| Issue | Title | |
| Vol 20, No 1: October 2020 | A computational forensic framework for detection of hidden applications on android | Abstract PDF |
| Tahira Rasul, Rabia Latif, Nor Shahida Mohd Jamail | ||
| Vol 26, No 2: May 2022 | A computationally efficient non-coherent technique for wireless relay networks | Abstract PDF |
| Samer Alabed, Aymen I. Zreikat, Mohammad Al-Abed | ||
| Vol 14, No 1: April 2019 | A computer vision based image processing system for depression detection among students for counseling | Abstract PDF |
| Sandhya Parameswaran Namboodiri, Venkataraman D | ||
| Vol 19, No 3: September 2020 | A computing model for trend analysis in stock data stream classification | Abstract PDF |
| Abdul Razak, Nirmala C. R | ||
| Vol 6, No 3: June 2017 | A Concealment Aware UEP scheme for H.264 using RS Codes | Abstract PDF |
| Deevya Indoonundon, Tulsi Pawan Fowdur, Sunjiv Soyjaudah | ||
| Vol 37, No 1: January 2025 | A conceptual approach of optimization in federated learning | Abstract PDF |
| Farhanna Mar’i, Ahmad Afif Supianto | ||
| Vol 12, No 3: December 2018 | A Conceptual Framework for Gamified Learning Management System for LINUS Students | Abstract PDF |
| Syadiah Nor Wan Shamsuddin, Muhammad Faisal Selman, Ismahafezi Ismail, Maizan Mat Amin, Norkhairani Abdul Rawi | ||
| Vol 17, No 3: March 2020 | A conceptual integrated health information systems framework in postnatal care for modern and traditional malay medicine | Abstract PDF |
| Raja Rina Raja Ikram, Lizawati Salahuddin, Mohd Hariz Mohd Naim, Ariff Idris, Nor Afirdaus Zainal Abidin, Nadiah Ishak, Noor Raihan Ab Hamid | ||
| Vol 12, No 3: December 2018 | A Conceptual Model of Role Based Access Control Using Role Mining Algorithm | Abstract PDF |
| Nazirah Abd Hamid, Rabiah Ahmad, Siti Rahayu Selamat | ||
| Vol 14, No 2: May 2019 | A concurrent dual-band CMOS low noise amplifier at 2.4/5.2 GHz for WLAN applications | Abstract PDF |
| S.A.Z. Murad, A. F. Hasan, A. Azizan, A. Harun, J. Karim | ||
| Vol 7, No 1: July 2017 | A Condorcet Voting Theory Based AHP Approach for MCDM Problems | Abstract PDF |
| Sweta Bhattacharya, V Raju | ||
| Vol 11, No 8: August 2013 | A Conflict Context Reasoning Method Based on Dempster-Shafer Theory in Ubiquitous Computing | Abstract PDF |
| Xinkai Yang | ||
| Vol 12, No 2: February 2014 | A Control Packet Minimized Routing Protocol for Ad-hoc Wireless Networks | Abstract PDF |
| Youn-Sik Hong | ||
| Vol 5, No 2: February 2017 | A Control Strategy for DFIM to Minimize DC Bus Voltage Fluctuations and Torque Oscillations | Abstract PDF |
| G. Venu Madhav, Y. P. Obulesu | ||
| Vol 12, No 1: January 2014 | A Control Strategy for Single-phase Grid-Connected Inverter with Power Quality Regulatory Function | Abstract PDF |
| Jin Jiapei, Chen Tiantian, Luo Ling, Su Shaoze | ||
| 136 - 150 of 8967 Items | << < 5 6 7 8 9 10 11 12 13 14 > >> | |
