温和女孩 发表于 2025-3-26 21:02:58

https://doi.org/10.1007/978-3-319-24424-2opment time, launch cost, and small size made them very attractive for the challenging environment of space. However, communication between CubeSats and the earth request the development of high-data-rate, compact and credible RF subsystems, which must include an antenna with excellent radiation cha

GNAW 发表于 2025-3-27 01:16:13

http://reply.papertrans.cn/15/1457/145684/145684_32.png

Exclaim 发表于 2025-3-27 09:06:13

http://reply.papertrans.cn/15/1457/145684/145684_33.png

和蔼 发表于 2025-3-27 11:50:38

http://reply.papertrans.cn/15/1457/145684/145684_34.png

现晕光 发表于 2025-3-27 15:47:02

https://doi.org/10.1007/978-1-137-09870-2DNA cryptographic operations which are used for compressing and encrypting together for an image. Usually, the image encryption techniques has more focused towards the providing security while there is a still room for an improvement in computational speed. An efficient approach for achieving higher

被诅咒的人 发表于 2025-3-27 18:51:42

https://doi.org/10.1007/978-1-137-09870-2ode and data alone, but these days software developers combine these techniques to protect code and data which in turn increases the complexity of reverse engineering. Data obfuscation is used to protect personally identifiable information or sensitive information used in military applications. Data

obscurity 发表于 2025-3-28 01:12:37

http://reply.papertrans.cn/15/1457/145684/145684_37.png

Apraxia 发表于 2025-3-28 03:33:15

http://reply.papertrans.cn/15/1457/145684/145684_38.png

舞蹈编排 发表于 2025-3-28 08:41:01

http://reply.papertrans.cn/15/1457/145684/145684_39.png

Ambulatory 发表于 2025-3-28 14:16:52

http://reply.papertrans.cn/15/1457/145684/145684_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Advanced Informatics for Computing Research; Third International Ashish Kumar Luhach,Dharm Singh Jat,Pawan Lingras Conference proceedings