separate 发表于 2025-3-28 17:17:42
https://doi.org/10.1007/978-3-642-38070-9 redundancy and a huge amount of energy drainage within the network. Use of a head node for a cluster can be a better solution. The proposed algorithm creates several clusters, selects a cluster head, aggregates the data, and sends that to base station through other cluster heads. Simulation result提升 发表于 2025-3-28 21:38:57
http://reply.papertrans.cn/15/1454/145383/145383_42.pngFierce 发表于 2025-3-29 00:03:07
http://reply.papertrans.cn/15/1454/145383/145383_43.pngEntirety 发表于 2025-3-29 06:11:27
In-Memory Data Management Researchamework is proposed here to ensure availability of health-care resource to valid end users. This service is capable to reduce time complexity, bandwidth cost, and to increase accuracy and attack resistance capacity. Theoretical analysis shows its efficiency.Thyroid-Gland 发表于 2025-3-29 10:55:07
https://doi.org/10.1007/978-3-642-38070-9uckoo Search optimization. The developed technique has been applied on the real-world microarray dataset of Lung Adenocarcinoma for detection of genes which may be directly responsible for the cause of Lung Adenocarcinoma.切割 发表于 2025-3-29 15:07:36
https://doi.org/10.1007/978-3-642-38070-9y individual service providers as well as by a third party identity provider. The proposed two-factor authentication protocols uses password as the first factor and a Smart card or Mobile Phone as the second factor. The protocols are resistant to various known security attacks.OVERT 发表于 2025-3-29 18:14:00
In-Memory Data Management Research is distance vector protocol in nature. We have compared its lifetime with some other Fermat point based protocols and studied the effect of aggregation factor on cumulative delay for packet forwarding. Moreover, effect of increased transmission radius on the lifetime of the proposed protocol too was studied.温和女孩 发表于 2025-3-29 22:11:42
Book 2016Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumedithiolethione 发表于 2025-3-30 02:22:37
2194-5357 cations to provide design, analysis, and model for key areas.The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, IndiaDecimate 发表于 2025-3-30 04:56:08
Christian Groß,Björn Richerzhagen,Max Lehnf a users’ data protection, an encryption of keystrokes was implemented. A new method of a computer user profiling based on encrypted keystrokes is introduced. Additionally, an attempt to an intrusion detection based on the .-NN classifier is performed.