|
Issue |
Title |
|
Vol 12, No 1: February 2022 |
Word-based encryption algorithm using dictionary indexing with variable encryption key length |
Abstract
PDF
|
Ahmad Al-Jarrah, Amer Albsharat, Mohammad Al-Jarrah |
|
Vol 8, No 2: April 2018 |
Workflow Scheduling Techniques and Algorithms in IaaS Cloud: A Survey |
Abstract
PDF
|
K. Kalyana Chakravarthi, Vaidhehi Vijayakumar |
|
Vol 13, No 1: February 2023 |
Working with cryptographic key information |
Abstract
PDF
|
Nurullaev Mirkhon Mukhammadovich, Aloev Rakhmatillo Djuraevich |
|
Vol 6, No 6: December 2016 |
WWLLN Data Cluster Analysis Methods for Lightning-Caused Forest Fires Monitoring |
Abstract
PDF
|
Baranovskiy Nikolay, Krechetova Svetlana, Belikova Marina, Perelygin Anton |
|
Vol 5, No 5: October 2015 |
XML and Semantics |
Abstract
PDF
|
Mohammad Moradi, MohammadReza Keyvanpour |
|
Vol 12, No 2: April 2022 |
X-ware: a proof of concept malware utilizing artificial intelligence |
Abstract
PDF
|
Thanh Cong Truong, Jan Plucar, Bao Quoc Diep, Ivan Zelinka |
|
Vol 10, No 5: October 2020 |
Y2O3:Ho3+ and ZnO:Bi3+: a selection for enhancing color quality and luminous flux of WLEDs |
Abstract
PDF
|
Nguyen Thi Phuong Loan, Nguyen Doan Quoc Anh |
|
6001 - 6007 of 6007 Items |
<< < 396 397 398 399 400 401 |