|
Issue |
Title |
|
Vol 14, No 6: December 2024 |
A comprehensive verification of the header format and bandwidth utilization to detect distributed denial of service attack in vehicular ad hoc network |
Abstract
PDF
|
Arun Singh Kaurav, K. Srinivas |
|
Vol 9, No 5: October 2019 |
A compressive sensing algorithm for hardware trojan detection |
Abstract
PDF
|
priyatharishini m, M. Nirmala Devi |
|
Vol 8, No 6: December 2018 |
A Computational Analysis of ECC Based Novel Authentication Scheme in VANET |
Abstract
PDF
|
Sachin P. Godse, Parikshit N. Mahalle |
|
Vol 9, No 6: December 2019 |
A computational analysis of short sentences based on ensemble similarity model |
Abstract
PDF
|
Arifah Che Alhadi, Aziz Deraman, Masita Masila Abdul Jalil, Wan Nural Jawahir Wan Yussof, Rosmayati Mohemad |
|
Vol 9, No 5: October 2019 |
A computationally efficient detector for MIMO systems |
Abstract
PDF
|
Samer Alabed |
|
Vol 12, No 5: October 2022 |
A computationally efficient learning model to classify audio signal attributes |
Abstract
PDF
|
Maha Veera Vara Prasad Kantipud, Satish Kumar |
|
Vol 13, No 1: February 2023 |
A computer vision-based lane detection technique using gradient threshold and hue-lightness-saturation value for an autonomous vehicle |
Abstract
PDF
|
Md. Abdullah Al Noman, Zhai LI, Firas Husham Almukhtar, Md. Faishal Rahaman, Batyrkhan Omarov, Samrat Ray, Shahajan Miah, Chengping Wang |
|
Vol 12, No 6: December 2022 |
A conceptual architecture for integrating software defined network and network virtualization with internet of things |
Abstract
PDF
|
Ali Haider Shamsan, Arman Rasool Faridi |
|
Vol 13, No 1: February 2023 |
A constrained model predictive control for the building thermal management with optimal setting design |
Abstract
PDF
|
Noureddine Boutchich, Ayoub Moufid, Najib Bennis |
|
Vol 8, No 6: December 2018 |
A Context-based Numeral Reading Technique for Text to Speech Systems |
Abstract
PDF
|
Soumya Priyadarsini Panda, Ajit Kumar Nayak |
|
Vol 8, No 3: June 2018 |
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor Networks |
Abstract
PDF
|
Piyush Charan, Tahsin Usmani, Rajeev Paulus, Syed Hasan Saeed |
|
Vol 8, No 5: October 2018 |
A CORDIC based QR Decomposition Technique for MIMO Detection |
Abstract
PDF
|
Shirly Edward A., Malarvizhi S. |
|
Vol 9, No 2: April 2019 |
A cost effective computational design of maximum power point tracking for photo-voltaic cell |
Abstract
PDF
|
Yoganandini A. P., Anitha G. S. |
|
Vol 9, No 5: October 2019 |
A cost-effective 2-tier security paradigm to safeguard cloud data with faster authentication |
Abstract
PDF
|
Veena R.S, Ramachandra V. Pujeri, Indiramma M |
|
Vol 13, No 5: October 2023 |
A cost-effective and optimized maximum powerpoint tracking system for the photovoltaic model |
Abstract
PDF
|
Yoganandini Arehalli Puttalingaiah, Anitha Gowda Shesadri |
|
91 - 105 of 5896 Items |
<< < 2 3 4 5 6 7 8 9 10 11 > >> |