ºÝºÝߣshows by User: Fajar_112 / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: Fajar_112 / Sun, 01 Oct 2017 12:00:33 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: Fajar_112 Energy Harvesting Techniques in Wireless Sensor Networks – A Survey /slideshow/energy-harvesting-techniques-in-wireless-sensor-networks-a-survey/80332373 16f9006farwarmfinalpaper2-171001120033
It is a Self effort done under the supervision of my Respected Supervisor Dr. A Rehman, to surveyed out all the techniques for Energy harvesting in WSNs. Harvesting Systems are basically subdivided into two types. One in which ambient energy is converted to required electrical energy directly without any storage and the other is where storage of converted energy is required before supplying. So for these sub-systems different energy harvesting techniques are proposed which are Radio Frequency based, solar based, thermal based, flow based from source of ambient environment and from external sources of mechanical based & human based. Flow based are further classified into wind based and hydro based. Each energy harvesting technique’s source has its own capability to harvest energy and can effectively overcome the issues of energy consumption.]]>

It is a Self effort done under the supervision of my Respected Supervisor Dr. A Rehman, to surveyed out all the techniques for Energy harvesting in WSNs. Harvesting Systems are basically subdivided into two types. One in which ambient energy is converted to required electrical energy directly without any storage and the other is where storage of converted energy is required before supplying. So for these sub-systems different energy harvesting techniques are proposed which are Radio Frequency based, solar based, thermal based, flow based from source of ambient environment and from external sources of mechanical based & human based. Flow based are further classified into wind based and hydro based. Each energy harvesting technique’s source has its own capability to harvest energy and can effectively overcome the issues of energy consumption.]]>
Sun, 01 Oct 2017 12:00:33 GMT /slideshow/energy-harvesting-techniques-in-wireless-sensor-networks-a-survey/80332373 Fajar_112@slideshare.net(Fajar_112) Energy Harvesting Techniques in Wireless Sensor Networks – A Survey Fajar_112 It is a Self effort done under the supervision of my Respected Supervisor Dr. A Rehman, to surveyed out all the techniques for Energy harvesting in WSNs. Harvesting Systems are basically subdivided into two types. One in which ambient energy is converted to required electrical energy directly without any storage and the other is where storage of converted energy is required before supplying. So for these sub-systems different energy harvesting techniques are proposed which are Radio Frequency based, solar based, thermal based, flow based from source of ambient environment and from external sources of mechanical based & human based. Flow based are further classified into wind based and hydro based. Each energy harvesting technique’s source has its own capability to harvest energy and can effectively overcome the issues of energy consumption. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/16f9006farwarmfinalpaper2-171001120033-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> It is a Self effort done under the supervision of my Respected Supervisor Dr. A Rehman, to surveyed out all the techniques for Energy harvesting in WSNs. Harvesting Systems are basically subdivided into two types. One in which ambient energy is converted to required electrical energy directly without any storage and the other is where storage of converted energy is required before supplying. So for these sub-systems different energy harvesting techniques are proposed which are Radio Frequency based, solar based, thermal based, flow based from source of ambient environment and from external sources of mechanical based &amp; human based. Flow based are further classified into wind based and hydro based. Each energy harvesting technique’s source has its own capability to harvest energy and can effectively overcome the issues of energy consumption.
Energy Harvesting Techniques in Wireless Sensor Networks – A Survey from Farwa Ansari
]]>
1856 17 https://cdn.slidesharecdn.com/ss_thumbnails/16f9006farwarmfinalpaper2-171001120033-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Micro-services architecture /slideshow/microservices-architecture-76075773/76075773 farwaandsaba16f900616f9011micro-services-architecture-170518004447
Micro-services architecture is an evolutionary design ideal for evolutionary systems where you can’t fully anticipate the types of devices that may one day be accessing your application ]]>

Micro-services architecture is an evolutionary design ideal for evolutionary systems where you can’t fully anticipate the types of devices that may one day be accessing your application ]]>
Thu, 18 May 2017 00:44:47 GMT /slideshow/microservices-architecture-76075773/76075773 Fajar_112@slideshare.net(Fajar_112) Micro-services architecture Fajar_112 Micro-services architecture is an evolutionary design ideal for evolutionary systems where you can’t fully anticipate the types of devices that may one day be accessing your application <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/farwaandsaba16f900616f9011micro-services-architecture-170518004447-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Micro-services architecture is an evolutionary design ideal for evolutionary systems where you can’t fully anticipate the types of devices that may one day be accessing your application
Micro-services architecture from Farwa Ansari
]]>
496 5 https://cdn.slidesharecdn.com/ss_thumbnails/farwaandsaba16f900616f9011micro-services-architecture-170518004447-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Software Design Patterns - An Overview /slideshow/software-design-patterns-an-overview/76075710 farwaabdulhannan16f-9006-170518004050
Software Design Patterns - An Overview]]>

Software Design Patterns - An Overview]]>
Thu, 18 May 2017 00:40:50 GMT /slideshow/software-design-patterns-an-overview/76075710 Fajar_112@slideshare.net(Fajar_112) Software Design Patterns - An Overview Fajar_112 Software Design Patterns - An Overview <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/farwaabdulhannan16f-9006-170518004050-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Software Design Patterns - An Overview
Software Design Patterns - An Overview from Farwa Ansari
]]>
259 2 https://cdn.slidesharecdn.com/ss_thumbnails/farwaabdulhannan16f-9006-170518004050-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Optimizing the memory management of a virtual machine monitor on a NUMA system - A Survey /Fajar_112/optimizing-the-memory-management-of-a-virtual-machine-monitor-on-a-numa-system-a-survey 1-asurveyofoptimizingthememorymanagementofavirtualmachinemonitoronanumasystem-170518003548
NUMA systems provide non-uniform access to memory. Though they are providing many benefits by meeting the requirement of memory bandwidth and to achieve high performance a Virtual Machine Monitor is utilized which was working appropriately in small scale enterprises but on the other hand due to shifting of large scale datacenters towards the NUMA architecture, it is suffering from some memory management challenges in a virtualized environment. Hence to address the challenges the memory management of its VMM needs to be fully functional/optimized. This survey paper first demonstrates the main issues that are causing the performance degradation of the VMM on NUMA system and then the current trends and methodologies to remove or lessen these issues are explained. Memory over-commitment, Memory ballooning, swapping and performance degradation due to migration time and downtime in live virtual machine’s migration are the issues currently being addressed.]]>

NUMA systems provide non-uniform access to memory. Though they are providing many benefits by meeting the requirement of memory bandwidth and to achieve high performance a Virtual Machine Monitor is utilized which was working appropriately in small scale enterprises but on the other hand due to shifting of large scale datacenters towards the NUMA architecture, it is suffering from some memory management challenges in a virtualized environment. Hence to address the challenges the memory management of its VMM needs to be fully functional/optimized. This survey paper first demonstrates the main issues that are causing the performance degradation of the VMM on NUMA system and then the current trends and methodologies to remove or lessen these issues are explained. Memory over-commitment, Memory ballooning, swapping and performance degradation due to migration time and downtime in live virtual machine’s migration are the issues currently being addressed.]]>
Thu, 18 May 2017 00:35:48 GMT /Fajar_112/optimizing-the-memory-management-of-a-virtual-machine-monitor-on-a-numa-system-a-survey Fajar_112@slideshare.net(Fajar_112) Optimizing the memory management of a virtual machine monitor on a NUMA system - A Survey Fajar_112 NUMA systems provide non-uniform access to memory. Though they are providing many benefits by meeting the requirement of memory bandwidth and to achieve high performance a Virtual Machine Monitor is utilized which was working appropriately in small scale enterprises but on the other hand due to shifting of large scale datacenters towards the NUMA architecture, it is suffering from some memory management challenges in a virtualized environment. Hence to address the challenges the memory management of its VMM needs to be fully functional/optimized. This survey paper first demonstrates the main issues that are causing the performance degradation of the VMM on NUMA system and then the current trends and methodologies to remove or lessen these issues are explained. Memory over-commitment, Memory ballooning, swapping and performance degradation due to migration time and downtime in live virtual machine’s migration are the issues currently being addressed. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/1-asurveyofoptimizingthememorymanagementofavirtualmachinemonitoronanumasystem-170518003548-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> NUMA systems provide non-uniform access to memory. Though they are providing many benefits by meeting the requirement of memory bandwidth and to achieve high performance a Virtual Machine Monitor is utilized which was working appropriately in small scale enterprises but on the other hand due to shifting of large scale datacenters towards the NUMA architecture, it is suffering from some memory management challenges in a virtualized environment. Hence to address the challenges the memory management of its VMM needs to be fully functional/optimized. This survey paper first demonstrates the main issues that are causing the performance degradation of the VMM on NUMA system and then the current trends and methodologies to remove or lessen these issues are explained. Memory over-commitment, Memory ballooning, swapping and performance degradation due to migration time and downtime in live virtual machine’s migration are the issues currently being addressed.
Optimizing the memory management of a virtual machine monitor on a NUMA system - A Survey from Farwa Ansari
]]>
323 4 https://cdn.slidesharecdn.com/ss_thumbnails/1-asurveyofoptimizingthememorymanagementofavirtualmachinemonitoronanumasystem-170518003548-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Fault Tolerance Typed Assembly Language - A graphical overview /slideshow/fault-tolerance-typed-assembly-language-a-graphical-overview/76075578 farwaabdulhannan16f-9006-170518003157
PRIOR TECHNIQUES + PROBLEMS + NEW PROPOSED TECHNIQUE + BENEFITS]]>

PRIOR TECHNIQUES + PROBLEMS + NEW PROPOSED TECHNIQUE + BENEFITS]]>
Thu, 18 May 2017 00:31:57 GMT /slideshow/fault-tolerance-typed-assembly-language-a-graphical-overview/76075578 Fajar_112@slideshare.net(Fajar_112) Fault Tolerance Typed Assembly Language - A graphical overview Fajar_112 PRIOR TECHNIQUES + PROBLEMS + NEW PROPOSED TECHNIQUE + BENEFITS <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/farwaabdulhannan16f-9006-170518003157-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> PRIOR TECHNIQUES + PROBLEMS + NEW PROPOSED TECHNIQUE + BENEFITS
Fault Tolerance Typed Assembly Language - A graphical overview from Farwa Ansari
]]>
92 2 https://cdn.slidesharecdn.com/ss_thumbnails/farwaabdulhannan16f-9006-170518003157-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Comparative Analysis of Face Recognition Methodologies and Techniques /Fajar_112/comparative-analysis-of-face-recognition-methodologies-and-techniques mypaperpublishedone-170518002602
In the field of computer sciences such as graphics and also analyzing the image and its processing, face recognition is the most prominent problem due to the comprehensive variation of faces and the complexity of noises and image backgrounds. The purpose and working of this system is that it identifies the face of a person from the real time video and verifies the person from the images store in the database. This paper provides a review of the methodologies and techniques used for face detection and recognition. Firstly a brief introduction of Facial Recognition is given then the review of the face recognition’s working which has been done until now, is briefly introduced. Then the next sections covered the approaches, methodologies, techniques and their comparison. Holistic, Feature based and Hybrid approaches are basically used for face recognition methodologies. Eigen Faces, Fisher Faces and LBP methodologies were introduced for recognition purpose. Eigen Faces is most frequently used because of its efficiencies. To observe the efficient techniques of facial recognition, there are many scenarios to measure its performance which are based on real time.]]>

In the field of computer sciences such as graphics and also analyzing the image and its processing, face recognition is the most prominent problem due to the comprehensive variation of faces and the complexity of noises and image backgrounds. The purpose and working of this system is that it identifies the face of a person from the real time video and verifies the person from the images store in the database. This paper provides a review of the methodologies and techniques used for face detection and recognition. Firstly a brief introduction of Facial Recognition is given then the review of the face recognition’s working which has been done until now, is briefly introduced. Then the next sections covered the approaches, methodologies, techniques and their comparison. Holistic, Feature based and Hybrid approaches are basically used for face recognition methodologies. Eigen Faces, Fisher Faces and LBP methodologies were introduced for recognition purpose. Eigen Faces is most frequently used because of its efficiencies. To observe the efficient techniques of facial recognition, there are many scenarios to measure its performance which are based on real time.]]>
Thu, 18 May 2017 00:26:02 GMT /Fajar_112/comparative-analysis-of-face-recognition-methodologies-and-techniques Fajar_112@slideshare.net(Fajar_112) Comparative Analysis of Face Recognition Methodologies and Techniques Fajar_112 In the field of computer sciences such as graphics and also analyzing the image and its processing, face recognition is the most prominent problem due to the comprehensive variation of faces and the complexity of noises and image backgrounds. The purpose and working of this system is that it identifies the face of a person from the real time video and verifies the person from the images store in the database. This paper provides a review of the methodologies and techniques used for face detection and recognition. Firstly a brief introduction of Facial Recognition is given then the review of the face recognition’s working which has been done until now, is briefly introduced. Then the next sections covered the approaches, methodologies, techniques and their comparison. Holistic, Feature based and Hybrid approaches are basically used for face recognition methodologies. Eigen Faces, Fisher Faces and LBP methodologies were introduced for recognition purpose. Eigen Faces is most frequently used because of its efficiencies. To observe the efficient techniques of facial recognition, there are many scenarios to measure its performance which are based on real time. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mypaperpublishedone-170518002602-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In the field of computer sciences such as graphics and also analyzing the image and its processing, face recognition is the most prominent problem due to the comprehensive variation of faces and the complexity of noises and image backgrounds. The purpose and working of this system is that it identifies the face of a person from the real time video and verifies the person from the images store in the database. This paper provides a review of the methodologies and techniques used for face detection and recognition. Firstly a brief introduction of Facial Recognition is given then the review of the face recognition’s working which has been done until now, is briefly introduced. Then the next sections covered the approaches, methodologies, techniques and their comparison. Holistic, Feature based and Hybrid approaches are basically used for face recognition methodologies. Eigen Faces, Fisher Faces and LBP methodologies were introduced for recognition purpose. Eigen Faces is most frequently used because of its efficiencies. To observe the efficient techniques of facial recognition, there are many scenarios to measure its performance which are based on real time.
Comparative Analysis of Face Recognition Methodologies and Techniques from Farwa Ansari
]]>
1019 4 https://cdn.slidesharecdn.com/ss_thumbnails/mypaperpublishedone-170518002602-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set) /Fajar_112/chapter-5-names-bindings-and-scopes-review-questions-and-problem-set tplchapter5assignment-161123145659
Concept of Programming Languages Tenth Edition (Robert W. Sebesta)]]>

Concept of Programming Languages Tenth Edition (Robert W. Sebesta)]]>
Wed, 23 Nov 2016 14:56:59 GMT /Fajar_112/chapter-5-names-bindings-and-scopes-review-questions-and-problem-set Fajar_112@slideshare.net(Fajar_112) Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set) Fajar_112 Concept of Programming Languages Tenth Edition (Robert W. Sebesta) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tplchapter5assignment-161123145659-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Concept of Programming Languages Tenth Edition (Robert W. Sebesta)
Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set) from Farwa Ansari
]]>
6771 8 https://cdn.slidesharecdn.com/ss_thumbnails/tplchapter5assignment-161123145659-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Chapter 4: Lexical & Syntax Analysis (Programming Exercises) /slideshow/chapter-4-lexical-syntax-analysis/69458448 tplchapter4assignment-161123143941
Concept of Programming Languages Tenth Edition (Robert W. Sebesta)]]>

Concept of Programming Languages Tenth Edition (Robert W. Sebesta)]]>
Wed, 23 Nov 2016 14:39:41 GMT /slideshow/chapter-4-lexical-syntax-analysis/69458448 Fajar_112@slideshare.net(Fajar_112) Chapter 4: Lexical & Syntax Analysis (Programming Exercises) Fajar_112 Concept of Programming Languages Tenth Edition (Robert W. Sebesta) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tplchapter4assignment-161123143941-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Concept of Programming Languages Tenth Edition (Robert W. Sebesta)
Chapter 4: Lexical & Syntax Analysis (Programming Exercises) from Farwa Ansari
]]>
2281 5 https://cdn.slidesharecdn.com/ss_thumbnails/tplchapter4assignment-161123143941-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Business plan of a software house /slideshow/business-plan-of-a-software-house/66680436 business-plan-final-161003165851
Business plan of a software house in order to start a company/software house/business ]]>

Business plan of a software house in order to start a company/software house/business ]]>
Mon, 03 Oct 2016 16:58:51 GMT /slideshow/business-plan-of-a-software-house/66680436 Fajar_112@slideshare.net(Fajar_112) Business plan of a software house Fajar_112 Business plan of a software house in order to start a company/software house/business <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/business-plan-final-161003165851-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Business plan of a software house in order to start a company/software house/business
Business plan of a software house from Farwa Ansari
]]>
13201 17 https://cdn.slidesharecdn.com/ss_thumbnails/business-plan-final-161003165851-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Mission statement and Vision statement of 3 Different Companies /slideshow/mission-statement-and-vision-statement-of-3-different-companies/66680364 royaldutchshell-161003165657
Mission statement and Vision statement of 3 Different Companies]]>

Mission statement and Vision statement of 3 Different Companies]]>
Mon, 03 Oct 2016 16:56:57 GMT /slideshow/mission-statement-and-vision-statement-of-3-different-companies/66680364 Fajar_112@slideshare.net(Fajar_112) Mission statement and Vision statement of 3 Different Companies Fajar_112 Mission statement and Vision statement of 3 Different Companies <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/royaldutchshell-161003165657-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Mission statement and Vision statement of 3 Different Companies
Mission statement and Vision statement of 3 Different Companies from Farwa Ansari
]]>
193 2 https://cdn.slidesharecdn.com/ss_thumbnails/royaldutchshell-161003165657-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Applications of Image Processing /slideshow/applications-of-image-processing/66680190 g-4-161003165203
Applications of Image Processing their different types of tasks and fundamental steps]]>

Applications of Image Processing their different types of tasks and fundamental steps]]>
Mon, 03 Oct 2016 16:52:03 GMT /slideshow/applications-of-image-processing/66680190 Fajar_112@slideshare.net(Fajar_112) Applications of Image Processing Fajar_112 Applications of Image Processing their different types of tasks and fundamental steps <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/g-4-161003165203-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Applications of Image Processing their different types of tasks and fundamental steps
Applications of Image Processing from Farwa Ansari
]]>
170 2 https://cdn.slidesharecdn.com/ss_thumbnails/g-4-161003165203-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cohen sutherland algorithm /slideshow/cohen-sutherland-algorithm/66680135 cohensutherlandalgorithm-161003165033
Cohen Sutherland Algorithm briefly Explained in easy way]]>

Cohen Sutherland Algorithm briefly Explained in easy way]]>
Mon, 03 Oct 2016 16:50:33 GMT /slideshow/cohen-sutherland-algorithm/66680135 Fajar_112@slideshare.net(Fajar_112) Cohen sutherland algorithm Fajar_112 Cohen Sutherland Algorithm briefly Explained in easy way <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cohensutherlandalgorithm-161003165033-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cohen Sutherland Algorithm briefly Explained in easy way
Cohen sutherland algorithm from Farwa Ansari
]]>
511 3 https://cdn.slidesharecdn.com/ss_thumbnails/cohensutherlandalgorithm-161003165033-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Scaling /slideshow/scaling-66679948/66679948 scaling-161003164534
Scaling: Scaling Types, Examples (Computer Graphics)]]>

Scaling: Scaling Types, Examples (Computer Graphics)]]>
Mon, 03 Oct 2016 16:45:34 GMT /slideshow/scaling-66679948/66679948 Fajar_112@slideshare.net(Fajar_112) Scaling Fajar_112 Scaling: Scaling Types, Examples (Computer Graphics) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/scaling-161003164534-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Scaling: Scaling Types, Examples (Computer Graphics)
Scaling from Farwa Ansari
]]>
843 2 https://cdn.slidesharecdn.com/ss_thumbnails/scaling-161003164534-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Raster images (assignment) /slideshow/raster-images-assignment/66679905 rasterimagesassignment-161003164358
Raster images: introduction, their types (Computer Graphics)]]>

Raster images: introduction, their types (Computer Graphics)]]>
Mon, 03 Oct 2016 16:43:58 GMT /slideshow/raster-images-assignment/66679905 Fajar_112@slideshare.net(Fajar_112) Raster images (assignment) Fajar_112 Raster images: introduction, their types (Computer Graphics) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/rasterimagesassignment-161003164358-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Raster images: introduction, their types (Computer Graphics)
Raster images (assignment) from Farwa Ansari
]]>
198 3 https://cdn.slidesharecdn.com/ss_thumbnails/rasterimagesassignment-161003164358-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Prefix and suffix of open gl /slideshow/prefix-and-suffix-of-open-gl/66679856 prefixandsuffixofopengl-161003164243
Prefix and Suffix of OpenGL their data types, C Language type and OpenGL Type Definition. (Computer Graphics)]]>

Prefix and Suffix of OpenGL their data types, C Language type and OpenGL Type Definition. (Computer Graphics)]]>
Mon, 03 Oct 2016 16:42:43 GMT /slideshow/prefix-and-suffix-of-open-gl/66679856 Fajar_112@slideshare.net(Fajar_112) Prefix and suffix of open gl Fajar_112 Prefix and Suffix of OpenGL their data types, C Language type and OpenGL Type Definition. (Computer Graphics) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/prefixandsuffixofopengl-161003164243-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Prefix and Suffix of OpenGL their data types, C Language type and OpenGL Type Definition. (Computer Graphics)
Prefix and suffix of open gl from Farwa Ansari
]]>
513 2 https://cdn.slidesharecdn.com/ss_thumbnails/prefixandsuffixofopengl-161003164243-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Linear combination of vector /slideshow/linear-combination-of-vector/66679802 linearcombinationofvector-161003164111
Linear Combination of Vector: introduction, examples and types (Computer Graphics)]]>

Linear Combination of Vector: introduction, examples and types (Computer Graphics)]]>
Mon, 03 Oct 2016 16:41:11 GMT /slideshow/linear-combination-of-vector/66679802 Fajar_112@slideshare.net(Fajar_112) Linear combination of vector Fajar_112 Linear Combination of Vector: introduction, examples and types (Computer Graphics) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/linearcombinationofvector-161003164111-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Linear Combination of Vector: introduction, examples and types (Computer Graphics)
Linear combination of vector from Farwa Ansari
]]>
561 3 https://cdn.slidesharecdn.com/ss_thumbnails/linearcombinationofvector-161003164111-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Graphic display devices /Fajar_112/graphic-display-devices graphicdisplaydevices-161003163940
Graphic Display Devices just a know-how or introduction (Computer Graphics)]]>

Graphic Display Devices just a know-how or introduction (Computer Graphics)]]>
Mon, 03 Oct 2016 16:39:40 GMT /Fajar_112/graphic-display-devices Fajar_112@slideshare.net(Fajar_112) Graphic display devices Fajar_112 Graphic Display Devices just a know-how or introduction (Computer Graphics) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/graphicdisplaydevices-161003163940-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Graphic Display Devices just a know-how or introduction (Computer Graphics)
Graphic display devices from Farwa Ansari
]]>
163 2 https://cdn.slidesharecdn.com/ss_thumbnails/graphicdisplaydevices-161003163940-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Implementation & Challenges of IPv6� /slideshow/implementation-challenges-of-ipv6/66679662 group13implimentaionandchallengesinipv6-161003163714
Implementation & Challenges of IPv6: Problem Identification and Proposed Solution and its research paper is also added previously in my uploads.]]>

Implementation & Challenges of IPv6: Problem Identification and Proposed Solution and its research paper is also added previously in my uploads.]]>
Mon, 03 Oct 2016 16:37:14 GMT /slideshow/implementation-challenges-of-ipv6/66679662 Fajar_112@slideshare.net(Fajar_112) Implementation & Challenges of IPv6� Fajar_112 Implementation & Challenges of IPv6�: Problem Identification and Proposed Solution and its research paper is also added previously in my uploads. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/group13implimentaionandchallengesinipv6-161003163714-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Implementation &amp; Challenges of IPv6�: Problem Identification and Proposed Solution and its research paper is also added previously in my uploads.
Implementation & Challenges of IPv6 from Farwa Ansari
]]>
345 7 https://cdn.slidesharecdn.com/ss_thumbnails/group13implimentaionandchallengesinipv6-161003163714-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IPv6 Implementation challenges /slideshow/ipv6-implementation-challenges/66679382 group13ipv6implementationchallanges-161003162941
A research paper related to IPv6 Implementation challenges and its solution basically narrowed down to security.]]>

A research paper related to IPv6 Implementation challenges and its solution basically narrowed down to security.]]>
Mon, 03 Oct 2016 16:29:41 GMT /slideshow/ipv6-implementation-challenges/66679382 Fajar_112@slideshare.net(Fajar_112) IPv6 Implementation challenges Fajar_112 A research paper related to IPv6 Implementation challenges and its solution basically narrowed down to security. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/group13ipv6implementationchallanges-161003162941-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A research paper related to IPv6 Implementation challenges and its solution basically narrowed down to security.
IPv6 Implementation challenges from Farwa Ansari
]]>
400 4 https://cdn.slidesharecdn.com/ss_thumbnails/group13ipv6implementationchallanges-161003162941-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Tomasulo Algorithm /slideshow/tomasulo-algorithm-66679281/66679281 assignment-161003162706
This document includes some practical questions related to Tomasulo Algorithm. A computer Architecture Assignment.]]>

This document includes some practical questions related to Tomasulo Algorithm. A computer Architecture Assignment.]]>
Mon, 03 Oct 2016 16:27:06 GMT /slideshow/tomasulo-algorithm-66679281/66679281 Fajar_112@slideshare.net(Fajar_112) Tomasulo Algorithm Fajar_112 This document includes some practical questions related to Tomasulo Algorithm. A computer Architecture Assignment. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/assignment-161003162706-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This document includes some practical questions related to Tomasulo Algorithm. A computer Architecture Assignment.
Tomasulo Algorithm from Farwa Ansari
]]>
1551 3 https://cdn.slidesharecdn.com/ss_thumbnails/assignment-161003162706-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-Fajar_112-48x48.jpg?cb=1523533498 https://cdn.slidesharecdn.com/ss_thumbnails/16f9006farwarmfinalpaper2-171001120033-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/energy-harvesting-techniques-in-wireless-sensor-networks-a-survey/80332373 Energy Harvesting Tech... https://cdn.slidesharecdn.com/ss_thumbnails/farwaandsaba16f900616f9011micro-services-architecture-170518004447-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/microservices-architecture-76075773/76075773 Micro-services archite... https://cdn.slidesharecdn.com/ss_thumbnails/farwaabdulhannan16f-9006-170518004050-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/software-design-patterns-an-overview/76075710 Software Design Patter...