Land cover Mapping using Triangular-Norms (English)
- New search for: Rashwan, S.
- New search for: Ismail, M. A.
- New search for: Fouad, S.
- New search for: Rashwan, S.
- New search for: Ismail, M. A.
- New search for: Fouad, S.
In:
WSEAS TRANSACTIONS ON COMPUTERS RESEARCH
;
1
, 1
;
19-24
;
2006
-
ISSN:
- Article (Journal) / Print
-
Title:Land cover Mapping using Triangular-Norms
-
Contributors:
-
Published in:WSEAS TRANSACTIONS ON COMPUTERS RESEARCH ; 1, 1 ; 19-24
-
Publisher:
- New search for: WSEAS PRESS
-
Publication date:2006-01-01
-
Size:6 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 440.072
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 440.072 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 1, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
A Dynamic Procedure with Propagation Delay Analysis for Performance Optimization in WDM NetworksBaziana, P. A. / Pountourakis, I. E. et al. | 2006
- 7
-
A New Negotiation Mechanism for Cryptographic Capabilities in SIP based Secured VoIP Service using PriorityKim, J. / Won, Y. / Lee, J. et al. | 2006
- 13
-
Perfect Load Balancing on Cube-connected Cycles MultiprocessorsJan, G. E. / Leu, S.-W. / Li, C.-H. / Dong, X. et al. | 2006
- 19
-
Land cover Mapping using Triangular-NormsRashwan, S. / Ismail, M. A. / Fouad, S. et al. | 2006
- 25
-
An Efficient Concept in Digital Signature Schemes using Computational DelegationAl-Fayoumi, M. A. / Aboud, S. J. et al. | 2006
- 31
-
Large-scale Experimental System Integrating Multiple Web Services with a Traffic Information Web ServiceOba, M. / Matsuyama, N. / Komoda, N. et al. | 2006
- 37
-
The Development of "Digital Museum" and the Innovative Applications of E-Learning at the National Palace MuseumLai, T.-S. / Lin, Q.-P. et al. | 2006
- 45
-
Analysis of Software VulnerabilityKuang, C. / Miao, Q. / Chen, H. et al. | 2006
- 51
-
Bayesian vs. Simulation-based Bidding in the Game of TarokMarincic, D. / Gams, M. / Lustrek, M. et al. | 2006
- 58
-
Implementation of Ontology Mapping for Computational AgentsNeruda, R. et al. | 2006
- 64
-
Study on Security Policy for Responding to PhishingLee, E. / Kim, Y. et al. | 2006
- 71
-
Malicious Code Detection Method over IPv4/IPv6 Tunneling using Naive Bayesian ClassifierOh, K.-C. / Lee, K.-H. / Won, Y.-J. et al. | 2006
- 75
-
Computerised Data Acquisition and Processing in Measurement of Raster ScalesRybokas, M. et al. | 2006
- 78
-
Computer Programs for Estimating the Alpha Diversity: the Basis of Sustainable Management Plans to Conserve DiversityNavar, J. et al. | 2006