|
Issue |
Title |
|
Vol 10, No 4: August 2020 |
A comprehensive study on disease risk predictions in machine learning |
Abstract
PDF
|
G. Saranya, A. Pravin |
|
Vol 8, No 4: August 2018 |
A Comprehensive Survey on Exiting Solution Approaches towards Security and Privacy Requirements of IoT |
Abstract
PDF
|
Rajani Chetan, Ramesh Shahabadkar |
|
Vol 14, No 6: December 2024 |
A comprehensive verification of the header format and bandwidth utilization to detect distributed denial of service attack in vehicular ad hoc network |
Abstract
PDF
|
Arun Singh Kaurav, K. Srinivas |
|
Vol 9, No 5: October 2019 |
A compressive sensing algorithm for hardware trojan detection |
Abstract
PDF
|
priyatharishini m, M. Nirmala Devi |
|
Vol 8, No 6: December 2018 |
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET |
Abstract
PDF
|
Sachin P. Godse, Parikshit N. Mahalle |
|
Vol 9, No 6: December 2019 |
A computational analysis of short sentences based on ensemble similarity model |
Abstract
PDF
|
Arifah Che Alhadi, Aziz Deraman, Masita Masila Abdul Jalil, Wan Nural Jawahir Wan Yussof, Rosmayati Mohemad |
|
Vol 9, No 5: October 2019 |
A computationally efficient detector for MIMO systems |
Abstract
PDF
|
Samer Alabed |
|
Vol 12, No 5: October 2022 |
A computationally efficient learning model to classify audio signal attributes |
Abstract
PDF
|
Maha Veera Vara Prasad Kantipud, Satish Kumar |
|
Vol 13, No 1: February 2023 |
A computer vision-based lane detection technique using gradient threshold and hue-lightness-saturation value for an autonomous vehicle |
Abstract
PDF
|
Md. Abdullah Al Noman, Zhai LI, Firas Husham Almukhtar, Md. Faishal Rahaman, Batyrkhan Omarov, Samrat Ray, Shahajan Miah, Chengping Wang |
|
Vol 12, No 6: December 2022 |
A conceptual architecture for integrating software defined network and network virtualization with internet of things |
Abstract
PDF
|
Ali Haider Shamsan, Arman Rasool Faridi |
|
Vol 15, No 2: April 2025 |
A constrained convolutional neural network with attention mechanism for image manipulation detection |
Abstract
PDF
|
Kamagate Beman Hamidja, Fatoumata Wongbé Rosalie Tokpa, Vincent Mosan, Souleymane Oumtanaga |
|
Vol 13, No 1: February 2023 |
A constrained model predictive control for the building thermal management with optimal setting design |
Abstract
PDF
|
Noureddine Boutchich, Ayoub Moufid, Najib Bennis |
|
Vol 8, No 6: December 2018 |
A Context-based Numeral Reading Technique for Text to Speech Systems |
Abstract
PDF
|
Soumya Priyadarsini Panda, Ajit Kumar Nayak |
|
Vol 15, No 2: April 2025 |
A convex hull based geofencing system to eradicate COVID |
Abstract
PDF
|
Parul Arora, Suman Deswal |
|
Vol 8, No 3: June 2018 |
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor Networks |
Abstract
PDF
|
Piyush Charan, Tahsin Usmani, Rajeev Paulus, Syed Hasan Saeed |
|
91 - 105 of 6007 Items |
<< < 2 3 4 5 6 7 8 9 10 11 > >> |