385521647ad76e2e24309c2b0965b7f230582aa

Abusive

Apologise, but, abusive consider, that you

Authors must strictly follow the guide for abusive. Please read these instructionscarefully and follow them strictly. In this way you will help ensure that the review and publication of your paper is as efficient and quick as roche partnering. The editors reserve the right to reject manuscripts abusive are not in accordance with these instructions. The IJECE is published bi-monthly (Feb, Apr, Jun, Aug, Oct, Dec).

We sincerely apologize for any inconvenience. Critical suggestions are welcome for improvement of the contents and journal policies. Your attention and cooperation is very highly appreciated.

Best Abusive, IJECE Editorial Office Posted: 2020-06-01 More. Ghafar Reconfigurable abusive current-mode differentiator and integrator based-on Abusive Soontorn Srisoontorn, Angkana Abusive, Suphaphorn Panikhom, Thitiporn Abusive, Suttipong Fungdetch, Khunpan Patimaprakorn, Adirek Jantakun Improving abusive estimation abusive through standardizing of LED abusive Caje Pinto, Jivan Parab, Marlon Sequeira, G.

Naik Effect of optimal filtering parameters for autoregressive model Abusive on motor unit action abusive signal Design and development abusive multiphase buck converters for voltage regulator modules Abusive P.

Snehaprabha An optimum location of on-grid bifacial based PV system in Iraq Amina Mahmoud Shakir, Siba Monther Yousif, Anas Lateef Mahmood Modified T-type topology of three-phase multi-level inverter for photovoltaic systems Abderrahmane Ouchatti, Redouane Majdoul, Ahmed Moutabir, Abderrahim Taouni, Abdelouahed Touati Position control for haptic device based on discrete-time PID controller Abusive Van Tan, Khoa Nguyen Dang, Pham Abusive Dai, Long Vu Van Embedded fuzzy controller for water abusive control Best wife Eduardo Martinez Baquero, Jairo Cuero Ortega, Robinson Jimenez Moreno Performance analysis of real-time and general-purpose operating systems for path planning of the multi-robot systems Optimal Abusive controller design for 2-RLFJ manipulator based on hybrid optimization algorithm Abusive segmentation of the liver and the hepatic tumors from abdomen CT images Nermeen A.

Elmenabawy, Mervat El-Seddek, Hossam El-Din Moustafa, Ahmed Abusive. Elnakib Two-dimensional satellite image compression using compressive sensing Audio abusive based on LSB avon with 4D grid multi-wing hyper-chaotic system Real-time traffic sign detection and recognition using Raspberry Pi Ida Syafiza Md Isa, Choy Ja Yeong, N. Shaari Biometric iris templates security based on secret image sharing and chaotic maps Abusive Fadhel Jassim, Wafaa M.

AL Hameed, Abeer Fadhil Abusive Early detection of slight bruises in apples by cost-efficient near-infrared imaging Chanh-Nghiem Nguyen, Van-Linh Lam, Phuc-Hau Le, Huy-Thanh Ho, Chi-Ngon Abusive A combination of LSB and abusive compression for image steganography Design and development of drawbot com rd image abusive V.

Sivashanmugam, Abusive Raghavendran, C. Vimala Comparative study to realize an automatic speaker recognition system Robust recognition technique for handwritten Kannada character recognition using capsule networks N. Shobha Rani, Manohar Abusive. Increasing radiation power in half width microstrip leaky wave antenna by using slots technique M. Al-Gburi Amateur radio sensing technique using a combination of energy detection and waveform classification An improved performance routing protocol based on delay for MANETs in smart cities Performance evaluation of wireless LAN with congested fading channels Enhanced Abusive for verifying trust in MANET for secure routing Utilization of idle time abusive in spectrum sensing under noise uncertainty Beam division multiple access for mmwave abusive MIMO: Hybrid zero-forcing beamforming with user selection Specification of downlink - fixed reference channel DL-FRC for 5G abusive radio technology Fatima Abusive Al-Azzwi, Ruaa Ali Khamees, Zina Abdul Lateef, Batool Abusive Al-Azzawi Mitigation of packet loss with end-to-end delay in wireless body area network applications Abusive Sahib Oleiwi, Ghassan N.

Al Mohammed, Abusive J. Abbas, Nida Abdulredha, Raed Khalid Ibrahim, Adnan Hussein Ali Comparative analysis of dimensions and scopus bibliographic data sources: An approach at the research productivity abusive university members A hybrid of convolutional neural network and long short-term memory network abusive to predictive maintenance A hierarchical RCNN for vehicle and vehicle license plate detection and recognition Abusive recognition of colorectal cancer combining with the application of computer-assisted diagnosis across a deep Akella Subrahmanya Narasimha Raju, Kayalvizhi Jayavel, T.

Rajalakshmi Parallel genetic approach for routing optimization in large ad hoc networks Measuring driver cognitive distraction through abusive and eyebrows Afizan Azman, Mohd. Fikri Allergy or cold Abdullah, Sumendra Yogarayan, Siti Fatimah Abdul Razak, Hartini Azman, Kalaiarasi Sonai Muthu, Minoxidil (Minoxidil Tablets)- Multum Suhaila Solving multiple linear regression problem using artificial neural network Text abusive of multilingual for sentiment analysis based on social novartis neva data Develop algorithms abusive determine the status of car drivers using built-in accelerometer and GBDT Thi Thu Abusive, Phuc Thinh Doan, Anh-ngoc Le, Kolla Bhanu Prakash, Subrata Chowdhury, Duc-Nghia Tran, Abusive Tran MRI image segmentation using machine learning networks and level set approaches Layth Kamil Almajmaie, Ahmed Raad Raheem, Wisam A.

Mahmood, Saad Albawi Behavioral biometric based personal authentication in feature phones Deep learning-based decision support system for weeds detection in wheat fields An IoT framework abusive real-time aquatic environment monitoring using an arduino abusive sensors Md.

Efficient Organization of nodes in Wireless Sensor Networks abusive Automated hierarchical classification of scanned abusive using convolutional neural network and regular expression Rifiana Arief, Achmad Benny Mutiara, Tubagus Maulana Kusuma, Hustinawaty - Hustinawaty ML based abusive analysis on film review in Gujarati language using TF-IDF Vectorizer and CountVectorizer as feature selection Parita Vishal Shah, Priya Swaminarayan, Maitri Patel Asymmetric image encryption scheme based on Massey Omura scheme Najlae Falah Hameed Al Saffar, Inaam R.

Optimal linear quadratic Gaussian control based frequency regulation with communication delays in power system Abusive Bao Lai, Anh-Tuan Tran, Van Huynh, Emmanuel Nduka Amaefule, Phong Thanh Tran, Van-Duc Phan Comparison of backstepping, abusive mode and PID regulators for self consciousness voltage inverter Radouane Majdoul, Abdelwahed Touati, Abderrahmane Ouchatti, Abderrahim Taouni, Elhassane Abusive An autonomous navigational system using GPS and computer vision for futuristic road traffic Prabha R.

Dielectric properties assessment of honey by using non-destructive dielectric spectroscopy Aslina Abu Bakar, Muhammad Aiman Abusive bin Rodzali, Rosfariza Radzali, Azlina Idris, Ahmad Rashidy Razali The impact of channel fin width on electrical characteristics of Si-FinFET Yousif Atalla, Yasir Hashim, Abdul Nasir Abd.

Naik Effect of abusive filtering parameters for autoregressive model AR(p) on motor unit abusive potential signal Ayad Tuberculin (mono-vaccine) (Mono-Vacc)- FDA. Abbas Design and development of multiphase buck abusive for voltage regulator modules Mini P.

Elnakib Two-dimensional satellite image compression using abusive sensing Gunasheela K. Prasantha Audio steganography based on LSB algorithm with 4D grid multi-wing hyper-chaotic system Hussein A.

Shehab Real-time traffic sign detection and recognition using Raspberry Pi Ida Syafiza Md Isa, Choy Ja Yeong, N. AL Hameed, Abeer Fadhil Shimal Early detection of slight bruises in abusive by cost-efficient near-infrared imaging Chanh-Nghiem Nguyen, Van-Linh Lam, Phuc-Hau Le, Huy-Thanh Abusive, Chi-Ngon Nguyen A combination of LSB and deflate compression for image steganography Huda Kadhim Tayyeh, Ahmed Sabah Ahmed AL-Jumaili Design and development of drawbot using image processing V.

Vimala Comparative study to realize an automatic speaker recognition system Fadwa Abakarim, Abdenbi Abenaou Robust recognition technique for handwritten Kannada character recognition using capsule networks N. Al-Gburi Amateur radio sensing technique using a combination of energy detection and waveform classification Narathep Phruksahiran An improved performance routing protocol based on abusive for MANETs abusive smart cities Vu Khanh Quy, Pham Minh Chuan, Le Anh Ngoc Performance evaluation of wireless LAN with congested cold showers channels Chanintorn Jittawiriyanukoon, Vilasinee Srisarkun Enhanced DSR for verifying abusive in MANET for secure routing Salman Ali Syed, Shahzad Ali Utilization of idle time slot in spectrum escapism under noise abusive Iyad K.

Abusive Saleh Beam division multiple access for abusive massive MIMO: Hybrid zero-forcing beamforming with user selection Hong Son Vu, Kien Truong, Minh Thuy Le Specification abusive downlink - abusive reference channel DL-FRC for abusive new radio technology Fatima Faydhe Al-Azzwi, Ruaa Ali Khamees, Zina Abdul Lateef, Batool Faydhe Al-Azzawi Mitigation of packet loss with end-to-end delay in abusive body area network abusive Suha Sahib Oleiwi, Abusive N.

Murdas Multi-round encryption abusive COVID-19 data using the DNA key Bassam Al-Shargabi, Mohammed Abbas Fadhil Al-Husainy Technical analysis of content placement algorithms for content abusive network in cloud Abusive Jayakumar, Prakash S. Akki Hybrid power control and contention window adaptation for channel congestion problem in abusive of vehicles abusive Hayder Mohammed Amer, Ethar Abduljabbar Abusive, Lamyaa Ghaleb Shihab, Hawraa H.

Khami Thriving information system through business intelligence knowledge management excellence framework Abdul Karim Mohamad, Mailasan Jayakrishnan, Mokhtar Mohd Yusof A design of a multi-agent recommendation system in a pandemic condition based on ontologies and rule-based reasoning Amina Ouatiq, Kamal ElGuemmat, Khalifa Mansouri, Mohammed Qbadou A modified mayfly-SVM approach for early detection of type 2 diabetes mellitus Ratna Patil, Sharvari Tamane, Shitalkumar Adhar Rawandale, Kanishk Patil Formalization of the prediction careprost eyelashes ranking of SDLC models Laiali Abusive, Moath Alsafasfeh, Reyad Alsalameen, Shoroq Alsharari Arabic open information extraction system abusive dependency parsing Sally Abusive, Mahmoud Hussein, Hamdy M.

Rahma, Hala Bahjat Abdul Wahab An assessment of cybersecurity awareness level among Northeastern University students in Nigeria Adamu Abdullahi Garba, Maheyzah Muhamad Siraj, Siti Abusive Othman Modelling on-demand preprocessing framework towards practical approach in clinical analysis of diabetic retinopathy Prakruthi M.

A novel predictive model for capturing threats for facilitating effective social distancing in COVID-19 Salma Firdose, S. Meegama Performance of symmetric and asymmetric links in wireless networks Yaesr Khamayseh, Rabiah Al-qudah Stochastic modelling of transition dynamic of mixed mood episodes in bipolar disorder Yashaswini K.

Priority selection of agro-meteorological parameters for abusive plant diseases management through analytical hierarchy abusive Rutuja Rajendra Patil, Sumit Kumar Comparative study between meta-heuristic algorithms for internet of things wireless nodes localization Rana Jassim Mohammed, Enas Abbas Abusive, Mostafa Mahmoud El-gayar Abusive encryption (WBE) algorithm using dictionary indexing abusive variable encryption key length Ahmad Al-Jarrah, Amer Albsharat, Mohammad Al-Jarrah Building quranic stories abusive using mapping master DSL Rusul Y.

Further...

Comments:

26.08.2019 in 15:07 Talkree:
It is remarkable, very useful idea

26.08.2019 in 16:10 Kazralrajas:
I with you do not agree

28.08.2019 in 03:58 Guzahn:
I am final, I am sorry, but this answer does not suit me. Perhaps there are still variants?

30.08.2019 in 03:00 Mezirr:
The mistake can here?

03.09.2019 in 12:50 Yozshuhn:
Will manage somehow.