Search Results - MA Memon
-
141
-
142
-
143
Managing the Risks: An Evaluation of Risk Management Processes
Conference Proceeding -
144
Investigative Data Mining: Identifying Key Nodes in Terrorist Networks
Conference Proceeding -
145
-
146
Using Recurrent Neural Networks for Circuit Complexity Modeling
Conference Proceeding -
147
-
148
Analyzing Soft Skills of Software Engineers using Repertory Grid
Conference Proceeding -
149
-
150
-
151
-
152
-
153
A Random Key Distribution Scheme for Securing Wireless Sensor Network
Conference Proceeding -
154
Performance of the VI-CFAR in Homogeneous Weibull Background
Conference Proceeding -
155
Fusion of Visible and Thermal Images Using Support Vector Machines
Conference Proceeding -
156
-
157
-
158
-
159
Improved Square Contour Algorithm for Blind Equalization of QAM Signals
Conference Proceeding -
160