|
Issue |
Title |
|
Vol 8, No 5: October 2018 |
The Proposed Development of Prototype with Secret Messages Model in Whatsapp Chat |
Abstract
PDF
|
Hamdani Hamdani, Heru Ismanto, Agus Qomaruddin Munir, Budi Rahmani, Andri Syafrianto, Didit Suprihanto, Anindita Septiarini |
|
Vol 10, No 3: June 2020 |
The protect mobile user data in Russia |
Abstract
PDF
|
Anna Zharova |
|
Vol 10, No 4: August 2020 |
The quality of data and the accuracy of energy generation forecast by artificial neural networks |
Abstract
PDF
|
Bogdan Kwiatkowski, Jacek Bartman, Damian Mazur |
|
Vol 11, No 3: June 2021 |
The quality of service of the deployed LTE technology by mobile network operators in Abuja-Nigeria |
Abstract
PDF
|
Anabi Hilary Kelechi, Uyi Aiyudubie Samson, Matthew Simeon, Okoyeigbo Obinna, Aligbe Alex, Atayero Aaron Aderemi |
|
Vol 10, No 5: October 2020 |
The resistance of routing protocols against DDOS attack in MANET |
Abstract
PDF
|
Maha Abdelhaq, Raed Alsaqour, Mada Alaskar, Fayza Alotaibi, Rawan Almutlaq, Bushra Alghamdi, Bayan Alhammad, Malak Sehaibani, Donia Moyna |
|
Vol 14, No 1: February 2024 |
The role of Louvain-coloring clustering in the detection of fraud transactions |
Abstract
PDF
|
Heru Mardiansyah, Saib Suwilo, Erna Budhiarti Nababan, Syahril Efendi |
|
Vol 13, No 4: August 2023 |
The role of neural network for estimating real estate prices value in post COVID-19: a case of the middle east market |
Abstract
PDF
|
Laith T. khrais, Osman Saad Shidwan |
|
Vol 9, No 1: February 2019 |
The role of speech technology in biometrics, forensics and man-machine interface |
Abstract
PDF
|
Satyanand Singh |
|
Vol 9, No 5: October 2019 |
The saturation of population fitness as a stopping criterion in genetic algorithm |
Abstract
PDF
|
Foo Fong Yeng, Soo Kum Yoke, Azrina Suhaimi |
|
Vol 8, No 3: June 2018 |
The Security Challenges of the Rhythmprint Authentication |
Abstract
PDF
|
Nakinthorn Wongnarukane, Pramote Kuacharoen |
|
Vol 3, No 6: December 2013 |
The Security of Arithmetic Compression Based Text Steganography Method |
Abstract
PDF
|
Reihane Saniei, Karim Faez |
|
Vol 6, No 1: February 2016 |
The Selection of Useful Visual Words for Class-Imbalanced Data in Image Classification |
Abstract
PDF
|
Sutasinee Chimlek, Part Pramokchon, Punpiti Piamsa-nga |
|
Vol 13, No 3: June 2023 |
The simulation analysis of stator flux droop minimization in direct torque control open-end winding induction machine |
Abstract
PDF
|
Muhammad Zaid Aihsan, Auzani Jidin, Siti Azura Ahmad Tarusan, Tole Sutikno |
|
Vol 14, No 3: June 2024 |
The social media sentiment analysis framework: deep learning for sentiment analysis on social media |
Abstract
PDF
|
Prasanna Kumar Rangarjan, Bharathi mohan Gurusamy, Gayathri Muthurasu, Rithani Mohan, Gundala Pallavi, Sulochana Vijayakumar, Ali Altalbe |
|
Vol 10, No 4: August 2020 |
The students’ acceptance of learning management systems in Saudi Arabian Universities |
Abstract
PDF
|
Mutasem K. Alsmadi |
|
Vol 6, No 6: December 2016 |
The Study Methods of Increase Efficiency Algorithms Pulse width Modulation in AC Electric Drives |
Abstract
PDF
|
Bogdan Y. Vasilev |
|
Vol 11, No 5: October 2021 |
The study of convex-dual-layer remote phosphor geometry in upgrading WLEDs color rendering index |
Abstract
PDF
|
Huu Phuc Dang, Nguyen Thi Phuong Loan, Nguyen Thi Kim Chung, Nguyen Doan Quoc Anh |
|
Vol 10, No 2: April 2020 |
The support of multipath routing in IPv6-based internet of things |
Abstract
PDF
|
Ibrahim S. Alsukayti |
|
Vol 12, No 3: June 2022 |
The susceptible-infected-recovered-dead model for long-term identification of key epidemiological parameters of COVID-19 in Indonesia |
Abstract
PDF
|
Muhammad Achirul Nanda, Anifatul Faricha, Siti Maghfirotul Ulyah, Ni'matut Tamimah, Enny Indasyah, Muhammad Falahudin Malich Salaz, Qurrotun 'Ayun Mawadatur Rohmah, Ulfah Abqari |
|
Vol 9, No 3: June 2019 |
The telecom value chain, opportunities and revenues created by the nigerian telecom boom |
Abstract
PDF
|
Nsikan Nkordeh, Uzairue Stanley Idiake, Ibinabo Bob-Manuel, Francis Anyasi |
|
Vol 10, No 1: February 2020 |
The transient stability analysis of wind turbines interconected to grid under fault |
Abstract
PDF
|
Anass Gourma, Abdelmajid Berdai, Moussa Reddak |
|
Vol 5, No 6: December 2015 |
The Transient Stability Study of a Synchronous Generator Based on the Rotor Angle Stability |
Abstract
PDF
|
Selwa Fetissi, Djamel Labed, Imen Labed |
|
Vol 10, No 1: February 2020 |
The upsurge of deep learning for computer vision applications |
Abstract
PDF
|
Priyanka Patel, Amit Thakkar |
|
Vol 9, No 5: October 2019 |
The usage of gold and the investment analysis based on gold rate in India |
Abstract
PDF
|
Vanitha S, Saravanakumar K |
|
Vol 9, No 6: December 2019 |
The use of Least Significant Bit (LSB) and Knight Tour Algorithm for image steganography of cover image |
Abstract
PDF
|
Soo Ann Nie, Ghazali Sulong, Rozniza Ali, Andrew Abel |
|
5151 - 5175 of 5452 Items |
<< < 202 203 204 205 206 207 208 209 210 211 > >> |