>
Fa
  |  
Ar
  |  
En
  
jurnal teknologi
  
سال:2015 - دوره:73 - شماره:2
  
 
A prototype for network intrusion detection system using danger theory
- صفحه:77-84
  
 
A review burst assembly techniques in optical burst switching (OBS)
- صفحه:1-6
  
 
A review: Simultaneous localization and mapping algorithms
- صفحه:25-29
  
 
An improved method for predicting and ranking suppliers efficiency using data envelopment analysis
- صفحه:91-97
  
 
Corporate default prediction with adaboost and bagging classifiers
- صفحه:45-50
  
 
Data verification and misbehavior detection in vehicular Ad-hoc networks
- صفحه:37-44
  
 
Experimental analysis of RSSI-based outdoor localization in wireless sensor networks
- صفحه:133-138
  
 
Improving the optical burst switching networks quality of service by ensuring the fireness among the network traffic types
- صفحه:7-10
  
 
Matrix for mapping ICT roles in small and medium enterprises with TRIZ inventive principles based on redesign service types
- صفحه:67-75
  
 
Models of adopting cloud computing in the E-Government context: A review
- صفحه:51-59
  
 
Motivations for value co-creation in higher education institutions using online platforms: Case of idea bank
- صفحه:61-66
  
 
Passive aproaches for detecting image tampering: A review
- صفحه:31-36
  
 
Physical security framework for power plants in Yemen
- صفحه:123-131
  
 
Quranic verses verification using speech recognition techniques
- صفحه:99-106
  
 
Semi-Automatic red blood cells counting in microscopic digital images
- صفحه:19-24
  
 
The readiness and limitations of e-government in yemen
- صفحه:107-115
  
 
The role of electronic records management (ERM) for supporting decision making process in Yemeni higher professional education (HPE): A preliminary review
- صفحه:117-
  
 
Towards a new framework for tpm compliance testing
- صفحه:11-17
  
 
Traditional security risk assessment methods in cloud computing environment: Usability analysis
- صفحه:85-89
Copyright 2023
Islamic World Science Citation Center
All Rights Reserved