Loading Now

IJCT – Volume 11, Issue 4

A Comparative Analysis of Digital Forensics Models for Cybersecurity

Authors: Rajesh Kumar Goutam

Paper ID: IJCT-V11I4P1

Read Paper Google Scholar Search

Power Turbines Control, Part III: Wind Turbine Speed Control using PD-PI, PI-PD and 2DOF-3 Controllers Compared with a PI Controller

Authors: Galal Ali Hassaan

Paper ID: IJCT-V11I4P3

Read Paper Google Scholar Search

Submit Your Paper

Interested in submitting your research paper to IJCT? We welcome submissions in various computer science and engineering domains. Share your findings and contribute to the advancement of scientific knowledge.

Submit Your Paper Now