Sensorless Direct Torque Control of Induction Machine with MRAS Speed Estimator
|
ChialiEl Mehdi, MassoumAhmed, MeroufelAbdelkader, GuebliAbderrahmane
|
pp.
8-13
|
DOI:
10.5923/j.computer.20130301.02 21429 Views 17073 Downloads
|
|
The Study of Fraud Detection in Financial and Credit Institutions with Real Data
|
SevdaSoltaniziba, MohammadAli Balafar
|
pp.
30-36
|
DOI:
10.5923/j.computer.20150502.02 13872 Views 11029 Downloads
|
|
Implementing Granular Access Definitions in Log Records
|
Sandeep Jayashankar, Subin Thayyile Kandy
|
pp.
22-30
|
DOI:
10.5923/j.computer.20201001.03 16425 Views 10679 Downloads
|
|
Understanding Blockchain Technology
|
Simanta Shekhar Sarmah
|
pp.
23-29
|
DOI:
10.5923/j.computer.20180802.02 15989 Views 10659 Downloads
|
|
Data and Information Security in Modern World by using Elliptic Curve Cryptography
|
Obaidur Rahaman
|
pp.
29-44
|
DOI:
10.5923/j.computer.20170702.01 10251 Views 7907 Downloads
|
|
New Chaos-Based Image Encryption Scheme for RGB Components of Color Image
|
NashwanA. Al-Romema, AbdulfatahS. Mashat, IbrahimAlBidewi
|
pp.
77-85
|
DOI:
10.5923/j.computer.20120205.06 14190 Views 7018 Downloads
|
|
Digital Movements Images Restoring by Artificial Neural Networks
|
HajjiTarik, MohcineKodad, Jaara El Miloud
|
pp.
36-42
|
DOI:
10.5923/j.computer.20140402.02 8977 Views 6631 Downloads
|
|
Testing Randomness: The Original Poker Approach Acceleration Using Parallel MATLAB with OpenMP
|
WaelM. F. Abdel-Rehim, IsmailA. Ismail, EhabMorsy
|
pp.
25-29
|
DOI:
10.5923/j.computer.20150502.01 9212 Views 6560 Downloads
|
|
A New Method for Ciphering a Message Using QR Code
|
Sawsan K. Thamer, Basheer N. Ameen
|
pp.
19-24
|
DOI:
10.5923/j.computer.20160602.01 12755 Views 5510 Downloads
|
|