|
Issue |
Title |
|
Vol 20, No 3: December 2020 |
A robust watermarking algorithm for medical images |
Abstract
PDF
|
Ahmed Nagm, Mohammed Safy |
|
Vol 11, No 3: March 2013 |
A SaaS Development Platform based on Cloud Computing |
Abstract
PDF
|
Qingpeng ZENG, Shuixiu WU |
|
Vol 11, No 10: October 2013 |
A Safety Algorithm of P2P Routing based on Multiple-Encryption Detecting Technology |
Abstract
PDF
|
Chuiwei Lu, Xianhao Miao, Zhiyuan Liu |
|
Vol 6, No 3: June 2017 |
A Sales Prediction Model Adopted the Recency-Frequency-Monetary Concept |
Abstract
PDF
|
Rendra Gustriansyah, Dana Indra Sensuse, Arief Ramadhan |
|
Vol 33, No 3: March 2024 |
A scoping review of artificial intelligence-based robot therapy for children with disabilities |
Abstract
PDF
|
Rusnani Yahya, Rozita Jailani, Fazah Akhtar Hanapiah, Nur Khalidah Zakaria |
|
Vol 31, No 3: September 2023 |
A scoping review of topic modelling on online data |
Abstract
PDF
|
Mohd Mukhlis Mohd Sharif, Ruhaila Maskat, Zirawani Baharum, Kamaruzaman Maskat |
|
Vol 3, No 2: August 2016 |
A Secure ANFIS based Relay for Turbo-Generators Phase Backup Protection |
Abstract
PDF
|
Mohamed Salah El-Din Abdel Aziz, Mohamed ElSamahy, Mohamed Moustafa, Fahmy ElBendary |
|
Vol 21, No 2: February 2021 |
A secure cloud service deployment framework for DevOps |
Abstract
PDF
|
Rao Ravinder, V. Sucharita |
|
Vol 27, No 3: September 2022 |
A secure communication protocol for civil drones |
Abstract
PDF
|
Ayad Al-Adhami, Rajaa K. Hasoun, Ekhlas K. Gbashi, Soukaena Hassan |
|
Vol 11, No 1: July 2018 |
A Secure Data Aggregation Technique for Wireless Sensor Networks Using Iterative Filtering |
Abstract
PDF
|
Jyothi R, Nagaraj G Cholli |
|
Vol 34, No 1: April 2024 |
A secure framework for effective workload resource management |
Abstract
PDF
|
Dharuman Salangai Nayagi, Hosaagrahara Savalegowda Mohan |
|
Vol 28, No 3: December 2022 |
A secure framework of blockchain technology using CNN long short-term memory hybrid deep learning model |
Abstract
PDF
|
Gillala Chandra Sekhar, Aruna Rajendran |
|
Vol 16, No 2: November 2019 |
A secure group based authentication protocol for machine to machine communications in LTE-WLAN interworking architecture |
Abstract
PDF
|
Mariya Ouaissa, Abdallah Rhattoy |
|
Vol 12, No 10: October 2014 |
A Security Enhanced Password Authentication and Update Scheme Based on Elliptic Curve Cryptography |
Abstract
PDF
|
Hang Tu |
|
Vol 11, No 6: June 2013 |
A Security Mechanism Based on Authenticated Diffie-Hellman for WSN |
Abstract
PDF
|
Xin Yu, JianJun Fang, ZhaoLi Zhang |
|
796 - 810 of 8967 Items |
<< < 49 50 51 52 53 54 55 56 57 58 > >> |