>
Fa   |   Ar   |   En
   journal of telecommunication, electronic and computer engineering   
سال:2017 - دوره:9 - شماره:1-2


  tick  5G: The next wave of digital society challenges and current trends - صفحه:63-66

  tick  A new routing protocols for reducing path loss in Wireless Body Area Network (WBAN) - صفحه:93-97

  tick  A review of challenges and security risks of cloud computing - صفحه:87-91

  tick  An evaluation of feature selection methods on multi-class imbalance and high dimensionality shape-based leaf image features - صفحه:57-61

  tick  Analysis of performance measures with single channel fuzzy queues under two class by ranking method - صفحه:109-112

  tick  Artificial Bee Colony algorithm for pairwise test generation - صفحه:103-108

  tick  Comparative analysis of feature extraction techniques for event detection from news channels' Facebook page - صفحه:13-17

  tick  Copy-move forgery detection using integrated DWT and SURF - صفحه:67-71

  tick  Determining distance measure in Fast Scanning algorithm for image segmentation - صفحه:25-28

  tick  Enhancing the security of RCIA ultra-lightweight authentication protocol by using Random Number Generator (RNG) technique - صفحه:77-80

  tick  Fruit classification using neural network model - صفحه:43-46

  tick  GIS based multi-criteria decision making for flood vulnerability index assessment - صفحه:7-11

  tick  Hybrid harmony search with great deluge for UUM CAS curriculum based course timetabling - صفحه:33-38

  tick  Iris feature detection using split block and PSO for iris identification system - صفحه:99-102

  tick  Maximax&Maximin and 2FBlockwise operators: Enhancement in the Evolutionary Algorithm for a nurse scheduling problem - صفحه:1-6

  tick  Multiclass classification application using SVM kernel to classify chest X-ray images based on nodule location in lung zones - صفحه:19-23

  tick  Performance evaluation of TCP NewReno and TCP Vegas over LTE network - صفحه:39-42

  tick  Replica maintenance strategy for data grid - صفحه:47-51

  tick  Robust multi-dimensional trust computing mechanism for cloud computing - صفحه:73-76

  tick  Temporal dynamics modelling for aggression level of victims in disaster evacuation center - صفحه:29-32

  tick  Using hierarchical cluster analysis to generate clusters of agile practices - صفحه:53-56

  tick  Vertical handover in wireless heterogeneous networks - صفحه:81-85
 

Copyright 2023
Islamic World Science Citation Center
All Rights Reserved