|
Issue |
Title |
|
Vol 9, No 4: August 2019 |
A robust authorship attribution on big period |
Abstract
PDF
|
Mubin Shoukat Tamboli, Rajesh Prasad |
|
Vol 10, No 3: June 2020 |
A robust diagnosis method for speed sensor fault based on stator currents in the RFOC induction motor drive |
Abstract
PDF
|
Cuong Dinh Tran, Pavel Brandstetter, Minh Chau Huu Nguyen, Sang Dang Ho, Bach Hoang Dinh, Phuong Nhat Pham |
|
Vol 3, No 2: April 2013 |
A Robust Steganography method Using Adjustable Parameters |
Abstract
PDF
|
Ahmad Reza Eskandari |
|
Vol 13, No 6: December 2023 |
A robust super twisting fractional-order sliding mode-based control of vehicle longitudinal dynamic subjected to a constant actuator fault |
Abstract
PDF
|
Imane Abzi, Mohammed Nabil Kabbaj, Mohammed Benbrahim |
|
Vol 3, No 5: October 2013 |
A Routing Algorithm Based on Ant Colony, Local Search and Fuzzy Inference to Improve Energy Consumption in Wireless Sensor Networks |
Abstract
PDF
|
Mina Jafari, Hassan Khotanlou |
|
Vol 14, No 1: February 2024 |
A rule-based machine learning model for financial fraud detection |
Abstract
PDF
|
Saiful Islam, Md. Mokammel Haque, Abu Naser Mohammad Rezaul Karim |
|
Vol 5, No 4: August 2015 |
A Scalable Large Format Display Based on Zero Client Processor |
Abstract
PDF
|
Sang Don Kim, Seung Eun Lee |
|
Vol 15, No 2: April 2025 |
A secure and cloud-based patient management system using attribute-based encryption algorithm |
Abstract
PDF
|
Senthilkumar Kalarani, Mahalingam Shobana, Edamakanti Uma Shankari, Bolly Joshi Praveena, Subramaniam Shanthi, Rathinasabapathy Ramadevi, Rajendar Sandiri |
|
Vol 9, No 1: February 2019 |
A secure image steganography based on burrows wheeler transform and dynamic bit embedding |
Abstract
PDF
|
Ahmed Toman Thahab |
|
Vol 10, No 2: April 2020 |
A secure image steganography based on JND model |
Abstract
PDF
|
Tuan Duc Nguyen, Dung Huu Le |
|
Vol 13, No 2: April 2023 |
A secure sharing control framework supporting elastic mobile cloud computing |
Abstract
PDF
|
Aws Hamed Hamad, Adnan Yousif Dawod, Mohammed Fakhrulddin Abdulqader, Israa Al_Barazanchi, Hassan Muwafaq Gheni |
|
Vol 12, No 4: August 2022 |
A secure trust-based protocol for hierarchical routing in wireless sensor network |
Abstract
PDF
|
Maha Al-Sadoon, Ahmed Jedidi |
|
Vol 4, No 6: December 2014 |
A Secure-Coordinated Expansion Planning of Generation and Transmission Using Game Theory and Minimum Singular Value |
Abstract
PDF
|
Mehdi Zareian Jahromi, Mohsen Tajdinian, Mojtaba Jalalpour |
|
Vol 6, No 5: October 2016 |
A Secured Cloud Data Storage with Access Privileges |
Abstract
PDF
|
Naresh Vurukonda, B. Thirumala Rao, B. Tirapathi Reddy |
|
Vol 12, No 6: December 2022 |
A self-balancing platform on a mobile car |
Abstract
PDF
|
Bushra Amer Tawfeeq, Maher Yahya Salloom, Ahmed Alkamachi |
|
571 - 585 of 6090 Items |
<< < 34 35 36 37 38 39 40 41 42 43 > >> |