It including: Methods of detection of Improvised Explosives (IE). Methods of detection of Improvised explosives devices (IED). ...
Continue reading
This comprehensive monograph deals with detectors, signal processors and related noise phenomena. Detailed quantitative analyses ...
Continue reading
This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Continue reading
This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Continue reading
This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
Continue reading
This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
Continue reading
This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
Continue reading
The organization of an Advanced Research Workshop with the title “Detection and Disposal of Liquid Explosives and Flammable ...
Continue reading
Determinantal ideals are ideals generated by minors of a homogeneous polynomial matrix. Some classical ideals that can be ...
Continue readingIn DevOps for Digital Leaders, deep collective experience on both sides of the dev–ops divide informs the global thought ...
Continue reading
As Ambient Intelligence (AmI) ecosystems are rapidly becoming a reality, they raise new research challenges. Unlike predefined ...
Continue reading
The research papers included in the AmI.d proceedings are devoted to both theoretical and applied research, cover the most ...
Continue reading
This book is for developers of wireless Internet services. It addresses the technical issues that can get in the way of the ...
Continue readingTo solve the problem of congestion in bus stops for students, members of the administrative and educational people at the ...
Continue readingMetaverse is the virtual world in which humans can see each other in the form of 3D and communicate with each other in a ...
Continue readingThis study is about developing a secure, autoscaling military postponement e-service in Syria, that allows Syrian citizens ...
Continue reading
The book examines the methodological challenges in analyzing the effectiveness of development policies. It presents a selection ...
Continue reading
The last decade has seen a rapid extension of electronic control devices for various types of technical products. In modern ...
Continue readingDue to high water content of hydrogel (wetting) and due to extended drug release comparing to ophthalmic solution and higher ...
Continue readingThis book intends to bring together systems and molecular approaches on various fundamental issues on thalamocortical development ...
Continue reading