Issue | Title | |
Vol 16, No 2 (2024) | Latency And Residual Energy Analysis Of Mimo Heterogeneous Wireless Sensor Networks | Abstract |
Saurabh Mishra, Rakesh Ranjan, Sonika Singh, Gagan Singh | ||
Vol 8, No 3 (2016) | Learning Repository Adaptability in an Agent-Based University Environment | Abstract PDF |
Vanco Cabukovski, Roman Golubovski, Riste Temjanovski | ||
Vol 2, No 5 (2010) | Level Shifter Design for Low Power Applications | Abstract PDF |
Manoj Kumar, Sandeep K. Arya, Sujata Pandey | ||
Vol 12, No 2 (2020) | Lidar Point Cloud Classification using Expectation Maximization Algorithm | Abstract PDF |
Nguyen Thi Huu Phuong | ||
Vol 11, No 5 (2019) | Lightweight Headgear Brain Waves for Fatigue Detection in Smartphone | Abstract PDF |
Yung Gi Wu, Jwu Jenq Chen, Rui Hsin Wang | ||
Vol 15, No 2 (2023) | Linear Feedback Shift Register Genetically Adjusted for Sequence Copying | Abstract PDF |
Ugalde-Franco Juan Manuel, Martinez-Gonzalez Ricardo Francisco, Mejia-Perez Juan Francisco | ||
Vol 2, No 3 (2010) | Low Power Shift and Add Multiplier Design | Abstract PDF |
C. N. Marimuthu, P. Thangaraj, Aswathy Ramesan | ||
Vol 2, No 1 (2010) | Low Power VLSI Design with Resistive Feedback Logic | Abstract PDF |
C. Ashok Kumar, B. K. Madhavi, K. Lal Kishore | ||
Vol 4, No 5 (2012) | Machine Learning Algorithms in Web Page Classification | Abstract PDF |
W. A. Awad | ||
Vol 12, No 5 (2020) | Machine Learning in Early Genetic Detection of Multiple Sclerosis Disease: A Survey | Abstract PDF |
Nehal M. Ali, Mohamed Shaheen, Mai S. Mabrouk, Mohamed A. AboRezka | ||
Vol 3, No 1 (2011) | Machine Learning Methods for Spam E-Mail Classification | Abstract PDF |
W. A. Awad, S. M. ELseuofi | ||
Vol 6, No 5 (2014) | Managing Collaboration within Networks and Relationships in the Serious Game of Agribusiness Management Using Sandpile Model | Abstract PDF |
Saiful Bukhori | ||
Vol 2, No 6 (2010) | Manipulating Multistage Interconnection Networks Using Fundamental Arrangements | Abstract PDF |
E. Gur, Z. Zalevsky | ||
Vol 7, No 4 (2015) | Map-Reduce Implementations: Survey and Performance Comparison | Abstract PDF |
Zeba Khanam, Shafali Agarwal | ||
Vol 4, No 2 (2012) | Mass Lesion Detection Using Wavelet Decomposition Transform and Support Vector Machine | Abstract PDF |
Ayman Abu Baker | ||
Vol 6, No 3 (2014) | Massive Parallelism with Gpus for Centrality Ranking in Complex Networks | Abstract PDF |
Frederico L. Cabral, Carla Osthoff, Rafael Nardes, Daniel Ramos | ||
Vol 11, No 5 (2019) | Matbase Auto Function Non-Relational Constraints Enforcement Algorithms | Abstract PDF |
Christian Mancas | ||
Vol 5, No 4 (2013) | Matching Structure and the Evolution of Cooperation in the Prisoner's Dilemma | Abstract PDF |
Noureddine Bouhmala, Jon Reiersen | ||
Vol 3, No 4 (2011) | MDA-Based ATL Transformation to Generate MVC 2 Web Models | Abstract PDF |
M'hamed Rahmouni, Samir Mbarki | ||
Vol 2, No 2 (2010) | Memory Management Technique for Paging on Distributed Shared Memory Framework | Abstract PDF |
Bal Gopal, Rizwan Beg, Pankaj Kumar | ||
Vol 9, No 6 (2017) | Method for a Simple Encryption of Images Based on The Chaotic Map of Bernoulli | Abstract PDF |
Luis Alfredo Crisanto Baez, Ricardo Francisco Martinez Gonzalez, Yesenia Isabel Moreno Pavan, Marcos Alonso Mendez Gamboa | ||
Vol 3, No 5 (2011) | Minimize the False Positive Rate in a Database Intrusion Detection System | Abstract PDF |
A. Rezk, H. Ali, M. El-Mikkawy, S. Barakat | ||
Vol 11, No 1 (2019) | Minimizing Distortion in Steganog-Raphy based on Image Feature | Abstract PDF |
Dong Wu | ||
Vol 5, No 1 (2013) | Mining Closed Regular Patterns in Data Streams | Abstract PDF |
M. Sreedevi, L. S. S. Reddy | ||
Vol 3, No 1 (2011) | Mining Target-Oriented Fuzzy Correlation Rules to Optimize Telecom Service Management | Abstract PDF |
Hao-En Chueh | ||
551 - 575 of 876 Items | First Previous 18 19 20 21 22 23 24 25 26 27 Next Last |
Browse Title Index
Scroll