Your shopping cart is empty!
Hi there! Click one of our representatives below and we will get back to you as soon as possible.
Product Compare (0)
Continuous authentication is mainly associated with the use of biometrics to guarantee that a resour..
computing provides massive computation power and storage capacity which enable
The development of the Internet of Things (IoT) has
made extraordinary progress in recent years in ..
We propose a privacy protection framework for large-scale content-based information retrieval. It o..
Advances in real-time location systems have enabled us to collect massive amounts of fine-grained se..
Cloud Computing arisen as a successful computing paradigm, because it allows hiring resources withou..
As an effective and efficient way to provide computing resources and services to customers on demand..
The advancement in wireless technologies in general and mobile devices capabilities in particular, u..
A system that utilizes process recommendation
technology to help design new business processes fro..
Device-to-Device (D2D) multicast communication is
emerging as a practical solution to alleviate se..
The purpose of this study is to identify important reduced input features in building IDS that is co..
Education sector has witnessed sea change in its functioning. Today it is recognized as an industry ..
Cloud services act as storage center in the health sector which enables the exchange of EHR among th..
Data Mining is a standout amongst the most
comprehensively and rousing zones of research with the