Issue | Title | |
Vol 14, No 3 (2022) | Security In Wireless Sensor Networks: Comparative Study | Abstract PDF |
Fatimah Khalil Aljwari, Hajer Abdullah Alwadei, Aseel Abdullah Alfaidi | ||
Vol 5, No 3 (2013) | Security Threats on Cloud Computing Vulnerabilities | Abstract PDF |
Te-Shun Chou | ||
Vol 2, No 6 (2010) | Segmentation and Object Recognition Using Edge Detection Techniques | Abstract PDF |
Y. Ramadevi, T. Sridevi, B. Poornima, B. Kalyani | ||
Vol 8, No 1 (2016) | Segmentation of Magnetic Resonance Brain Tumor Using Integrated Fuzzy K-Means Clustering | Abstract PDF |
P. Pedda Sadhu Naik, T. Venu Gopal | ||
Vol 3, No 4 (2011) | Self-Adaptation Mechanism to Control the Diversity of the Population in Genetic Algorithm | Abstract PDF |
Chaiwat Jassadapakorn, Prabhas Chongstitvatana | ||
Vol 11, No 6 (2019) | Self-Learning AI Framework for Skin Lesion Image Segmentation and Classification | Abstract PDF |
Anandhanarayanan Kamalakannan, Shiva Shankar Ganesan, Govindaraj Rajamanickam | ||
Vol 7, No 4 (2015) | Sensitivity Analysis of Information Retrieval Metrics | Abstract PDF |
Marina Marjanovic-Jakovljevic | ||
Vol 7, No 6 (2015) | Service Oriented Quality Requirement Framework for Cloud Computing | Abstract PDF |
Madhushi Rathnaayke, Janaka I. Wijayanayake | ||
Vol 15, No 2 (2023) | Sex Detection in the Early Stage of Feretilized Chicken Eggsvia Image Recognition | Abstract PDF |
Ufuk Asil, Efendi Nasibov | ||
Vol 7, No 2 (2015) | SFAMSS: A Secure Framework for ATM Machines via Secret Sharing | Abstract PDF |
Zeinab Ghafari, Taha Arian, Morteza Analoui | ||
Vol 5, No 2 (2013) | Shadow Detection Using Tricolor Attenuation Model Enhanced with Adaptive Histogram Equalization | Abstract PDF |
V. Jyothisree, Smitha Dharan | ||
Vol 6, No 1 (2014) | Shape-Based Plagiarism Detection for Flowchart Figures in Texts | Abstract PDF |
Senosy Arrish, Fadhil Noer Afif, Ahmadu Maidorawa, Naomie Salim | ||
Vol 4, No 6 (2012) | Shaping of Location Conscious Information | Abstract PDF |
R. Palson Kennedy, Rajashekhara | ||
Vol 6, No 2 (2014) | Sharing of Cluster Resources among Multiple Workflow Applications | Abstract PDF |
Uma Boregowda, Venugopal Chakravarthy | ||
Vol 6, No 3 (2014) | Short Term Load forecasting System Based on Support Vector Kernel Methods | Abstract PDF |
Lal Hussain, M. Sajjad Nadeem, Syed Ahsen Ali Shah | ||
Vol 14, No 1 (2022) | Shortcomings And Flaws In The Mathematical Derivation Of The Fundamental Matrix Equation | Abstract PDF |
Tayeb Basta | ||
Vol 4, No 2 (2012) | Signal Processing for MIMO Interference Networks | Abstract PDF |
Thanat Chiamwichtkun, Stephanie Soon, Ian Lim | ||
Vol 4, No 1 (2012) | Signsworld; Deeping into the Silence World and Hearing its Signs (State of the Art) | Abstract PDF |
A. M. Riad, Hamdy K. Elmonier, Samaa M. Shohieb, A. S. Asem | ||
Vol 12, No 6 (2020) | Simulation of Package Delivery Optimization using a Combination of Carriers and Drop-Ship | Abstract PDF |
Valentyn M. Yanchuk, Andrii G. Tkachuk, Dmytro S. Antoniuk, Tetiana A. Vakaliuk, Anna A. Humeniuk | ||
Vol 10, No 5 (2018) | Simulation of Software Defined Networks with Open Network Operating System and Mininet | Abstract PDF |
Antonio Cortes | ||
Vol 4, No 5 (2012) | Skyline Sets Queries for Incomplete Data | Abstract PDF |
Mohammad Shamsul Arefin, Yasuhiko Morimoto | ||
Vol 11, No 3 (2019) | Smart Motorcycle Helmet:Real-Time Crash Detection with Emergency Notification, Tracker and Anti-Theft System using Internet-of-Things Cloud based Technology | Abstract PDF |
Marlon Intal Tayag, Maria Emmalyn Asuncion De Vigal Capuno | ||
Vol 14, No 2 (2022) | SMSecurity: Security System And SMS Notification Cum Face Recognition | Abstract PDF |
Winston G. Domingo, Arnold Dela Cruz, Klaida Nicolas, Jennifer A. Gamay MIT, Erwin N. Lardizabal, Virdi C. Gonzales | ||
Vol 5, No 1 (2013) | Sobel Edge Detection Method to Identify and Quantify the Risk Factors for Diabetic Foot Ulcers | Abstract PDF |
Kunjam Nageswara Rao, P. Srinivasa Rao, Allam Appa Rao, G. R. Sridhar | ||
Vol 5, No 2 (2013) | Social Media News: Motivation, Purpose and Usage | Abstract PDF |
Samaneh Beheshti-Kashi, Baharak Makki | ||
726 - 750 of 867 Items | First Previous 25 26 27 28 29 30 31 32 33 34 Next Last |
Browse Title Index
Scroll