|
Issue |
Title |
|
Vol 11, No 10: October 2013 |
A Safety Algorithm of P2P Routing based on Multiple-Encryption Detecting Technology |
Abstract
PDF
|
Chuiwei Lu, Xianhao Miao, Zhiyuan Liu |
|
Vol 6, No 3: June 2017 |
A Sales Prediction Model Adopted the Recency-Frequency-Monetary Concept |
Abstract
PDF
|
Rendra Gustriansyah, Dana Indra Sensuse, Arief Ramadhan |
|
Vol 33, No 3: March 2024 |
A scoping review of artificial intelligence-based robot therapy for children with disabilities |
Abstract
PDF
|
Rusnani Yahya, Rozita Jailani, Fazah Akhtar Hanapiah, Nur Khalidah Zakaria |
|
Vol 31, No 3: September 2023 |
A scoping review of topic modelling on online data |
Abstract
PDF
|
Mohd Mukhlis Mohd Sharif, Ruhaila Maskat, Zirawani Baharum, Kamaruzaman Maskat |
|
Vol 3, No 2: August 2016 |
A Secure ANFIS based Relay for Turbo-Generators Phase Backup Protection |
Abstract
PDF
|
Mohamed Salah El-Din Abdel Aziz, Mohamed ElSamahy, Mohamed Moustafa, Fahmy ElBendary |
|
Vol 21, No 2: February 2021 |
A secure cloud service deployment framework for DevOps |
Abstract
PDF
|
Rao Ravinder, V. Sucharita |
|
Vol 27, No 3: September 2022 |
A secure communication protocol for civil drones |
Abstract
PDF
|
Ayad Al-Adhami, Rajaa K. Hasoun, Ekhlas K. Gbashi, Soukaena Hassan |
|
Vol 11, No 1: July 2018 |
A Secure Data Aggregation Technique for Wireless Sensor Networks Using Iterative Filtering |
Abstract
PDF
|
Jyothi R, Nagaraj G Cholli |
|
Vol 34, No 1: April 2024 |
A secure framework for effective workload resource management |
Abstract
PDF
|
Dharuman Salangai Nayagi, Hosaagrahara Savalegowda Mohan |
|
Vol 28, No 3: December 2022 |
A secure framework of blockchain technology using CNN long short-term memory hybrid deep learning model |
Abstract
PDF
|
Gillala Chandra Sekhar, Aruna Rajendran |
|
Vol 16, No 2: November 2019 |
A secure group based authentication protocol for machine to machine communications in LTE-WLAN interworking architecture |
Abstract
PDF
|
Mariya Ouaissa, Abdallah Rhattoy |
|
Vol 12, No 10: October 2014 |
A Security Enhanced Password Authentication and Update Scheme Based on Elliptic Curve Cryptography |
Abstract
PDF
|
Hang Tu |
|
Vol 11, No 6: June 2013 |
A Security Mechanism Based on Authenticated Diffie-Hellman for WSN |
Abstract
PDF
|
Xin Yu, JianJun Fang, ZhaoLi Zhang |
|
Vol 23, No 2: August 2021 |
A self adaptive new crossover operator to improve the efficiency of the genetic algorithm to find the shortest path |
Abstract
PDF
|
Mrinmoyee Chattoraj, Udaya Rani Vinayakamurthy |
|
Vol 19, No 3: September 2020 |
A self-rectifying memristor model for simulation and ReRAM applications |
Abstract
PDF
|
Sinan Sabah, Nasri Bin Sulaiman |
|
Vol 24, No 2: November 2021 |
A semantic web services discovery approach integrating multiple similarity measures and k-means clustering |
Abstract
PDF
|
Mourad Fariss, Naoufal El Allali, Hakima Asaidi, Mohamed Bellouki |
|
Vol 27, No 1: July 2022 |
A semi-automated hybrid approach to identify radicalization on social digital platform |
Abstract
PDF
|
Vandna Batra, Suresh Kumar |
|
Vol 9, No 1: January 2018 |
A Semi-Autonomous Coal Mine Monitoring Security System Based On Wireless Control Using RTOS |
Abstract
PDF
|
Singh Omkar Ramabhilash, Santosh Kumar Singh |
|
Vol 11, No 7: July 2013 |
A Semi-Instantaneous Heat Exchanger for Mobile Solar Collectors Test System |
Abstract
PDF
|
Haifeng Cao, Liangen Yang, Jiabao Cheng, Xing Cheng |
|
Vol 8, No 2: November 2017 |
A Series Regeneration Converter Technique for Voltage Balancing of Energy Storage Devices |
Abstract
PDF
|
A K M Ahasan Habib, S. M. A. Motakabber, Muhammad I. Ibrahimy |
|
Vol 24, No 2: November 2021 |
A series-connected switched source and an H-bridge based multilevel inverter |
Abstract
PDF
|
Siva Pachipala, Amarsrinadh Guda, Mentimi Sandeep Babu, Veeranarayana B., K. V. S. Ramachandra Murthy, Abhilash Tirupathi |
|
Vol 11, No 12: December 2013 |
A Service Management Mode Dealing with Information Leakage Risk in the Online Payment |
Abstract
PDF
|
Wu Xiao Gang, Zhou Wei Feng, Du Rong Wei |
|
Vol 36, No 3: December 2024 |
A set of embedding rules in IWT for watermark embedding in image watermarking |
Abstract
PDF
|
Muhammad Afnan Hafidz, Ferda Ernawan, Suraya Abu Bakar, Mohammad Fakhreldin |
|
Vol 11, No 9: September 2013 |
A Shearlets-based Edge Identification Algorithem for Infrared Image |
Abstract
PDF
|
Rui-bin ZOU, Cai-cheng SHI |
|
Vol 11, No 1: January 2013 |
A Ship Cargo Hold Inspection Approach Using Laser Vision Systems |
Abstract
PDF
|
MI Chao, LIU Haiwei, ZHAO Ning, SHEN Yang |
|
751 - 775 of 8410 Items |
<< < 26 27 28 29 30 31 32 33 34 35 > >> |