Review of Challenges in Big Data MiningAbdullah Alsulami View | Download | Full Text | DOI:10.21694/2572-2921.16005| Share This Article: |
Combining Iris Biometric System and Cryptography Provide a Strong Security AuthenticationAbdullah Alsulami, Darren Teo, Weiyi He View | Download | Full Text | DOI: 10.21694/2572-2921.16004| Share This Article: |
Reducing Sensors According to a vectors analysis of Stored Measurements (ReSeVA)Ammar Suhail Balouch View | Download | Full Text | DOI:10.21694/2572-2921.16003| Share This Article: |
Autonomic Cloud Services to Enhance Secure Data Services for Digital LibraryN.Raveendran,Dr.Antony Selvadoss Thanamani View | Download | Full Text | DOI:10.21694/2572-2921.16002| Share This Article: |
PCM Omars Algorithm: Parallel computation of Median- Omniscient Maximal Reduction StepsAmmar SuhailBalouch View | Download | Full Text | DOI: 10.21694/2572-2921.16001| Share This Article: |