|
Issue |
Title |
|
Vol 31, No 3: September 2023 |
A scoping review of topic modelling on online data |
Abstract
PDF
|
Mohd Mukhlis Mohd Sharif, Ruhaila Maskat, Zirawani Baharum, Kamaruzaman Maskat |
|
Vol 3, No 2: August 2016 |
A Secure ANFIS based Relay for Turbo-Generators Phase Backup Protection |
Abstract
PDF
|
Mohamed Salah El-Din Abdel Aziz, Mohamed ElSamahy, Mohamed Moustafa, Fahmy ElBendary |
|
Vol 21, No 2: February 2021 |
A secure cloud service deployment framework for DevOps |
Abstract
PDF
|
Rao Ravinder, V. Sucharita |
|
Vol 27, No 3: September 2022 |
A secure communication protocol for civil drones |
Abstract
PDF
|
Ayad Al-Adhami, Rajaa K. Hasoun, Ekhlas K. Gbashi, Soukaena Hassan |
|
Vol 11, No 1: July 2018 |
A Secure Data Aggregation Technique for Wireless Sensor Networks Using Iterative Filtering |
Abstract
PDF
|
Jyothi R, Nagaraj G Cholli |
|
Vol 34, No 1: April 2024 |
A secure framework for effective workload resource management |
Abstract
PDF
|
Dharuman Salangai Nayagi, Hosaagrahara Savalegowda Mohan |
|
Vol 28, No 3: December 2022 |
A secure framework of blockchain technology using CNN long short-term memory hybrid deep learning model |
Abstract
PDF
|
Gillala Chandra Sekhar, Aruna Rajendran |
|
Vol 16, No 2: November 2019 |
A secure group based authentication protocol for machine to machine communications in LTE-WLAN interworking architecture |
Abstract
PDF
|
Mariya Ouaissa, Abdallah Rhattoy |
|
Vol 12, No 10: October 2014 |
A Security Enhanced Password Authentication and Update Scheme Based on Elliptic Curve Cryptography |
Abstract
PDF
|
Hang Tu |
|
Vol 11, No 6: June 2013 |
A Security Mechanism Based on Authenticated Diffie-Hellman for WSN |
Abstract
PDF
|
Xin Yu, JianJun Fang, ZhaoLi Zhang |
|
Vol 23, No 2: August 2021 |
A self adaptive new crossover operator to improve the efficiency of the genetic algorithm to find the shortest path |
Abstract
PDF
|
Mrinmoyee Chattoraj, Udaya Rani Vinayakamurthy |
|
Vol 19, No 3: September 2020 |
A self-rectifying memristor model for simulation and ReRAM applications |
Abstract
PDF
|
Sinan Sabah, Nasri Bin Sulaiman |
|
Vol 24, No 2: November 2021 |
A semantic web services discovery approach integrating multiple similarity measures and k-means clustering |
Abstract
PDF
|
Mourad Fariss, Naoufal El Allali, Hakima Asaidi, Mohamed Bellouki |
|
Vol 27, No 1: July 2022 |
A semi-automated hybrid approach to identify radicalization on social digital platform |
Abstract
PDF
|
Vandna Batra, Suresh Kumar |
|
Vol 9, No 1: January 2018 |
A Semi-Autonomous Coal Mine Monitoring Security System Based On Wireless Control Using RTOS |
Abstract
PDF
|
Singh Omkar Ramabhilash, Santosh Kumar Singh |
|
781 - 795 of 8670 Items |
<< < 48 49 50 51 52 53 54 55 56 57 > >> |