Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
News / Announcements
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Forward modelling of circular loop source and calculation of whole area apparent resistivity based on TEM
https://iieta.org/sites/default/files/pdf/2019-06/183-198.pdf
Experiment and mechanism study on microbial improvement of dredger fill
https://iieta.org/sites/default/files/pdf/2019-06/189-208.pdf
From human collaboration control to semantic service contracts for information security
https://iieta.org/sites/default/files/pdf/2019-06/isi22_1_05_jaramillo.pdf
Deep learning based conventional neural network architecture for medical image classification
https://iieta.org/sites/default/files/pdf/2019-06/169-182.pdf
Collective ethics in multiagent systems
https://iieta.org/sites/default/files/pdf/2019-06/ria31_1-2_06_cointe.pdf
Simulation on the effects of various factors on the motion of ultrasonic cavitation bubble
https://iieta.org/sites/default/files/pdf/2019-06/04.04_06.pdf
Promotional effect of iron on the activity of TiO2 in the production of adipic acid
https://iieta.org/sites/default/files/pdf/2019-06/173-188.pdf
Deciding the consistency of combined qualitative constraint networks
https://iieta.org/sites/default/files/pdf/2019-06/ria31_1-2_05_cohen-solal.pdf
Trust modelling and measurements for the security of information systems
https://iieta.org/sites/default/files/pdf/2019-06/isi22_1_04-coste_isi.pdf
Evolution of digital detonators as an intelligent tool for control blasting in Indian mines
https://iieta.org/sites/default/files/pdf/2019-06/157-171.pdf
Pages
« first
‹ previous
…
1837
1838
1839
1840
1841
1842
1843
1844
1845
…
next ›
last »