| Issue | Title | |
| Vol 20, No 3: December 2020 | Near-lossless image compression using an improved edge adaptive hierarchical interpolation | Abstract PDF |
| Yenewondim Biadgie Sinshahw | ||
| Vol 12, No 10: October 2014 | Necessary Conditions of the Wave Packet Frames with Several Generators | Abstract PDF |
| Tao Zhao, Xiaoyu Zhou | ||
| Vol 12, No 1: October 2018 | Neighbor Weighted K-Nearest Neighbor for Sambat Online Classification | Abstract PDF |
| Annisya Aprilia Prasanti, M. Ali Fauzi, Muhammad Tanzil Furqon | ||
| Vol 8, No 1: October 2017 | Neoteric Hybrid Multilevel Cascade Inverter Based on Low Switch Numbers Along with Low Voltage Stress: Design, Analysis, Verification | Abstract PDF |
| Rasool Esmailzadeh, A. Ajami, M.R. Banaei | ||
| Vol 31, No 1: July 2023 | Nested approach for X-ray image enhancement based on contrast adaptive using histogram equalization | Abstract PDF |
| Mostafa Satea | ||
| Vol 19, No 3: September 2020 | Net energy metering scheme based on time of use pricing for residents in Malaysia | Abstract PDF |
| Abdul Hafiz Bin Razali | ||
| Vol 22, No 2: May 2021 | Network analysis of Youtube videos based on keyword search with graph centrality approach | Abstract PDF |
| Edi Surya Negara, Ria Andryani, Riyan Amanda | ||
| Vol 11, No 12: December 2013 | Network Coding Based Reliable Multi-path Routing in Wireless Sensor Network | Abstract PDF |
| Zhao Wei, Tang Zhenmin, Yang Yuwang, Wang Lei | ||
| Vol 11, No 2: February 2013 | Network Coding-Based Communications via the Controlled Quantum Teleportation | Abstract PDF |
| Dazu Huang, Shaoping Zhu, Dan Song, Ying Guo | ||
| Vol 31, No 2: August 2023 | Network intrusion detection and classification using machine learning predictions fusion | Abstract PDF |
| Harshitha Somashekar, Ramesh Boraiah | ||
| Vol 12, No 2: February 2014 | Network Intrusion Detection Based on PSO-SVM | Abstract PDF |
| Changsheng Xiang, Yong Xiao, Peixin Qu, Xilong Qu | ||
| Vol 12, No 4: April 2014 | Network Intrusion Detection System Based on Optimized Fuzzy Rules Algorithm | Abstract PDF |
| Liang Lei | ||
| Vol 16, No 3: December 2019 | Network intrusion detection system by using genetic algorithm | Abstract PDF |
| Hamizan Suhaimi, Saiful Izwan Suliman, Ismail Musirin, Afdallyna Fathiyah Harun, Roslina Mohamad | ||
| Vol 17, No 2: February 2020 | Network intrusion detection system using immune-genetic algorithm (IGA) | Abstract PDF |
| Hamizan Suhaimi, Saiful Izwan Suliman, Ismail Musirin, Afdallyna Harun, Roslina Mohamad, Murizah Kassim, Shahrani Shahbudin | ||
| Vol 25, No 2: February 2022 | Network intrusion detection system: machine learning approach | Abstract PDF |
| Ameera S. Jaradat, Malek M. Barhoush, Rawan S. Bani Easa | ||
| 6181 - 6195 of 9200 Items | << < 408 409 410 411 412 413 414 415 416 417 > >> | |
