Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Resource Based Attacks Security Using RPL Protocol in Internet of Things
https://iieta.org/sites/default/files/pdf/2022-03/27.01_20.pdf
Spam Mail Detection Using Optimization Techniques
https://iieta.org/sites/default/files/pdf/2022-03/27.01_19.pdf
Smart-Approach Based Internet of Things and Skyline Query for Multicriteria Decisions for Travel Services
https://iieta.org/sites/default/files/pdf/2022-03/27.01_12.pdf
Fine-Tuning BERT Based Approach for Multi-Class Sentiment Analysis on Twitter Emotion Data
https://iieta.org/sites/default/files/pdf/2022-03/27.01_11.pdf
Analysis of E-Commerce Process in the Downstream Section of Supply Chain Management Based on Process and Data Mining
https://iieta.org/sites/default/files/pdf/2022-03/27.01_10.pdf
Effective Intrusion Detection System Using Classifier Ensembles
https://iieta.org/sites/default/files/pdf/2022-03/27.01_18.pdf
Automatic Traffic Red-Light Violation Detection Using AI
https://iieta.org/sites/default/files/pdf/2022-03/27.01_09.pdf
Controller Modeling of a Quadrotor
https://iieta.org/sites/default/files/pdf/2022-03/27.01_03.pdf
A Comprehensive Review of Low Density Parity Check Encoder Techniques
https://iieta.org/sites/default/files/pdf/2022-03/27.01_02.pdf
A Survey on 6G Networks: Vision, Requirements, Architecture, Technologies and Challenges
https://iieta.org/sites/default/files/pdf/2022-03/27.01_01.pdf
Pages
« first
‹ previous
…
1116
1117
1118
1119
1120
1121
1122
1123
1124
…
next ›
last »