Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for ''
published presentations and documents on DocSlides.
Drowsiness Detection System Using Heartbeat Rate in Android-based Handheld Devices
by pamella-moone
Advisor : Dr. Kai-Wei Ke. Presenter : D. Jayasakt...
Wavelength dispersive (WDXRF) and energy dispersive (EDXRF)
by giovanna-bartolotta
. X- ray fluorescence. NON DESTRUCTIVE CHEMICAL ...
Detect Limits as Representation for a Standard
by mitsue-stanley
VAP Rule Discussion. Dawn Busalacchi. Risk Assess...
Secure Navigation and Timing
by debby-jeon
Todd Humphreys | Aerospace Engineering. The Uni...
Secure Civil Navigation and Timing
by sherrill-nordquist
Todd Humphreys | Aerospace Engineering. The Uni...
Talking Data Click Fraud Detection
by faustina-dinatale
Andrew Cudworth. 04/23/18 . Introduction. Talking...
James Pittman February 9, 2011
by calandra-battersby
EEL 6788. MoVi. : Mobile Phone based Video Highli...
Evaluating survey methods for the Yellow Rail:
by kittie-lecroy
comparison of . human surveys and autonomous reco...
Deadlocks What is a Deadlock
by celsa-spraggs
“A set of processes is deadlocked if each proce...
SAND No. 2010-2286C Sandia is a
by kittie-lecroy
multiprogram. laboratory operated by Sandia Corp...
Aiding the Detection of Fake Accounts in Large Scale Social Online Services
by lindy-dunigan
Qiang. Cao. . Duke University. . Michael ....
CDAP Capacity Development Assistance Program
by olivia-moreira
Kentucky Division of Water. Capacity Development ...
Continuous Audit at Insurance Companies
by tawny-fly
Youngbum. . Kim. , PhD. Student, Rutgers Univ. ....
Business Logic Bots: Friend or Foe?
by faustina-dinatale
Amichai Shulman, CTO, Imperva. Ofer Shezaf, Leade...
Packet Sniffing - By Aarti Dhone
by alexa-scheidler
Introduction. Packet Sniffer Definition:. A . ...
Overview of emerging and detection of arboviral disease in South Africa.
by sherrill-nordquist
Msimang V.. 1. , Jansen van Vuren P.. 1. , Weyer...
Incentives and Sanctions: Practical Application of the Science of Behavior Change
by mitsue-stanley
. Shannon M. Carey, Ph.D.. Based on a Nee...
mPuff : Automated Detection of Cigarette Smoking Puffs
by tawny-fly
from Respiration . Measurements. Amin Ahsan Ali, ...
Modeling Adversarial Activity (MAA)
by cheryl-pisano
Carey Schwartz. DARPA/I2O. Proposers Day. Septemb...
Multilingual Event Detection in the Europe Media Monitor
by jane-oiler
Hristo . Tanev. Joint . Research. Centre, . Euro...
ECG SIGNAL RECOGNIZATION AND APPLICAITIONS
by yoshiko-marsland
ECE, UA. 12 Lead ECG Interpretation. Anatomy Revi...
Introducing Lyra AMD for Asterisk
by phoebe-click
December 2012. Recap AMD. Introducing Lyra AMD fo...
Introducing Lyra AMD for Asterisk
by stefany-barnette
December 2012. Recap AMD. Introducing Lyra AMD fo...
CAPABILITIES REGIONAL HAZARDOUS MATERIALS
by jane-oiler
RESPONSE TEAMS. TYPE 1 HAZARDOUS MATERIALS RESPON...
Cross-Indexing of Binary Scale Invariant Feature
by trish-goza
Transform Codes for Large-Scale . Image Search. P...
KDHE’s 2016 HAB Stakeholder
by tatyana-admore
Meeting. Rex Cox. Past Program Mainly for Recreat...
Resource-Stratified Guidelines:
by giovanna-bartolotta
A Framework for Change. Benjamin O. Anderson, M.D...
Worldwide adoption of RT
by test
-PCR machines have lowered the cost of conducting...
Molecular Haematology 10 Mar 2011
by test
Alberto Catalano. email: . catalano.alberto@gmail...
Finding Security in Misery of Others
by calandra-battersby
Amichai Shulman, CTO. The OWASP Foundation. Agend...
Real-time, Unified Endpoint Protection
by giovanna-bartolotta
Jared Branda – Account Director – East . Real...
ECOSOC Meeting Dr. Eric Jallas
by sherrill-nordquist
Victoria . Fall. , April 2017. Short . presentati...
Module 5 Sexual Abuse Detection, Reporting, and Response
by min-jolicoeur
Is an objective tool. Can prevent sexual abuse. I...
Practical Rootkit Detection with RAI
by alexa-scheidler
Christoph Csallner. , University of Texas at Arli...
Sampling and Occupancy Estimation
by liane-varnes
Krishna . Pacifici. Department of Applied Ecology...
Local outlier detection in data forensics:
by calandra-battersby
data mining approach . to flag unusual schools. M...
Low Altitude Particle Detection
by tawny-fly
#1 . Pima Community College ASCEND Team. Team Mem...
2028 2018 2023 2033 2038
by danika-pritchard
Role of Digitization & Analytics in Improving...
Intercepting Advanced Threats
by natalia-silvester
Anurag Singh. Sophos . Sales Engineer. Top Threat...
The LBR @ the dawn of 2016
by phoebe-click
I. Overview. People. Logistic tasks and challenge...
Load More...