Your selections:
- Ali, Mortuza, Murshed, Manzur
Content sharing among visitors with irregular movement patterns in visiting hotspots
- Kaisar, Shahriar, Kamruzzaman, Joarder, Karmakar, Gour, Gondal, Iqbal
Development and bench-marking of agoraphilic navigation algorithm in dynamic environment
- Hewawasam, Hasitha, Ibrahim, Yousef, Kahandawa, Gayan, Choudhury, Tanveer, IEEE
Classifying transformer winding deformation fault types and degrees using FRA based on support vector machine
- Liu, Jiangnan, Zhao, Zhongyong, Tang, Chao, Yao, Chenguo, Li, Chengxiang, Islam, Syed
DFIG-based WECS fault ride through complying with Australian grid codes
- Khamaira, Mahmoud, Abu-Siada, Ahmed, Islam, Syed
Impact of friendly jammers on secrecy multicast capacity in presence of adaptive eavesdroppers
- Giti, Jishan, Srinivasan, Bala, Kamruzzaman, Joarder
Fuzzy logic inspired bearing fault-model membership estimation
- Amar, Muhammad, Gondal, Iqbal, Wilson, Campbell
Performance evaluation of the dependable properties of a body area wireless sensor network
- Balasubramanian, Venki, Stranieri, Andrew
Priority sensitive event detection in hybrid wireless sensor networks
- Alam, Kh Mahmudul, Kamruzzaman, Joarder, Karmakar, Gour, Murhsed, Manzur
Issues and challenges of balancing cost, performance and risk in heavy-haul rail asset management
Impact characterization of multiple-points-defect on machine fault diagnosis
- Yaqub, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder
Verifiable and privacy preserving electronic voting with untrusted machines
- Murshed, Manzur, Sabrina, Tishna, Iqbal, Anindya, Ali, Mortuza
Impact of axial displacement on power transformer FRA signature
- Hashemnia, Naser, Abu-Siada, Ahmed, Islam, Syed
A comparison of bidding strategies for online auctions using fuzzy reasoning and negotiation decision functions
- Kaur, Preetinder, Goyal, Madhu, Lu, Jie
Anonymization techniques for preserving data quality in participatory sensing
- Sabrina, Tishna, Murshed, Manzur, Iqbal, Anindya
Mobile malware detection : an analysis of deep learning model
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq, Rahman, Ashfaqur, IEEE
Vulnerability modelling for hybrid IT systems
- Ur-Rehman, Attiq, Gondal, Iqbal, Kamruzzuman, Joarder, Jolfaei, Alireza, IEEE
An Attention-Based Approach for Single Image Super Resolution
- Liu, Yuan, Wang, Yuancheng, Li, Nan, Cheng, Xu, Zhang, Yifeng, Huang, Yongming, Lu, Guojun
Verification of latency and delays related to a digital topology based on IEC 61850
- Kumar, Shantanu, Das, Narottam, Islam, Syed, Abu-Siada, Ahmed
Adaptive sliding-mode dynamic controller for nonholonomic mobile robots
- Amer, Ahmed, Sallam, Elsayed, Sultan, Ibrahim
Are you sure you would like to clear your session, including search history and login status?