Security System for Bit Data Cloud Computing Using Secure Dynamic Bit Standard.- Distributed DBSCAN Protocol for Energy Saving in IoT Networks.- Texture based Face Recognition Using Grasshopper Optimization Algorithm and Deep Convolutional Neural Network.- An Interactive Framework to Compare Multi-criteria Optimization Algorithms: Preliminary Results on NSGA- II and MOPSO.- Arabic Braille Numeral Recognition Using Residual Networks.- Comparative Analysis of LSTM, One-Class SVM, and PCA to Monitor Real-Time Malware Threats Using System Call Sequences and Virtual Machine Introspection.- Acceptance of Biometric Authentication Security Technology on Mobile Devices.- Automated Industrial Sound Power Alert System.- Predicting Early Readmission of Diabetic Patients: Towards Interpretable Models.- Design and Analysis of Mobile based Tourism Security Application: Concepts, Artifacts and Challenges.- On the Evaluation of Effectiveness of eLearning and Blended Learning.
This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 2 - 3 weeks of you placing an order.
Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.
Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:
ACT Metro: 2 working days
NSW Metro: 2 working days
NSW Rural: 2-3 working days
NSW Remote: 2-5 working days
NT Metro: 3-6 working days
NT Remote: 4-10 working days
QLD Metro: 2-4 working days
QLD Rural: 2-5 working days
QLD Remote: 2-7 working days
SA Metro: 2-5 working days
SA Rural: 3-6 working days
SA Remote: 3-7 working days
TAS Metro: 3-6 working days
TAS Rural: 3-6 working days
VIC Metro: 2-3 working days
VIC Rural: 2-4 working days
VIC Remote: 2-5 working days
WA Metro: 3-6 working days
WA Rural: 4-8 working days
WA Remote: 4-12 working days
Share This Book: