Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Isolation of Wormhole Attackers in IOV Using WPWP Packet
https://www.iieta.org/sites/default/files/pdf/2019-08/33.01_02_0.pdf
IBLIND Quantum Computing and HASBE for Secure Cloud Data Storage and Accessing
https://www.iieta.org/sites/default/files/pdf/2019-08/33.01_06.pdf
Knowledge Text Classification Based on Virtual Category Tree
https://www.iieta.org/sites/default/files/pdf/2019-08/33.01_03.pdf
Design of a Fire Detection System Based on Four-rotor Aircraft
https://www.iieta.org/sites/default/files/pdf/2019-08/33.01_07.pdf
Recognition of the Purchasing Intentions of WeChat Users Based on Forgetting Curve
https://www.iieta.org/sites/default/files/pdf/2019-08/33.01_11_0.pdf
Type-1 and Type-2 fuzzy Sets to Control a Nonlinear Dynamic System
https://www.iieta.org/sites/default/files/pdf/2019-08/33.01_01.pdf
Design and Application of Face Recognition Algorithm Based on Improved Backpropagation Neural Network
https://www.iieta.org/sites/default/files/pdf/2019-08/33.01_05.pdf
Accurate Positioning of License Plate in Video Stream Based on Concatenated Convolutional Neural Network
https://www.iieta.org/sites/default/files/pdf/2019-08/06.02_03.pdf
Research on Service Quality of "12306 China Railway" Mobile Ticketing Software
https://www.iieta.org/sites/default/files/pdf/2019-08/06.02_02.pdf
Implementation of Entropy-based Distributed Denial of Service Attack Detection Method in Multiple POX Controllers
https://www.iieta.org/sites/default/files/pdf/2019-08/06.02_01.pdf
Pages
« first
‹ previous
…
1776
1777
1778
1779
1780
1781
1782
1783
1784
…
next ›
last »