|
Issue |
Title |
|
Vol 20, No 1: October 2020 |
A computational forensic framework for detection of hidden applications on android |
Abstract
PDF
|
Tahira Rasul, Rabia Latif, Nor Shahida Mohd Jamail |
|
Vol 26, No 2: May 2022 |
A computationally efficient non-coherent technique for wireless relay networks |
Abstract
PDF
|
Samer Alabed, Aymen I. Zreikat, Mohammad Al-Abed |
|
Vol 14, No 1: April 2019 |
A computer vision based image processing system for depression detection among students for counseling |
Abstract
PDF
|
Sandhya Parameswaran Namboodiri, Venkataraman D |
|
Vol 19, No 3: September 2020 |
A computing model for trend analysis in stock data stream classification |
Abstract
PDF
|
Abdul Razak, Nirmala C. R |
|
Vol 6, No 3: June 2017 |
A Concealment Aware UEP scheme for H.264 using RS Codes |
Abstract
PDF
|
Deevya Indoonundon, Tulsi Pawan Fowdur, Sunjiv Soyjaudah |
|
Vol 37, No 1: January 2025 |
A conceptual approach of optimization in federated learning |
Abstract
PDF
|
Farhanna Mar’i, Ahmad Afif Supianto |
|
Vol 12, No 3: December 2018 |
A Conceptual Framework for Gamified Learning Management System for LINUS Students |
Abstract
PDF
|
Syadiah Nor Wan Shamsuddin, Muhammad Faisal Selman, Ismahafezi Ismail, Maizan Mat Amin, Norkhairani Abdul Rawi |
|
Vol 17, No 3: March 2020 |
A conceptual integrated health information systems framework in postnatal care for modern and traditional malay medicine |
Abstract
PDF
|
Raja Rina Raja Ikram, Lizawati Salahuddin, Mohd Hariz Mohd Naim, Ariff Idris, Nor Afirdaus Zainal Abidin, Nadiah Ishak, Noor Raihan Ab Hamid |
|
Vol 12, No 3: December 2018 |
A Conceptual Model of Role Based Access Control Using Role Mining Algorithm |
Abstract
PDF
|
Nazirah Abd Hamid, Rabiah Ahmad, Siti Rahayu Selamat |
|
Vol 14, No 2: May 2019 |
A concurrent dual-band CMOS low noise amplifier at 2.4/5.2 GHz for WLAN applications |
Abstract
PDF
|
S.A.Z. Murad, A. F. Hasan, A. Azizan, A. Harun, J. Karim |
|
Vol 7, No 1: July 2017 |
A Condorcet Voting Theory Based AHP Approach for MCDM Problems |
Abstract
PDF
|
Sweta Bhattacharya, V Raju |
|
Vol 11, No 8: August 2013 |
A Conflict Context Reasoning Method Based on Dempster-Shafer Theory in Ubiquitous Computing |
Abstract
PDF
|
Xinkai Yang |
|
Vol 12, No 2: February 2014 |
A Control Packet Minimized Routing Protocol for Ad-hoc Wireless Networks |
Abstract
PDF
|
Youn-Sik Hong |
|
Vol 5, No 2: February 2017 |
A Control Strategy for DFIM to Minimize DC Bus Voltage Fluctuations and Torque Oscillations |
Abstract
PDF
|
G. Venu Madhav, Y. P. Obulesu |
|
Vol 12, No 1: January 2014 |
A Control Strategy for Single-phase Grid-Connected Inverter with Power Quality Regulatory Function |
Abstract
PDF
|
Jin Jiapei, Chen Tiantian, Luo Ling, Su Shaoze |
|
Vol 15, No 1: July 2019 |
A control strategy on power quality improvement in consumer side using custom power device |
Abstract
PDF
|
D Danalakshmi, Srinivas Bugata, Kohila J |
|
Vol 16, No 3: December 2015 |
A Controller Design Researh Based on the Cloud Model |
Abstract
PDF
|
Feng Jie, Jingfang Wang |
|
Vol 12, No 5: May 2014 |
A Convenient Control Strategy of Bearingless Induction Motor Based on Inverse System Method |
Abstract
PDF
|
Wen-shao Bu, Chun-xiao Lu, Cong-lin Zu |
|
Vol 12, No 9: September 2014 |
A Cooperative Time Synchronization Protocol for Wireless Sensor Networks |
Abstract
PDF
|
Min Li, Guoqiang Zheng, Jishun Li, Lei Fu |
|
Vol 20, No 1: October 2020 |
A coplanar waveguide tapered slot antenna with beam switching capabilities |
Abstract
PDF
|
Delphine Abijuru, M. R. Hamid, N. Seman, M. Himdi |
|
Vol 34, No 2: May 2024 |
A critical evaluation of DC microgrid implementation in Indonesia: opportunities and challenges |
Abstract
PDF
|
Levin Halim, Pinto Anugrah, Aditya Kurniawan, Khairuddin Karim |
|
Vol 7, No 2: August 2017 |
A Critical Evaluation of Power Quality Features using Dual APF under Grid Interfaced DG Scheme |
Abstract
PDF
|
Yadiki Rajendra Babu, C Srinivas Rao |
|
Vol 13, No 3: March 2019 |
A critical insight into the identity authentication systems on smartphones |
Abstract
PDF
|
Tehseen Mehraj, Mir Aman Sheheryar, Sajaad Ahmed Lone, A. H. Mir |
|
Vol 10, No 2: May 2018 |
A Cross Slot Coupling to Enhance Bandwidth of Dual-Layer SIW Structure |
Abstract
PDF
|
M. N. Hafiz, M. H. Jamaluddin, R. Selvaraju |
|
Vol 29, No 2: February 2023 |
A crypto-steganography healthcare management: towards a secure communication channel for data COVID-19 updating |
Abstract
PDF
|
Mohanad Sameer Jabbar, Samer Saeed Issa |
|
126 - 150 of 8475 Items |
<< < 1 2 3 4 5 6 7 8 9 10 > >> |