Browse Title Index

Issue Title
Vol 12, No 4: December 2014 Trusted Node-Based Algorithm to Secure Home Agent NATed IPv4 Network from IPv6 Routing Header Attacks Abstract   PDF
Mohamed Shenify
Anton Yudhana, Sunardi Sunardi, Jafri Din, Syed Abdullah, Raja Bidin Raja Hassan
Vol 15, No 3: September 2017 Twitter’s Sentiment Analysis on Gsm Services using Multinomial Naïve Bayes Abstract   PDF
Aisah Rini Susanti, Taufik Djatna, Wisnu Ananta Kusuma
Vol 12, No 1: March 2014 Two Text Classifiers in Online Discussion: Support Vector Machine vs Back-Propagation Neural Network Abstract   PDF
E. Erlin, R. Rahmiati, Unang Rio
Vol 12, No 4: December 2014 Two-Dimensional Imaging Algorithm Based on Linear Prognosis for Space Target in Bistatic ISAR System Abstract   PDF
Xueping Lu, Shapu Ren
Vol 11, No 4: December 2013 Two-phase Flow Visualization Employing Gauss-Newton Method in Microchannel Abstract   PDF
Yonghong Liu, Mingyan Zu, Xiantao Wang, Je-Eun Choi
Vol 17, No 3: June 2019 Two-port network model of fixed-speed wind turbine generator for distribution system load flow analysis Abstract   PDF
Rudy Gianto, Kho Hie Khwee, Hendro Priyatman, Managam Rajagukguk
Vol 17, No 2: April 2019 UDP Protocol for multi-task assignment in "void loop" robot soccer Abstract   PDF
Irma Damayanti, Simon Siregar, Muhammad Ikhsan Sani
Vol 11, No 2: June 2013 UHF RFID Tag Antenna for Vehicle License Plate Number (e-Plate) Abstract   PDF
Evizal Evizal, Tharek Abdul Rahman, Sharul Kamal Abdul Rahim
Vol 13, No 1: March 2015 Ultrasonic Tomography of Immersion Circular Array by Hyperbola Algorithm Abstract   PDF
Liu Yang, Chunguang Xu, Xianghui Guo, Liping Wang
Vol 12, No 4: December 2014 Unambiguous Acquisition for Galileo E1 OS Signal Based on Delay-And-Multiply Abstract   PDF
Deng Zhongliang, Xi Yue, Jiao Jichao, Yin Lu
Vol 13, No 2: June 2015 Unambiguous Sine-phased BOC(kn,n) Signal Acquisition Based on Combined Correlation Functions Abstract   PDF
Deng Zhongliang, Xi Yue, Yin Lu
Vol 13, No 1: March 2015 Unbalanced Active Distribution Analysis with Renewable Distributed Energy Resources Abstract   PDF
Syafii Syafii, K. M. Nor
Vol 17, No 5: October 2019 Understanding user intention in image retrieval: generalization selection using multiple concept hierarchies Abstract   PDF
Abdelmadjid Youcefa, Mohammed Lamine Kherfi, Belal Khaldi, Oussama Aiadi
Vol 14, No 1: March 2016 Underwater Channel Characterization to Design Wireless Sensor Network by Bellhop Abstract   PDF
Nima Bahrami, Nor Hisham Haji Khamis, Ameruddin Baharom, Azli Yahya
Vol 16, No 6: December 2018 Underwater Image De-nosing using Discrete Wavelet Transform and Pre-Whitening Filter Abstract   PDF
Mohanad Najm Abdulwahed, Ali Kamil Ahmed
Muchlas Muchlas
Vol 13, No 1: March 2015 Unscented Particle Filtering Algorithm for Optical-fiber Sensing Intrusion Localization Based on Particle Swarm Optimization Abstract   PDF
Hua Zhang, Xiaoping Jiang, Chenghua Li
Vol 14, No 3A: 2016 Unsupervised Classification of Fully Polarimetric SAR Image Based on Polarimetric Features and Spatial Features Abstract   PDF
Xiaorong Xue, Liping Di, Liying Guo, Li Lin
Vol 17, No 2: April 2019 Usability of BLESS-implemented class room: a case study of mixtio Abstract   PDF
Desita Mustikaningrum, Astari Retnowardhani
Vol 15, No 3: September 2017 Use of Automation Codecs Streaming Video Applications Based on Cloud Computing Abstract   PDF
Hero Wintolo, Anggraini Kusumaningrum, Handoko Widya Kusuma
Vol 16, No 6: December 2018 Using Alpha-cuts and Constraint Exploration Approach on Quadratic Programming Problem Abstract   PDF
Y. Dasril, Zahriladha Zakaria, I. B. Mohd
Vol 17, No 5: October 2019 Using machine learning for the classification of the modern Arabic poetry Abstract   PDF
Munef Abdullah Ahmed, Raed Abdulkareem Hasan, Ahmed Hussien Ali, Mostafa Abdulghafoor Mohammed
Vol 14, No 2: June 2016 Using STATCOM with Energy Storage to Enhance the Stability of AC-DC Hybrid System Abstract   PDF
Zheng Xu, Ding Jianyong, Li Mei, Zhao Shuang, Zeng Ni, Zhu Ruoxi, Zhang Buhan, Mao Chengxiong
Vol 15, No 3: September 2017 Using SVD and DWT Based Steganography to Enhance the Security of Watermarked Fingerprint Images Abstract   PDF
Mandy Douglas, Karen Bailey, Mark Leeney, Kevin Curran
1926 - 1950 of 2010 Items << < 73 74 75 76 77 78 79 80 81 > >>