default search action
9th SKIMA 2015: Kathmandu, Nepal
- 9th International Conference on Software, Knowledge, Information Management and Applications, SKIMA 2015, Kathmandu, Nepal, December 15-17, 2015. IEEE 2015, ISBN 978-1-4673-6744-8
- Foteini Andriopoulou, Ilias Politis, Asimakis Lykourgiotis, Tasos Dagiuklas, Dionisios Serras, Yacine Rebahi:
EMYNOS: A next generation emergency communication platform for people with disabilities. 1-8 - Jagdish Bhatta, Lok Prakash Pandey:
Performance analysis of various optimization techniques for elliptic curve cryptosystems on resource-constrained devices. 1-7 - Napaporn Reeveerakul:
A practical way to integrate simulation based on SCOR model. 1-5 - Sami Smadi, Nauman Aslam, Li Zhang, Rafe Alasem, M. Alamgir Hossain:
Detection of phishing emails using data mining algorithms. 1-8 - Hari Prasad Rimal, Morris Breuna, Nava Raj Karki, Ajit Kumar Verma:
Control of PMSG based wind turbines for renewables based DC distribution. 1-7 - Umar Farooq, Tej Prasad Dhamala, Antoine Nongaillard, Yacine Ouzrout, Muhammad Abdul Qadir:
A word sense disambiguation method for feature level sentiment analysis. 1-8 - Ajaya Shrestha, Arun Timalsina:
Color image steganography technique using daubechies discrete wavelet transform. 1-7 - Dipesh Shrestha, Sanjeeb Prasad Panday:
Visual cryptography using image pixel transparency with cover image. 1-4 - Ikram Asghar, Shuang Cang, Hongnian Yu:
A systematic mapping study on assitive technologies for people with dementia. 1-8 - Shailesh Acharya, Ashok Kumar Pant, Prashnna Kumar Gyawali:
Deep learning based large scale handwritten Devanagari character recognition. 1-6 - Mohammad Shameem, Chiranjeev Kumar, Bibhas Chandra:
Communication related issues in GSD: An exploratory study. 1-5 - Prem Lal Tamang, Pradip Kumar Paudyal:
A DBMS based inventory model and its timeframe study in automobile spare parts import management. 1-8 - Munmun Bhattacharya, Papri Mani:
Preserving privacy in social network graph with K-anonymize degree sequence generation. 1-7 - Emilia Mendes:
Key note speech 1: Predicting the overall value of decisions relating to software. I-II - Madeleine El-Zaher, Baudouin Dafflon, Franck Gechter:
A cyber-physical model for platoon system. 1-8 - Magne Jørgensen:
The effect of the time unit on software development effort estimates. 1-5 - Piang-or Loahavilai, Nopasit Chakpitak, Pradorn Sureephong, Keshav P. Dahal:
Serious game to motivate the knowledge sharing among knowledge technicians in machinery relocation of foreign direct investment. 1-7 - Nischal Regmi, Shailesh B. Pandey:
A regression analysis into Nepali ICT's energy consumption and its implications. 1-8 - Deepak Bhardwaj, Kotaro Kataoka, V. Amith Vikram, Vishal Hirani:
Hybrid approach to distributed Wi-Fi performance assessment for multi-floor structures. 1-8 - Chunbo Luo, Pablo Casaseca-de-la-Higuera, Xinheng Wang, Keshav P. Dahal, Cheng Jin, Peng Ren:
On the study of wireless signal noise for designing network infrastructure of knowledge management systems. 1-8 - Nilam Nur Amir Sjarif, Siti Mariyam Shamsuddin:
Human action invarianceness for human action recognition. 1-7 - Sirinrat Khwanpheng, Khin T. Lwin, Roungsan Chaisricharoen, Punnarumol Temdee:
Collaborative crosschecking system of observed loss estimation for disaster relief management. 1-5 - Bidur Devkota, Bikram Adhikar, Deepanjal Shrestha:
Integrating romanized Nepali spellchecker with SMS based decision support system for Nepalese farmers. 1-6 - Muhammad Sajjad Akbar, Hongnian Yu, Shuang Cang:
A holistic simulation model for remote patient monitoring systems using Wireless Body Area Sensor Networks (WBASNs). 1-5 - Netra Gyawali, Bikram Paudel, Baburam Subedi:
Improved active power sharing strategy for ELC Controlled Synchronous Generators Based Islanded Micro Grid application. 1-5 - Wei Chen, Li Zhang, Ling Shao, Rosemary Bass, Chenyu Liu, M. Alamgir Hossain:
Modelling of tumour-induced angiogenesis with regress by immune factor. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.