Part 1: Security Systems.- Chapter 1. A Lightweight Security Protocol for IoT using Merkle Hash Tree and Chaotic Cryptography.- Chapter 2. A Quantitative Methodology for Business Process-based Data Privacy Risk Computation.- Chapter 3. Architectural Design Based Compliance Verification for IoT Enabled Secure Advanced Metering Infrastructure in Smart Grid.- Chapter 4. A Novel Approach to Human Recognition Based on Finger Geometry.- Chapter 5. Biometric Fusion System Using Face and Voice Recognition.- Part 2: Pattern Recognition and Imaging.- Chapter 6. A Multi-Class Image Classifier for Assisting in Tumor Detection of Brain Using Deep Convolution Neural Network.- Chapter 7. Determining Perceptual Similarity Among Readers Based on Eyegaze Dynamics.- Part 3: High Performance Computing.- Chapter 8. 2D Qubit Placement of Quantum Circuits Using LONGPATH.- Chapter 9. Debugging Errors in Microfluidic Executions.- Chapter 10. Effect of Volumetric Split-Errors on Reactant-Concentration During Sample Preparation with Microfluidic Biochips.
"synopsis" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantCan't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!
Create a Want