Your shopping cart is empty!
Hi there! Click one of our representatives below and we will get back to you as soon as possible.
Product Compare (0)
Security primitives are based on hard mathematical problems. Using hard AI problems for security is ..
Applications of Internet of Things underwater wireless sensor networks, such as imaging
Mobile Ad hoc Network (MANET) consists of mobile nodes which is connected without any centralized ad..
Mobile cellular networks have become both the generators and carriers of massive data. Big data anal..
This circuit is an electronic realization of the original -cell model equations which is achieved wi..
• The objective of the paper is to retrieve full-text in efficient and effective manner in unstructu..
The technology of sensor, pervasive computing, and intelligent information processing is widely us..
A novel two-stage approach for the important
cyber-security problem of detecting the presenc..
The hardware failure, software corruption and unfavorable operating environment among the diff..
First, the input image is loaded and then the image is filtered. Gaussian filter is used for filteri..
Packet dropping and modification are common attacks that can be launched by an adversary to disrupt ..
Underlying link-layer protocols of well-established wireless networks that use the conventional “sto..
An Ad-hoc network is a collection of mobile nodes dynamically forming a temporary network without th..
Cognitive radio technology allows the secondary user to access channel from the spectrum range witho..
Vehicular ad hoc networks (VANETs) is a type of wireless networks which plays a key role in the inte..