|
Issue |
Title |
|
Vol 11, No 11: November 2013 |
An Interval Type-2 Fuzzy Neural Network Control on Two-Axis Motion System |
Abstract
PDF
|
Ye Xiaoting, Zhang Tao, Wu Shasha |
|
Vol 34, No 2: May 2024 |
An Intrusion Detection System against RPL-based Routing Attacks for IoT Networks |
Abstract
PDF
|
Manjula Hebbaka Shivanajappa, Roopa Maidanahalli Seetharamaiah, Bharath Viswaraju Sai, Arunalatha Jakkanahally Siddegowda, Venugopal Kuppanna Rajuk |
|
Vol 6, No 3: June 2017 |
An Inventive and Innovative Alternate for Legacy Chain Pulling System through Internet of Things |
Abstract
PDF
|
Budaraju Sri Datta, Rama Ganapathy, Sini Raj P, Shriram K Vasudevan, Abhishek SN |
|
Vol 27, No 3: September 2022 |
An investigation of even ordered magic squares (4, 6, and 8): characteristic polynomials, eigenvalues, and encryption |
Abstract
PDF
|
Saleem Al-Ashhab, Majdi Al-qdah |
|
Vol 23, No 3: September 2021 |
An investigation of inertia constant in single generator on transient analysis for an isolated electrical network system |
Abstract
PDF
|
M. Saifuzam Jamri, Muhammad Nizam Kamarudin, Mohd Luqma Mohd Jamil |
|
Vol 30, No 1: April 2023 |
An investigation of low-density parity-check codes and polar codes for future communication systems |
Abstract
PDF
|
Layla Mahdi Salih, Thuraya Mahmood Al-Qaradaghi, Jalal Jamal Hamad Ameen |
|
Vol 29, No 2: February 2023 |
An investigation of machine learning techniques in speech emotion recognition |
Abstract
PDF
|
Anu Saini, Amit Ramesh Khaparde, Sunita Kumari, Salim Shamsher, Jeevanandam Joteeswaran, Seifedine Kadry |
|
Vol 10, No 1: April 2018 |
An Investigation of the Current Practice to Support Upper Limb Rehabilitation among Advanced Stroke Survivors |
Abstract
PDF
|
Nurul Hafizha Musthafa, Suziah Sulaiman |
|
Vol 15, No 1: July 2019 |
An investigation on apportion of mathematical loss in transmission loss/cost allocation approach |
Abstract
PDF
|
Shafeeque Ahmed Kalavai, Prabhakar Karthikeyan Shanmugam |
|
Vol 25, No 3: March 2022 |
An investigation study for risk calculation of security vulnerabilities on android applications |
Abstract
PDF
|
Radhwan M. Abdullah, Abedallah Zaid Abualkishik, Najla Matti Isaacc, Ali A. Alwan, Yonis Gulzar |
|
Vol 13, No 2: February 2019 |
An investigative design of optimum stochastic language model for bangla autocomplete |
Abstract
PDF
|
Md.Iftakher Alam Eyamin, Md. Tarek Habib, Muhammad Ifte Khairul Islam, Md. Sadekur Rahman, Md. Abbas Ali Khan |
|
Vol 18, No 3: June 2020 |
An IoT based SMART patient health monitoring system |
Abstract
PDF
|
C.R Srinivasan, Guru Charan, P Chenchu Sai Babu |
|
Vol 11, No 2: February 2013 |
An IOT Security Risk Autonomic Assessment Algorithm |
Abstract
PDF
|
Ruijuan Zheng, Mingchuan Zhang, Qingtao Wu, Chunlei Yang, Wangyang Wei, Dan Zhang, Zhengchao Ma |
|
Vol 13, No 1: January 2019 |
An LED-based visible light communication system for multicast |
Abstract
PDF
|
Jong-Sung Lee, Dae-Hee Lee, Sung-Jin Kim, Chang-Heon Oh |
|
Vol 9, No 3: March 2018 |
An Non Destructive Test for the Detection of Weld Defects Using Image Processing |
Abstract
PDF
|
Kalaiselvi V, John Aravindhar D |
|
1411 - 1425 of 8800 Items |
<< < 90 91 92 93 94 95 96 97 98 99 > >> |