Sciweavers

733 search results - page 112 / 147
» Active Automation of the DITSCAP
Sort
View
IEEECIT
2010
IEEE
14 years 8 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
JDCTA
2010
347views more  JDCTA 2010»
14 years 4 months ago
Application of 3D body scanning technology to human measurement for clothing Fit
Complications with garment sizing and poor fit inconvenience many consumers who become dissatisfied with such provision on the high street. It is evident that human measurement an...
Phoebe R. Apeagyei
TITB
2010
148views Education» more  TITB 2010»
14 years 4 months ago
Coclustering for cross-subject fiber tract analysis through diffusion tensor imaging
Abstract--One of the fundamental goals of computational neuroscience is the study of anatomical features that reflect the functional organization of the brain. The study of physica...
Cui Lin, Darshan Pai, Shiyong Lu, Otto Muzik, Jing...
BMCBI
2011
14 years 1 months ago
GPCR-SSFE: A comprehensive database of G-protein-coupled receptor template predictions and homology models
Background: G protein-coupled receptors (GPCRs) transduce a wide variety of extracellular signals to within the cell and therefore have a key role in regulating cell activity and ...
Catherine L. Worth, Annika Kreuchwig, Gunnar Klein...
CORR
2012
Springer
237views Education» more  CORR 2012»
13 years 5 months ago
Novel Component Based Development Model For Sip-Based Mobile Application
Universities and Institutions these days’ deals with issues related to with assessment of large number of students. Various evaluation methods have been adopted by examiners in ...
Ahmed Barnawi, Abdurrahman H. Al-Talhi, M. Rizwan ...