Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cambridge Z88

Known as: Cambridge Computer Z88, Cambridge Computers Z 88 
The Cambridge Computer Z88 is an A4-size, lightweight, portable Z80-based computer with a built-in combined word processing/spreadsheet/database… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Quantum key distribution is a way to distribute secret keys to distant users with information theoretic security and key rates… Expand
  • figure 1
  • figure 2
  • figure 3
2016
2016
2016
These day, face recognition became main attraction by many researcher due to demand from commercial and law enforcement sectors… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
2013
2013
The dynamics of schooling in Indonesia, started since the enactment of Law Number 20 Year 2003, indicate a paradigm shift in… Expand
2012
2012
PCA is a well-known feature extraction and data representation technique widely used in the areas of pattern recognition… Expand
  • figure 1
  • table 1
2009
2009
A novel technique for face recognition is presented in this paper. Wavelet Transform, PCA and SVM are combined in this technique… Expand
  • figure 5
2007
2007
The one overriding theme used to describe the modern Supreme Court is its revival of federalism. Ever since the New Deal era… Expand
2005
2005
This paper proposes a face recognition method based on PCA and LVQ neural networks. PCA is applied to get the eigen vector of the… Expand
Highly Cited
2002
Highly Cited
2002
A number of empirically downscaled climate scenarios are presented for 115 locations in northern Europe, based on 17 different… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 5
Highly Cited
2000
Highly Cited
2000
  • G. Guo, S. Li, K. Chan
  • Proceedings Fourth IEEE International Conference…
  • 2000
  • Corpus ID: 14555654
Support vector machines (SVM) have been recently proposed as a new technique for pattern recognition. SVM with a binary tree… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5