搜寻 发表于 2025-3-30 11:38:15

https://doi.org/10.1007/978-3-030-66022-2em immune to many attacks. The technique was implemented on Raspberry Pi 3, and its performance analysis was done. The relation between text size and encryption/decryption time was found approximately linear, which can be interpreted as being more efficient for smaller files as compared to the relat

CLOUT 发表于 2025-3-30 14:11:05

Mrs Thatcher and the Trident C-4 Decision,stematic sampling-based big data mining model through the K-means clustering that is known as SYK-means (systematic sampling-based K-means). The experimental results of the SYK-means algorithm are compared with the RSK-means (random sampling-based K-means) and classical K-means algorithms concerning

GUILE 发表于 2025-3-30 17:15:39

http://reply.papertrans.cn/17/1624/162325/162325_53.png

Extort 发表于 2025-3-30 21:59:41

,Simulated Annealing-Based Time–Cost Trade-Off Model for Construction Projects,ure of hyper-volume and results comparisons of proposed model with genetic algorithm-based TCT model demonstrate the efficiency of proposed model. Besides, the developed model is expected to be beneficial in making the decision about time–cost of project.

填料 发表于 2025-3-31 03:29:43

http://reply.papertrans.cn/17/1624/162325/162325_55.png

哑剧 发表于 2025-3-31 07:44:59

Optimization of Congo Red Dye by Iron Oxide@AC,val efficiency (98%) has been achieved at 10 mg/L dye concentration. The results reveal that activated charcoal coated with iron oxide can be successfully used to remove dyes from synthetic as well as industrial effluent.

Aggrandize 发表于 2025-3-31 10:33:43

http://reply.papertrans.cn/17/1624/162325/162325_57.png

Amendment 发表于 2025-3-31 15:59:58

http://reply.papertrans.cn/17/1624/162325/162325_58.png

解冻 发表于 2025-3-31 18:31:37

http://reply.papertrans.cn/17/1624/162325/162325_59.png

令人作呕 发表于 2025-3-31 22:10:10

Implementation and Performance Analysis of ECC-Based Text Encryption on Raspberry Pi 3,em immune to many attacks. The technique was implemented on Raspberry Pi 3, and its performance analysis was done. The relation between text size and encryption/decryption time was found approximately linear, which can be interpreted as being more efficient for smaller files as compared to the relat
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Artificial Intelligence and Sustainable Computing; Proceedings of ICSIS Hari Mohan Dubey,Manjaree Pandit,Bijaya Ketan Pani Conference proce