| Issue | Title | |
| Vol 8, No 2: June 2019 | Routing performance of structured overlay in Distributed Hash Tables (DHT) for P2P | Abstract PDF |
| Rafiza Ruslan, Ayu Shaqirra Mohd Zailani, Nurul Hidayah Mohd Zukri, Nur Khairani Kamarudin, Shamsul Jamel Elias, R. Badlishah Ahmad | ||
| Vol 10, No 5: October 2021 | RT-RCT: an online tool for real-time retrieval of connected things | Abstract PDF |
| Fatima Zahra Fagroud, El Habib Ben Lahmar, Hicham Toumi, Youssef Baddi, Sanaa El Filali | ||
| Vol 1, No 3: September 2012 | Rural Load Management using Information Technology | Abstract PDF |
| R L Chakrasali, H.N. Nagaraja, B.S. Shavaladi, V.R. Sheelavant | ||
| Vol 7, No 3: September 2018 | Sabah Traditional Chinese Medicine Database | Abstract PDF |
| Aslina Baharum, Neoh Yee Jin, Shaliza Hayati A. Wahab, Mohd Helmy Abd Wahab, Radzi Ambar, Nurul Hidayah Mat Zain | ||
| Vol 3, No 2: June 2014 | Sampled Reference Frame Algorithm Based on Space Vector Pulse Width Modulation for Five Level Cascaded H-Bridge Inverter | Abstract PDF |
| Gomathi C, Navya Nagath, Veerakumar S | ||
| Vol 6, No 4: December 2017 | Satellite Image Enhancement Using Dual Tree Complex Wavelet Transform | Abstract PDF |
| C. Periyasamy | ||
| Vol 9, No 3: June 2020 | Satellite imagery and machine learning for aridity disaster classification using vegetation indices | Abstract PDF |
| Sri Yulianto Joko Prasetyo, Kristoko Dwi Hartomo, Mila Chrismawati Paseleng, Dian Widiyanto Chandra, Edi Winarko | ||
| Vol 11, No 2: April 2022 | Scalable epidemic message passing interface fault tolerance | Abstract PDF |
| Soma Sekhar Kolisetty, Battula Srinivasa Rao | ||
| Vol 8, No 1: March 2019 | Scalable workflow scheduling algorithm for minimizing makespan and failure probability | Abstract PDF |
| Maslina Abdul Aziz, Izuan Hafez Ninggal | ||
| Vol 10, No 2: April 2021 | Scaled conjugate gradient ANN for industrial sensors calibration | Abstract PDF |
| Karam Mazin Zeki Othman, Abdulkreem M Salih | ||
| Vol 9, No 3: June 2020 | Search for a substring of characters using the theory of non-deterministic finite automata and vector-character architecture | Abstract PDF |
| Dmitry V. Pashchenko, Dmitry A. Trokoz, Alexey I. Martyshkin, Mihail P. Sinev, Boris L. Svistunov | ||
| Vol 11, No 6: December 2022 | Secrecy capacity analysis of bi-static backscatter communication systems | Abstract PDF |
| Phung Ton That, Duy-Hung Ha, Hong-Nhu Nguyen | ||
| Vol 11, No 2: April 2022 | Secure lightweight obfuscated delay-based physical unclonable function design on FPGA | Abstract PDF |
| Mohammad Haziq Ishak, Mohd Syafiq Mispan, Wong Yan Chiew, Muhammad Raihaan Kamaruddin, Mikhail Aleksandrovich Korobkov | ||
| Vol 10, No 3: June 2021 | Secure message transmission scheme in wireless sensor networks | Abstract PDF |
| Kameran Ali Ameen, Baban Ahmed Mahmood, Yalmaz Najm Aldeen Taher | ||
| Vol 10, No 2: April 2021 | Secure outage probability of cognitive radio network relying non-orthogonal multiple access scheme | Abstract PDF |
| Chi-Bao Le, Dinh-Thuan Do | ||
| Vol 5, No 4: December 2016 | Secure Routing Protocol for Integrated UMTS and WLAN Ad Hoc Networks | Abstract PDF |
| Shashank Tripathi, A. K. Jain | ||
| Vol 12, No 4: August 2023 | Secure two-factor mutual authentication scheme using shared image in medical healthcare environment | Abstract PDF |
| Husam A. Abdulmalik, Ali A. Yassin | ||
| Vol 9, No 2: April 2020 | Security issues and framework of electronic medical record: A review | Abstract PDF |
| Jibril Adamu, Raseeda Hamzah, Marshima Mohd Rosli | ||
| Vol 12, No 1: February 2023 | Security of private cloud using machine learning and cryptography | Abstract PDF |
| Ali Abdulsattar Jabbar, Wesam Sameer Bhaya | ||
| Vol 9, No 3: June 2020 | Security performance analysis for power domain NOMA employing in cognitive radio networks | Abstract PDF |
| Thi-Anh Hoang, Chi-Bao Le, Dinh-Thuan Do | ||
| Vol 10, No 3: June 2021 | Security system with RFID control using E-KTP and internet of things | Abstract PDF |
| Andi Ainun Najib, Rendy Munadi, Nyoman Bogi Aditya Karna | ||
| Vol 5, No 3: September 2016 | Security Technology by using Firewall for Smart Grid | Abstract PDF |
| Ayla Hasanalizadeh Khosroshahi, Hossein Shahinzadeh | ||
| Vol 6, No 1: March 2017 | Segmentation Comparing Eggs Watermarking Image and Original Image | Abstract PDF |
| Anton Yudhana, Sunardi Sunardi, Shoffan Saifullah | ||
| Vol 12, No 4: August 2023 | Segmenting the eating behaviour of university students using the K-means algorithm | Abstract PDF |
| Lenin Quiñones Huatangari, María Alina Cueva Ríos, Rafaela Teodosia Huerta Camones | ||
| Vol 5, No 2: June 2016 | Selection of Gate Dielectrics for ZnO Based Thin-Film Transistors | Abstract PDF |
| Vaibhav Garg, Navneet Gupta | ||
| Vol 10, No 1: February 2021 | Selection of optimal hyper-parameter values of support vector machine for sentiment analysis tasks using nature-inspired optimization methods | Abstract PDF |
| Lakshmana Kumar Ramasamy, Seifedine Kadry, Sangsoon Lim | ||
| Vol 8, No 2: June 2019 | Self-switching diodes as RF rectifiers: evaluation methods and current progress | Abstract PDF |
| Nor Farhani Zakaria, Shahrir Rizal Kasjoo, Muammar Mohamad Isa, Zarimawaty Zailan, Mohd Khairuddin Md Arshad, Sanna Taking | ||
| Vol 2, No 3: September 2013 | Semantic Constraints Satisfaction Based Improved Quality of Ontology Alignment | Abstract PDF |
| Fatemeh Fakhar | ||
| Vol 11, No 6: December 2022 | Sensor fault diagnosis technique applied to three-phase induction motor drive | Abstract PDF |
| Tien Xuan Nguyen, Minh Chau Huu Nguyen, Cuong Dinh Tran | ||
| Vol 10, No 3: June 2021 | SentiHotel: a sentiment analysis application of hotel services using an optimized neural network | Abstract PDF |
| Dyah Apriliani, Taufiq Abidin, Edhy Sutanta, Amir Hamzah, Oman Somantri | ||
| 1531 - 1560 of 1853 Items | << < 47 48 49 50 51 52 53 54 55 56 > >> | |