Special Issue 2020, No. 4A ( Special Issue 2020, No. 4A ) (13)
28 July 2020
Model Transformations Carried by the Traceability
28 July 2020
Design and Simulation of Spectrum Access and Power Management Protocol for Dynamic Access
28 July 2020
Incorporating Intelligence for Overtaking Moving Threatening Obstacles<
28 July 2020
Enhanced Android Malware Detection and Family Classification, using Conversation-level Network Traff
Enhanced Android Malware Detection and Family
28 July 2020
Robotic Path Planning and Fuzzy
28 July 2020
Mitigating Insider Threats on the Edge:
28 July 2020
Discovery of Arbitrary-Shapes Clusters Using
28 July 2020
Default Prediction Model: The Significant Role of Data Engineering in
28 July 2020
Identity Identification and Management in the Internet
of Things
28 July 2020
DoS and DDoS Attack Detection Using Deep Learning and
More...
28 July 2020
On Detection and Prevention of Zero-Day Attack Using Cuckoo Sandbox
28 July 2020
Identification of Ischemic Stroke by Marker Controlled Watershed Segmentation and Fearture Extractio
Identification of Ischemic Stroke by Marker
27 July 2020
Streaming Video Classification Using Machine Learning<
▼
- Diploma Courses
- Business and Enterprise
- Digital Literacy & IT
- Health Literacy
- Business Literacy
Starting from Jun. 14 2016
-
Sonstur aut pereis dolibus Starting from Jun. 14 2016
-
The impact of nursing Starting from Jun. 10 2016
-
English for beginner Starting from Jun. 10 2016
-
How to control the risk Starting from Jun. 10 2016