Issue | Title | |
Vol 10, No 4 (2018) | Search for Answers in Domain-Specific Supported by Intelligent Agents | Abstract PDF |
Fernando Zacarias, Rosalba Cuapa, Guillermo De Ita, Miguel Bracamontes | ||
Vol 3, No 1 (2011) | Search-Based Software Test Data Generation Using Evolutionary Computation | Abstract PDF |
P. Maragathavalli | ||
Vol 2, No 3 (2010) | Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups | Abstract PDF |
Ruchira Naskar, Indranil Sengupta | ||
Vol 15, No 5 (2023) | Secure Arcade: A Gamified Defense Against Cyber Attacks | Abstract PDF |
Sean Loesch, Ryan Hrastich, Jordan Herbert, Ben Drangstveit, Jacob Weber, Mounika Vanamala | ||
Vol 13, No 6 (2021) | Secureti: Advanced SDLC And Project Management Tool For TI (Philippines) | Abstract PDF |
Amelie Anne Gutierrez | ||
Vol 2, No 6 (2010) | Security Enhencement & Solution for Authentication Frame Work in IEEE 802.16 | Abstract PDF |
A. K. M. Nazmus Sakib | ||
Vol 2, No 6 (2010) | Security in Wireless Sensor Networks Using Key Management Schemes | Abstract PDF |
P. Soundarya, L. M. Varalakshmi | ||
Vol 14, No 3 (2022) | Security In Wireless Sensor Networks: Comparative Study | Abstract PDF |
Fatimah Khalil Aljwari, Hajer Abdullah Alwadei, Aseel Abdullah Alfaidi | ||
Vol 5, No 3 (2013) | Security Threats on Cloud Computing Vulnerabilities | Abstract PDF |
Te-Shun Chou | ||
Vol 2, No 6 (2010) | Segmentation and Object Recognition Using Edge Detection Techniques | Abstract PDF |
Y. Ramadevi, T. Sridevi, B. Poornima, B. Kalyani | ||
Vol 8, No 1 (2016) | Segmentation of Magnetic Resonance Brain Tumor Using Integrated Fuzzy K-Means Clustering | Abstract PDF |
P. Pedda Sadhu Naik, T. Venu Gopal | ||
Vol 3, No 4 (2011) | Self-Adaptation Mechanism to Control the Diversity of the Population in Genetic Algorithm | Abstract PDF |
Chaiwat Jassadapakorn, Prabhas Chongstitvatana | ||
Vol 11, No 6 (2019) | Self-Learning AI Framework for Skin Lesion Image Segmentation and Classification | Abstract PDF |
Anandhanarayanan Kamalakannan, Shiva Shankar Ganesan, Govindaraj Rajamanickam | ||
Vol 7, No 4 (2015) | Sensitivity Analysis of Information Retrieval Metrics | Abstract PDF |
Marina Marjanovic-Jakovljevic | ||
Vol 7, No 6 (2015) | Service Oriented Quality Requirement Framework for Cloud Computing | Abstract PDF |
Madhushi Rathnaayke, Janaka I. Wijayanayake | ||
Vol 15, No 2 (2023) | Sex Detection in the Early Stage of Feretilized Chicken Eggsvia Image Recognition | Abstract PDF |
Ufuk Asil, Efendi Nasibov | ||
Vol 7, No 2 (2015) | SFAMSS: A Secure Framework for ATM Machines via Secret Sharing | Abstract PDF |
Zeinab Ghafari, Taha Arian, Morteza Analoui | ||
Vol 5, No 2 (2013) | Shadow Detection Using Tricolor Attenuation Model Enhanced with Adaptive Histogram Equalization | Abstract PDF |
V. Jyothisree, Smitha Dharan | ||
Vol 16, No 4 (2024) | Shadowed AHP for Multi-Criteria Supplier Selection | Abstract |
Mohamed Abdel Hameed El-Hawy | ||
Vol 6, No 1 (2014) | Shape-Based Plagiarism Detection for Flowchart Figures in Texts | Abstract PDF |
Senosy Arrish, Fadhil Noer Afif, Ahmadu Maidorawa, Naomie Salim | ||
Vol 4, No 6 (2012) | Shaping of Location Conscious Information | Abstract PDF |
R. Palson Kennedy, Rajashekhara | ||
Vol 6, No 2 (2014) | Sharing of Cluster Resources among Multiple Workflow Applications | Abstract PDF |
Uma Boregowda, Venugopal Chakravarthy | ||
Vol 6, No 3 (2014) | Short Term Load forecasting System Based on Support Vector Kernel Methods | Abstract PDF |
Lal Hussain, M. Sajjad Nadeem, Syed Ahsen Ali Shah | ||
Vol 14, No 1 (2022) | Shortcomings And Flaws In The Mathematical Derivation Of The Fundamental Matrix Equation | Abstract PDF |
Tayeb Basta | ||
Vol 4, No 2 (2012) | Signal Processing for MIMO Interference Networks | Abstract PDF |
Thanat Chiamwichtkun, Stephanie Soon, Ian Lim | ||
751 - 775 of 907 Items | First Previous 26 27 28 29 30 31 32 33 34 35 Next Last |
Browse Title Index
Scroll