Your shopping cart is empty!
Hi there! Click one of our representatives below and we will get back to you as soon as possible.
Product Compare (0)
Cloud computing is an Internet-based computing
pattern through which shared resources are provided..
Individual wellbeing record is a developing patient-driven model of wellbeing data trade, which is r..
Internet worm means separate malware computer programs that repeated itself and in order to spread o..
The kernelized fuzzy c-means algorithm uses kernel methods to improve the clustering performance of ..
In this paper, we propose a new concept for human identification (ID): sclera recognition. The blood..
Dengue viruses are members of the Flaviviridae, transmitted principally in a cycle involving humans ..
Temporal data contain time-stamping information
that affects the results of data mining. Traditiona..
In networking, Lots of routing mechanisms in the Internet network have been based on single-shortest..
Addressing key management in mobile multicast communication is currently a booming topic due to the ..
Ontologies are structures, used for knowledge representation, which model domain knowledge in the fo..
Continuous blood pressure (BP) estimation
using pulse transit time (PTT) is a promising method for ..
Integrity constraint based data repairing is an iterative process consisting of two parts: detect an..
Over the last decade, cloud computing has emerged as a popular model for distributed, efficient and ..
There are a number of research challenges
associated with Internet of Things (IoT) security, and on..