|
Issue |
Title |
|
Vol 19, No 2: August 2020 |
Countermeasures against darknet localisation attacks with packet sampling |
Abstract
PDF
|
Masaki Narita, Keisuke Kamada, Kanayo Ogura, Bhed Bahadur Bista, Toyoo Takata |
|
Vol 17, No 1: January 2020 |
Course recommendation system using fuzzy logic approach |
Abstract
PDF
|
Mohd Suffian Sulaiman, Amylia Ahamad Tamizi, Mohd Razif Shamsudin, Azri Azmi |
|
Vol 30, No 2: May 2023 |
Covariance absolute values spectrum sensing method based on two adaptive thresholds |
Abstract
PDF
|
Bushra T. Hashim, Hadi T. Ziboon, Sinan M. Abdulsatar |
|
Vol 25, No 1: January 2022 |
Coverage enhancements of vehicles users using mobile stations at 5G cellular networks |
Abstract
PDF
|
Jaafar A. Aldhaibani, Mohanad S. Alkhazraji, Hasanain Lafta Mohammed, Abid Yaya |
|
Vol 29, No 3: March 2023 |
COVID-19 classification using hybrid deep learning and standard feature extraction techniques |
Abstract
PDF
|
Hassan Ahmed El Shenbary, Ebeid Ali Ebeid, Dumitru Baleanu |
|
Vol 26, No 2: May 2022 |
COVID-19 detection based on combined domain features |
Abstract
PDF
|
Omar Munthir Al Okashi, Ismail Taha Ahmed, Leith Hamid Abed |
|
Vol 29, No 3: March 2023 |
COVID-19 detection based on convolution neural networks from CT-scan images: a review |
Abstract
PDF
|
Walat Ramadhan Ibrahim, Mayyadah Ramiz Mahmood |
|
Vol 21, No 1: January 2021 |
COVID-19 knowledge-based system for diagnosis in Iraq using IoT environment |
Abstract
PDF
|
Bashar M. Nema, Yasmin Makki Mohialden, Nadia Mahmood Hussien, Nael Ali Hussein |
|
Vol 12, No 11: November 2014 |
Crack Detection of Power Line Based on Metal Magnetic Memory Non-destructive |
Abstract
PDF
|
Fenglian Niu |
|
Vol 11, No 7: July 2013 |
Crawling Microblog by Common-Designed Software |
Abstract
PDF
|
Gang Lu, Shumei Liu, Kevin Lü |
|
Vol 6, No 2: May 2017 |
Creating Model with System Breakdown Structure for System Dynamics |
Abstract
PDF
|
Feldiansyah Bin Bakri Nasution, Nor Erne Nazira Bazin |
|
Vol 35, No 3: September 2024 |
Credit card fraud detection with advanced graph based machine learning techniques |
Abstract
PDF
|
Krishna Kumari Renganathan, Janaki Karuppiah, Mahimairaj Pathinathan, Sudharani Raghuraman |
|
Vol 25, No 2: February 2022 |
Crime prediction using a hybrid sentiment analysis approach based on the bidirectional encoder representations from transformers |
Abstract
PDF
|
Mohammed Boukabous, Mostafa Azizi |
|
Vol 12, No 2: November 2018 |
Critical Design Factors on Performance of Car Jack Lifting Operations |
Abstract
PDF
|
Dzul Hafez Yacob, S. Sarip, M. A. Suhot, M. Z. Hassan, S. A. Aziz, M. Y. Daud, N. A. Bani, M. N. Muhtazaruddin |
|
Vol 34, No 2: May 2024 |
Cross-layer multipath routing approach and link quality indicator for QoS provisioning in mobile WMSN |
Abstract
PDF
|
Bharati S. Pochal, Jayashree Agarkhed, Siddarama R. Patil |
|
Vol 7, No 3: September 2017 |
Crowd Anomaly Detection Using Motion Based Spatio-Temporal Feature Analysis |
Abstract
PDF
|
Basavaraj G M, Ashok Kusagur |
|
Vol 15, No 1: July 2019 |
Crowd behavior analysis using MoDTA approach |
Abstract
PDF
|
Savitha C, Dr. Ramesh. D |
|
Vol 4, No 2: November 2016 |
Crowd Detection in Still Images Using Combined HOG and SIFT Feature |
Abstract
PDF
|
Machbah Uddin, Hira Lal Gope, Md. Sayeed Iftekhar Yousuf, Dilshad Islam, Mohammad Khairul Islam |
|
Vol 24, No 2: November 2021 |
Crown closure segmentation on wetland lowland forest using the mean shift algorithm |
Abstract
PDF
|
Beni Iskandar, I Nengah Surati Jaya, Muhammad Buce Saleh |
|
Vol 12, No 10: October 2014 |
Cryptanalysis and Improvement of an Authentication Scheme for Telecare Medical Information Systems |
Abstract
PDF
|
Yun Zhao, Wenbo Shi |
|
Vol 8, No 2: November 2017 |
Cryptanalysis on Privacy-aware two-factor Authentication Protocol for Wireless Sensor Networks |
Abstract
PDF
|
Younsung Choi |
|
Vol 28, No 3: December 2022 |
CryptoAR: scrutinizing the trend and market of cryptocurrency using machine learning approach on time series data |
Abstract
PDF
|
Abu Kowshir Bitto, Imran Mahmud, Md. Hasan Imam Bijoy, Fatema Tuj Jannat, Md. Shohel Arman, Md. Mahfuj Hasan Shohug, Hasnur Jahan |
|
Vol 30, No 2: May 2023 |
Cryptocurrencies investment framework using sentiment analysis of Twitter influencers |
Abstract
PDF
|
Mohammed Ali Zare Chahooki, Kia Jahanbin, Tole Sutikno |
|
Vol 30, No 1: April 2023 |
Cryptocurrency price forecasting method using long short-term memory with time-varying parameters |
Abstract
PDF
|
Laor Boongasame, Panida Songram |
|
Vol 9, No 1: January 2018 |
Cryptographic Hashing Method using for Secure and Similarity Detection in Distributed Cloud Data |
Abstract
PDF
|
A. Mohamed Divan Masood, S. K. Muthusundar |
|
2451 - 2475 of 8410 Items |
<< < 94 95 96 97 98 99 100 101 102 103 > >> |