|
Issue |
Title |
|
Vol 6, No 1: April 2017 |
Geodesic Distance on Riemannian Manifold using Jacobi Iterations in 3D Face Recognition System |
Abstract
PDF
|
Rachid Ahdid, Said Safi, Mohamed Fakir, Bouzid Manaut |
|
Vol 10, No 2: August 2021 |
Guard lines conformal slotted antenna array for multiband application |
Abstract
PDF
|
Brajlata Chauhan, Suresh Chandra Gupta, Sandip Vijay |
|
Vol 5, No 1: April 2016 |
Half Iris Matching Based on RED Algorithm |
Abstract
PDF
|
Akeel Ali Al-Hillali, Safaa S Omran |
|
Vol 10, No 3: December 2021 |
Heart disease prediction model with k-nearest neighbor algorithm |
Abstract
PDF
|
Tssehay Admassu Assegie |
|
Vol 13, No 1: April 2024 |
Hen maternal care inspired optimization framework for attack detection in wireless smart grid network |
Abstract
PDF
|
Narmadha Ganesamoorthy, B. Sakthivel, Deivasigamani Subbramania, K. Balasubadra |
|
Vol 11, No 3: December 2022 |
High accuracy sensor nodes for a peat swamp forest fire detection using ESP32 camera |
Abstract
PDF
|
Shipun Anuar Hamzah, Mohd Noh Dalimin, Mohamad Md Som, Mohd Shamian Zainal, Khairun Nidzam Ramli, Wahyu Mulyo Utomo, Nor Azizi Yusoff |
|
Vol 2, No 2: August 2013 |
Human Machine Interface Based on Eye Wink Detection |
Abstract
PDF
|
Kiran P, Mohana HS, Vijaya PA |
|
Vol 7, No 1: April 2018 |
Improve Security of Cloud Storage by Using Third Parity Authentication, One Time Password and Modified AES Encryption Algorithm |
Abstract
PDF
|
Firas A. Abdulatif, Maan Zuhiar |
|
Vol 12, No 3: December 2023 |
Improved distribution and food safety for beef processing and management using a blockchain-tracer support framework |
Abstract
PDF
|
Arnold Adimabua Ojugo, Patrick Ogholuwarami Ejeh, Odiakaose Chukwufunaya Christopher, Andrew Okonji Eboka, Frances Uchechukwu Emordi |
|
Vol 9, No 3: December 2020 |
Improved ICHI square feature selection method for Arabic classifiers |
Abstract
PDF
|
Hadeel N. Alshaer, Mohammed A. Otair, Laith Abualigah |
|
Vol 4, No 3: December 2015 |
Improved Semantically Secured Variant of RSA Public Key Cryptosystem |
Abstract
PDF
|
Sushma Pradhan, Birendra Kumar Sharma |
|
Vol 9, No 2: August 2020 |
Improved service governance in notary administration system through multi channel access implementation |
Abstract
PDF
|
A.A. Kompiang Oka Sudana, Ni Kadek Giofanni Chandra Devi, I Made Suwija Putra |
|
Vol 6, No 2: August 2017 |
Improving Performance of Mobile Ad Hoc Network Using Clustering Schemes |
Abstract
PDF
|
Mohamed Er-Rouidi, Houda Moudni, Hassan Faouzi, Hicham Mouncif, Abdelkrim Merbouha |
|
Vol 6, No 1: April 2017 |
Improving the Network Life Time Based on Energy Efficient Routing in Ad Hoc Networks |
Abstract
PDF
|
P. Parthiban, G. Sundararaj |
|
Vol 2, No 2: August 2013 |
In Cryptanalysis and Improvement of the Zhu et al.'s Authentication Protocol |
Abstract
PDF
|
Mahdi Azizi, Abdolrasoul Mirghadri, Nasour Bagheri |
|
Vol 13, No 1: April 2024 |
Indonesian generative chatbot model for student services using GPT |
Abstract
PDF
|
Shania Priccilia, Abba Suganda Girsang |
|
Vol 13, No 1: April 2024 |
Influence live streaming TikTok to purchase intention of skincare products in Indonesia |
Abstract
PDF
|
Nova Winda Rajagukguk, Wulan Suwarno, Adilla Anggraeni |
|
Vol 3, No 1: April 2014 |
Instantiation in Partial Learning |
Abstract
PDF
|
Velimir Graorkoski, Ana Madevska-Bogdanova |
|
Vol 3, No 2: August 2014 |
Inteference Mitigation in Femtocellular Networks |
Abstract
PDF
|
Amevi Acakpovi, Dominique Kogue, Koudjo Mawuefam Koumadi, Ibrahim Tahirou |
|
Vol 7, No 3: December 2018 |
Intelligent Information System for Suspicious Human Activity Detection in Day and Night |
Abstract
PDF
|
J L Mazher Iqbal, S. Arun |
|
Vol 2, No 1: April 2013 |
Interval-valued Intuitionistic Fuzzy Weighted Entropy in Evaluation of Service Quality |
Abstract
PDF
|
Lazim Abdullah, Hui Mei Ling |
|
Vol 8, No 3: December 2019 |
Inventory prediction and management in Nigeria using market basket analysis associative rule mining: memetic algorithm based approach |
Abstract
PDF
|
Arnold Adimabua Ojugo, Andrew Okonji Eboka |
|
Vol 4, No 1: April 2015 |
Investigational Security Structural Design Using Client and Server Ambitious Protocols for WMN |
Abstract
PDF
|
Selvakani Kandeeban, N Suresh Kumar |
|
Vol 10, No 3: December 2021 |
Knowledge and utilization of health informatics among medical doctors in Ahmadu Bello University Teaching Hospital, Shika-Zaria |
Abstract
PDF
|
Jamila Mohammed Dahiru |
|
Vol 8, No 3: December 2019 |
Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks |
Abstract
PDF
|
Wajid Hassan, Te-Shun Chou, Xiaoming Li, Patrick Appiah-Kubi, Tamer Omar |
|
151 - 175 of 288 Items |
<< < 2 3 4 5 6 7 8 9 10 11 > >> |