Your shopping cart is empty!
Hi there! Click one of our representatives below and we will get back to you as soon as possible.
Product Compare (0)
Complaints are a valuable source of feedback to improve the
infrastructure and condition of our cit..
are also a number of works on data hiding in the encrypted domain. The
density, natural and man-made disasters make public safety a problem of grow..
this paper, we use the three-axis accelerometer of an Android-based smartphone
Android is open source based Linux kernel operating system mostly
designed for touchscreen for mobi..
In information security image steganography is one of the information securing process. Image stegan..
With the advent of the World Wide Web and the emergence of e-commerce applications and social networ..
Healthcare is a one of the developing technology within the pervasive compu..
Self-security through GPS based protection system is a security application which is specially desig..
— Sensors on (or attached to) mobile phones can
enable attractive sensing applications in different..
A “Smart Appointment Scheduling System” is aimed to develop to maintain the day-to-day state of a..
Google Cloud Messaging (GCM) is a free service that enables users to send messages between servers a..
Due to the existence of many useful applications, people are sharing billions of photos taken by sma..
Android voting system is an application developed for android devices to
deploy an easy and flexibl..
This project aimed to develop an online super market prototype selling mainly product on the Interne..