Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
News / Announcements
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Protected strength approach for image steganography
https://iieta.org/sites/default/files/pdf/2019-06/175-181.pdf
Mechanical behavior study of abdominal aortic aneurysm created by the rat xenograft model
https://iieta.org/sites/default/files/pdf/2019-06/rcma27_1-2_45-56_print.pdf
Introduction
https://iieta.org/sites/default/files/pdf/2019-06/ria31_3_03_intro.pdf
Faster numerical weather forecasting using parallel computing with multi-mesh topology
https://iieta.org/sites/default/files/pdf/2019-06/04.02_01_0.pdf
Magnetic method used in geothermal reservoirs identification in Kasinan-Songgoriti, East Java, Indonesia
https://iieta.org/sites/default/files/pdf/2019-06/05.04_02_1.pdf
A novel human behaviour information coding method based on eye-tracking technology
https://iieta.org/sites/default/files/pdf/2019-06/153-173.pdf
Simulation of rock-breaking process of polycrystalline diamond compact bit under circumferential impact torque
https://iieta.org/sites/default/files/pdf/2019-06/299-311.pdf
Parameter optimization of micro ECDM process of borosilicate glass
https://iieta.org/sites/default/files/pdf/2019-06/05.02_03_0.pdf
Similar Metzler m otrix determination using non-smooth optimization
https://iieta.org/sites/default/files/pdf/2019-06/jesa50_1-2_07_chambon.pdf
Deep belief networks for phoneme recognition in continuous Tamil speech–an analysis
https://iieta.org/sites/default/files/pdf/2019-06/137-151_0.pdf
Pages
« first
‹ previous
…
1828
1829
1830
1831
1832
1833
1834
1835
1836
…
next ›
last »