| Issue | Title | |
| Vol 12, No 6: December 2022 | Forecasting stock price movement direction by machine learning algorithm | Abstract PDF |
| Bui Thanh Khoa, Tran Trong Huynh | ||
| Vol 10, No 2: April 2020 | Foreground algorithms for detection and extraction of an object in multimedia | Abstract PDF |
| Rekha V., Natarajan K., Innila Rose J. | ||
| Vol 8, No 5: October 2018 | Forensic and Automatic Speaker Recognition System | Abstract PDF |
| Satyanand Singh | ||
| Vol 8, No 5: October 2018 | Forensic Tools Performance Analysis on Android-based Blackberry Messenger using NIST Measurements | Abstract PDF |
| Imam Riadi, Rusydi Umar, Arizona Firdonsyah | ||
| Vol 12, No 4: August 2022 | Forest quality assessment based on bird sound recognition using convolutional neural networks | Abstract PDF |
| Nazrul Effendy, Didi Ruhyadi, Rizky Pratama, Dana Fatadilla Rabba, Ananda Fathunnisa Aulia, Anugrah Yuwan Atmadja | ||
| Vol 11, No 2: April 2021 | Forging a deep learning neural network intrusion detection framework to curb the distributed denial of service attack | Abstract PDF |
| Arnold Adimabua Ojugo, Rume Elizabeth Yoro | ||
| Vol 7, No 4: August 2017 | Formal Specification of QoS Negotiation in ODP System | Abstract PDF |
| Abdessamad Jarrar, Youssef Balouki, Taoufiq Gadi | ||
| Vol 10, No 4: August 2020 | Formalization of SOA concepts with mathematical foundation | Abstract PDF |
| Asha H. V., Shantharam Nayak, Annamma Abraham | ||
| Vol 12, No 1: February 2022 | Formalization of the prediction and ranking of software development life cycle models | Abstract PDF |
| Laiali Almazaydeh, Moath Alsafasfeh, Reyad Alsalameen, Shoroq Alsharari | ||
| Vol 12, No 3: June 2022 | Formation control of non-identical multi-agent systems | Abstract PDF |
| Djati Wibowo Djamari, Muhamad Rausyan Fikri, Bentang Arief Budiman, Farid Triawan | ||
| Vol 15, No 1: February 2025 | Fortifying industrial cybersecurity: a novel industrial internet of things architecture enhanced by honeypot integration | Abstract PDF |
| Oumaima El Kouari, Saiida Lazaar, Tarik Achoughi | ||
| Vol 14, No 5: October 2024 | Fortifying network security: machine learning-powered intrusion detection systems and classifier performance analysis | Abstract PDF |
| Arar Al Tawil, Lara Al-Shboul, Laiali Almazaydeh, Mohammad Alshinwan | ||
| Vol 12, No 1: February 2022 | Four dimensional hyperchaotic communication system based on dynamic feedback synchronization technique for image encryption systems | Abstract PDF |
| Hayder Mazin Makki Alibraheemi, Qais Al-Gayem, Ehab AbdulRazzaq Hussein | ||
| Vol 11, No 4: August 2021 | Four-leg active power filter control with SUI-PI controller | Abstract PDF |
| Mohamed M. El-sotouhy, Ahmed A. Mansour, Mostafa I. Marei, Aziza M. Zaki, Ahmed A. EL-Sattar | ||
| Vol 6, No 3: June 2016 | FPF: Fraud Proof Framework for Electronic Voting System | Abstract PDF |
| Innocent Kabandana, A.N. Nanda Kumar | ||
| 3091 - 3105 of 6309 Items | << < 202 203 204 205 206 207 208 209 210 211 > >> | |
