|
Issue |
Title |
|
Vol 13, No 3: June 2023 |
A transportation scheduling management system using decision tree and iterated local search techniques |
Abstract
PDF
|
Thittaporn Ganokratanaa, Mahasak Ketcham |
|
Vol 8, No 5: October 2018 |
A Triple Band Bow Tie Array Antenna Using Both-sided MIC Technology |
Abstract
PDF
|
Akimun Jannat Alvina, Samia Sabrin, Mohammad Istiaque Reja, Jobaida Akhtar |
|
Vol 14, No 2: April 2024 |
A trust based secure access control using authentication mechanism for interoperability in internet of things |
Abstract
PDF
|
Shashikala Narayanappa, Tulavanur Narayanareddy Anitha, Priti Mishra, Renuka Raichur Patil Herakal, Jayasudha Kolur |
|
Vol 12, No 2: April 2022 |
A trust evaluation scheme of service providers in mobile edge computing |
Abstract
PDF
|
Merrihan Badr Monir Mansour, Tamer Abdelkader, Mohammed Hashem AbdelAziz, El-Sayed Mohamed EI-Horbaty |
|
Vol 11, No 2: April 2021 |
A trust-based authentication framework for security of WPAN using network slicing |
Abstract
PDF
|
Sazia Parvin, Amjad Gawanmeh, Sitalakshmi Venkatraman, Ali Alwadi, Jamal N. Al-Karaki, Paul D. Yoo |
|
Vol 7, No 2: April 2017 |
A Tunable Ferrofluid-based Polydimethylsiloxane (PDMS) Microchannel Inductor for Ultra High Frequency Applications |
Abstract
PDF
|
Ahmad Hafiz Mohamad Razy, Mohd Tafir Mustaffa, Asrulnizam Abd Manaf, Norlaili Mohd Noh |
|
Vol 8, No 6: December 2018 |
A Two Channel Analog Front end Design AFE Design with Continuous Time Σ-Δ Modulator for ECG Signal |
Abstract
PDF
|
Mohammed Abdul Raheem, K Manjunathachari |
|
Vol 12, No 6: December 2022 |
A two-element planar multiple input multiple output array for ultra-wideband applications |
Abstract
PDF
|
Abdul Kayum Mohammad Zakir Hossain, Muhammad Ibn Ibrahimy, Tole Sutikno, Mohd Hatta Jopri, Jamil Abedalrahim Jamil Alsayaydeh, Mustafa Manap |
|
Vol 14, No 4: August 2024 |
A two-stage approach for aircraft detection with convolutional neural network |
Abstract
PDF
|
Wael Toghuj, Yousef Alraba'nah |
|
Vol 11, No 1: February 2021 |
A two-stage power amplifier design for ultra-wideband applications |
Abstract
PDF
|
Idrees S. Al-Kofahi, Zaid Albataineh, Ahmad Dagamseh |
|
Vol 12, No 4: August 2022 |
A typical analysis of hybrid covert channel using constructive entropy analytics |
Abstract
PDF
|
Anjan Krishnamurthy Koundinya, Gururaja Hebbur Satyanarayana |
|
Vol 8, No 6: December 2018 |
A UML Profile for Security and Code Generation |
Abstract
PDF
|
Abdellatif Lasbahani, Mostafa Chhiba, Abdelmoumen Tabyaoui |
|
Vol 8, No 1: February 2018 |
A Unified Approach for Performance Degradation Analysis from Transistor to Gate Level |
Abstract
PDF
|
Izhar Hussain, Marco Vacca, Fabrizio Riente, Mariagrazia Graziano |
|
Vol 4, No 3: June 2014 |
A Unified Call-to-Prayer Framework in Muslim World |
Abstract
PDF
|
Naeem Al-Oudat, Abdel Ilah Alshbatat |
|
Vol 3, No 4: August 2013 |
A Unified Codec Scheme for reduction of Area and Crosstalk in RC and RLC Modeled Interconnects using both Bus Encoding and Shielding Insertion Technique |
Abstract
PDF
|
Dhriti Duggal, Gurmohan Singh, Manjit Kaur |
|
691 - 705 of 6090 Items |
<< < 42 43 44 45 46 47 48 49 50 51 > >> |