Your shopping cart is empty!
Hi there! Click one of our representatives below and we will get back to you as soon as possible.
Honey pot is a trap set to detect, capture, or in some manner, counteract
attempts at unauthorized ..
Internet of Things (IoTs) has emerged to motivate various intelligent applications based on
In problem of production plans, named k-most
Classification of large datasets is an important data mining problem. Many classification algorithms..
High-profile, and often destructive Distributed Denial of Service (DDoS) attacks continue to be one ..
Most existing data mining algorithms apply data-driven data mining technologies. The major disadvant..
Nowadays security and privacy issues take a major role in multi-agent system. Mostly multi-agent sys..
We presented the architecture, design, and evaluation of the Cloud Coordinator element from the Inte..
Wind power forecasting (WPF) is significant to guide
the dispatching of grid and the production pla..
A family tree is a chart representing family relationships in a conventional structure. The concept ..
Cloud computing has become a new age technology that has got huge potentials in enterprises and mark..
Virtualization is an essential step before a baremetal data center being ready for commercial usage,..
The Machine Learning (ML) field has gained its momentum in almost any domain of research and just re..
Mobile vision services are a type of mobile ITS applications that emerge with increased miniaturizat..
The electronic representation of a contract for a business-to-business (B2B) partnership should be s..