triptans 发表于 2025-3-23 12:20:05

Evaluation of a Security Policy Based on OrBAC Model Using MotOrBAC: Application E-learning people are taking online courses. It becomes the need of the hour, since it is being used as a big platform for enhancing and upgrading knowledge by increasing flexibility in various fields and providing ways to make learning easier. However E-learning has several challenges, one of these major cha

CHARM 发表于 2025-3-23 15:09:29

A New Shared and Comprehensive Tool of Cloud Computing Security Risk Assessmenteir users. Despite the fact that cloud computing offers many cost benefits for their cloud users, number of security risk are emerging in association with cloud usage that need to be assessed. Assessing risk in Cloud computing environment remains an open research issue. This paper presents a compreh

发表于 2025-3-23 20:39:22

The Behavior of CPW-Fed Slotted Cantor Set Fractal Antenna an Ultra Wide Band (UWB) behavior and important gains. Also, the setup of slots allows having more lower resonant frequencies and therefore designing miniaturized antennas with good performances..All the simulations were performed with FEKO 6.3.

玉米棒子 发表于 2025-3-23 22:14:28

http://reply.papertrans.cn/16/1501/150058/150058_14.png

捏造 发表于 2025-3-24 02:34:28

High Sensitive and Efficient Circular Polarized Rectenna Design for RF Energy Harvesting at 5.8 GHzloped structure is suitable to harvest RF energy at 5.8GHz ISM frequency band for powering devices involving low power consumption, located in unreachable area or needing expensive maintenance costs. The proposed design incorporate a 2 × 2 circular polarized antenna array with an enhanced directivit

主动 发表于 2025-3-24 07:31:58

http://reply.papertrans.cn/16/1501/150058/150058_16.png

美丽的写 发表于 2025-3-24 13:36:10

http://reply.papertrans.cn/16/1501/150058/150058_17.png

Lumbar-Spine 发表于 2025-3-24 17:44:48

Evaluation of a Security Policy Based on OrBAC Model Using MotOrBAC: Application E-learningtrol) model which is considered as one of the most developed access control security models, to improve the highest degree of security in a concrete e-learning scenario for educational purpose, and to prove how the expressive power and flexibility of this model work. The proposed approach is impleme

granite 发表于 2025-3-24 23:02:50

http://reply.papertrans.cn/16/1501/150058/150058_19.png

惰性女人 发表于 2025-3-24 23:22:32

Sociology of the Sciences - Monographswest power to transmit their packets among . available levels whereas the followers retransmit at the random power levels picked from . higher distinct. Furthermore, we investigate the impact of the implementation of our scheme on the equilibrium and discuss the optimal partition of leaders/follower
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Advances in Ubiquitous Networking; Proceedings of the U Essaïd Sabir,Hicham Medromi,Mohamed Sadik Conference proceedings 2016 Springer Scie