-
121
-
122
-
123
-
124
-
125
-
126
Channel selection strategies for co-existence between wimax and wifi
Published 2009Get full text
Thesis -
127
-
128
Fuzzy logic application to searchable cryptography
Published 2020“…Besides, some PEKS schemes are not secure mainly because they are vulnerable to Off-line Keyword Guessing Attack (OKGA). This research paper incorporates with Mamdani Fuzzy Inference System to PEKS for supporting Fuzzy Keyword Search. …”
Get full text
Conference or Workshop Item -
129
-
130
-
131
Governance of heritable human gene editing world-wide and beyond
Published 2022Get full text
Article -
132
-
133
-
134
-
135
-
136
Controlling tunnel induced ground surface and pile movements using micropiles
Published 2024Subjects: Get full text
Thesis -
137
-
138
Modified shipping containers for transitional shelter construction
Published 2023Get full text
Thesis -
139
-
140