| Issue | Title | |
| Vol 7, No 6: December 2017 | Reduction of Total Harmonic Distortion in Cascaded H-Bridge Inverter by Pattern Search Technique | Abstract PDF |
| Suresh N., R. Samuel Rajesh Babu | ||
| Vol 9, No 3: June 2019 | Reengineering framework for open source software using decision tree approach | Abstract PDF |
| Jaswinder Singh, Kanwalvir Singh, Jaiteg Singh | ||
| Vol 6, No 3: June 2016 | Referenced Approximation Technique for a Rom-Less Sweep Frequency Synthesizer | Abstract PDF |
| Atman Jbari, Larbi Bellarbi, Abdelhamid Errachid | ||
| Vol 15, No 1: February 2025 | Refining thyroid function evaluation: a comparative study of preprocessing methods in diffuse reflectance spectroscopy | Abstract PDF |
| Wincent Anto Win Shalini, Thulasi Rajalakshmi, Selvanayagam Vasanthadev Suryakala | ||
| Vol 8, No 5: October 2018 | Reflectivity Parameter Extraction from RADAR Images Using Back Propagation Algorithm | Abstract PDF |
| P. Anil Kumar, B. Anuradha | ||
| Vol 13, No 5: October 2023 | Regional feature learning using attribute structural analysis in bipartite attention framework for vehicle re-identification | Abstract PDF |
| Cynthia Sherin, Kayalvizhi Jayavel | ||
| Vol 10, No 2: April 2020 | Reinforcement learning based multi core scheduling (RLBMCS) for real time systems | Abstract PDF |
| Dhruva R. Rinku, M. AshaRani | ||
| Vol 14, No 1: February 2024 | Reinforcement learning strategies using Monte-Carlo to solve the blackjack problem | Abstract PDF |
| Raghavendra Srinivasaiah, Vinai George Biju, Santosh Kumar Jankatti, Ravikumar Hodikehosahally Channegowda, Niranjana Shravanabelagola Jinachandra | ||
| Vol 13, No 5: October 2023 | Reinforcement learning-based security schema mitigating man-in-the-middle attacks in fog computing | Abstract PDF |
| Hossam Elmansy, Khaled Metwally, Khaled Badran | ||
| Vol 14, No 5: October 2024 | Reinforcement learning-empowered resource allocation with multi-head attention mechanism in V2X networks | Abstract PDF |
| Irshad Khan, Manjula Sunkadakatte Haladappa | ||
| Vol 13, No 4: August 2023 | Reinforcing optimization enabled interactive approach for liver tumor extraction in computed tomography images | Abstract PDF |
| Jayanthi Muthuswamy, Chanda Verabadra Reddy, Rekha Narayanaswamy | ||
| Vol 14, No 5: October 2024 | Relationship between features volatility and bug occurrence rate to support software evolution | Abstract PDF |
| Tiara Rahmania Hadiningrum, Bella Dwi Mardiana, Siti Rochimah | ||
| Vol 11, No 1: February 2021 | Relationship of drain induced barrier lowering and top/bottom gate oxide thickness in asymmetric junctionless double gate MOSFET | Abstract PDF |
| Hakkee Jung | ||
| Vol 9, No 3: June 2019 | Relevance vector machine based fault classification in wind energy conversion system | Abstract PDF |
| Rekha S. N., P. Aruna Jeyanthy, D. Devaraj | ||
| Vol 4, No 2: April 2014 | Reliability and Cost Model of P.M. in A Component of an Electrical Distribution System Considering Ageing Mechanism | Abstract PDF |
| Saeed Afshar, M Fotuhi Firuzabad | ||
| 5326 - 5340 of 6399 Items | << < 351 352 353 354 355 356 357 358 359 360 > >> | |
