| Issue | Title | |
| Vol 29, No 1: January 2023 | Priority-based market clearing model for off-grid P2P energy trading | Abstract PDF |
| Wan Azlan Wan Zainal Abidin, Alan Ling Sieng Yew | ||
| Vol 31, No 2: August 2023 | Privacy aware-based federated learning framework for data sharing protection of internet of things devices | Abstract PDF |
| Yuris Mulya Saputra, Ganjar Alfian | ||
| Vol 23, No 2: August 2021 | Privacy preserving association rule hiding using border based approach | Abstract PDF |
| Suma B., Shobha G. | ||
| Vol 16, No 2: November 2019 | Privacy preserving outsourcing algorithm for two-point linear boundary value problems | Abstract PDF |
| Nedal Mohammed, Laman R. Sultan, Santosh Lomte | ||
| Vol 37, No 2: February 2025 | Privacy preserving ZK-STARK based blockchain for agriculture food supply chain | Abstract PDF |
| Madhuri Sadashiv Arade, Nitin N. Pise | ||
| Vol 34, No 3: June 2024 | Privacy-preserving authentication approach for vehicular networks | Abstract PDF |
| Chindika Mulambia, Sudeep Varshney, Amrit Suman | ||
| Vol 36, No 3: December 2024 | Privacy-preserving data mining optimization for big data analytics using deep reinforcement learning | Abstract PDF |
| Wiranto Herry Utomo, Rosalina Rosalina, Afriyadi Afriyadi | ||
| Vol 4, No 1: October 2016 | Private Cloud Storage Using OpenStack with Simple Network Architecture | Abstract PDF |
| Albert Sagala, Ruth Marlina Hutabarat | ||
| Vol 34, No 2: May 2024 | Proactive ransomware prevention in pervasive IoMT via hybrid machine learning | Abstract PDF |
| Usman Tariq, Bilal Tariq | ||
| Vol 11, No 4: April 2013 | Probes Vacillating and Mapping Technique at Testing Micro-area Sheet Resistance | Abstract PDF |
| Zhihui Zhu, Xinfu Liu, Runli Zhang, Ruqing Zhang, Nan Jiang | ||
| Vol 21, No 1: January 2021 | Probing signals with ZACZ for GPRonboard of unmanned aerial vehicle | Abstract PDF |
| Roman N. Ipanov, Aleksey A. Komarov | ||
| Vol 36, No 3: December 2024 | Probing the depths: assessing the efficacy of the two-tier deception-driven security model | Abstract PDF |
| Anazel P. Gamilla, Thelma D. Palaoag, Marlon A. Naagas | ||
| Vol 16, No 1: October 2019 | Process Mining: Measuring Key Performance Indicator Container Dwell Time | Abstract PDF |
| Bambang Jokonowo, Riyanarto Sarno, Siti Rochimah, Bagus Priambodo | ||
| Vol 12, No 4: April 2014 | Process Model and Digitalization of the Coal Gas Outburst Prevention | Abstract PDF |
| Shao-jie Hou, Yu-wei Zhang, Yuan-ping Cheng | ||
| Vol 35, No 2: August 2024 | Processes monitoring using adaptive confidence limit based on T-S fuzzy model and Luenberger observer | Abstract PDF |
| Khaled Bouzenad, Salah Rahmouni, Messaoud Ramdani | ||
| 7006 - 7020 of 9072 Items | << < 463 464 465 466 467 468 469 470 471 472 > >> | |
