Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Mining user actions with fuzzy related data security conviction in cloud computing
https://iieta.org/sites/default/files/pdf/2019-06/201-212.pdf
Safety evaluation of blasting fly-rock based on unascertained measurement model
https://iieta.org/sites/default/files/pdf/2019-06/55-62.pdf
Vector control of brushless double fed generator based on control winding orientation on smooth switch from stand-alone mode to grid-tied mode
https://iieta.org/sites/default/files/pdf/2019-06/85-95.pdf
Design of different reference model based model reference adaptive controller for inversed model non-minimum phase system
https://iieta.org/sites/default/files/pdf/2019-06/04.02_02_0.pdf
Solar air collectors with doubles glazed by different distances in support of mass flow
https://iieta.org/sites/default/files/pdf/2019-06/37-53.pdf
Experimental investigation on heat transfer and friction factor for an inclined spherical ball roughened solar air heater
https://iieta.org/sites/default/files/pdf/2019-06/7-36.pdf
Permeability and mechanical properties of basalt fiber-reinforced concrete under magnesium sulfate corrosion
Comparison between cycle slip detection methods based on dual-frequency observation data
https://iieta.org/sites/default/files/pdf/2019-06/357-367.pdf
Study and development of innovative materials for hydrogen storage activity
Design and application of a wavelet neural network program for evaluation of goodwill value in corporate intellectual capital
https://iieta.org/sites/default/files/pdf/2019-06/185-200_0.pdf
Pages
« first
‹ previous
…
1512
1513
1514
1515
1516
1517
1518
1519
1520
…
next ›
last »