|
Issue |
Title |
|
Vol 47, No 9 (2023): Online-only issue |
Retrieval of Interactive requirements for Data Intensive Applications using Random Forest Classifier |
Abstract
PDF
|
Renita Raymond, Margret Anouncia Savarimuthu |
|
Vol 46, No 7 (2022): Online-only issue |
Risk prediction of enterprise credit financing using machine learning |
Abstract
PDF
|
Jingjing Gu |
|
Vol 45, No 1 (2021) |
Risks Analyzing and management in Software Project Management Using Fuzzy Cognitive Maps with Reinforcement Learning |
Abstract
PDF
|
Ahmed Tlili, Salim Chikhi |
|
Vol 48, No 9 (2024): Online-only issue |
River Ship Monitoring Based on Improved Deep-Sort Algorithm |
Abstract
PDF
|
Yan Zhai |
|
Vol 41, No 4 (2017) |
Robust Computer Algebra, Theorem Proving, and Oracle AI |
Abstract
PDF
|
Gopal P. Sarma, Nick J. Hay |
|
Vol 33, No 2 (2009) |
Robust H1 Control of a Doubly Fed Asynchronous Machine |
Abstract
PDF
|
G. Sofiane, Y. Said, S. Moussa |
|
Vol 46, No 9 (2022): Online-only issue |
Robust Method for Embedding an Image inside Cover Image based on Least Significant Bit Steganography |
Abstract
PDF
|
Sahera A. Sead Almola, Najat Hameed Qasim, Hamid Ali Abed Alasadi |
|
Vol 32, No 3 (2008) |
Robust Speech Recognition Using Perceptual Wavelet Denoising and Mel-frequency Product Spectrum Cepstral Coefficient Features |
Abstract
PDF
|
M.C.A. Korba, D. Messadeg, R. Djemili, H. Bourouba |
|
Vol 33, No 3 (2009) |
Robustness and Visualization of Decision Models |
Abstract
PDF
|
A. Bregar, J. Györkös, M.B. Juric |
|
Vol 40, No 3 (2016) |
Rough-Mereology Framework for Making Medical Treatment Decisions Based on Granular Computing |
Abstract
PDF
|
Mohammed M. Eissa, Mohammed Mahfouz Elmogy, Mohamed Hashem |
|
Vol 45, No 2 (2021) |
Routing Algorithm in Networks on the Globe |
Abstract
PDF
|
Sujit Kumar Bose |
|
Vol 33, No 2 (2009) |
Routing Scalability in Multicore-Based Ad Hoc Networks |
Abstract
PDF
|
A. Marowka |
|
Vol 48, No 18 (2024): Online-only issue |
RREASO Building Structure Physical Parameter Identification Algorithm for Structural Damage Identification |
Abstract
PDF
|
Xin Li |
|
Vol 33, No 3 (2009) |
Run-time Manipulation of Programs in a Statically-Typed Language |
Abstract
PDF
|
S. Greiner |
|
Vol 46, No 9 (2022): Online-only issue |
SADetection: Security Mechanisms to Detect SLAAC Attack in IPv6 Link-Local Network |
Abstract
PDF
|
Mahmood A. Al-Shareeda, Selvakumar Manickam, Murtaja Ali Saare, Nazrool Bin Omar |
|
Vol 48, No 21 (2024): Online-only issue |
SD-WSN Network Security Detection Methods for Online Network Education |
Abstract
PDF
|
Zhenpeng Zhang |
|
Vol 37, No 3 (2013) |
Searching for Credible Relations in Machine Learning |
Abstract
PDF
|
V. Vidulin |
|
Vol 47, No 6 (2023): Online-only issue |
Secure and Low-Complexity Medical Image Exchange Based on Compressive Sensing and LSB Audio Steganography |
Abstract
PDF
|
Wafaa Al-Chaab, Zaid Ameen Abduljabbar, Enas Wahab Abood, Vincent Omollo Nyangaresi, Hussein M. Mohammed, Junchao Ma |
|
Vol 33, No 4 (2009) |
Secure Convertible Authenticated Encryption Scheme Based on RSA |
Abstract
PDF
|
T.-S. Wu, H.-Y. Lin |
|
Vol 48, No 18 (2024): Online-only issue |
Secure Face Recognition Using Fully Homomorphic Encryption and Convolutional Neural Networks |
Abstract
PDF
|
Tao Liu |
|
Vol 36, No 1 (2012) |
Secure Key Exchange Scheme for IPTV Broadcasting |
Abstract
PDF
|
R.S. Pippal, S. Tapaswi, C.D. Jaidhar |
|
Vol 33, No 1 (2009) |
Secure, Portable, and Customizable Video Lectures for E-learning on the Move |
Abstract
PDF
|
M. Furini |
|
Vol 46, No 8 (2022): Online-only issue |
Secure Routing Protocol for WSNs Using Bacterial Foraging Optimization and Improved RC4 |
Abstract
PDF
|
Imad Alshawi, Hasan Al-badrei |
|
Vol 40, No 1 (2016) |
Secured Storage for Dynamic Data in Cloud |
Abstract
PDF
|
Veeralakshmi Ponnuramu, Latha Tamilselvan |
|
Vol 48, No 2 (2024) |
Seepage Detection Using Passive Temperature Measurements by Fiber Optic DTS |
Abstract
PDF
|
Yaser Ghafoori |
|
1301 - 1325 of 1530 Items |
<< < 48 49 50 51 52 53 54 55 56 57 > >> |