Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Causal Analysis of Accidents During Wind Power Engineering Construction Using Bayesian Networks
https://iieta.org/sites/default/files/pdf/2024-03/ijsse_14.01_30.pdf
Winters’ Multiplicative Model Based Analysis of the Development and Prospects of New Energy Electric Vehicles in China
https://iieta.org/sites/default/files/pdf/2024-03/rces_11.01_01.pdf
The Social Network Dilemma: Safeguarding Privacy and Security in an Online Community
https://iieta.org/sites/default/files/pdf/2024-03/ijsse_14.01_12.pdf
Evaluating Performances of Two Unsupervised Methods for Classification Crime Text
https://iieta.org/sites/default/files/pdf/2024-03/ijsse_14.01_16.pdf
Genetic Crossover at the RNA Level for Secure Medical Image Encryption
https://iieta.org/sites/default/files/pdf/2024-03/ijsse_14.01_20_0.pdf
Network Master Node Assessed Trust Factor with Arbitrary Neighbor Assessment for Secure Route Detection in 6G Enabled Wireless Sensor Networks
https://iieta.org/sites/default/files/pdf/2024-03/ijsse_14.01_11.pdf
Simultaneous Botnet Attack Detection Using Long Short Term Memory-Based Autoencoder and XGBoost Classifier
https://iieta.org/sites/default/files/pdf/2024-03/ijsse_14.01_15_0.pdf
Spurious Trip Rate Optimization Using Particle Swarm Optimization Algorithm
https://iieta.org/sites/default/files/pdf/2024-03/ijsse_14.01_06_0.pdf
Urban Safety is a Tool for Containing Slums to Reach a Sustainable Urban Structure
https://iieta.org/sites/default/files/pdf/2024-03/ijsse_14.01_19_0.pdf
Biometric Identification for a Secured Environment Using AI-Based Facial Recognition
https://iieta.org/sites/default/files/pdf/2024-03/ijsse_14.01_18.pdf
Pages
« first
‹ previous
…
192
193
194
195
196
197
198
199
200
…
next ›
last »