- DocumentoK1enviado poryayarety
- DocumentoICWR.2017.7959317_3c3b13467c1b5b756516989dba181103enviado poryayarety
- Documentoسند 2030.pdfenviado poryayarety
- DocumentoBEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTORenviado poryayarety
- DocumentoIEEE_06742611enviado poryayarety
- Documento[2009 Springer Bookchapter] Modeling Learning Impacts on Day-To-day Travel Choiceenviado poryayarety
- Documento[1996 Tandf International Journal of Systems Science] Learning Automata With Continuous Input and Changing Number of Actionsenviado poryayarety
- Documento[2008 Ifac Conf] Intelligent Adaptive Dynamic Matrix Controlenviado poryayarety
- Documento[1982 U.S. Patent and Trademark Office] Dynamic matrix control method.pdfenviado poryayarety
- Documento[1982 U.S. Patent and Trademark Office] Dynamic matrix control method.pdfenviado poryayarety
- Documentoupper₋arm rehabilitation robotics system modeling using sysml.pdfenviado poryayarety
- Documentorobotics2012-12-10-121212111454-phpapp02enviado poryayarety
- DocumentoPaper 29 Sosece 2 Huynh Paperenviado poryayarety
- Documento-Cloutier Et Al Early Viewenviado poryayarety
- Documentoeng-2008-4-303-316.pdfenviado poryayarety
- Documento-Cloutier et al Early View.pdfenviado poryayarety
- DocumentoA Practical Approach for Modelling Submarine Sub-system Architecture in SysML-Pearce Friedenthalenviado poryayarety
- DocumentoA_Practical_Approach_for_Modelling_Submarine_Sub-system_Architecture_in_SysML-Pearce_Friedenthal.pdfenviado poryayarety
- Documento31f1f895bd726d3313cdd4655cd20b84edb0enviado poryayarety
- Documento[doi 10.1145%2F2791060.2791104] Gaeta, Jesús Padilla; Czarnecki, Krzysztof -- [ACM Press the 19th International Conference - Nashville, Tennessee (2015.07.20-2015.07.24)] Proceedings of the 19th Inter.pdfenviado poryayarety
- Documento[Doi 10.1109%2FMECATRONICS.2012.6450983] Ngo, Van Hien; Soriano, Thierry -- [IEEE 2012 9th France-Japan & 7th Europe-Asia Congress on Mechatronics (MECATRONICS) _ 13th Int'l Workshop on Research and Eenviado poryayarety
- Documento[2016 IEEETRANSACTIONSONINFORMATIONFORENSICSANDSECURITY] Content-AdaptiveSteganographybyMinimizing StatisticalDetectabilityenviado poryayarety
- Documento[2015 Wiley SECURITYANDCOMMUNICATIONNETWORKS] MDE-basedimagesteganographywithlargeembedding Capacityenviado poryayarety
- Documento[2014 Ieeetransactionsoninformationforensicsandsecurity] Uniform Embedding for Efficient Jpeg Steganographyenviado poryayarety
- Documento[2014 Elsevier ExpertSystemswithApplications] Anovelimagesteganographyschemewithhighembeddingcapacityand Tunablevisualimagequalitybasedonageneticalgorithmenviado poryayarety
- Documento[2013 Springer MultimedToolsAppl] Reversibledatahidingusingside-matchpredictions Onsteganographicimagesenviado poryayarety
- Documento[2013 Ieeetransactionsoninformationforensicsandsecurity] Pixelgrouptracemodel-basedquantitative Steganenviado poryayarety
- Documento[2012 IEEETRANSACTIONSONINFORMATIONFORENSICSANDSECURITY] NewChannelSelectionRuleforJPEGSteganographyenviado poryayarety
- Documento[Doi 10.1109%2Ficrms.2011.5979460] Li, Lei; Wang, Naichao; Ma, Lin; Yang, Qingwei -- [IEEE 2011 9th International Conference on Reliability, Maintainability and Safety (ICRMS 2011) - Guiyang, China (2(1)enviado poryayarety
- DocumentoMBSE Methodology Survey RevAenviado poryayarety
- Documento11845enviado poryayarety
- Documentodysacademicwriting.pdfenviado poryayarety
- DocumentoUseful phrases.pdfenviado poryayarety
- DocumentoCaltech Selected Resources for Writers in Stem Fieldsenviado poryayarety
- DocumentoAcademic Writing Styleenviado poryayarety
- Documento1407.2649enviado poryayarety