Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Journal of Telecommunication, Electronic and Computer Engineering (JTEC)
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Current
Archives
Publication Ethics & Malpractice
Announcements
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 3 No. 2
Vol. 3 No. 2
Published:
2015-09-01
Articles
Brain Lesion Segmentation from Diffusion-Weighted MRI Based on Adaptive Thresholding and Gray Level Co-Occurence Matrix
Norhashimah Mohd Saad, S.A.R Abu Bakar, Abdul Rahim Abdullah, Lizawati Salahuddin, Sobri Muda, Musa Mokji
1-13
PDF
Ray Tracing Algorithm for Specific Indoor Propagation Modeling
Juwita M.S, Ummi Syafiqah S., Mohd Riduan A.
15-21
PDF
Design of LNA at 5.8GHz with Cascode and Cascaded Techniques using T-Matching Network for WiMAX Applications
A.B Ibrahim, Hussain M.N, Othman A.R, Johal M.S
23-27
PDF
Automated Detecting Arcus Senilis, Symptom for Cholesterol Presence Using Iris Recognition Algorithm
R.A Ramlee, K.A Aziz, S. Ranjit, Mazran Esro
29-39
PDF
Current-Voltage Analysis of Nanoscale Planar and Vertical MOSFT Incorporating Dielectric Pocket
Z.A.F. M. Napiah, A.S Ja'afar, I. Saad, M.A Riyadi, R. Ismail
41-45
PDF
The Investigation of Polarozation Diversity in MIMO System at 2.4GHz
M.Z.A Abd Aziz, M.K.A Rahim, M.F.A Kadir, M.K Suaidi, Z. Daud, M.H Jamaluddin
47-54
PDF
Face Recognition using Fixed Spread Radial Basis Function Neural Network for Security System
Khairul Azha Abd Aziz, Rostam Affendi Hamzah, Shahrum Shah Abdullah, Ahmad Nizam Jahari, Siti Dhamirah 'Izzati Damni
55-59
PDF
Substrate Integrated Waveguide Filters based on Even-And Odd-Mode Predistortion Technique
Z. Zakaria, Ian C Hunter
61-71
PDF
300 GHz Detection Using High Electron Mobility Transistor (HEMT) as Sub-THz Detector
M.A Othman, I. Harrison
73-77
PDF
A Novel Voice Priority Queue (VPQ) Schedule and Algorithm for VoIP over WLAN Network
Kashif Nisar, Suhaidi Hassan, Mohammed M.Kadhum
79-94
PDF
Indexed by:
Make a Submission
Make a Submission
Keywords
Most Read
Credit Card Fraud Detection Using Machine Learning As Data Mining Technique
487
Information System Implementation Failure in Malaysian Government Hospitals: How Change Management Helps?
428
Fourth-Order Butterworth Active Bandpass Filter Design for Single-Sided Magnetic Particle Imaging Scanner
347
React Apps with Server-Side Rendering: Next.js
323
Hand-Gesture Recognition-Algorithm based on Finger Counting
297