| Issue | Title | |
| Vol 7, No 3: September 2018 | Sabah Traditional Chinese Medicine Database | Abstract PDF |
| Aslina Baharum, Neoh Yee Jin, Shaliza Hayati A. Wahab, Mohd Helmy Abd Wahab, Radzi Ambar, Nurul Hidayah Mat Zain | ||
| Vol 3, No 2: June 2014 | Sampled Reference Frame Algorithm Based on Space Vector Pulse Width Modulation for Five Level Cascaded H-Bridge Inverter | Abstract PDF |
| Gomathi C, Navya Nagath, Veerakumar S | ||
| Vol 6, No 4: December 2017 | Satellite Image Enhancement Using Dual Tree Complex Wavelet Transform | Abstract PDF |
| C. Periyasamy | ||
| Vol 9, No 3: June 2020 | Satellite imagery and machine learning for aridity disaster classification using vegetation indices | Abstract PDF |
| Sri Yulianto Joko Prasetyo, Kristoko Dwi Hartomo, Mila Chrismawati Paseleng, Dian Widiyanto Chandra, Edi Winarko | ||
| Vol 11, No 2: April 2022 | Scalable epidemic message passing interface fault tolerance | Abstract PDF |
| Soma Sekhar Kolisetty, Battula Srinivasa Rao | ||
| Vol 8, No 1: March 2019 | Scalable workflow scheduling algorithm for minimizing makespan and failure probability | Abstract PDF |
| Maslina Abdul Aziz, Izuan Hafez Ninggal | ||
| Vol 10, No 2: April 2021 | Scaled conjugate gradient ANN for industrial sensors calibration | Abstract PDF |
| Karam Mazin Zeki Othman, Abdulkreem M Salih | ||
| Vol 14, No 4: August 2025 | Screening capabilities for the 3D dyscalculia identification game framework | Abstract PDF |
| Bambang Pudjoatmodjo, Sazilah Salam, Ahmad Naim Che Pee, Rikman Aherliwan Rudavan, Ary Setijadi Prihatmanto | ||
| Vol 9, No 3: June 2020 | Search for a substring of characters using the theory of non-deterministic finite automata and vector-character architecture | Abstract PDF |
| Dmitry V. Pashchenko, Dmitry A. Trokoz, Alexey I. Martyshkin, Mihail P. Sinev, Boris L. Svistunov | ||
| Vol 11, No 6: December 2022 | Secrecy capacity analysis of bi-static backscatter communication systems | Abstract PDF |
| Phung Ton That, Duy-Hung Ha, Hong-Nhu Nguyen | ||
| Vol 13, No 4: August 2024 | Secure and efficient data storage with Rivest Shamir Adleman algorithm in cloud environment | Abstract PDF |
| Ezhilarasan Elumalai, Dinakaran Muruganandam | ||
| Vol 14, No 3: June 2025 | Secure and efficient elliptic curve-based certificate-less authentication scheme for solar-based smart grids | Abstract PDF |
| Reduanul Bari Shovon, Ashif Mohammad, Rimi Das, Tuhin Hossain, Md Ahasun Habib Ratul, Ronjon Kundu, Md. Ahsan Arif | ||
| Vol 13, No 2: April 2024 | Secure Euclidean random distribution for patients’ magnetic resonance imaging privacy protection | Abstract PDF |
| Ali Jaber Tayh Albderi, Lamjed Ben Said | ||
| Vol 11, No 2: April 2022 | Secure lightweight obfuscated delay-based physical unclonable function design on FPGA | Abstract PDF |
| Mohammad Haziq Ishak, Mohd Syafiq Mispan, Wong Yan Chiew, Muhammad Raihaan Kamaruddin, Mikhail Aleksandrovich Korobkov | ||
| Vol 13, No 3: June 2024 | Secure map-based crypto-stego technique based on mac address | Abstract PDF |
| Dima S. Kasasbeh, Bushra M. Al-Ja’afreh, Mohammed Anbar, Iznan H. Hasbullah, Mahmoud Al Khasawneh | ||
| Vol 10, No 3: June 2021 | Secure message transmission scheme in wireless sensor networks | Abstract PDF |
| Kameran Ali Ameen, Baban Ahmed Mahmood, Yalmaz Najm Aldeen Taher | ||
| Vol 10, No 2: April 2021 | Secure outage probability of cognitive radio network relying non-orthogonal multiple access scheme | Abstract PDF |
| Chi-Bao Le, Dinh-Thuan Do | ||
| Vol 5, No 4: December 2016 | Secure Routing Protocol for Integrated UMTS and WLAN Ad Hoc Networks | Abstract PDF |
| Shashank Tripathi, A. K. Jain | ||
| Vol 12, No 4: August 2023 | Secure two-factor mutual authentication scheme using shared image in medical healthcare environment | Abstract PDF |
| Husam A. Abdulmalik, Ali A. Yassin | ||
| Vol 13, No 6: December 2024 | Securing IoT edge device communication with efficient ECC middleware for resource-constrained systems | Abstract PDF |
| Zainatul Yushaniza Mohamed Yusoff, Mohamad Khairi Ishak, Lukman AB Rahim | ||
| Vol 13, No 1: February 2024 | Securing laboratories through internet of things networks: a comprehensive approach for ensuring safety and efficiency | Abstract PDF |
| Tamali Abderrahmane, Nourredine Amardjia, Tamali Mohammed | ||
| Vol 14, No 4: August 2025 | Securing patient data and access control in electronic health records with Ethereum blockchain | Abstract PDF |
| Shruthi Kumarswamy, Poornima Athikatte Sampigerayappa | ||
| Vol 12, No 6: December 2023 | Security analysis of encrypted audio based on elliptic curve and hybrid chaotic maps within GFDM modulator in 5G networks | Abstract PDF |
| Mohammed Jabbar Mohammed Ameen, Saad S. Hreshee | ||
| Vol 15, No 1: February 2026 | Security challenges in the internet of things for higher education: a study of vulnerabilities and emerging solutions | Abstract PDF |
| Kamal Elhattab, Driss Naji, Abdelouahed Ait Ider, Abdelali Joumad, Abdelkbir Ouisaadane, Karim Abouelmehdi | ||
| Vol 9, No 2: April 2020 | Security issues and framework of electronic medical record: A review | Abstract PDF |
| Jibril Adamu, Raseeda Hamzah, Marshima Mohd Rosli | ||
| 2476 - 2500 of 2962 Items | << < 95 96 97 98 99 100 101 102 103 104 > >> | |