Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Design of a Privacy-Preserving Algorithm for Peer-to-Peer Network Based on Differential Privacy
https://www.iieta.org/sites/default/files/pdf/2019-10/24.04_11_1.pdf
The Ability to Think Creatively on SSCS Using Schoology Apps, How is the Student’s Language Metacognitive Awareness?
https://www.iieta.org/sites/default/files/pdf/2019-10/24.04_02_0.pdf
A Fast Algorithm for Particle Stacking
https://www.iieta.org/sites/default/files/pdf/2019-10/24.04_03_0.pdf
A Novel Privacy Protection Protocol for Vehicular Ad Hoc Networks Based on Elliptic Curve Bilinear Mapping
https://www.iieta.org/sites/default/files/pdf/2019-10/24.04_06.pdf
An Improved Energy-Efficient Cluster Routing Protocol for Wireless Sensor Network
https://www.iieta.org/sites/default/files/pdf/2019-10/24.04_09.pdf
Estimation of Neural Sources from EEG Measurements Using Sequential Monte Carlo Method
https://www.iieta.org/sites/default/files/pdf/2019-10/24.04_08_0.pdf
Cryptanalysis of a Pseudorandom Generator for Cross-Border E-Commerce
https://www.iieta.org/sites/default/files/pdf/2019-10/24.04_01.pdf
An Evolving Hybrid Deep Learning Framework for Legal Document Classification
https://www.iieta.org/sites/default/files/pdf/2019-10/24.04_10.pdf
Design of a Reliable Current Starved Inverter Based Arbiter Physical Unclonable Functions (PUFs) for Hardware Cryptography
https://www.iieta.org/sites/default/files/pdf/2019-10/24.04_13.pdf
Feature Extraction Techniques in Associate with Opposition Based Whale Optimization Algorithm
https://www.iieta.org/sites/default/files/pdf/2019-11/24.04_07.pdf
Pages
« first
‹ previous
…
1753
1754
1755
1756
1757
1758
1759
1760
1761
…
next ›
last »