-
121
-
122
-
123
-
124
-
125
-
126
-
127
-
128
-
129
Channel selection strategies for co-existence between wimax and wifi
Published 2009Get full text
Thesis -
130
-
131
Fuzzy logic application to searchable cryptography
Published 2020“…Besides, some PEKS schemes are not secure mainly because they are vulnerable to Off-line Keyword Guessing Attack (OKGA). This research paper incorporates with Mamdani Fuzzy Inference System to PEKS for supporting Fuzzy Keyword Search. …”
Get full text
Conference or Workshop Item -
132
-
133
-
134
Governance of heritable human gene editing world-wide and beyond
Published 2022Get full text
Article -
135
-
136
-
137
-
138
-
139
Controlling tunnel induced ground surface and pile movements using micropiles
Published 2024Subjects: Get full text
Thesis -
140