IJCT – Volume 11, Issue 4
A Comparative Analysis of Digital Forensics Models for Cybersecurity
Authors: Rajesh Kumar Goutam
Paper ID: IJCT-V11I4P1
Read Paper Google Scholar SearchA Survey of Machine Learning Techniques for Artificial Intelligence
Authors: Yogesh Rathod
Paper ID: IJCT-V11I4P2
Read Paper Google Scholar SearchPower Turbines Control, Part III: Wind Turbine Speed Control using PD-PI, PI-PD and 2DOF-3 Controllers Compared with a PI Controller
Authors: Galal Ali Hassaan
Paper ID: IJCT-V11I4P3
Read Paper Google Scholar SearchDigital Forensic Models Investigation with Cybersecurity
Authors: Rajesh Kumar Goutam
Paper ID: IJCT-V11I4P4
Read Paper Google Scholar SearchSubmit Your Paper
Interested in submitting your research paper to IJCT? We welcome submissions in various computer science and engineering domains. Share your findings and contribute to the advancement of scientific knowledge.
Submit Your Paper Now