|
Issue |
Title |
|
Vol 12, No 2: February 2014 |
Designers' Cognitive Thinking Based on Evolutionary Algorithms |
Abstract
PDF
|
Zhang Shutao, Jianning Su, Chibing Hu, Peng Wang |
|
Vol 23, No 1: July 2021 |
Designing a secure campus network and simulating it using Cisco packet tracer |
Abstract
PDF
|
Alaa H. Ahmed, Mokhaled N. A. Al-Hamadani |
|
Vol 14, No 2: May 2019 |
Designing cantilever dimension for low power wireless applications |
Abstract
PDF
|
Md Rabiul Awal, Muzammil Jusoh, R. Badlishah Ahmad, Thennarasan Sabapathy, M. Najib M. Yasin, Mohd Hafizuddin Mat |
|
Vol 22, No 1: April 2021 |
Designing consensus algorithm for collaborative signature-based intrusion detection system |
Abstract
PDF
|
Eko Arip Winanto, Mohd Yazid Idris, Deris Stiawan, Mohammad Sulkhan Nurfatih |
|
Vol 37, No 2: February 2025 |
Designing fuzzy membership functions using genetic algorithm with a new encoding method |
Abstract
PDF
|
Ali Hamed, Slimane Hireche, Abdelkader Bekri, Ahmed Cheriet |
|
Vol 1, No 2: February 2016 |
Designing Game-Based Service Desk towards User Engagement Improvement |
Abstract
PDF
|
Kridanto Surendro, Sarifah Putri Raflesia |
|
Vol 4, No 3: December 2016 |
Designing Multi-Dimensional User Interaction for a Virtual Museum System |
Abstract
PDF
|
Tengku Siti Meriam Tengku Wook, Noraidah Sahari @ Ashaari, Normala Rahim |
|
Vol 4, No 3: December 2016 |
Designing of Medical processor unit for Intelligent network-based Medical usage |
Abstract
PDF
|
P. ILA Chandana Kumari, P. Gayathri, N. Rajesh, Syed Umar, G. Chandra Sekhar, Azeem Mohammed Abdul |
|
Vol 38, No 1: April 2025 |
Designing stair climbing wheelchairs with surface prediction using theoretical analysis and machine learning |
Abstract
PDF
|
Pharan Chawaphan, Dechrit Maneetham, Padma Nyoman Crisnapati |
|
Vol 15, No 2: August 2019 |
Designs of rectangular-shaped planar Inverted-F antennas at mobile operating frequencies with different ground plane techniques |
Abstract
PDF
|
Nurul Inshirah Mohd Razali, Norhudah Seman, Tien Han Chua |
|
Vol 11, No 2: February 2013 |
Desynchronization Attacks on RFID Security Protocols |
Abstract
PDF
|
Miaolei Deng, Weijun Zhu |
|
Vol 12, No 11: November 2014 |
Detailed Analysis of Extrinsic Plagiarism Detection System Using Machine Learning Approach (Naive Bayes and SVM) |
Abstract
PDF
|
Zakiy Firdaus Alfikri, Ayu Purwarianti |
|
Vol 24, No 1: October 2021 |
Detailed modelling and simulation of single-phase transformers for research and educational purposes |
Abstract
PDF
|
Saif Sabah Sami, Mazin T. Muhssin, Zeyad Assi Obaid, Ali N. Hussain |
|
Vol 22, No 3: June 2021 |
Detailed Simulink implementation for induction motor control based on space vector pulse width modulation SVPWM |
Abstract
PDF
|
Taha A. Hussein, Laith A. Mohammed |
|
Vol 37, No 2: February 2025 |
Detect and envision of pandemic disease exposure using CNN |
Abstract
PDF
|
Ch. Rupa, Kanakam Siva Rama Prasad, Aremanda Lakshmi Rajeswari, Elika Sambasiva Rao, Mohammad Sirajuddin |
|
2986 - 3000 of 8735 Items |
<< < 195 196 197 198 199 200 201 202 203 204 > >> |