|
Issue |
Title |
|
Vol 12, No 4: August 2022 |
A comprehensive fuzzy-based scheme for online detection of operational and topological changes |
Abstract
PDF
|
Amin Damanjani, Mohamad Hosseini Abardeh, Azita Azarfar, Mehrdad Hojjat |
|
Vol 10, No 3: June 2020 |
A comprehensive insight towards Pre-processing Methodologies applied on GPS data |
Abstract
PDF
|
R. Prabha, Mohan G Kabadi |
|
Vol 14, No 4: August 2024 |
A comprehensive review of early detection of COVID-19 based on machine learning and deep learning models |
Abstract
PDF
|
Ali J. Askar Al-Khafaji, Nilam Nur Amir Sjarif |
|
Vol 11, No 2: April 2021 |
A comprehensive review on hybrid network traffic prediction model |
Abstract
PDF
|
Jinmei Shi, Yu Beng Leau, Kun Li, Joe Henry Obit |
|
Vol 10, No 4: August 2020 |
A comprehensive study of distributed Denial-of-Service attack with the detection techniques |
Abstract
PDF
|
H. H. Ibrahim, A. E. Hamzah, H. A. Saeed, H. H. Qasim, O. S. Hamed, Hussein Yahya Alkhalaf, M. I. Hamza |
|
Vol 13, No 2: April 2023 |
A comprehensive study of machine learning for predicting cardiovascular disease using Weka and SPSS tools |
Abstract
PDF
|
Belal Abuhaija, Aladeen Alloubani, Mohammad Almatari, Ghaith M. Jaradat, Hemn Barzan Abdallah, Abdallah Mohd Abualkishik, Mutasem Khalil Alsmadi |
|
Vol 10, No 4: August 2020 |
A comprehensive study on disease risk predictions in machine learning |
Abstract
PDF
|
G. Saranya, A. Pravin |
|
Vol 8, No 4: August 2018 |
A Comprehensive Survey on Exiting Solution Approaches towards Security and Privacy Requirements of IoT |
Abstract
PDF
|
Rajani Chetan, Ramesh Shahabadkar |
|
Vol 9, No 5: October 2019 |
A compressive sensing algorithm for hardware trojan detection |
Abstract
PDF
|
priyatharishini m, M. Nirmala Devi |
|
Vol 8, No 6: December 2018 |
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET |
Abstract
PDF
|
Sachin P. Godse, Parikshit N. Mahalle |
|
Vol 9, No 6: December 2019 |
A computational analysis of short sentences based on ensemble similarity model |
Abstract
PDF
|
Arifah Che Alhadi, Aziz Deraman, Masita Masila Abdul Jalil, Wan Nural Jawahir Wan Yussof, Rosmayati Mohemad |
|
Vol 9, No 5: October 2019 |
A computationally efficient detector for MIMO systems |
Abstract
PDF
|
Samer Alabed |
|
Vol 12, No 5: October 2022 |
A computationally efficient learning model to classify audio signal attributes |
Abstract
PDF
|
Maha Veera Vara Prasad Kantipud, Satish Kumar |
|
Vol 13, No 1: February 2023 |
A computer vision-based lane detection technique using gradient threshold and hue-lightness-saturation value for an autonomous vehicle |
Abstract
PDF
|
Md. Abdullah Al Noman, Zhai LI, Firas Husham Almukhtar, Md. Faishal Rahaman, Batyrkhan Omarov, Samrat Ray, Shahajan Miah, Chengping Wang |
|
Vol 12, No 6: December 2022 |
A conceptual architecture for integrating software defined network and network virtualization with internet of things |
Abstract
PDF
|
Ali Haider Shamsan, Arman Rasool Faridi |
|
Vol 13, No 1: February 2023 |
A constrained model predictive control for the building thermal management with optimal setting design |
Abstract
PDF
|
Noureddine Boutchich, Ayoub Moufid, Najib Bennis |
|
Vol 8, No 6: December 2018 |
A Context-based Numeral Reading Technique for Text to Speech Systems |
Abstract
PDF
|
Soumya Priyadarsini Panda, Ajit Kumar Nayak |
|
Vol 8, No 3: June 2018 |
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor Networks |
Abstract
PDF
|
Piyush Charan, Tahsin Usmani, Rajeev Paulus, Syed Hasan Saeed |
|
Vol 8, No 5: October 2018 |
A CORDIC based QR Decomposition Technique for MIMO Detection |
Abstract
PDF
|
Shirly Edward A., Malarvizhi S. |
|
Vol 9, No 2: April 2019 |
A cost effective computational design of maximum power point tracking for photo-voltaic cell |
Abstract
PDF
|
Yoganandini A. P., Anitha G. S. |
|
Vol 9, No 5: October 2019 |
A cost-effective 2-tier security paradigm to safeguard cloud data with faster authentication |
Abstract
PDF
|
Veena R.S, Ramachandra V. Pujeri, Indiramma M |
|
Vol 13, No 5: October 2023 |
A cost-effective and optimized maximum powerpoint tracking system for the photovoltaic model |
Abstract
PDF
|
Yoganandini Arehalli Puttalingaiah, Anitha Gowda Shesadri |
|
Vol 6, No 4: August 2016 |
A Criterion on Existence and Uniqueness of Behavior in Electric Circuit |
Abstract
PDF
|
Takuya Hirata, Eko Setiawan, Kazuya Yamaguchi, Ichijo Hodaka |
|
Vol 8, No 6: December 2018 |
A Critical Review of Time-frequency Distribution Analysis for Detection and Classification of Harmonic Signal in Power Distribution System |
Abstract
PDF
|
M. H. Jopri, A. R. Abdullah, T. Sutikno, M. Manap, M. R. Ab Ghani, M. R. Yusoff |
|
Vol 9, No 5: October 2019 |
A cryptanalytic attack of simplified-AES using ant colony optimization |
Abstract
PDF
|
Hicham Grari, Ahmed Azouaoui, Khalid Zine-Dine |
|
76 - 100 of 5563 Items |
<< < 1 2 3 4 5 6 7 8 9 10 > >> |