Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "M-file"

ADD TO MY LIST
 
Publication and dissemination of datasets in taxonomy: ZooKeys working example

Author(s): Lyubomir Penev | Terry Erwin | Jeremy Miller | Vishwas Chavan | Tom Moritz | Charles Griswold
A checklist to the wasps of Peru (Hymenoptera, Aculeata)

Author(s): Claus Rasmussen | Angelico Asenjo
Common Protocol for Distributed Network File System

Author(s): Peter Peniak | Fedor Kallay
Principles of Audio Watermarking

Author(s): Martin Hrncar | Jan Krajcovic
A critical examination of spatial biases between MODIS and MISR aerosol products – application for potential AERONET deployment

Author(s): Y. Shi | J. Zhang | J. S. Reid | E. J. Hyer | T. F. Eck | B. N. Holben | R. A. Kahn
Why Small Business Owners Should Not Worry about“Money Left on the Table” in IPOs!

Author(s): Roger Su | Keith Hooper | Amitabh S. Dutta | Ronghua Yi
SEM evaluation of contamination of dentinal tubules in open apex teeth treated with MTA plug

Author(s): Behnaz Barekatain | Ali Reza Farhad | Maryam Zolfaghari
TshwaneLex, una aplicación lexicográfica singular

Author(s): Ignacio Navascués Benlloch
Crawler Indexing using Tree Structure and its Implementation

Author(s): Deepika Sharma | Parul Gupta | Dr. A.K. Sharma
3D Terrain Synthesis from SRTM data and Spatial Watermarking

Author(s): Aditya Garg | Ruchir Joshi | Vikas Saxena
An Optimized Method for Concealing Data using Audio Steganography

Author(s): Md. Shafakhatullah Khan | V.Vijaya Bhasker | V. Shiva Nagaraju
Dynamic Video Conferencing with Fully Secured Encryption Algorithms

Author(s): Y.V. Srinivasa Murthy | Dr. S. C. Satapathy | Ch Rajesh | P Tejnadh Reddy
Comprehensive Survey of Framework for Web Personalization using Web Mining

Author(s): Vikas Verma | A. K. Verma | S. S. Bhatia
The Study and Development of Transaction Subsystem of Data Center

Author(s): Wenbin ZHANG | Hantian WU | Ruotong LI | Guanghui MIN
A Comparison of Trojan Virus Behavior in Linux and Windows Operating System

Author(s): Ghossoon. M. W. Al-Saadoon | Hilal M.Y. Al-Bayatt
Supporting Red List threat assessments with GeoCAT: geospatial conservation assessment tool

Author(s): Steven Bachman | Justin Moat | Andrew Hill | Javier de la Torre | Ben Scott
Optimized Design of 2D Mesh NOC Router using Custom SRAM & Common Buffer Utilization

Author(s): Bhavana Pote | V. N. Nitnaware | S. S. Limaye
R-TREE IMPLEMENTATION OF IMAGE DATABASES

Author(s): Chandresh Pratap Singh
Penerapan Teknik Komputer Forensik untuk Pengembalian dan Penghapusan Berkas Digital

Author(s): Anggit Dwi Hartanto | Ema Utami | Hanif Al Fatta
Gene-chromosome locations of neuropsychiatric diseases

Author(s): Paul Shapshak | Charurut Somboonwit | John Sinnott | Deborah Commins | Elyse Singer | Andrew Levine
Teatri della memoria: una ricerca sulle mediatiche domestiche

Author(s): Olimpia Affuso | Simona Isabella
Lossless Hoffman Coding Technique For Image Compression and Reconstruction using Binary Trees

Author(s): Mridul Kumar Mathur | Seema Loonker | Dr. Dheeraj Saxena
Non-Specialized File Format Extension

Author(s): Blake W. Ford & Khosrow Kaikhah
Comparison between electronic and radiographic method for the determination of root canal length in primary teeth

Author(s): Sérgio Luiz Pinheiro | Iris Nogueira Bincelli | Talita Faria | Carlos Eduardo da Silveira Bueno | Rodrigo Sanches Cunha
Application specific web log pre-processing

Author(s): Ravindra Gupta | Prateek Gupta
Fuzzy Clustering: An Approachfor Mining Usage Profilesfrom Web

Author(s): Ms.Archana N. Boob | Prof. D. M. Dakhane
Protection through Oblivion 'An Image Based Steganography'

Author(s): T Chandra Sekhara Reddy | D Prasad | B.Venkateswara Reddy
The value of brainstem auditory evoked potentials in high risk children

Author(s): Mohammadi M | Malekzadeh M | Kiani A
Common Protocol for Distributed Network File System

Author(s): Peter Peniak | Fedor Kallay
Principles of Audio Watermarking

Author(s): Martin Hrncar | Jan Krajcovic
Transforming DATA* with Dotty Format to Aggregate Region Automaton

Author(s): H. Hachichi | I. Kitouni | D.E. Saidouni
Reannotation of the Corynebacterium diphtheriae NCTC13129 genome as a new approach to studying gene targets connected to virulence and pathogenicity in diphtheria

Author(s): D'Afonseca V | Soares SC | Ali A | Santos AR | Pinto AC | Magalhães AAC | Faria CJ | Barbosa E | Guimarães LC | Eslabão M | Almeida SS | Abreu VAC | Zerlotini A | Carneiro AR | Cerdeira LT | Ramos RTJ | Hirata Jr R | Mattos-Guaraldi AL | Trost E | Tauch A | Silva A | Schneider MP | Miyoshi A | Azevedo V
Implementation Of A New Binary Tree Using Huffman Encoder

Author(s): K.V.Satyanarayana | B.Bhaskar Rao
A Survey Of Tcp Reno, New Reno And Sack Over Mobile Ad-Hoc Network

Author(s): Md Nazmul Islam Khan | Rashed Ahmed | Md. Tariq Aziz
Thermal Neutron Capture onto the Stable Tungsten Isotopes

Author(s): Hurst A.M. | Firestone R.B. | Sleaford B.W. | Summers N.C. | Revay Zs. | Szentmiklósi L. | Belgya T. | Basunia M.S. | Capote R. | Choi H. | Dashdorj D. | Escher J. | Krticka M. | Nichols A.
IDENTIFICATION OF OBJECT IN 3D FLASH LIDAR IMAGES

Author(s): MADHUSUDHANARAO M., KARTHEEK K. And RAJANIKANTH M.
Conversion Database of the Shapes Into XML Data for Shape Matching

Author(s): Noreddine GHERABI | Mohamed BAHAJ
Women Participation in Nigerian Trade Union Movement: A Strategic and Socio-Psychological Viewpoint

Author(s): OWOLABI LATEEF KUYE | Francis Chuks Anyim | Joy Onyinyechi Ekwoaba
An Efficient Method of Steganography using Matrix Approach

Author(s): Nirmalya Chowdhury | Puspita Manna
Automatic Deduction in Dynamic Geometry using Sage

Author(s): Francisco Botana | Miguel A. Abánades
AN ALGORITHM FOR DIGITAL WATERMARKING OF STILL IMAGES FOR COPYRIGHT PROTECTION

Author(s): Jahnvi Sen | A.M. Sen | K. Hemachandran
Evaluation of different weather files on energy analysis of buildings

Author(s): Apostolos Michopoulos, Vassiliki Voulgari, Konstantinos Papakostas, Nikolas Kyriakis
Shrimp meal in diets for Nile tilapia ("Oreochromis niloticus") Farinha de camarão em dietas para tilápia do Nilo ("Oreochromis niloticus")

Author(s): Igo Gomes Guimarães | Edma Carvalho de Miranda | Valéria Louro Ribeiro | Graciela Pessoa Martins | Carolina Carvalho de Miranda
Carcass traits of surubim (“Pseudoplatystoma” spp.) evaluated by ultrasound Rendimento de carcaça em surubim ("Pseudoplatystoma" spp.) avaliado por ultra-som

Author(s): Daniel Vieira Crepaldi | Edgar de Alencar Teixeira | Paulo Mário Faria | Lincoln Pimentel Ribeiro | Daniela Chemim Melo | Denise Aparecida de Andrade Oliveira | Eduardo Maldonado Turra | Bruno Machado Queiroz
Farelo de babaçu em dietas para tambaqui Babassu meal in diets for tambaqui

Author(s): Jeane Mello Lopes | Leonardo Augusto Fonseca Pascoal | Florisval Protasio da Silva Filho | Isabele Batista Santos | Pedro Henrique Watanabe | Daniel de Magalhães Araujo | Denise Costa Pinto | Poollyanna dos Santos Oliveira
Coconut husk meal in diets for tambaqui (“Colossoma macropomum”) Farelo de coco em dietas para o tambaqui ("Colossoma macropomum")

Author(s): Marcos Vinícius Antunes de Lemos | Igo Gomes Guimarães | Edma Carvalho de Miranda
Pre-Operative Assessment and Education

Author(s): Amina Malik | Nasreen S. Lalani | Rozina Barkat Ali
Changes in body composition of women at different age decades and its relation with to metabolic risks

Author(s): Günay Can | Alper Tokay | Aliye Özenoğlu | Serdal Uğurlu
Changes in body composition of women at different age decades and its relation with to metabolic risks

Author(s): Günay Can | Alper Tokay | Aliye Özenoğlu | Serdal Uğurlu
Dynamic Real Time Distributed Sensor Network Based Database Management System Using XML, JAVA and PHP Technologies

Author(s): D. Sudharsan | J. Adinarayana | S. Ninomiya | M. Hirafuji | T. Kiura
Audio Segmentation using Line Spectral Pairs

Author(s): N. P. Jawarkar | R. S. Holambe | T. K. Basu
Trust Model for Reliable File Exchange In Cloud Computing

Author(s): Edna Dias Canedo | Rafael Timoteo de Sousa Junior | Robson de Oliveira Albuquerque
Real time Video Streaming using Novel approach

Author(s): Mukesh Kumar | Jain Akash | B.A.Khivsara | Magar Padmakar | Baphana Abliasaha
Mobile Viruses

Author(s): Pranav R Shah | Yash Shah | Saurabh Madan
Searching an XML File and its Context in a Folder

Author(s): Priyanka suram | Dr.V.Janaki | Suma Patra | Nalubala Deepika
A Logical Approach to Supporting Professional Learning Communities

Author(s): Laurie F. Ruberg | Meri Cummings | Debra C. B. Piecka | Chris Ruckman | Ralph Seward
¿Qué tiene SDLX 2007 que no tengan los demás?

Author(s): Luciana Ramos | Betty Galiano
Usage of neural network for the prediction of surface roughness after the roller burnishing

Author(s): I. Stanković | M. Perinić | Z. Jurković | V. Mandić | S. Maričić
ASPECTS OF MANAGEMENT OF AGRICULTURAL FIRMS

Author(s): L ROLÍNEK | M DOKTOROVÁ
GENOTYPES OF FIVE BLOOD PROTEINS’ POLYMORPHISM IN VARIOUS PRODUCTION AGE OF DAIRY COWS

Author(s): J ŽITNÝ | J BUJKO | A KÚBEK | A TRAKOVICKÁ | M RYBANSKÁ
Business Process Based Database Recovery and Experimental Results

Author(s): Pinaki Mitra | Girish Sundaram | Arun Kumar Tripathi
High Capacity and Resistance to Additive Noise Audio Steganography Algorithm

Author(s): Haider Ismael Shahadi | Razali Bin Jidin
Host-based Web Anomaly Intrusion Detection System, an Artificial Immune System Approach

Author(s): Iman Khalkhali | Reza Azmi | Mozhgan Azimpour-Kivi | Mohammad Khansari
Experimenting with the Novel Approaches in Text Steganography

Author(s): Shraddha Dulera | Devesh Jinwala | Aroop Dasgupta
A Study on the Rate of Irrigant Penetration to the Apical Third of the Root Canal via Urografin Injection

Author(s): Abbasali Khademi | Masoud khabiri | Atefeh Mirzabagherian | Masoud Hashemi
Color –Based Image Retrieval in Image Database System

Author(s): Gunja Varshney | Uma Soni
Vol. 2, No. 2, June 2009

Author(s): Editor ELT
Design and Implementation for Multi-Level Cell Flash Memory Storage Systems

Author(s): Amarnath Gaini | K Vijayalaxmi | Sathish Mothe
A Survey of the Complaints Entering the Medical Council Organization of Tehran in Three Time Periods: The Years Ending on 20 March 1992, 20 March 1997 and 20 March 2002

Author(s): Ali Jafarian | Alireza Parsapour | Amirhasan Haj-Tarkhani | Fariba Asghari | Seyyed Hassan Emami Razavi | Alireza Yalda
Small Food Businesses: Trying to Improve Taking Records with a Mobile Device Application

Author(s): Esteban Pérez | António Raposo | Conrado Carrascosa | Esther Sanjuán | Cristina Mauricio | Rafael Millán
DLLFS - A Caching Mechanism for a Distributed File System

Author(s): Liviu Sebastian Matei | Liviu Frateanu
Multispectral Remote Sensing from Unmanned Aircraft: Image Processing Workflows and Applications for Rangeland Environments

Author(s): Andrea S. Laliberte | Mark A. Goforth | Caitriana M. Steele | Albert Rango
De-identifying a public use microdata file from the Canadian national discharge abstract database

Author(s): Emam Khaled El | Paton David | Dankar Fida | Koru Gunes
Haplo2Ped: a tool using haplotypes as markers for linkage analysis

Author(s): Cheng Feng | Zhang Xianglong | Zhang Yinan | Li Chaohua | Zeng Changqing
Implementing a genomic data management system using iRODS in the Wellcome Trust Sanger Institute

Author(s): Chiang Gen-Tao | Clapham Peter | Qi Guoying | Sale Kevin | Coates Guy
An efficient and extensible approach for compressing phylogenetic trees

Author(s): Matthews Suzanne | Williams Tiffani
ATOM - an OMERO add-on for automated import of image data

Author(s): Müller Oliver | Lipp Peter | Kaestner Lars
Opportunistic P2P Communications in Delay-Tolerant Rural Scenarios

Author(s): Castro MarcelC | Galluccio Laura | Kassler Andreas | Rametta Corrado
Music Genre Classification Using MIDI and Audio Features

Author(s): Cataltepe Zehra | Yaslan Yusuf | Sonmez Abdullah
Why do you need a reservation system?      Save time & money - Smart Internet Solutions