Contents:
Turing Model
Von Neumann model
Computer components
Number systems
Data storage
Operations on data
Computer organizations
Computer networks
Operating systems
Algorithms
Programming language
Software engineering
Data structures
Abstract data types
File structures
Databases
Data compression
Security
Theory of co…
Tabel of Contents: - An Introduction to Journal Phishings and Their Detection Approach (Mehdi Dadkhah, Tole Sutikno, Mohammad Davarpanah Jazi, Deris Stiawan) - Analysis and Simulation on Torque Ripples of Brushless DC Motor (Qian Weikang, Shi Yutao) - Flicker Measurement and Grey Disaster Prediction of Grid-connected Wind Turbines (Zhanqiang Zhang, Keqilao Meng, Li Zhang) - Battery State-of…
Tabel of Contents: - Variable Step Size Perturb and Observe MPPT for PV Solar Applications (Awang Bin Jusoh, Omer Jamal Eldin Ibrahim Mohammed, Tole Sutikno) - Lightning Air Terminal Collection Volume Assessment: A New Technique and Device (Zainuddin Nawawi, Hussein Ahmad, Muhammad Abu Bakar Sidik, Lim Pai Hung, Aulia, Hamizah Shahroom, Muhammad Irfan Jambak) - Unbalanced Active Distribution…
Tabel of Contents: - Large Crowd Count Based on lmproved SURF Algorithm - lmage Fuzzy Enhancement Based on Self-Adaptive Bee Colony Algorithm - Multi Facial Blurring using Improved Henon Map - Prediction and Realization of DO in Sewage Treatment Based on Machine Vision and BP Neural Network - Sparsity Properties ol Compressive Video Sampling Generated by Coefhcient Thresholding - Feature …
Volume Measurement Algorithm for Food Product with Irregular Shape using Computer Vision based on Monte CarloMethod ACAFD: Secure and Scalable Access Control with Assured File Deletion for Outsourced Data in Cloud Regressive Prediction Approach to Vertical Handover in Fourth Generation Wireless Networks Performance Analysis of Genetic Zone Routing Protocol combined with Vertical Handover Alg…
CSLM: Levenberg Marquardt based Back Propagation Algorithm Optimized with Cuckoo Search Keystrokes Inference Attack on Android: A Comparative Evaluation of Sensors and Their Fusion Quadrangle Detection Based on A Robust Line Tracker Using Multiple Kalman Models Wideband and Multiband Antenna Design and Fabrication for Modem Wireless Communications Systems Text Normalization Method for Arabi…
Implementation of Kadazan Tagger Based on Brill's Method Characterization of Series Iteration Log-periodic Fractal Koch Printed Antenna Equipped with Balun Unit A Fast and Efficient Thinning Algorithm for Binary Images Genetic Programming for Medicinal Plant Family Identification System A Multiclass-based Classification Strategy for Rhetorical Sentence Categorization from Scientific Papers
Wireless Power Transfer by Using Solar Energy Quantized Feedback Control of Network Empowerment Ammunition with Data-Rate Limitations Failure Mechanism Analysis and Failure Number Prediction of Wind Turbine Blades Multi Population Evolutionary Programming Approach for Distributed Generation Installation Simple HAWT Prototype Efficiency at Small Scale Wind Speed A Different Single-Phase Hyb…