Part 1: Security Systems.- Chapter 1. A Lightweight Security Protocol for IoT using Merkle Hash Tree and Chaotic Cryptography.- Chapter 2. A Quantitative Methodology for Business Process-based Data Privacy Risk Computation.- Chapter 3. Architectural Design Based Compliance Verification for IoT Enabled Secure Advanced Metering Infrastructure in Smart Grid.- Chapter 4. A Novel Approach to Human Recognition Based on Finger Geometry.- Chapter 5. Biometric Fusion System Using Face and Voice Recognition.- Part 2: Pattern Recognition and Imaging.- Chapter 6. A Multi-Class Image Classifier for Assisting in Tumor Detection of Brain Using Deep Convolution Neural Network.- Chapter 7. Determining Perceptual Similarity Among Readers Based on Eyegaze Dynamics.- Part 3: High Performance Computing.- Chapter 8. 2D Qubit Placement of Quantum Circuits Using LONGPATH.- Chapter 9. Debugging Errors in Microfluidic Executions.- Chapter 10. Effect of Volumetric Split-Errors on Reactant-Concentration During Sample Preparation with Microfluidic Biochips.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
(nessuna copia disponibile)
Cerca: Inserisci un desiderataNon riesci a trovare il libro che stai cercando? Continueremo a cercarlo per te. Se uno dei nostri librai lo aggiunge ad AbeBooks, ti invieremo una notifica!
Inserisci un desiderata