Issue | Title | |
Vol 8, No 1 (2013) | Modified Fast Codebook Model | Abstract |
Qian Zhao, Cheng Zhao, Yuan-Bin Hou, Xin-Rong Mao | ||
Vol 8, No 6 (2013) | Modified Harmony Search Algorithm for Energy Optimization in WSN | Abstract |
T. Shankar, S. Shanmugavel, A. Karthikeyan | ||
Vol 9, No 11 (2014) | Modified Low Energy Adaptive Clustering Hierarchy Protocol for Efficient Energy Consumption in Wireless Sensor Networks | Abstract |
Mohammed Joda Usman, Zhang Xing, Haruna Chiroma, Abdulsalam Ya’u Gital, Adamu I. Abubakar, Ali Muhammad Usman, Tutut Herawan | ||
Vol 11, No 3 (2016) | Modified Time-Based Heuristics Miner for Parallel Business Processes | Abstract |
Riyanarto Sarno, Yutika Amelia Effendi, Fitrianing Haryadita | ||
Vol 14, No 1 (2019) | Molecular Beacon DNA-Strand Optical Processor | Abstract |
Qabeela Qassim Thabit, Alaa A. Al-Saffar | ||
Vol 9, No 4 (2014) | MSG SEVIRI Image Segmentation Using a Method Based on Spectral, Temporal and Textural Features | Abstract |
Mounir Sehad, Soltane Ameur, Jean Michel Brucker, Mourad Lazri | ||
Vol 9, No 5 (2014) | Multi Biometric Fuzzy Vault Generation Using Chaff Points and Cuckoo Search Optimization | Abstract |
K. Annapurani, Deepika Ravikumar, M. A. K. Sadiq | ||
Vol 8, No 7 (2013) | Multi Channel Voice Active Detection Using Instance Filed Auto-Interrelation Function | Abstract |
M. Mathivanan, S. Chenthur Pandian | ||
Vol 9, No 3 (2014) | Multi Class Multi Label Based Fuzzy Associative Classifier with Genetic Rule Selection for Coronary Heart Disease Risk Level Prediction | Abstract |
R. Sumathi, E. Kirubakaran, R. Krishnamoorthi | ||
Vol 10, No 3 (2015) | Multi Criteria Decision Making for n-Dimensional Vertical Partitions | Abstract |
Prathipa Baskaran, Balika J. Chelliah | ||
Vol 11, No 6 (2016) | Multi Hop Time Synchronization Protocol for Wireless Ad-Hoc Sensor Networks | Abstract |
Arun Saxena, Manuj Darbari | ||
Vol 9, No 10 (2014) | Multi Key Word Search and Trusted Auditing System to Verify the Integrity of Outsourced Data in Cloud Computing | Abstract |
J. Jospin Jeya, E. Kannan | ||
Vol 10, No 7 (2015) | Multi Sensor Image Fusion Using Saliency Map Detection | Abstract |
Durga Prasad Bavirisetti, Ravindra Dhuli | ||
Vol 9, No 10 (2014) | Multi-Agent Architecture for Business Modeling of Web Services Composition Based on WS2JADE Framework | Abstract |
Nouha Adadi, Mohammed Berrada, Driss Chenouni, Bouchaïb Bounabat | ||
Vol 11, No 7 (2016) | Multi-Character String Matching Algorithm Based on State Machine | Abstract |
Timothy Yudi Adinugroho, Benfano Soewito | ||
Vol 8, No 7 (2013) | Multi-Energy X-Ray Imaging System Using Single Photon Counting | Abstract |
Sang Don Kim, Seung Eun Lee | ||
Vol 10, No 8 (2015) | MultiLayer Reversible Data Hiding Based on Histogram Shifting with High Quality and Capacity | Abstract |
Hamida Mohammed Almangush, Mohd K. Abd Ghani, Ahmed B. Abugharsa | ||
Vol 10, No 3 (2015) | Multimodal Medical Image Fusion Under Redundant Transforms | Abstract |
Naveen Kishore Gattim, V. Rajesh | ||
Vol 8, No 3 (2013) | Multipath Routing for Admission Control and Load Balancing in Wireless Mesh Networks | Abstract |
Rakesh Kumar Giri, Masih Saikia | ||
Vol 8, No 7 (2013) | Multiple Server Indirect Security Authentication Protocol for Mobile Networks Using Elliptic Curve Cryptography (ECC) | Abstract |
Pabitra Kumar Tripathy, Debashis Biswal | ||
Vol 10, No 1 (2015) | Multiple-Population Genetic Algorithm for Solving Min-Max Optimization Problems | Abstract |
Mohammad Alshraideh, Luay Tahat | ||
Vol 18, No 2 (2023) | Multispectral Retinal Blood Vessel Analysis for Detecting Eye Diseases | Abstract |
Sanaa Ghouzali | ||
Vol 8, No 5 (2013) | Multivariate Gaussian Mean Distributed Network Topology for Energy Efficient Communication in Wireless Sensor Networks | Abstract |
T. Shankar, S. Shanmugavel, A. Karthikeyan, Arshad Nadeem | ||
Vol 9, No 6 (2014) | Network Alert Management Based on Multi Agent Systems for Surveillance and Supervising Software and Hardware Components | Abstract |
Moummadi Kamal, Abidar Rachida, Moutaouakkil Fouad, Medromi Hicham | ||
Vol 8, No 5 (2013) | Network Intrusion Detection System Based on Negative Selection Algorithm Reinforced by Danger Theory | Abstract |
Younes Chihab, Abdellah Ait Ouahman, Omar Bencharef | ||
676 - 700 of 989 Items | << < 23 24 25 26 27 28 29 30 31 32 > >> |
Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize