111 results on '"M. Al-Jarrah"'
Search Results
2. Finger-Drawn Signature Verification on Touch Devices Using Statistical Anomaly Detectors.
3. PIN Authentication Using Multi-Model Anomaly Detection in Keystroke Dynamics.
4. Wavelet packets: Uniform approximation and numerical integration.
5. Steganalysis System for Colour Steganographic Images Using Three Different Techniques.
6. Steganalysis of RGB Images Using Merged Statistical Features of Color Channels.
7. A Survey on Internet of Thing Enabled Smart Campus Applications.
8. Steganalysis Using LSB-Focused Statistical Features.
9. A system for application development using aerial robots.
10. Analysis and classification of Arabic crowd-sourced news reports: A case study of the Syrian crisis.
11. Statistical Keystroke Dynamics System on Mobile Devices for Experimental Data Collection and User Authentication.
12. DuoHide: A Secure System for Hiding Multimedia Files in Dual Cover Images.
13. Hierarchical detection of insider attacks in cloud computing systems.
14. Integrated network and hosts energy management for cloud data centers.
15. Image Mosaicing Using Binary Edge Detection Algorithm in a Cloud-Computing Environment.
16. A new method for expiration code detection and recognition using gabor features based collaborative representation.
17. Texture Analysis-Based Image Spam Filtering.
18. Real-Time Power-Aware Routing Protocol for Wireless Sensor Network.
19. New adaptive counter based broadcast using neighborhood information in MANETS.
20. Energy-Efficient Fuzzy-Logic-Based Clustering Technique for Hierarchical Routing Protocols in Wireless Sensor Networks.
21. A novel key management algorithm in sensor networks.
22. Recognition of gestures in arabic sign language using neural networks.
23. Endometrial compaction and serum progesterone measurements at the day of embryo transfer cannot predict pregnancy outcomes in frozen-thaw embryo transfer cycles
24. Multi-level low swing voltage values for low power design applications.
25. Protein contact map prediction using multi-stage hybrid intelligence inference systems.
26. Position Control of a Robot Manipulator Using Continuous Gain Scheduling.
27. Recognition of dynamic gestures in arabic sign language using two stages hierarchical scheme.
28. Enhanced AODV routing protocol for Bluetooth scatternet.
29. Arm-manipulator coordination for load sharing using reflexive motion control.
30. Arm-manipulator coordination for load sharing using variable compliance control.
31. Improving Gesture Recognition in the Arabic Sign Language Using Texture Analysis.
32. Automotive volume control using fuzzy logic.
33. Mobile Robot Navigation Using Fuzzy Logic.
34. Arm-manipulator coordination for load sharing using compliant control.
35. Intelligent compliant motion control.
36. Efficient Trajectory Planning for Two Manipulators to Deform Flexible Materials with Experiments.
37. Trajectory Planning for Two Manipulators to Deform Flexible materials Using Compliant Motion.
38. Efficient trajectory planning for two manipulators to deform flexible material.
39. An Efficient Low-Swing Multithreshold-Voltage Low-Power Design Technique.
40. Handwritten Indian numerals recognition system using probabilistic neural networks.
41. On Hilbert Transform of Gabor and Wilson Systems.
42. Recognition of gestures in Arabic sign language using neuro-fuzzy systems.
43. Building maps for mobile robot navigation using fuzzy classification of ultrasonic range data.
44. Intelligent compliant motion control.
45. Efficient Trajectory Planning and Compliant Control for Two Manipulators to Deform Flexible Materials.
46. A Novel Algorithm for Defending Path-Based Denial of Service Attacks in Sensor Networks.
47. Utilization of Guidelines-recommended secondary cardiovascular preventive medications in a decade or more survivors after coronary revascularization in the Middle East; analysis form the DECADE PLUS S
48. Micro-mechanical damage model accounting for composite material nonlinearity due to matrix-cracking of unidirectional composite laminates
49. The efficiency cost of market power in banking: a test of the 'quiet life' and related hypotheses in the Jordan's banking industry
50. PIN Authentication Using Multi-Model Anomaly Detection in Keystroke Dynamics
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.