| Issue | Title | |
| Vol 5, No 6: December 2015 | Tree Based Energy Balancing Routing Protocol by Self Organizing in Wireless Sensor Networks | Abstract PDF |
| Syed Umar, P.V.R. D Prasada Rao, Sridevi Gutta | ||
| Vol 6, No 6: December 2016 | Trends In Task Allocation For Multicore System | Abstract PDF |
| Arun Kumar Sundar Rajan, Shriram K Vasudevan, Nirmala Devi M | ||
| Vol 15, No 6: December 2025 | Trends of unmanned aerial vehicles in smart farming: a bibliometric analysis | Abstract PDF |
| Alfred Thaga Kgopa, Sikhosonke Manyela, Bessie Baakanyang Monchusi | ||
| Vol 13, No 5: October 2023 | Triple-layer remote phosphor geometry: an excellent selection to improve the optical properties of white light-emitted diodes | Abstract PDF |
| Thuc Minh Bui, My Hanh Nguyen Thi, Nguyen Doan Quoc Anh, Nguyen Le Thai | ||
| Vol 13, No 1: February 2023 | Trolls: a novel low-cost controlling system platform for walk-behind tractor | Abstract PDF |
| Padma Nyoman Crisnapati, Dechrit Maneetham, Evi Triandini | ||
| Vol 13, No 5: October 2023 | Trust based multi objective honey badger algorithm to secure routing in vehicular ad-hoc networks | Abstract PDF |
| Pramod Mutalik, Venkangouda C. Patil | ||
| Vol 10, No 2: April 2020 | Trust correlation of mobile agent nodes with a regular node in a Adhoc network using decision-making strategy | Abstract PDF |
| Chethan B. K., M. Siddappa, Jayanna H. S. | ||
| Vol 8, No 6: December 2018 | Trust Enhanced Role Based Access Control Using Genetic Algorithm | Abstract PDF |
| Saleh Mowla, Niharika Sinha, Raghavendra Ganiga, Nisha P. Shetty | ||
| Vol 15, No 2: April 2025 | Trust factor validation for distributed denial of service attack detection using machine learning | Abstract PDF |
| Manju Jayakumar Raghvin, Manjula R. Bharamagoudra, Ritesh Dash | ||
| Vol 9, No 5: October 2019 | Trust model genetic node recovery based on cloud theory for underwater acoustic sensor network | Abstract PDF |
| Buddesab T, Thriveni J, Venugopal K R | ||
| Vol 6, No 5: October 2016 | Trust-Based Privacy for Internet of Things | Abstract PDF |
| Vera Suryani, Selo Sulistyo, Widyawan Widyawan | ||
| Vol 10, No 2: April 2020 | Trust-based secure routing against lethal behavior of nodes in wireless adhoc network | Abstract PDF |
| Jyoti Neeli, N. K. Cauvery | ||
| Vol 12, No 5: October 2022 | Tunicate swarm algorithm based maximum power point tracking for photovoltaic system under non-uniform irradiation | Abstract PDF |
| Evi Nafiatus Sholikhah, Novie Ayub Windarko, Bambang Sumantri | ||
| Vol 10, No 3: June 2020 | Tuning of different controlling techniques for magnetic suspending system using an improved bat algorithm | Abstract PDF |
| Nizar Hadi Abbas | ||
| Vol 8, No 6: December 2018 | Twitter Sentiment Analysis on 2013 Curriculum Using Ensemble Features and K-Nearest Neighbor | Abstract PDF |
| M. Rizzo Irfan, M. Ali Fauzi, Tibyani Tibyani, Nurul Dyah Mentari | ||
| 6106 - 6120 of 6309 Items | << < 403 404 405 406 407 408 409 410 411 412 > >> | |
