|
Journal | Issue |
Title |
|
Computer and Telecommunication Engineering | Vol 2, No 1 (2024) |
Artificial neural network-based home energy management system for smart homes |
Abstract
PDF
|
Abdullahi Ijala, Olabode Idowu-Bismark, Jemitola Olugbeji, Ali Obadiah, Oluseun Oyeleke |
|
Computer and Telecommunication Engineering | Vol 2, No 1 (2024) |
Potential use of virtual reality technologies for opioid use disorder treatment |
Abstract
PDF
|
Renee Garett, Sean D. Young |
|
Computer and Telecommunication Engineering | Vol 2, No 1 (2024) |
Analysis of the effectiveness of object coordinates estimation in WSN using the RSS method |
Abstract
PDF
|
Vladimir Ivanovich Parfenov |
|
Computer and Telecommunication Engineering | Vol 2, No 1 (2024) |
Prediction model for diabetes mellitus using machine learning algorithms for enhanced diagnosis and prognosis in healthcare |
Abstract
PDF
|
Prosanjeet Jyotirmay Sarkar, Satyanarayana Chanagala, George Chellin Jeya Chandra, Usha Ruby, Kavitha Manda |
|
Computer and Telecommunication Engineering | Vol 2, No 2 (2024) |
CORE: Counteracting overwhelming requests effectively—A method for interest flooding attack mitigation in NDNoT |
Abstract
PDF
|
Sedat Bilgili, Gökçe Ertit, Alper Kamil Demir |
|
Computer and Telecommunication Engineering | Vol 2, No 2 (2024) |
Design and implementation of novel 6G cellular communication architecture using 3D modelling in real environments |
Abstract
PDF
|
Mahmood A. Al-Shareeda, Muhammad Majid Al-Phryggy, Ali Abd Khadim Al-Kashani, Haider Adnan Al-Jaber, Jabbar Deyaa Al-Moussawi |
|
Computer and Telecommunication Engineering | Vol 2, No 2 (2024) |
Semi-autonomous sensor fusion-based strategy for unmanned aerial atmospheric surveillance system in open field environments |
Abstract
PDF
|
Yassen Gorbounov, Zahari Dinchev, Petar Peychinov |
|
Computer and Telecommunication Engineering | Vol 2, No 2 (2024) |
Analyzing the performance of secondary users in satellite-terrestrial systems with cognitive radio assistance |
Abstract
PDF
|
Huu Q. Tran |
|
Computer and Telecommunication Engineering | Vol 2, No 2 (2024) |
An analytical view on Unmanned Aircraft Systems |
Abstract
PDF
|
Arunima Sharma |
|
Computer and Telecommunication Engineering | Vol 2, No 3 (2024) |
Adaptive beamforming approach for secure communication in 5G network |
Abstract
PDF
|
Arunima Sharma |
|
Computer and Telecommunication Engineering | Vol 2, No 3 (2024) |
Analyzing device-to-device communication performance with amplify-and-forward relaying amid co-channel interference |
Abstract
PDF
|
Huu Quy Tran |
|
Computer and Telecommunication Engineering | Vol 2, No 3 (2024) |
Leaf diseases detection empowered with transfer learning model |
Abstract
PDF
|
Muhamamd Daniyal Baig, Hafiz Burhan Ul Haq, Muhammad Asif, Aqdas Tanvir |
|
Computer and Telecommunication Engineering | Vol 2, No 3 (2024) |
A new modification to the A* path-finding algorithm to improve its space and time performance |
Abstract
PDF
|
Aaron Rasheed Rababaah |
|
Computer and Telecommunication Engineering | Vol 3, No 1 (2025) |
Automated leaderboard system for hackathon evaluation using large language models |
Abstract
PDF
|
Bowen Li, Bohan Cheng, Patrick D. Taylor, Dale A. Osborne, Fengling Han, Robert Shen, Iqbal Gondal |
|
Computer and Telecommunication Engineering | Vol 3, No 1 (2025) |
Spectral analysis of the Lorenz attractor |
Abstract
PDF
|
H. Ali Pacha, W. Aggoune, S. Hamaci, P. Lorenz, A. Ali Pacha |
|
Computer and Telecommunication Engineering | Vol 3, No 1 (2025) |
Cyber risk management: Theories, frameworks, models, and practices |
Abstract
PDF
|
Cheryl Ann Alexander, Lidong Wang |
|
Computer and Telecommunication Engineering | Vol 3, No 1 (2025) |
Fine-tuned large language models into traditional back-end web architectures |
Abstract
PDF
|
Bowen Li, Chuan Zhang |
|
Computer and Telecommunication Engineering | Vol 3, No 1 (2025) |
A survey on the applications of machine learning, deep learning, and reinforcement learning in wireless communications |
Abstract
PDF
|
Huu Q. Tran, Viet-Thanh Pham, Sy Ngo |
|
Computer and Telecommunication Engineering | Vol 3, No 2 (2025) |
An efficient security framework, vulnerabilities, and defense mechanisms in LoraWAN |
Abstract
PDF
|
Farhan Nisar, Baseer Ali Rehman |
|
Mathematics and Systems Science | Vol 2, No 2 (2024) |
Modified scaled exponential linear unit |
Abstract
PDF
|
Nimra Nimra, Jamshaid Ul Rahman, Dianchen Lu |
|
Mathematics and Systems Science | Vol 2, No 2 (2024) |
Research on the detection and recognition system of target vehicles based on fusion algorithm |
Abstract
PDF
|
Wenlei Wang, Chongfei Huai, Lingyin Meng, Ziming Wang, Hao Zhang |
|
Mathematics and Systems Science | Vol 2, No 2 (2024) |
Why the big bang never happened |
Abstract
PDF
|
Yingqiu Gu |
|
Mathematics and Systems Science | Vol 2, No 2 (2024) |
On matrix strong Diophantine 27-Tuples and matrix elliptic curves |
Abstract
PDF
|
Joachim Moussounda Mouanda, Kouakou Kouassi Vincent |
|
Mathematics and Systems Science | Vol 2, No 2 (2024) |
Investigating the drivers and barriers of digital resource utilization in mathematical culture curricula development: A PLS-SEM analysis with Chinese teachers |
Abstract
PDF
|
Jinhai Liu, Ruili Li, Jihe Chen |
|
Mathematics and Systems Science | Vol 2, No 2 (2024) |
Approximation results of Phillips type operators including exponential function |
Abstract
PDF
|
Prerna Sharma, Diwaker Sharma |
|
426 - 450 of 5323 Items |
<< < 13 14 15 16 17 18 19 20 21 22 > >> |