active office , 1997, IEEE Wirel. Commun..
[3] M. Madalena Martins. Note on irreducible diagonally dominant matrices and the convergence of the AOR iterative method , 1981 .
[4] Andrew J. Viterbi,et al. On the capacity of a cellular CDMA system , 1991 .
[5] F. Stagnari,et al. Effects of N fertilizers and rates on yield, safety and nutrients in processing spinach genotypes , 2007 .
[6] Ching Y. Suen,et al. Thinning Methodologies - A Comprehensive Survey , 1992, IEEE Trans. Pattern Anal. Mach. Intell..
[7] E. P. Papadopoulou,et al. Block AOR iterative schemes for large-scale least-squares problems , 1989 .
[8] Serge Galam. The September 11 attack: A percolation of individual passive support , 2002 .
[9] Parveen Kakkar,et al. Traffic Pattern based performance comparison of Reactive and Proactive protocols of Mobile Ad-hoc Networks , 2010 .
[10] Jaydip Sen,et al. Security and Privacy Issues in Cloud Computing , 2013, ArXiv.
[11] R. S. Sawhney,et al. Metrics improvement of MANET using reactive protocols approach , 2012, 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing.
[12] A. Kumaravel,et al. Introducing an Efficient Programming Paradigm for Object-oriented Distributed Systems , 2013 .
[13] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[14] J. Owen,et al. Transitional flow between contra-rotating disks , 1994, Journal of Fluid Mechanics.
[16] John C. Batchelor,et al. Covert dual-band wearable button antenna , 2006 .
[17] Liadh Kelly,et al. The Role Of Places And Spaces In Lifelog Retrieval , 2009 .
[18] David L. Hicks,et al. How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks , 2007, ADMA.
[19] Yongik Yoon,et al. Intelligent Smart Cloud Computing for Smart Service , 2010, FGIT-GDC/CA.
[20] A. Morse. Application of a Low Reynolds Number k–ε Turbulence Model to High-Speed Rotating Cavity Flows , 1991 .
[21] Anindo Banerjea,et al. Network support for multimedia: a discussion of the Tenet approach , 1994 .
[22] Sewan Choi,et al. An Improved Current-Fed ZVS Isolated Boost Converter for Fuel Cell Applications , 2010, IEEE Transactions on Power Electronics.
[23] Roger W. Hill,et al. Direct numerical simulations of turbulent forced convection between counter-rotating disks , 1999 .
[24] Superposed flow between two discs contrarotating at differential speeds , 1994 .
[25] T. Vincenty. DIRECT AND INVERSE SOLUTIONS OF GEODESICS ON THE ELLIPSOID WITH APPLICATION OF NESTED EQUATIONS , 1975 .
[26] Shao-Yi Chien,et al. Algorithm and Architecture Design of Perception Engine for Video Coding Applications , 2011, IEEE Transactions on Multimedia.
[27] Hyun-il Lim,et al. Detecting code theft via a static instruction trace birthmark for Java methods , 2008, 2008 6th IEEE International Conference on Industrial Informatics.
[28] Shahram Izadi,et al. SenseCam: A Retrospective Memory Aid , 2006, UbiComp.
[29] Ruowei Zhou,et al. A novel single-pass thinning algorithm and an effective set of performance criteria , 1995, Pattern Recognit. Lett..
[30] Yang Xiang,et al. Software Similarity and Classification , 2012, SpringerBriefs in Computer Science.
[31] Tony Wong,et al. Optimum sectorization for CDMA 1900 base stations , 1997, 1997 IEEE 47th Vehicular Technology Conference. Technology in Motion.
[32] Syed Irfan Hyder,et al. Efficiency and Performance Analysis of On-demand Routing Protocols in Autonomous System , 2011 .
[33] T. Mishima,et al. Boost-Half Bridge Single Power Stage PWM DC-DC Converter for Small Scale Fuel Cell Stack , 2006, 2006 IEEE International Power and Energy Conference.
[34] Yongzhong Song,et al. Modified AOR methods for linear complementarity problem , 2003, Appl. Math. Comput..
[35] Philippe Poignet,et al. Dermarob: A safe robot for reconstructive surgery , 2003, IEEE Trans. Robotics Autom..
[36] A. Sari,et al. Biosorption of As(III) and As(V) from aqueous solution by macrofungus (Inonotus hispidus) biomass: equilibrium and kinetic studies. , 2009, Journal of hazardous materials.
[37] M. Madalena Martins,et al. On an accelerated overrelaxation iterative method for linear systems with strictly diagonally dominant matrix , 1980 .
[38] Yunhao Liu,et al. ANDMARC: Indoor Location Sensing Using Active RFID , 2003, PerCom.
[39] Hyun-il Lim,et al. Detecting Java Theft Based on Static API Trace Birthmark , 2008, IWSEC.
[40] Ayyoub Akbari-Moghanjoughi,et al. A Review and Performance Analysis of Reactive and Proactive Routing Protocols on MANET , 2012, Netw. Commun. Technol..
[41] Apostolos Hadjidimos,et al. Accelerated overrelaxation method , 1978 .
[42] Zhang Yi,et al. A class of binary images thinning using two PCNNs , 2007, Neurocomputing.
[43] P. Zetterberg. Performance of three, six, nine and twelve sector sites in CDMA - based on measurements , 2004, Eighth IEEE International Symposium on Spread Spectrum Techniques and Applications - Programme and Book of Abstracts (IEEE Cat. No.04TH8738).
[44] P.D. Ziogas,et al. Analysis and design of a three-phase offline DC-DC converter with high frequency isolation , 1988, Conference Record of the 1988 IEEE Industry Applications Society Annual Meeting.
[45] Young-June Choi,et al. Interference-based capacity analysis in CDMA cellular systems , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[46] E. Niemela,et al. Feature modelling of component-based embedded software , 1997, Proceedings Eighth IEEE International Workshop on Software Technology and Engineering Practice incorporating Computer Aided Software Engineering.
[47] Huang-Cheng Kuo,et al. An efficient incremental mining algorithm-QSD , 2007, Intell. Data Anal..
[48] Peter J. Brown,et al. Context-aware applications: from the laboratory to the marketplace , 1997, IEEE Wirel. Commun..
[49] Sa'adah Hassan,et al. Feasibility Study of Aspect Mining at Requirement Level , 2014 .
[50] Yu Sun,et al. Video transcoding: an overview of various techniques and research issues , 2005, IEEE Transactions on Multimedia.
[51] S. Riter,et al. Automatic vehicle location—An overview , 1977, IEEE Transactions on Vehicular Technology.
[52] P. Salonen,et al. A novel fabric WLAN antenna for wearable applications , 2003, IEEE Antennas and Propagation Society International Symposium. Digest. Held in conjunction with: USNC/CNC/URSI North American Radio Sci. Meeting (Cat. No.03CH37450).
[53] Abdel-Ouahab Boudraa,et al. Speech Enhancement via EMD , 2008, EURASIP J. Adv. Signal Process..
[54] Norihiro Hagita,et al. Collaborative capturing, interpreting, and sharing of experiences , 2006, Personal and Ubiquitous Computing.
[55] N. Chaubey,et al. Performance evaluation of DSR, OLSR and ZRP protocols in MANETs , 2012, 2012 International Conference on Computer Communication and Informatics.
[56] Ramakrishnan Srikant,et al. Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.
[57] Senglee Foo,et al. On higher-order-sectorization cellular arrays , 2014, 2014 IEEE Antennas and Propagation Society International Symposium (APSURSI).
[58] Peter A. Rogerson,et al. Cellular network configuration with co-channel and adjacent-channel interference constraints , 2008, Comput. Oper. Res..
[59] M. Sajid,et al. Impact of nitrogen and phosphorus on seed yield and yield components of okra cultivars. , 2012 .
[60] Bradford W. Parkinson,et al. Global Positioning System (GPS) , 2003 .
[61] Sewan Choi,et al. Multiphase DC–DC Converters Using a Boost-Half-Bridge Cell for High-Voltage and High-Power Applications , 2011, IEEE Transactions on Power Electronics.
[62] B. P. Lathi,et al. Modern Digital and Analog Communication Systems , 1983 .
[63] Bhat.M Subramanya,et al. A Performance Study of Proactive, Reactive and Hybrid Routing Protocols using Qualnet Simulator , 2011 .
[64] David Hilley,et al. Cloud Computing: A Taxonomy of Platform and Infrastructure-level Offerings , 2009 .
[65] Dan Cosley,et al. Pensieve: supporting everyday reminiscence , 2010, CHI.
[66] Somchai Jitapunkul,et al. Automatic face color segmentation based rate control for low bit-rate video coding , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[67] Pascal Frossard,et al. Joint source/FEC rate selection for quality-optimal MPEG-2 video delivery , 2001, IEEE Trans. Image Process..
[68] Constantine A. Balanis,et al. Antenna Theory: Analysis and Design , 1982 .
[69] Hadjer Ykhlef,et al. A smoothed Minimum Mean-Square Error Log-Spectral Amplitude estimator for speech enhancement , 2014, 2014 International Conference on Multimedia Computing and Systems (ICMCS).
[70] Sewan Choi,et al. A Three-Phase Zero-Voltage and Zero-Current Switching DC–DC Converter for Fuel Cell Applications , 2010, IEEE Transactions on Power Electronics.
[71] I. P. Castro,et al. Studies in numerical computations of recirculating flows , 1987 .
[72] Marios S. Pattichis,et al. Wireless telemedicine systems: an overview , 2002 .
[73] Rafael C. González,et al. Digital image processing using MATLAB , 2006 .
[74] Tanzeem Choudhury,et al. The Sociometer: A Wearable Device for Understanding Human Networks , 2002 .
[75] K. Ball,et al. Chebyshev Collocation Analysis of Axisymmetric Flow and Heat Transfer Between Counter-Rotating Disks , 1997 .
[76] Z. Firoz. Impact of nitrogen and phosphorus on the growth and yield of okra [ Abelmoschus esculentus (L.) Moench] in hill slope condition , 2010 .
[77] Mohamed Tayeb Laskri,et al. Modularization of Crosscutting Concerns in Requirements Engineering , 2008, Int. Arab J. Inf. Technol..
[78] Catherine E. Lewis,et al. Tactile Feedback Induces Reduced Grasping Force in Robot-Assisted Surgery , 2009, IEEE Transactions on Haptics.
[79] Basel Kikhia,et al. Reminiscence processes using life-log entities for persons with mild dementia , 2009 .
[80] Ronald H. Perrott,et al. An improved parallel thinning algorithm , 1987, CACM.
[81] Sencun Zhu,et al. Behavior based software theft detection , 2009, CCS.
[82] J. M. Owen,et al. Heat Transfer From Air-Cooled Contrarotating Disks , 1997 .
[83] A novel polarization rotating frequency selective surface based on substrate integrated waveguide technology , 2009, 2009 European Microwave Conference (EuMC).
[84] S. H. Hasan,et al. Biosorption of arsenic from aqueous solution using agricultural residue 'rice polish'. , 2009, Journal of hazardous materials.
[85] Yukio Ohsawa,et al. Analyzing covert social network foundation behind terrorism disaster , 2007, ArXiv.
[86] P. Kuppusamy,et al. A study and comparison of OLSR, AODV and TORA routing protocols in ad hoc networks , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[87] R. Leigh,et al. Effect of potassium fertilizer on the yield, quality and potassium offtake of sugar beet crops grown on soils of different potassium status , 2000, The Journal of Agricultural Science.
[88] Jeng-Shin Sheu,et al. Cell sectorization and power management for inter-cell interference coordination in OFDMA-based network MIMO systems , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[89] Harvey Cohn,et al. Introduction to the construction of class fields , 1985 .
[90] William E. Lorensen,et al. Object-Oriented Modeling and Design , 1991, TOOLS.
[91] Remi Manceau,et al. Recent progress in the development of the Elliptic Blending Reynolds-stress model , 2015 .
[92] John Abraham,et al. Distributed Semantic Web Data Management in HBase and MySQL Cluster , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[93] Véronique Vèque,et al. A Medium Access Delay MAC aware metric for Multihop Wireless Networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[94] Hsinchun Chen,et al. CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.
[95] Daniele Trinchero,et al. Concealable, low-cost paper-printed antennas for WISP-based RFIDs , 2011, 2011 IEEE International Conference on RFID.
[96] Trang Dinh Dang,et al. Fractal analysis and modeling of VoIP traffic , 2004, 11th International Telecommunications Network Strategy and Planning Symposium. NETWORKS 2004,.
[97] Meenakshi Sharma,et al. Network traffic based assessment of reactive, proactive and hybrid MANET protocols , 2014 .
[98] A Rossi,et al. A telerobotic haptic system for minimally invasive stereotactic neurosurgery , 2005, The international journal of medical robotics + computer assisted surgery : MRCAS.
[99] A. Abdel-Mawgoud,et al. Effect of Plant Density and Nitrogen Application on the Growth, Yield and Quality of Radish (Raphanus sativus L.) , 2005 .
[100] Zakir Ali,et al. Performance analysis of first iteration koch curve fractal log periodic antenna of varying flare angles , 2012 .
[101] Kangchan Lee. Security Threats in Cloud Computing Environments 1 , 2012 .
[102] Kai-Uwe Schmidt,et al. Bounds on the PMEPR of Translates of Binary Codes , 2010, IEEE Communications Letters.
[103] Rodney A. Brooks,et al. Symbolic Reasoning Among 3-D Models and 2-D Images , 1981, Artif. Intell..
[104] Muhsin Kilic,et al. Flow Between Contrarotating Disks , 1995 .
[105] Edmund Lai,et al. Practical digital signal processing for engineers and technicians , 2004 .
[106] Jyrki Hoisko. Context triggered visual episodic memory prosthesis , 2000, Digest of Papers. Fourth International Symposium on Wearable Computers.
[107] S. MacGregor,et al. Experimental study of the flow in the cavity between rotating disks , 1993 .
[108] F. Montemurro,et al. Effect of nitrogen fertilisation reduction on yield, quality and N utilisation of processing spinach , 2008 .
[109] P. Struik,et al. Effects of nitrogen on accumulation and partitioning of dry matter and nitrogen of vegetables. 3. Spinach , 1995 .
[110] John Daly,et al. Increasing throughput in cellular networks with higher-order sectorization , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.
[111] A. Rezaee,et al. Removal of Arsenic Using Acetobacter xylinum Cellulose , 2008 .
[112] Damith Chinthana Ranasinghe,et al. Framework for preventing falls in acute hospitals using passive sensor enabled radio frequency identification technology , 2012, 2012 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[113] S. Barak,et al. Mild salinity stimulates a stress-induced morphogenic response in Arabidopsis thaliana roots , 2009, Journal of experimental botany.
[114] Matthew L. Lee,et al. Using lifelogging to support recollection for people with episodic memory impairment and their caregivers , 2008, HealthNet '08.
[115] James Bret Michael,et al. Cloud to cloud interoperability , 2011, 2011 6th International Conference on System of Systems Engineering.
[116] I. Barbi,et al. A three-phase ZVS PWM DC/DC converter with asymmetrical duty cycle associated with a three-phase version of the hybridge rectifier , 2005, IEEE Transactions on Power Electronics.
[117] William R. Raun,et al. Improving Nitrogen Use Efficiency for Cereal Production , 1999 .
[118] Allison M. Okamura,et al. Friction Compensation for Enhancing Transparency of a Teleoperator With Compliant Transmission , 2007, IEEE Transactions on Robotics.
[119] Venkata Sravan Kumar Maddineni,et al. Security Techniques for protecting data in Cloud Computing , 2012 .
[120] Weiping Li,et al. Overview of fine granularity scalability in MPEG-4 video standard , 2001, IEEE Trans. Circuits Syst. Video Technol..
[121] David L. Donoho,et al. De-noising by soft-thresholding , 1995, IEEE Trans. Inf. Theory.
[122] Kwan-Hee Yoo,et al. A Content Oriented Smart Education System based on Cloud Computing , 2013, MUE 2013.
[123] Jack H. Winters,et al. Smart antennas for wireless systems , 1998, IEEE Wirel. Commun..
[124] P. Enjeti,et al. A Three-Phase Current-Fed DC/DC Converter With Active Clamp for Low-DC Renewable Energy Sources , 2008, IEEE Transactions on Power Electronics.
[125] Toyotaro Suzumura,et al. Elastic Stream Computing with Clouds , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[126] Panagiotis Kanellis,et al. Digital Crime And Forensic Science in Cyberspace (N/A) , 2006 .
[127] Yangfeng Wu. Overweight and obesity in China , 2006, BMJ : British Medical Journal.
[128] Myoungjin Kim,et al. Performance Evaluation of Image Conversion Module Based on MapReduce for Transcoding and Transmoding in SMCCSE , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.
[129] Md. Tanvir Hasan,et al. Performance evaluation of various vocoders in mobile ad hoc network (MANET) , 2010, International Conference on Electrical & Computer Engineering (ICECE 2010).
[130] Jon Crowcroft,et al. A case for dynamic sender-based reservations in the Internet , 1998, J. High Speed Networks.
[131] C. Pfeiffer,et al. Millimeter-Wave Transmitarrays for Wavefront and Polarization Control , 2013, IEEE Transactions on Microwave Theory and Techniques.
[132] Hajo Hippner,et al. Text Mining , 2006, Informatik-Spektrum.
[133] Z. Czaplicki,et al. Selecting method and test conditions for accurate determination of yarn twist , 2000 .
[134] Y. Saridakis,et al. On exact convergence of the accelerated overrelaxation method when applied to consistently ordered systems , 1990 .
[135] P. A. Funk,et al. Summary of cyclone research at two USDA-ARS ginning laboratories. , 2000 .
[136] K.P. Esselle,et al. A novel absorb/transmit FSS for secure indoor wireless networks with reduced multipath fading , 2006, IEEE Microwave and Wireless Components Letters.
[137] Mohamed Ould-Khaoua,et al. Performance Analysis of MANET Routing Protocols in the Presence of Self-Similar Traffic , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[138] Ben A. Munk,et al. Frequency Selective Surfaces: Theory and Design , 2000 .
[139] Christian S. Collberg,et al. Software theft detection through program identification , 2006 .
[140] M. A. Malana,et al. Groundwater pollution with special focus on arsenic, Dera Ghazi Khan-Pakistan , 2011 .
[141] Hyun-il Lim,et al. Customizing k-Gram Based Birthmark through Partial Matching in Detecting Software Thefts , 2013, 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops.
[142] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[143] J. Gillis,et al. Matrix Iterative Analysis , 1961 .
[144] Mikhail Belkin,et al. Automatic Annotation of Daily Activity from Smartphone-Based Multisensory Streams , 2012, MobiCASE.
[145] Anindya Sengupta,et al. Crime Analyses Using R , 2014 .
[146] R H Taylor,et al. System for robotically assisted percutaneous procedures with computed tomography guidance. , 2001, Computer aided surgery : official journal of the International Society for Computer Aided Surgery.
[147] Pritam Singh,et al. Arsenic removal from contaminated water by natural iron ores , 2004 .
[148] T. Nakajima,et al. Adsorption and removal of arsenic(V) from drinking water by aluminum-loaded Shirasu-zeolite. , 2002, Journal of hazardous materials.
[149] D.Vijayakumar V. Saravanan. Performance Of Reactive And Proactive MANET Routing Protocols With Trajectories , 2012 .
[150] S. Boll,et al. Suppression of acoustic noise in speech using spectral subtraction , 1979 .
[151] V. J. Garg,et al. Application of adaptive array antenna to a TDMA cellular/PCS system , 1997 .
[152] Ch. V. Rama Rao,et al. Speech enhancement using perceptual Wiener filter combined with unvoiced speech — A new Scheme , 2011 .
[153] David G. Lowe,et al. Three-Dimensional Object Recognition from Single Two-Dimensional Images , 1987, Artif. Intell..
[154] R. M. C. So,et al. On near-wall turbulent flow modelling , 1990, Journal of Fluid Mechanics.
[155] Beresford N. Parlett,et al. On generalized successive overrelaxation methods for augmented linear systems , 2005, Numerische Mathematik.
[156] R. Neil Braithwaite. Using Walsh code selection to reduce the power variance of band-limited forward-link CDMA waveforms , 2000, IEEE Journal on Selected Areas in Communications.
[157] Ivo Barbi,et al. A three-phase ZVS PWM DC/DC converter with asymmetrical duty cycle for high power applications , 2005 .
[158] Cong Jin,et al. Software Defect Prediction Scheme Based on Feature Selection , 2012, 2012 Fourth International Symposium on Information Science and Engineering.
[159] Herbert Hamers,et al. On Heterogeneous Covert Networks , 2008 .
[160] G. Wickens,et al. Agricultural Innovation in the Early Islamic World , 1986 .
[161] Subhajyoti Bandyopadhyay,et al. Cloud computing - The business perspective , 2011, Decis. Support Syst..
[162] Chao Mei,et al. CloudStream: Delivering high-quality streaming videos through a cloud-based SVC proxy , 2011, 2011 Proceedings IEEE INFOCOM.
[163] Anita M. McGahan,et al. Jacob N. Shapiro: The Terrorist’s Dilemma: Managing Violent Covert Organizations , 2015 .
[164] Kyo Chul Kang,et al. Feature-Oriented Domain Analysis (FODA) Feasibility Study , 1990 .
[165] Derek McAuley,et al. The desk area network , 1991, OPSR.
[166] S. Patankar. Numerical Heat Transfer and Fluid Flow , 2018, Lecture Notes in Mechanical Engineering.
[167] Chung-Yuen Won,et al. A novel power conversion circuit for cost-effective battery-fuel cell hybrid systems , 2005 .
[168] Xiaobao Chen,et al. RSSP: RSVP Session Set-Up Protocol for RSVP-Incapable Multimedia Applications , 1999, Broadband Communications.
[169] Damith Chinthana Ranasinghe,et al. Towards falls prevention: A wearable wireless and battery-less sensing and automatic identification tag for real time monitoring of human movements , 2012, 2012 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[170] Sam Manthorpe,et al. Buffering and Packet Loss in the DQDB to ATM Interworking Unit , 1993, Integrated Broadband Communications.
[171] Sanjay Ghemawat,et al. MapReduce: simplified data processing on large clusters , 2008, CACM.
[172] Kimmo Roimela,et al. Experience Explorer: A Life-Logging Platform Based on Mobile Context Collection , 2009, 2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies.
[173] Uwe Glässer,et al. Modeling Criminal Activity in Urban Landscapes , 2009 .
[174] Yong Zhao,et al. Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.
[175] M. Lalli,et al. COMPARATIVE STUDY OF ROUTING PROTOCOLS FOR MANETS , 2014 .
[176] Roger S. Pressman,et al. Software Engineering: A Practitioner's Approach (McGraw-Hill Series in Computer Science) , 2004 .
[177] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[178] Kai-Uwe Schmidt,et al. On the peak-to-mean envelope power ratio of phase-shifted binary codes , 2006, IEEE Transactions on Communications.
[179] G. Jiang,et al. Remediation of organic and inorganic arsenic contaminated groundwater using a nanocrystalline TiO2-based adsorbent. , 2009, Environmental pollution.
[180] Clive Best,et al. Open Source Intelligence , 2007, NATO ASI Mining Massive Data Sets for Security.
[181] Dongwook Lim,et al. Performance evaluation of DSDV and AODV routing protocols in Mobile Ad-hoc Networks , 2010, 4th International Conference on New Trends in Information Science and Service Science.
[182] Ching Y. Suen,et al. A fast parallel algorithm for thinning digital patterns , 1984, CACM.
[183] D. Spalding,et al. A calculation procedure for heat, mass and momentum transfer in three-dimensional parabolic flows , 1972 .
[185] Takayoshi Nakai,et al. Noise reduction using modified phase spectra and Wiener Filter , 2011, 2011 IEEE International Workshop on Machine Learning for Signal Processing.
[186] M. Stuchly,et al. Frequency selective surface as a polarisation transformer , 2002 .
[187] Mehdi Dehghan,et al. Solution of the fully fuzzy linear systems using iterative techniques , 2007 .
[188] G. K. Chan. Effects of sectorization on the spectrum efficiency of cellular radio systems , 1992 .
[189] Kenneth S. Williams,et al. Introductory Algebraic Number Theory , 2003 .
[190] Odysseas Papapetrou,et al. Aspect Oriented Programming for a component-based real life application: a case study , 2004, SAC '04.
[191] Computation of Flow Between Two Disks Rotating at Different Speeds , 2003 .
[192] Mehran Sahami,et al. Text Mining: Classification, Clustering, and Applications , 2009 .
[193] Xiaoyue Zhang,et al. Portable, non-invasive fall risk assessment in end stage renal disease patients on hemodialysis , 2010, Wireless Health.
[194] Fenlin Liu,et al. A Method Based on Feature Matching to Identify Steganography Software , 2012, 2012 Fourth International Conference on Multimedia Information Networking and Security.
[195] James B. Y. Tsui,et al. Fundamentals of global positioning system receivers , 2000 .
[196] Xin Zhang,et al. Comparison of birefringent metamaterials and meanderline structure as quarter-wave plates at terahertz frequencies , 2008, 2009 Conference on Lasers and Electro-Optics and 2009 Conference on Quantum electronics and Laser Science Conference.
[197] Mehdi Dehghan,et al. Iterative solution of fuzzy linear systems , 2006, Appl. Math. Comput..
[198] G. Troster,et al. Design and Characterization of Purely Textile Patch Antennas , 2006, IEEE Transactions on Advanced Packaging.
[199] S. Mafakheri,et al. Response of spinach (Spinacia oleracea) yield and nutrient uptake to urea and manure , 2012 .
[200] Tzu-Chuan Chou,et al. Life is sharable: blogging life experience with RFID embedded mobile phones , 2005, Mobile HCI.
[201] Yasir Arfat Malkani,et al. Location aware device discovery for physically constrained environments , 2009, 2009 2nd International Conference on Computer, Control and Communication.
[202] Ashutosh Sabharwal,et al. Sector beam synthesis for cellular systems using phased antenna arrays , 2000, IEEE Trans. Veh. Technol..
[203] Katsutoshi Inoue,et al. Adsorptive removal of As(V) and As(III) from water by a Zr(IV)-loaded orange waste gel. , 2008, Journal of hazardous materials.
[204] T. Kazi,et al. Evaluation of arsenic and other physico-chemical parameters of surface and ground water of Jamshoro, Pakistan. , 2009, Journal of hazardous materials.
[205] I. Barbi,et al. A Three-Phase Current-Fed Push–Pull DC–DC Converter , 2009, IEEE Transactions on Power Electronics.
[206] Sewan Choi,et al. A Three-Phase Current-Fed Push–Pull DC–DC Converter With Active Clamp for Fuel Cell Applications , 2011, IEEE Transactions on Power Electronics.
[207] Kin K. Leung,et al. A high-capacity wireless network by quad-sector cell and interleaved channel assignment , 2000, IEEE Journal on Selected Areas in Communications.
[208] N. Fageria,et al. The Role of Mineral Nutrition on Root Growth of Crop Plants , 2011 .
[209] M. Sajid,et al. How nitrogen and phosphorus influence the phenology of okra , 2013 .
[210] Qiang Huang,et al. Maxillofacial surgical robotic manipulator controlled by haptic device with force feedback , 2013, 2013 ICME International Conference on Complex Medical Engineering.
[211] Santosh Kumar,et al. Simulation of Co-channel Interference Ratio (CCIR) for Directional Antenna in Mobile Computing , 2012 .
[212] Xingming Sun,et al. Dynamic K-Gram Based Software Birthmark , 2008 .
[213] Calvin B. Parnell,et al. Performance Characteristics of Cyclones in Cotton-Gin Dust Removal , 2002 .
[214] A. Jackson,et al. The Relationship of the Sit and Reach Test to Criterion Measures of Hamstring and Back Flexibility in Young Females. , 1986 .
[215] Rudinei Goularte,et al. A Model to Estimate Transcoding Costs Applied in Live-Video Transmissions , 2007 .
[216] Xingguang Duan,et al. Design and Implementation of Probe Driver Teleoperative Force Feedback System , 2014 .
[217] Abdullah Zawawi Talib,et al. MULTILINGUAL TEXT IMAGE DATABASE FOR OCR , 2016 .
[218] R. S. Meena,et al. Design of a Novel Compact Dualband Patch Antenna with Microstrip-Fed for Wireless Communication Bands , 2014 .
[219] V. Fineberg,et al. A practical architecture for implementing end-to-end QoS in an IP network , 2002, IEEE Commun. Mag..
[220] Hari Kalva,et al. Cloud transcoding for mobile video content delivery , 2011, 2011 IEEE International Conference on Consumer Electronics (ICCE).
[221] J.-S. Lai,et al. A high-performance V6 converter for fuel cell power conditioning system , 2005, 2005 IEEE Vehicle Power and Propulsion Conference.
[222] Jiro Tanaka,et al. Restrain from pervasive logging employing geo-temporal policies , 2012, APCHI '12.
[223] Cheng Sun,et al. Removal of Cr(VI) from aqueous solutions by low-cost biosorbents: marine macroalgae and agricultural by-products. , 2008, Journal of hazardous materials.
[224] Louis A. Hageman,et al. Iterative Solution of Large Linear Systems. , 1971 .
[225] Apostolos Hadjidimos,et al. Some theoretical and computational results concerning the Accelerated Overrelaxation (AOR) method , 1980 .
[226] Elias Stipidis,et al. Investigation for a global AVL system , 2001, IEEE Trans. Intell. Transp. Syst..
[227] Sally Floyd,et al. Wide area traffic: the failure of Poisson modeling , 1995, TNET.
[228] Generalized consistent orderings and the Accelerated Overrelaxation method , 1986 .
[229] Borko Furht,et al. A study of transcoding on cloud environments for video content delivery , 2010, MCMC '10.
[230] S. Čerňanský,et al. Removal of arsenic (V) from aqueous solutions using chemically modified sawdust of spruce (Picea abies): Kinetics and isotherm studies , 2009 .
[231] Jothy Rosenberg,et al. The Cloud at Your Service , 2010 .
[232] Simson L. Garfinkel,et al. An Evaluation of Amazon's Grid Computing Services: EC2, S3, and SQS , 2007 .
[233] Jiang Zhu,et al. Mobile Lifelogger - Recording, Indexing, and Understanding a Mobile User's Life , 2010, MobiCASE.
[234] Christian Hidber,et al. Association Rule Mining , 2017 .
[235] Muhammad Fraz,et al. Design and implementation of real time vehicle tracking system , 2009, 2009 2nd International Conference on Computer, Control and Communication.
[236] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[237] D. J. Evans,et al. On the Convergence of Some Generalized Preconditioned Iterative Methods , 1981 .
[238] Wang Jian,et al. Speech signal enhancement through wavelet domain MMSE filtering , 2010, 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering.
[239] P. Albrecht,et al. Extrapolated Iterative Methods for Linear Systems Approximation , 1984 .
[240] C. Soong,et al. Flow structure between two co-axial disks rotating independently , 2003 .
[241] Sang-Kyoo Han,et al. Voltage Doubler Rectified Boost-Integrated Half Bridge (VDRBHB) Converter for Digital Car Audio Amplifiers , 2007, IEEE Transactions on Power Electronics.
[242] Ying Zeng,et al. Abstract interpretation-based semantic framework for software birthmark , 2012, Comput. Secur..
[243] J. P. V. Doormaal,et al. ENHANCEMENTS OF THE SIMPLE METHOD FOR PREDICTING INCOMPRESSIBLE FLUID FLOWS , 1984 .
[244] Christian S. Collberg,et al. Detecting Software Theft via Whole Program Path Birthmarks , 2004, ISC.
[245] Thomas Chapman,et al. Alternative concepts of antenna deployment and cell layout in mobile communications , 2012, 2012 IEEE International Conference on Communications (ICC).
[246] Ashish Shrestha,et al. On MANET Routing Protocols for Mobility and Scalability , 2009, 2009 International Conference on Parallel and Distributed Computing, Applications and Technologies.
[247] W. Niethammer. On Different Splittings and the Associated Iteration Methods , 1979 .
[248] Olivia Sanchez-Graillet,et al. Identifying the impact of G-Quadruplexes on Affymetrix 3' Arrays using Cloud Computing , 2010, J. Integr. Bioinform..
[249] F. Harlow,et al. Numerical Calculation of Time‐Dependent Viscous Incompressible Flow of Fluid with Free Surface , 1965 .
[250] Hiroyuki Seki,et al. Capacity enhancement in quad-sector cell architecture with interleaved channel and polarization assignments , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[251] Sharma Shelja,et al. Performance improvement of OLSR protocol by modifying the Routing Table construction mechanism , 2014, 2014 International Conference on Reliability Optimization and Information Technology (ICROIT).
[252] Abigail Sellen,et al. Now let me see where i was: understanding how lifelogs mediate memory , 2010, CHI.
[253] John Zic,et al. Accountability as a Service for the Cloud , 2010, 2010 IEEE International Conference on Services Computing.
[254] Imran Raza,et al. Mobile Ad-hoc Network Routing Protocols: A Simulation and Performance Analysis Using Multimedia Traffic , 2012 .
[255] David Malah,et al. Speech enhancement using a minimum mean-square error log-spectral amplitude estimator , 1984, IEEE Trans. Acoust. Speech Signal Process..
[256] H. Cha,et al. A new three-phase interleaved isolated boost converter with active clamp for fuel cells , 2008, 2008 IEEE Power Electronics Specialists Conference.
[257] Robert David Steele. Open source intelligence , 2006 .
[258] P. O. Asagba,et al. A Comparative Analysis of Structured and Object-Oriented Programming Methods , 2010 .
[259] Arie van Deursen,et al. Crosscutting concerns in J2EE applications , 2005, Seventh IEEE International Symposium on Web Site Evolution.
[260] Jianhong Zeng,et al. A novel DC/DC ZVS converter for battery input application , 2002, APEC. Seventeenth Annual IEEE Applied Power Electronics Conference and Exposition (Cat. No.02CH37335).
[261] D. Cosley,et al. Using technologies to support reminiscence , 2009 .
[262] Hari Balakrishnan,et al. 6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .
[263] N. Fageria,et al. Enhancing Nitrogen Use Efficiency in Crop Plants , 2005 .
[264] Alexander Papaspyrou,et al. Open Cloud Computing Interface in Data Management-Related Setups , 2011, Grid and Cloud Database Management.
[265] C. Parnell,et al. Design of pre-separators for cyclone collectors , 1993 .
[266] Huaming Guo,et al. Adsorption of arsenic species from water using activated siderite-hematite column filters. , 2008, Journal of hazardous materials.
[267] Nasrullah Memon,et al. Semantic Analysis of FBI News Reports , 2012, ICONIP.
[268] I. Barbi,et al. A three-phase step-up DC-DC converter with a three-phase high frequency transformer , 2005, ISIE 2005.
[269] Mona Sharma,et al. Advancement in GSM and Wi-Fi technology Using Smart Antenna , 2014 .
[270] S. Gupta,et al. Performance Evaluation of Mobility Models on MANET Routing Protocols , 2013, 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT).
[271] J. Jakicic,et al. Fitness, Fatness, and Cardiovascular Disease Risk and Outcomes , 2011 .
[272] Ali Hassan Sodhro,et al. Integration of Inter-Connectivity of Information System (i3) using Web Services , 2014, ArXiv.
[273] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[274] J. Lempiainen,et al. Impact of the base station antenna beamwidth on capacity in WCDMA cellular networks , 2003, The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring..
[275] A. Sherin. OBESITY: HOW TO PREVENT PAKISTANI PEOPLE FROM GETTING HEAVIER? , 2013 .
[276] C. Niu,et al. Biosorption of arsenic (V) with acid-washed crab shells. , 2007, Water research.
[277] A. Jagna. NEW PARALLEL BINARY IMAGE THINNING ALGORITHM , 2010 .
[278] Leon Moonen,et al. An Integrated Crosscutting Concern Migration Strategy and its Application to JHOTDRAW , 2007, Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007).
[279] Su Yang. Research on recovering early aspects in aspect-oriented software reserve engineering , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[280] W. C. Y. Lee,et al. Overview of cellular CDMA , 1991 .
[281] Akito Monden,et al. Design and evaluation of birthmarks for detecting theft of java programs , 2004, IASTED Conf. on Software Engineering.
[282] Ig-Jae Kim,et al. Automatic Lifelog media annotation based on heterogeneous sensor fusion , 2008, 2008 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems.
[283] Ch. V. Rama Rao,et al. A novel two stage single channel speech enhancement technique , 2011, 2011 Annual IEEE India Conference.
[284] Michael W. Berry,et al. Text mining : applications and theory , 2010 .
[285] K. Wallstedt,et al. High capacity with limited spectrum in cellular systems , 1997 .
[286] H. Sherman,et al. A quasi-topological method for the recognition of line patterns , 1959, IFIP Congress.
[287] Yin Zhang,et al. Solving a low-rank factorization model for matrix completion by a nonlinear successive over-relaxation algorithm , 2012, Mathematical Programming Computation.
[288] Paul Holleis,et al. Studying mobile context-aware social services in the wild , 2010, NordiCHI.
[289] Rong Zheng,et al. Crime Data Mining: An Overview and Case Studies , 2003, DG.O.
[290] Abhishek Swaroop,et al. A Comprehensive Performance Analysis of Proactive, Reactive and Hybrid MANETs Routing Protocols , 2011, ArXiv.
[291] D. Spalding. A novel finite difference formulation for differential expressions involving both first and second derivatives , 1972 .
[292] Han-Joon Kim,et al. News Keyword Extraction for Topic Tracking , 2008, 2008 Fourth International Conference on Networked Computing and Advanced Information Management.
[293] H. Watanabe,et al. A novel high-efficient DC-DC converter with 1V/20A DC output , 2002, 24th Annual International Telecommunications Energy Conference.