| Issue | Title | |
| Vol 11, No 12: December 2013 | Ensemble of Differential Equations using Pareto Optimal for Traffic Forecasting | Abstract PDF |
| Bin Yang, Yuehui Chen, Mingyan Jiang | ||
| Vol 2, No 2: May 2016 | Ensuring Data Integrity Scheme Based on Digital Signature and Iris Features in Cloud | Abstract PDF |
| Salah H. Abbdal, Thair A. Kadhim, Zaid Ameen Abduljabbar, Zaid Alaa Hussien, Ali A. Yassin, Mohammed Abdulridha Hussain, Salam Waley | ||
| Vol 17, No 3: March 2020 | Ensuring sustainable development through groundwater management, area one, south western desert, Egypt | Abstract PDF |
| Gamal H. El Saeed, Neveen B. Abdelmageed, Peter Riad, M Komy | ||
| Vol 38, No 3: June 2025 | Ensuring transcript integrity with SHA-3 and digital signature standard: a practical approach | Abstract PDF |
| Wa Ode Siti Nur Alam, Adha Mashur Sajiah, La Ode Muhammad Bahtiar Aksara, La Surimi, Natalis Ransi, Jumadil Nangi | ||
| Vol 15, No 1: July 2019 | Enterprise architecture adoption issues and challenges: a systematic literature review | Abstract PDF |
| Nor Azizah Ahmad, Sulfeeza Mohd. Drus, Nur Azaliah Abu Bakar | ||
| Vol 3, No 1: July 2016 | Enterprise Architecture Characteristics in Context Enterprise Governance Base On COBIT 5 Framework | Abstract PDF |
| Heru Nugroho, Tutut Herawan | ||
| Vol 31, No 3: September 2023 | Enterprise information security risks: a systematic review of the literature | Abstract PDF |
| Jenner Lavalle Sandoval, Domingo Hernández Celis, Michael Cabanillas-Carbonell, Laberiano Andrade-Arenas | ||
| Vol 15, No 3: September 2019 | Entire X-band region metamaterial absorber and reflector with a microstrip patch switch for X-band applications | Abstract PDF |
| M.M. Gajibo, M. K. A. Rahim, N. A. Murad, O. Ayop, H.A. Majid, M. Aminu-Baba, R. Dewan | ||
| Vol 27, No 3: September 2022 | Entropy-based distributed denial of service attack detection in software-defined networking | Abstract PDF |
| Mohammed Ibrahim Kareem, Mahdi Nsaif Jasim | ||
| Vol 11, No 6: June 2013 | Entropy-based Evaluation Method of Design Scheme for Helicopter Transmission | Abstract PDF |
| Wang Haiwei, Liu Geng, Yang Zhanduo, Wei Zhongsheng | ||
| Vol 19, No 1: July 2020 | E-PAC: efficient password authentication code based RMPN method and diffie-hellman algorithm | Abstract PDF |
| Salah H. Abbdal Refish, Salam Waley Shneen | ||
| Vol 14, No 2: May 2019 | e-PADI: an iot-based paddy productivity monitoring and advisory system | Abstract PDF |
| M.A.F. Ismail, M. N. Md. Isa, S. N. Mohyar, M.I. Ahmad, M. N. M. Ismail, R. C. Ismail, A. Harun, S.A.Z. Murad | ||
| Vol 25, No 2: February 2022 | Epileptic seizure classification of electroencephalogram signals using extreme gradient boosting classifier | Abstract PDF |
| Millee Panigrahi, Dayal Kumar Behera, Krishna Chandra Patra | ||
| Vol 12, No 3: March 2014 | Equipment Fault Prognosis Based on Temporal Association Rules | Abstract PDF |
| Chao GAN, Yuan LU, Ying HU, Jia GU, Xin QIU | ||
| Vol 11, No 2: February 2013 | Equipment maintenance support capability evaluation using cloud barycenter evaluation method | Abstract PDF |
| Hongqiang Gu, Cheng Zhang, Quan Shi | ||
| 3916 - 3930 of 8967 Items | << < 257 258 259 260 261 262 263 264 265 266 > >> | |
