Offering a one-stop reference, this book provides an understanding of the physical phenomena, ...
This book introduces novel research targeting technical aspects of protecting information securit...
User authentication is the process of verifying whether the identity of a user is genuine prior t...
Colonial conquest and subsequent introduction of diverse diseases has reshaped the destiny of ...
Power electronics, which is a rapidly growing area in terms of research and applications, uses mo...
This book constitutes the refereed proceedings of the First International Conference on Intellige...
This book constitutes the refereed proceedings of the Second International Conference on Intellig...
User authentication is the process of verifying whether the identity of a user is genuine prior t...
This book constitutes the refereed proceedings of the First International Conference on Intellige...
Increasing attention is being paid in recent years to exploit the biotechnological potential of a...
This book constitutes the refereed proceedings of the Second International Conference on Intel...