Linked e-resources

Details

Part 1: Security Systems
Chapter 1. A Lightweight Security Protocol for IoT using Merkle Hash Tree and Chaotic Cryptography
Chapter 2. A Quantitative Methodology for Business Process-based Data Privacy Risk Computation
Chapter 3. Architectural Design Based Compliance Verification for IoT Enabled Secure Advanced Metering Infrastructure in Smart Grid
Chapter 4. A Novel Approach to Human Recognition Based on Finger Geometry
Chapter 5. Biometric Fusion System Using Face and Voice Recognition
Part 2: Pattern Recognition and Imaging
Chapter 6. A Multi-Class Image Classifier for Assisting in Tumor Detection of Brain Using Deep Convolution Neural Network
Chapter 7. Determining Perceptual Similarity Among Readers Based on Eyegaze Dynamics
Part 3: High Performance Computing
Chapter 8. 2D Qubit Placement of Quantum Circuits Using LONGPATH
Chapter 9. Debugging Errors in Microfluidic Executions
Chapter 10. Effect of Volumetric Split-Errors on Reactant-Concentration During Sample Preparation with Microfluidic Biochips.

Browse Subjects

Show more subjects...

Statistics

from
to
Export