A Survey of Reversible Data Hiding Schemes Based on Two-dimensional Histogram Modification.- Steganographic Image Hiding Schemes Based on Edge Detection.- A New Data Hiding Strategy Based on Pixel-Value-Differencing Method.- Data Hiding Scheme Based on Regular Octagon-shaped Shells.- A Web Page Watermarking Method using Hybrid Watermark Hiding Strategy.- Integrated Health Check Report Analysis and Tracking Platform.- A Study of the Multi-Organization Integrated Electronic Attendance System.- A Content Analysis of Mobile Learning on Constructivism Theory.- An Independence Mechanism Design for the Software Defined Device.- An Ontology-based Herb Therapy Recommendation for Respiration System.- Robust Optimal Control Technology for Multimedia Signal Processing Applications.- Implementation of an eBook Reader System with the Features of Emotion Sensing and Robot Control.- On the Automatic Construction of Knowledge-Map from Handouts for MOOC Courses.- Automated Music Composition Using Heart Rate Emotion Data.- Inter-Vehicle Media Distribution for Driving Safety.- High-capacity ECG Steganography with Smart Offset Coefficients.- An Automatic People Counter in Stores Using a Low-cost IoT Sensing Platform.- Determination of Coefficient of Thermal Expansion in High Power GaN-based Light-emitting Diodes via Optical Coherent Tomography.- Compression-efficient Reversible Data Hiding in Zero Quantized Coefficients of JPEG Images.- On the Security of a Certificateless Public Key Encryption with Keyword Search.- DCT-based Compressed Image with Reversibility using Modified Quantization.- Studying the Influence of Tourism Flow on Foreign Exchange Rate by IABC and Time-Series Models.- Short-term Forecasting on Technology Industry Stocks Return Indices by Swarm Intelligence and Time-Series Models.- Image Segmentation for Lung Lesions using Ant Colony Optimization Classifier in Chest CT.- SURF Algorithm-based Panoramic Image Mosaic Application.- Simulation of Long-distance Aerial Transmissions for Robust Audio Data Hiding.- Variable-Length Key Implementation Based on Complex Network WSN Clustering.- An Infrared Small Target Detection Method based on Block Compressed Sensing.- An Encryption Algorithm for ROI Images.
This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 2 - 3 weeks of you placing an order.
Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.
Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:
ACT Metro: 2 working days
NSW Metro: 2 working days
NSW Rural: 2-3 working days
NSW Remote: 2-5 working days
NT Metro: 3-6 working days
NT Remote: 4-10 working days
QLD Metro: 2-4 working days
QLD Rural: 2-5 working days
QLD Remote: 2-7 working days
SA Metro: 2-5 working days
SA Rural: 3-6 working days
SA Remote: 3-7 working days
TAS Metro: 3-6 working days
TAS Rural: 3-6 working days
VIC Metro: 2-3 working days
VIC Rural: 2-4 working days
VIC Remote: 2-5 working days
WA Metro: 3-6 working days
WA Rural: 4-8 working days
WA Remote: 4-12 working days
Share This Book: