Linked e-resources

Details

Chapter 1. Analysis of Codon-usage-bias in Cya, Lef and Pag genes exists in px01 plasmid of Bacillus anthracis
Chapter 2. Constructing digital signature algorithm based on a new key scheme
Chapter 3. Internet of Things (IoT), Three Layer Architecture, Security Issues and Counter Measures
Chapter 4. Intermittent Leather Defect Detection based on Ensemble algorithms derived from Black Hat Transformation and Hough Transformation
Chapter 5. Efficient Strategies to Manage Road Traffic using Big Data Analytics
Chapter 6. Travel Booking and Management Application: TravelBel
Chapter 7. Security and Privacy Issues in Internet of Things
Chapter 8. Industry 4.0: An Overview and Further Research Directions
Chapter 9. A Comprehensive Survey on Trust Management in Fog Computing
Chapter 10. Personal Identification Using Fuzzy Approach and RSA Algorithm
Chapter 11. ICT and Administrative Reforms: A literature review
Chapter 12. Analysis of Fault Tolerance Techniques in Virtual Machine Environment
Chapter 13. Analysis of Symmetric and Asymmetric Key Algorithms
Chapter 14. A Hybrid Approach for retrieving geographic information in Wireless Environment using Indexing Technique
Chapter 15. A Survey on Human Action Recognition and Detection Techniques.

Browse Subjects

Show more subjects...

Statistics

from
to
Export