Your shopping cart is empty!
Hi there! Click one of our representatives below and we will get back to you as soon as possible.
Product Compare (0)
Intrusion detection is an important role in implementing and enforcing an organizational security po..
A new very large scale integration (VLSI) algorithmic rule for a 2N length discrete hartley transfor..
A hybrid wireless network is an integration of mobile wireless ad-hoc network (MANETs) and wireless ..
The P2P protocol can be divided into two categories: Detection based on the Protocol Feature codes (..
Pan-sharpening is a common post processing operation for captured multispectral satellite imagery, w..
A power efficient reconfigurable output-capacitorless (OCL) low-drop-out (LDO) voltage regulator for..
novel signal-specific power-efficient
analog-to-digital converter (ADC) is proposed for sensorinter..
We propose a privacy protection framework for large-scale content-based information retrieval. It o..
Wireless Sensor Networks (WSNs) in delay and reliability critical environments is highly desired due..
Device-to-Device (D2D) multicast communication is
emerging as a practical solution to alleviate se..
The purpose of this study is to identify important reduced input features in building IDS that is co..
Cloud services act as storage center in the health sector which enables the exchange of EHR among th..
In this paper, we propose a methodology for embedding a color image data into a file and vice versa...
ABSTRACT Packet Classification is one of the