|
Issue |
Title |
|
Vol 7, No 3: September 2018 |
Sabah Traditional Chinese Medicine Database |
Abstract
PDF
|
Aslina Baharum, Neoh Yee Jin, Shaliza Hayati A. Wahab, Mohd Helmy Abd Wahab, Radzi Ambar, Nurul Hidayah Mat Zain |
|
Vol 3, No 2: June 2014 |
Sampled Reference Frame Algorithm Based on Space Vector Pulse Width Modulation for Five Level Cascaded H-Bridge Inverter |
Abstract
PDF
|
Gomathi C, Navya Nagath, Veerakumar S |
|
Vol 6, No 4: December 2017 |
Satellite Image Enhancement Using Dual Tree Complex Wavelet Transform |
Abstract
PDF
|
C. Periyasamy |
|
Vol 9, No 3: June 2020 |
Satellite imagery and machine learning for aridity disaster classification using vegetation indices |
Abstract
PDF
|
Sri Yulianto Joko Prasetyo, Kristoko Dwi Hartomo, Mila Chrismawati Paseleng, Dian Widiyanto Chandra, Edi Winarko |
|
Vol 11, No 2: April 2022 |
Scalable epidemic message passing interface fault tolerance |
Abstract
PDF
|
Soma Sekhar Kolisetty, Battula Srinivasa Rao |
|
Vol 8, No 1: March 2019 |
Scalable workflow scheduling algorithm for minimizing makespan and failure probability |
Abstract
PDF
|
Maslina Abdul Aziz, Izuan Hafez Ninggal |
|
Vol 10, No 2: April 2021 |
Scaled conjugate gradient ANN for industrial sensors calibration |
Abstract
PDF
|
Karam Mazin Zeki Othman, Abdulkreem M Salih |
|
Vol 9, No 3: June 2020 |
Search for a substring of characters using the theory of non-deterministic finite automata and vector-character architecture |
Abstract
PDF
|
Dmitry V. Pashchenko, Dmitry A. Trokoz, Alexey I. Martyshkin, Mihail P. Sinev, Boris L. Svistunov |
|
Vol 11, No 6: December 2022 |
Secrecy capacity analysis of bi-static backscatter communication systems |
Abstract
PDF
|
Phung Ton That, Duy-Hung Ha, Hong-Nhu Nguyen |
|
Vol 11, No 2: April 2022 |
Secure lightweight obfuscated delay-based physical unclonable function design on FPGA |
Abstract
PDF
|
Mohammad Haziq Ishak, Mohd Syafiq Mispan, Wong Yan Chiew, Muhammad Raihaan Kamaruddin, Mikhail Aleksandrovich Korobkov |
|
Vol 10, No 3: June 2021 |
Secure message transmission scheme in wireless sensor networks |
Abstract
PDF
|
Kameran Ali Ameen, Baban Ahmed Mahmood, Yalmaz Najm Aldeen Taher |
|
Vol 10, No 2: April 2021 |
Secure outage probability of cognitive radio network relying non-orthogonal multiple access scheme |
Abstract
PDF
|
Chi-Bao Le, Dinh-Thuan Do |
|
Vol 5, No 4: December 2016 |
Secure Routing Protocol for Integrated UMTS and WLAN Ad Hoc Networks |
Abstract
PDF
|
Shashank Tripathi, A. K. Jain |
|
Vol 12, No 4: August 2023 |
Secure two-factor mutual authentication scheme using shared image in medical healthcare environment |
Abstract
PDF
|
Husam A. Abdulmalik, Ali A. Yassin |
|
Vol 9, No 2: April 2020 |
Security issues and framework of electronic medical record: A review |
Abstract
PDF
|
Jibril Adamu, Raseeda Hamzah, Marshima Mohd Rosli |
|
Vol 12, No 1: February 2023 |
Security of private cloud using machine learning and cryptography |
Abstract
PDF
|
Ali Abdulsattar Jabbar, Wesam Sameer Bhaya |
|
Vol 9, No 3: June 2020 |
Security performance analysis for power domain NOMA employing in cognitive radio networks |
Abstract
PDF
|
Thi-Anh Hoang, Chi-Bao Le, Dinh-Thuan Do |
|
Vol 10, No 3: June 2021 |
Security system with RFID control using E-KTP and internet of things |
Abstract
PDF
|
Andi Ainun Najib, Rendy Munadi, Nyoman Bogi Aditya Karna |
|
Vol 5, No 3: September 2016 |
Security Technology by using Firewall for Smart Grid |
Abstract
PDF
|
Ayla Hasanalizadeh Khosroshahi, Hossein Shahinzadeh |
|
Vol 6, No 1: March 2017 |
Segmentation Comparing Eggs Watermarking Image and Original Image |
Abstract
PDF
|
Anton Yudhana, Sunardi Sunardi, Shoffan Saifullah |
|
Vol 12, No 4: August 2023 |
Segmenting the eating behaviour of university students using the K-means algorithm |
Abstract
PDF
|
Lenin Quiñones Huatangari, María Alina Cueva Ríos, Rafaela Teodosia Huerta Camones |
|
Vol 5, No 2: June 2016 |
Selection of Gate Dielectrics for ZnO Based Thin-Film Transistors |
Abstract
PDF
|
Vaibhav Garg, Navneet Gupta |
|
Vol 10, No 1: February 2021 |
Selection of optimal hyper-parameter values of support vector machine for sentiment analysis tasks using nature-inspired optimization methods |
Abstract
PDF
|
Lakshmana Kumar Ramasamy, Seifedine Kadry, Sangsoon Lim |
|
Vol 8, No 2: June 2019 |
Self-switching diodes as RF rectifiers: evaluation methods and current progress |
Abstract
PDF
|
Nor Farhani Zakaria, Shahrir Rizal Kasjoo, Muammar Mohamad Isa, Zarimawaty Zailan, Mohd Khairuddin Md Arshad, Sanna Taking |
|
Vol 2, No 3: September 2013 |
Semantic Constraints Satisfaction Based Improved Quality of Ontology Alignment |
Abstract
PDF
|
Fatemeh Fakhar |
|
Vol 11, No 6: December 2022 |
Sensor fault diagnosis technique applied to three-phase induction motor drive |
Abstract
PDF
|
Tien Xuan Nguyen, Minh Chau Huu Nguyen, Cuong Dinh Tran |
|
Vol 10, No 3: June 2021 |
SentiHotel: a sentiment analysis application of hotel services using an optimized neural network |
Abstract
PDF
|
Dyah Apriliani, Taufiq Abidin, Edhy Sutanta, Amir Hamzah, Oman Somantri |
|
Vol 12, No 4: August 2023 |
Sentiment analysis from Bangladeshi food delivery startup based on user reviews using machine learning and deep learning |
Abstract
PDF
|
Abu Kowshir Bitto, Md. Hasan Imam Bijoy, Md. Shohel Arman, Imran Mahmud, Aka Das, Joy Majumder |
|
Vol 11, No 5: October 2022 |
Serious game self-regulation using human-like agents to visualize students engagement base on crowd |
Abstract
PDF
|
Khothibul Umam, Moch Fachri, Fresy Nugroho, Supeno Mardi Susiki Nugroho, Mochamad Hariadi |
|
Vol 7, No 3: September 2018 |
SGSC Framework: Smart Government in Supply Chain Based on FODA |
Abstract
PDF
|
Ahmad Nurul Fajar, Ditdit Nugeraha Utama |
|
1591 - 1620 of 1923 Items |
<< < 49 50 51 52 53 54 55 56 57 58 > >> |