|
Issue |
Title |
|
Vol 9, No 3: June 2019 |
Wireless power transfer to a micro implant device from outside of human body |
Abstract
PDF
|
Kazuya Yamaguchi, Kazuma Onishi, Kenichi Iida |
|
Vol 10, No 3: June 2020 |
Wireless power transfer using multiple-transmitters for high stability for position |
Abstract
PDF
|
Kazuma Onishi, Kazuya Yamaguchi, Kenichi Iida |
|
Vol 11, No 1: February 2021 |
Wireless sensor network’s localization based on multiple signal classification algorithm |
Abstract
PDF
|
Nabeel Aad Lafta, Saad S. Hreshee |
|
Vol 15, No 1: February 2025 |
Wireless sensor networks based efficient drip irrigation monitoring systems |
Abstract
PDF
|
Karthik Sagar Ashok, Basavaraj Gangasamudra Nagendrappa, Mohan Bangalore Anjaneyalu, Priya Nandihal, Veena Narayana Reddy, Liyakathunisa Syed, Ayman Noor |
|
Vol 7, No 3: June 2017 |
Wireless Sensor Node with Passive RFID for Indoor Monitoring System |
Abstract
PDF
|
Norsaidah Muhamad Nadzir, M.K.A. Rahim, F. Zubir, A. Zabri, H.A. Majid |
|
Vol 8, No 6: December 2018 |
Wireless Technology for Monitoring Site-specific Landslide in Vietnam |
Abstract
PDF
|
Gian Quoc-Anh, Nguyen Dinh-Chinh, Tran Duc-Nghia, Tran Duc-Tan, Kieu Nguyen Thi, Kumbesan Sandrasegaran |
|
Vol 8, No 5: October 2018 |
WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline Monitoring |
Abstract
PDF
|
Fatma Karray, Mariem Triki, Mohamed Wassim Jmal, Mohamed Abid, Abdulfattah M. Obeid |
|
Vol 6, No 5: October 2016 |
Wood Classification Based on Edge Detections and Texture Features Selection |
Abstract
PDF
|
Achmad Fahrurozi, Sarifuddin Madenda, Ernastuti Ernastuti, Djati Kerami |
|
Vol 9, No 1: February 2019 |
Word2Vec model for sentiment analysis of product reviews in Indonesian language |
Abstract
PDF
|
M. Ali Fauzi |
|
Vol 12, No 1: February 2022 |
Word-based encryption algorithm using dictionary indexing with variable encryption key length |
Abstract
PDF
|
Ahmad Al-Jarrah, Amer Albsharat, Mohammad Al-Jarrah |
|
Vol 8, No 2: April 2018 |
Workflow Scheduling Techniques and Algorithms in IaaS Cloud: A Survey |
Abstract
PDF
|
K. Kalyana Chakravarthi, Vaidhehi Vijayakumar |
|
Vol 13, No 1: February 2023 |
Working with cryptographic key information |
Abstract
PDF
|
Nurullaev Mirkhon Mukhammadovich, Aloev Rakhmatillo Djuraevich |
|
Vol 6, No 6: December 2016 |
WWLLN Data Cluster Analysis Methods for Lightning-Caused Forest Fires Monitoring |
Abstract
PDF
|
Baranovskiy Nikolay, Krechetova Svetlana, Belikova Marina, Perelygin Anton |
|
Vol 5, No 5: October 2015 |
XML and Semantics |
Abstract
PDF
|
Mohammad Moradi, MohammadReza Keyvanpour |
|
Vol 12, No 2: April 2022 |
X-ware: a proof of concept malware utilizing artificial intelligence |
Abstract
PDF
|
Thanh Cong Truong, Jan Plucar, Bao Quoc Diep, Ivan Zelinka |
|
5881 - 5895 of 5896 Items |
<< < 388 389 390 391 392 393 394 > >> |