Power electronics, which is a rapidly growing area in terms of research and applications, uses mo...
This book introduces novel research targeting technical aspects of protecting information securit...
This book constitutes the refereed proceedings of the First International Conference on Intellige...
This book constitutes the refereed proceedings of the Second International Conference on Intellig...
Offering a one-stop reference, this book provides an understanding of the physical phenomena, ...
User authentication is the process of verifying whether the identity of a user is genuine prior t...
User authentication is the process of verifying whether the identity of a user is genuine prior t...
Colonial conquest and subsequent introduction of diverse diseases has reshaped the destiny of ...
User authentication is the process of verifying whether the identity of a user is genuine prior t...
This book introduces novel research targeting technical aspects of protecting information secu...
This book constitutes the refereed proceedings of the First International Conference on Intellige...