|
Issue |
Title |
|
Vol 28, No 3: December 2022 |
Cryptography based on retina information |
Abstract
PDF
|
Zainab Ibrahim Abood Alrifaee, Tarik Zeyad Ismaeel |
|
Vol 20, No 1: October 2020 |
Cryptosystems using an improving hiding technique based on latin square and magic square |
Abstract
PDF
|
Sahab Dheyaa Mohammed, Taha Mohammed Hasan |
|
Vol 11, No 3: September 2018 |
Cube Arithmetic: Improving Euler Method for Ordinary Differential Equation using Cube Mean |
Abstract
PDF
|
Nooraida Samsudin, Nurhafizah Moziyana Mohd Yusop, Syahrul Fahmy, Anis Shahida Niza binti Mokhtar |
|
Vol 26, No 2: May 2022 |
Cuckoo search algorithm and particle swarm optimization based maximum power point tracking techniques |
Abstract
PDF
|
Sally Abdulaziz, Galal Atlam, Gomaa Zaki, Essam Nabil |
|
Vol 34, No 1: April 2024 |
Cultivating excellence: a case study of enterprise architecture transformational journey in higher education |
Abstract
PDF
|
Fatimah Azzaharah Amin, Surya Sumarni Hussein, Nor Aziah Daud, Nur Azaliah Abu Bakar, Wan Azlin Zurita Wan Ahmad |
|
Vol 36, No 1: October 2024 |
Culturally inclusive prototyping for higher education institutions: navigating language and gender dynamics |
Abstract
PDF
|
Aminah Rezqallah Malkawi, Muhamad Shahbani Abu Bakar, Zulkhairi Md Dahlin |
|
Vol 34, No 2: May 2024 |
Cumulative error correction of inertial navigation systems using LIDAR sensors and extended Kalman filter |
Abstract
PDF
|
Silmi Ath Thahirah Al Azhima, Dadang Lukman Hakim, Robby Ikhfa Nulfatwa, Nurul Fahmi Arief Hakim, Mariya Al Qibtiya |
|
Vol 20, No 3: December 2020 |
Currency hedging strategy using barrier options in the colombian market |
Abstract
PDF
|
Mariana Arango-Franco, Miguel Jiménez-Gómez, Natalia Acevedo-Prins |
|
Vol 24, No 1: October 2021 |
Current mismatch reduction in charge pumps using regulated current stealing-injecting transistors for PLLs |
Abstract
PDF
|
Mohd Khairi Zulkalnain, Yan Chiew Wong |
|
Vol 21, No 2: February 2021 |
Current model predictive control for three-phase active power filter using cascaded h-bridge multilevel converter |
Abstract
PDF
|
Abdelkader Yousfi, Youcef Bot, Fayçal Mehedi, Abdelkader Chaker |
|
Vol 6, No 2: May 2017 |
Current PI-Gain Determination for Permanent Magnet Synchronous Motor by using Particle Swarm Optimization |
Abstract
PDF
|
Ahmad Asri Abd Samat, M.S Zainal, L.N Ismail, Wan Salha Saidon, A. Idzwan Tajudin |
|
Vol 5, No 3: March 2017 |
Current Steering Digital Analog Converter with Partial Binary Tree Network (PBTN) |
Abstract
PDF
|
Mohd Tafir Mustaffa, Yong Cheng Lim, Choon Yan Teh |
|
Vol 11, No 6: June 2013 |
Curve Fitting And Interpolation Model Applied In Nonel Dosage Detection |
Abstract
PDF
|
Jiuling Li, Quanjie Gao, Lei Peng, Liping Song |
|
Vol 31, No 3: September 2023 |
Custom application programming interface data extractor applied to the Klarna e-commerce dataset |
Abstract
PDF
|
Anas El Attaoui, Alaeddine Boukhalfa, Sara Rhouas, Norelislam El Hami |
|
Vol 25, No 1: January 2022 |
Customer churn analysis using XGBoosted decision trees |
Abstract
PDF
|
Muthupriya Vasudevan, Revathi Sathya Narayanan, Sabiyath Fatima Nakeeb, Abhishek Abhishek |
|
Vol 22, No 3: June 2021 |
Customer’s spontaneous facial expression recognition |
Abstract
PDF
|
Golam Morshed, Hamimah Ujir, Irwandi Hipiny |
|
Vol 36, No 1: October 2024 |
Customized convolutional neural networks for Moroccan traffic signs classification |
Abstract
PDF
|
Fatima Ezzahra Khalloufi, Najat Rafalia, Jaafar Abouchabaka |
|
Vol 7, No 1: July 2017 |
Customized Hardware Crypto Engine for Wireless Sensor Networks |
Abstract
PDF
|
Medhat Awadalla, Ahmed Al Maashri, Lavanya Pathuri, Afaq Ahmad |
|
Vol 3, No 1: July 2016 |
Cyber informatics and Contrasting Extreme Programming with Boolean Logic |
Abstract
PDF
|
Erick Fernando, Derist Touriano |
|
Vol 15, No 3: September 2015 |
Cyber Security Threats in Synchrophasor System in Wide Area Monitoring System |
Abstract
PDF
|
Surender Kumar, M K Soni, D K Jain |
|
Vol 31, No 3: September 2023 |
Cyber security: performance analysis and challenges for cyber attacks detection |
Abstract
PDF
|
Azar Abid Salih, Maiwan Bahjat Abdulrazzaq |
|
Vol 10, No 1: April 2018 |
Cyber Threat Intelligence – Issue and Challenges |
Abstract
PDF
|
Md Sahrom Abu, Siti Rahayu Selamat, Aswami Ariffin, Robiah Yusof |
|
Vol 18, No 3: June 2020 |
Cyberbullying identification in twitter using support vector machine and information gain based feature selection |
Abstract
PDF
|
Ni Made Gita Dwi Purnamasari, M. Ali Fauzi, Indriati Indriati, Liana Shinta Dewi |
|
Vol 32, No 3: December 2023 |
Cybersecurity awareness among university students in Mogadishu: a comparative study |
Abstract
PDF
|
Adnan Abdukadir Ahmed, Abdikadir Hussein Elmi, Abdijalil Abdullahi, Abdullahi Yahye Ahmed |
|
Vol 31, No 2: August 2023 |
Cybersecurity in health sector: a systematic review of the literature |
Abstract
PDF
|
Catherine Vanessa Peve Herrera, Jonathan Steve Mendoza Valcarcel, Mónica Díaz, Jose Luis Herrera Salazar, Laberiano Andrade-Arenas |
|
2476 - 2500 of 8410 Items |
<< < 95 96 97 98 99 100 101 102 103 104 > >> |