Preserving security and confidentiality in Wireless Sensor Networks (WSN) are crucial. Wireless sensor networks in comparison with wired networks are more substantially vulnerable to attacks and intrusions. In WSN, a third person can eavesdrop to the information or link to the network. So, preventing these intrusions by detecting them has ...Download Now
A new approach of using data mining tools for customer complaint management is presented in this paper. The association rule mining technique is applied to discover the relationship between different groups of citizens and different kinds of complainers. The data refers to citizens' complaints from the performance of municipality of ...Download Now
Many firms implemented various initiatives such as outsourced manufacturing which could make a Supply Chain (SC) more vulnerable to various types of disruptions. So managing risk has become a critical component of SC management. Different types of SC vulnerability management methodologies have been proposed for managing SC risk, most offer ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?