|
Issue |
Title |
|
Vol 16, No 1: October 2019 |
A detailed investigation of the impact of online transportation on Bangladesh economy |
Abstract
PDF
|
Abbas Ali Khan, M. Raki Billah, Chandan Debnath, Sadekur Rahman, Md. Tarek Habib, Gazi Zahirul Islam |
|
Vol 29, No 3: March 2023 |
A detailed survey regarding the usage of different ICT technology modes adopted by higher education institutions |
Abstract
PDF
|
Rakshit khajuria, Anuj Sharma, Ashok Sharma |
|
Vol 12, No 3: March 2014 |
A Detection method based on Control Flow Graph for Cisco IOS Security |
Abstract
PDF
|
Sheng-li Liu, Xiang Gao, Xiang Gao, Cheng Zeng, Cheng Zeng, Li-gen Chen |
|
Vol 15, No 3: September 2015 |
A Developed Graphical User Interface for Power System Stability and Robustness Studies |
Abstract
PDF
|
Ghouraf Djamel Eddine, Naceri Abdellatif, Abid Mohamed, Kabi Wahiba |
|
Vol 34, No 3: June 2024 |
A device to device driven approach towards optimizing energy efficiency for 6G networks |
Abstract
PDF
|
Sonia Aneesh, Alam N. Shaikh |
|
Vol 12, No 12: December 2014 |
A Difference-Based Feature Description Method of Image Target |
Abstract
PDF
|
Qiang Gao, Wu Yang, Hongye Yang |
|
Vol 11, No 6: June 2013 |
A Digital Watermarking Algorithm for Color Image Based on DWT |
Abstract
PDF
|
Huming Gao, Liyuan Jia, Meiling Liu |
|
Vol 27, No 3: September 2022 |
A disaster classification application using convolutional neural network by performing data augmentation |
Abstract
PDF
|
Mummaneni Sobhana, Smitha Chowdary Chaparala, Devaganugula N. V. S. L. S. Indira, Konduru Kranthi Kumar |
|
Vol 29, No 1: January 2023 |
A discrete salp swarm algorithm with weights and Lévy flights: application for Parkinson’s disease detection |
Abstract
PDF
|
Nitesh M. Sureja, Pratik N. Patel, Hemant Patel, Chetan J. Shingadiya |
|
Vol 11, No 10: October 2013 |
A Distributed Network Intrusion Detection System with Active Surveillance Agent |
Abstract
PDF
|
Bin Zeng, Lu Yao, Rui Wang |
|
Vol 19, No 3: September 2020 |
A distributed trust mechanism for malicious behaviors in VANETs |
Abstract
PDF
|
Ali Kamil Ahmed, Mohanad Najm Abdulwahed, Behnam Farzaneh |
|
Vol 12, No 6: June 2014 |
A Dominance Degree for Rough Sets and Its Application in Ranking Popularity |
Abstract
PDF
|
Jia Zhao, Jianfeng Guan, Changqiao Xu, Hongke Zhang |
|
Vol 12, No 9: September 2014 |
A Double-Efficient Integrity Verification Scheme to Cloud Storage Data |
Abstract
PDF
|
Hongyao Deng, Song Xiuli, Tao Jingsong |
|
Vol 27, No 1: July 2022 |
A dualband bandpass filter with tunable bandwidths for automotive radar and 5G millimeter-wave applications |
Abstract
PDF
|
Thierno Amadou Mouctar Balde, Franklin Manene, Franck Moukanda Mbango |
|
Vol 12, No 6: June 2014 |
A Dual-Microphone Speech Enhancement Algorithm for Close-Talk System |
Abstract
PDF
|
Yi Jiang, Zhenming Feng, Yuanyuan Zu, Xi Lu |
|
181 - 195 of 8800 Items |
<< < 8 9 10 11 12 13 14 15 16 17 > >> |