Your shopping cart is empty!
Hi there! Click one of our representatives below and we will get back to you as soon as possible.
Product Compare (0)
Searchable encryption has received a significant attention from the research community with various ..
Active Learning of Constraints for Semi-Supervised Clustering. Semi-supervised clustering aims to im..
Payroll system can be used to speed up the process of calculating pay, ensuring that payments are bo..
Voting system Using Multi level Password aims at providing a facility to cast vote for critical and ..
The Warehouse Management System is a real-time warehouse database capable of handling large inventor..
Internet of Things (IoTs) has emerged to motivate various intelligent applications based on
In problem of production plans, named k-most
A navigation scheme that utilizes the road information collected by a vehicular ad hoc network (VANE..
The advantages and principles of the
Classification of large datasets is an important data mining problem. Many classification algorithms..
High-profile, and often destructive Distributed Denial of Service (DDoS) attacks continue to be one ..
Most existing data mining algorithms apply data-driven data mining technologies. The major disadvant..
Nowadays security and privacy issues take a major role in multi-agent system. Mostly multi-agent sys..
We presented the architecture, design, and evaluation of the Cloud Coordinator element from the Inte..