CORE 发表于 2025-3-28 18:16:00

http://reply.papertrans.cn/15/1479/147852/147852_41.png

KIN 发表于 2025-3-28 19:03:04

http://reply.papertrans.cn/15/1479/147852/147852_42.png

Default 发表于 2025-3-29 02:59:17

http://reply.papertrans.cn/15/1479/147852/147852_43.png

Migratory 发表于 2025-3-29 04:23:25

Palgrave Development Studies Serieshe heterogeneous connectivity,smaller size, memory, storage and less security measurement, it is easy to hack and manipulate the IoT devices. To have a safe and secured connection, it is a must to ensure the data security in IoT too. This research proposes a novel method to secure the IoT devices using blockchain technology.

BALK 发表于 2025-3-29 09:51:50

http://reply.papertrans.cn/15/1479/147852/147852_45.png

Provenance 发表于 2025-3-29 14:39:52

https://doi.org/10.1007/978-981-15-8538-8 quality of performance of the system considered. This method is very powerful than other methods with single objectives considered such as makespan, utilization of resources, violation of deadline rate and cost.

详细目录 发表于 2025-3-29 16:09:46

http://reply.papertrans.cn/15/1479/147852/147852_47.png

出没 发表于 2025-3-29 23:18:09

http://reply.papertrans.cn/15/1479/147852/147852_48.png

neutral-posture 发表于 2025-3-30 00:38:55

http://reply.papertrans.cn/15/1479/147852/147852_49.png

BET 发表于 2025-3-30 07:16:05

Juan Carlos Velasco,MariaCaterina La Barberaresolve the issue of routing and mobility for better route selection in a wireless network. The performance results compared with the well-known existing wireless ad hoc routing protocols based on the packet delivery ratio (PDR), delay and throughput metrics. A fuzzy mobility-based selection gives b
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Advances in Distributed Computing and Machine Learning; Proceedings of ICADC Asis Kumar Tripathy,Mahasweta Sarkar,Suchismita Ch Conference