| Issue | Title | |
| Vol 7, No 3: September 2017 | Crowd Anomaly Detection Using Motion Based Spatio-Temporal Feature Analysis | Abstract PDF |
| Basavaraj G M, Ashok Kusagur | ||
| Vol 15, No 1: July 2019 | Crowd behavior analysis using MoDTA approach | Abstract PDF |
| Savitha C, Dr. Ramesh. D | ||
| Vol 4, No 2: November 2016 | Crowd Detection in Still Images Using Combined HOG and SIFT Feature | Abstract PDF |
| Machbah Uddin, Hira Lal Gope, Md. Sayeed Iftekhar Yousuf, Dilshad Islam, Mohammad Khairul Islam | ||
| Vol 24, No 2: November 2021 | Crown closure segmentation on wetland lowland forest using the mean shift algorithm | Abstract PDF |
| Beni Iskandar, I Nengah Surati Jaya, Muhammad Buce Saleh | ||
| Vol 12, No 10: October 2014 | Cryptanalysis and Improvement of an Authentication Scheme for Telecare Medical Information Systems | Abstract PDF |
| Yun Zhao, Wenbo Shi | ||
| Vol 8, No 2: November 2017 | Cryptanalysis on Privacy-aware two-factor Authentication Protocol for Wireless Sensor Networks | Abstract PDF |
| Younsung Choi | ||
| Vol 28, No 3: December 2022 | CryptoAR: scrutinizing the trend and market of cryptocurrency using machine learning approach on time series data | Abstract PDF |
| Abu Kowshir Bitto, Imran Mahmud, Md. Hasan Imam Bijoy, Fatema Tuj Jannat, Md. Shohel Arman, Md. Mahfuj Hasan Shohug, Hasnur Jahan | ||
| Vol 30, No 2: May 2023 | Cryptocurrencies investment framework using sentiment analysis of Twitter influencers | Abstract PDF |
| Mohammed Ali Zare Chahooki, Kia Jahanbin, Tole Sutikno | ||
| Vol 30, No 1: April 2023 | Cryptocurrency price forecasting method using long short-term memory with time-varying parameters | Abstract PDF |
| Laor Boongasame, Panida Songram | ||
| Vol 9, No 1: January 2018 | Cryptographic Hashing Method using for Secure and Similarity Detection in Distributed Cloud Data | Abstract PDF |
| A. Mohamed Divan Masood, S. K. Muthusundar | ||
| Vol 40, No 1: October 2025 | Cryptographically secure digital certificates on a distributed ledger | Abstract PDF |
| Umna Iftikhar, Hafiz Muhammad Attaullah, Inam Ullah Khan, Muhammad Mansoor Alam, Mazliham Mohd Su’ud, Ahthasham Sajid | ||
| Vol 28, No 3: December 2022 | Cryptography based on retina information | Abstract PDF |
| Zainab Ibrahim Abood Alrifaee, Tarik Zeyad Ismaeel | ||
| Vol 41, No 1: January 2026 | Cryptojacking detection using model-agnostic explainability | Abstract PDF |
| Elodie Ngoie Mutombo, Mike Wa Nkongolo, Mahmut Tokmak | ||
| Vol 20, No 1: October 2020 | Cryptosystems using an improving hiding technique based on latin square and magic square | Abstract PDF |
| Sahab Dheyaa Mohammed, Taha Mohammed Hasan | ||
| Vol 11, No 3: September 2018 | Cube Arithmetic: Improving Euler Method for Ordinary Differential Equation using Cube Mean | Abstract PDF |
| Nooraida Samsudin, Nurhafizah Moziyana Mohd Yusop, Syahrul Fahmy, Anis Shahida Niza binti Mokhtar | ||
| 2671 - 2685 of 9112 Items | << < 174 175 176 177 178 179 180 181 182 183 > >> | |
