cortex 发表于 2025-3-25 04:19:51
http://reply.papertrans.cn/27/2633/263270/263270_21.pngSigmoidoscopy 发表于 2025-3-25 09:27:52
Authentication Process Using Secure Sum for a New Node in Mobile Ad Hoc NetworkThe paper proposes an algorithm Algo_Authenticate_Node for authentication of a new node using the concept of the secured sum. It provides initial-level security. An algorithm is developed for short-span mobile ad hoc network.元音 发表于 2025-3-25 15:09:33
http://reply.papertrans.cn/27/2633/263270/263270_23.png确保 发表于 2025-3-25 17:49:16
http://reply.papertrans.cn/27/2633/263270/263270_24.pngMOTIF 发表于 2025-3-25 20:08:29
Design and Development of a Cloud-Based Electronic Medical Records (EMR) Systemechnology. The implementation requirement includes the use of client-side tools and server-side scripting languages, as well as a hosting platform. The client-side tools include HTML, CSS, Javascript, and jquery. PHP was used as the server-side scripting while MySQL served as the database. The appliIntact 发表于 2025-3-26 02:42:35
Energy-Aware Prediction-Based Load Balancing Approach with VM Migration for the Cloud Environmentid these unnecessary migrations, our approach uses a prediction approach which predicts the load on the PM before triggering the migrations. CloudSim simulator was used to develop a cloud environment. Experiment results depict that proposed approach consumes less amount of energy and less number ofNOVA 发表于 2025-3-26 05:55:35
An Energy-Efficient Intrusion Detection System for MANETer consumption. In order to overcome all these disadvantages of the proposed, Cluster-based game theory for IDS has been proposed that integrates the Game theory and K-means. In the proposed methodology, game theory is used to calculate reliability score, where K-means provide scope of reliability s大洪水 发表于 2025-3-26 10:57:24
DDoS Attack Mitigation Using Random and Flow-Based Schemef DoS and DDoS attacks and the techniques used for the prevention, detection, and trace back of such attacks. The next section gives a brief description of the existing methods used for mitigation of such attacks. The third section provides a detailed understanding of the algorithm we are using with出血 发表于 2025-3-26 13:42:36
http://reply.papertrans.cn/27/2633/263270/263270_29.png并排上下 发表于 2025-3-26 17:29:29
Image Forgery Detection: Survey and Future Directionsnipulation tools are becoming more and more sophisticated. The main purpose of this paper is to review the various existing methods developed for detecting the image forgery. A categorization of various forgery detection techniques has been presented in the paper.