Issue | Title | |
Vol 15, No 1 (2023) | Exploring the Benefits of Reinforcement Learning for Autonomous Drone Navigation and Control | Abstract PDF |
Ahshanul Haque, Md Naseef-Ur-Rahman Chowdhury, Mohammad Sahinur Hossen | ||
Vol 6, No 4 (2015) | Exploring the Feasibility of Adopting Cloud Computing in Computer Center Taiz University | Abstract PDF |
Mohammed A. M. Ibrahim, Alsabry, Fatimah, Ameen | ||
Vol 7, No 3 (2015) | Exploring Web of Things with Embedded Devices | Abstract PDF |
Tanmoy Sarkar, Niva Das | ||
Vol 9, No 6 (2018) | Explosive Detection Approach by Printed Antennas | Abstract PDF |
A. Adlin, K. Madhan Kumar | ||
Vol 14, No 2 (2022) | Face Recognition in Machine Learning: A Framework for Dimensionality Reduction Algorithms | Abstract |
Gabriel Kabanda | ||
Vol 12, No 2 (2020) | Face Recognition System | Abstract PDF |
Ebrahem Said, Mona Nasr | ||
Vol 6, No 4 (2015) | Face Recognition Techniques - An Evaluation Study | Abstract PDF |
Asmahan M. Altaher | ||
Vol 2, No 2 (2010) | Face Searching and Matching Using Gray Scale Diagonal Square Matrix | Abstract PDF |
G. Appasami, K. Suresh Joseph, R. Nakkeeran, S. Rajesh | ||
Vol 15, No 4 (2023) | Facial Feature Detection in Real-Time: A Novel Approach with MTCNN Deep Learning | Abstract PDF |
Honey , Sukhwinder Singh Oberoi | ||
Vol 14, No 4 (2023) | Faculty Performance Analysis by Implementing Optimization Technique on Multi Criteria Satisfaction Analysis | Abstract PDF |
GD Deshmukh, Rajendra Gupta | ||
Vol 14, No 4 (2023) | Feature Extraction for Image Analysis And Detection Using Machine Learning Techniques | Abstract PDF |
Adel Hassan, Muath Sabha | ||
Vol 11, No 3 (2019) | Feature Selection Methods for Classifying Email Messages: Analysis, Proposal, and Comparative Study | Abstract PDF |
Sanaa Abou Elhamayed, Samah Osama M. Kamel | ||
Vol 11, No 1 (2019) | Features Exploration of Distinct Load Balancing Algorithms in Cloud Computing Environment | Abstract PDF |
Saurabh Gupta, Sangeeta Rani, Amit Dixit, Harsh Dev | ||
Vol 11, No 4 (2020) | Fibonacci Technique for Privacy and Security to Sensitive Data on Cloud Environment | Abstract PDF |
Harikrishna Bommala, S. Kiran, T. Venkateswarlu, M. Asha Aruna Sheela | ||
Vol 1, No 3 (2009) | Financial Statement Fraud Detection by Data Mining | Abstract PDF |
G. Apparao, Arun Singh, G. S. Rao, B. Lalitha Bhavani, K. Eswar, D. Rajani | ||
Vol 15, No 1 (2023) | Finding All Graphic Sequences and Generating Random Graphs | Abstract PDF |
Brijendra Kumar Joshi | ||
Vol 13, No 1 (2021) | Fingerspelling Identification for American Sign Language Based on Resnet-18 | Abstract PDF |
Han-Wen Zhang, Ying Hu, Yong-Jia Zou, Cheng-Yu Wu | ||
Vol 2, No 2 (2010) | Fire Detection Using Support Vector Machine in Wireless Sensor Network and Rescue Using Pervasive Devices | Abstract PDF |
M. Mohamed Sathik, M. Syed Mohamed, A. Balasubramanian | ||
Vol 13, No 3 (2021) | Firewall Approach to Computer Network Security: Functional Viewpoint | Abstract PDF |
Oloyede A.O., Yekini N.A, Akinwole A.K, Ojo O | ||
Vol 10, No 4 (2019) | Flow-Based Attack Detection and Defense Scheme against DDoS Attacks in Cluster Based Ad Hoc Networks | Abstract PDF |
Deepa, Kanwalvir Singh Dhindsa, Bharat Bhushan | ||
Vol 6, No 1 (2014) | Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques | Abstract PDF |
P. Srimanchari, V. Perumal, M. Saroja, M. Venkatachalam | ||
Vol 10, No 2 (2018) | FPGA Implementation of High Speed Digital FIR Filter | Abstract PDF |
Lakshmi Kiran Mukkara, Kota VenkataRamanaiah | ||
Vol 2, No 4 (2011) | Frame Based Symmetric Key Cryptography | Abstract PDF |
Uttam Kr. Mondal, Satyendra Nath Mandal, J. Pal Choudhury, J. K. Mandal | ||
Vol 13, No 3 (2021) | Frequent Sequential Traversal Pattern Mining for Next Web Page Prediction | Abstract PDF |
Prabhat Kumar Sahu, Rajendra Gupta | ||
Vol 3, No 6 (2012) | FuGeIDS: Fuzzy Genetic paradigms in Intrusion Detection Systems | Abstract PDF |
Rajdeep Borgohain | ||
451 - 475 of 929 Items | First Previous 14 15 16 17 18 19 20 21 22 23 Next Last |
Browse Title Index
Scroll