inventory 发表于 2025-3-23 12:17:16
RC4-2S: RC4 Stream Cipher with Two State Tables in real time security. However, RC4 cipher shows some weaknesses including a correlation problem between the public known outputs of the internal state. We propose RC4 stream cipher with two state tables (RC4-2S) as an enhancement to RC4. RC4-2S stream cipher system solves the correlation problem b高歌 发表于 2025-3-23 14:52:19
Genetic Algorithm-Based Relocation Scheme in Electric Vehicle Sharing Systems to different rent-out and return patterns in different stations. To improve the service ratio, the relocation scheme explicitly moves vehicles from overflow stations to underflow stations. Each relocation plan is encoded to an integer-valued vector, based on two indexes, one for the overflow list,光明正大 发表于 2025-3-23 20:16:55
Improvement of Wireless LAN Connectivity by Optimizing Placement of Wireless Access Points increase the information access and traffic amount. In public facilities, hot spots, and university campuses, the coverage area of the wireless Access Points (APs) is limited because of high cost. Therefore, it is difficult to provide stable network connectivity. In this paper, we focus on measurem蘑菇 发表于 2025-3-24 01:33:14
Performance Comparison of OLSR and AODV Protocols in a VANET Crossroad Scenarioo (PDR), Throughput and Delay. We analyse the performance of the network by sending Constant Bit Rate (CBR) traffic and considering different number of connections. The simulation results show that when the number of connections is high, OLSR performs better than AODV protocol in this VANET scenario逗它小傻瓜 发表于 2025-3-24 03:00:34
WMN-GA System for Node Placement in WMNs: Effect of Grid Shapement of mesh routers nodes in the geographical deployment area to achieve network connectivity, stability and user coverage. In this paper, we evaluate the performance of WMN-GA system for node placement problem in WMNs. For evaluation, we consider Normal, Exponential and Weibull Distribution of mesreptile 发表于 2025-3-24 10:05:35
DCT-Based Watermarking for Color Images via Two-Dimensional Linear Discriminant Analysis for color images. At first, the color image is converted into the YIQ color space and then transformed into the frequency domain by DCT. During the embedding stage, two watermarks of reference and logo are embedded into the Q component. Then, watermark extraction is done by 2DLDA from the Q componeBOLUS 发表于 2025-3-24 13:36:33
http://reply.papertrans.cn/47/4657/465652/465652_17.pngneutralize 发表于 2025-3-24 17:41:04
Performance Analysis of OLSR with ETX_ff for Different HELLO Packet Interval in a MANET Testbedost and high-performance mobile terminals, without having to depend on the network infrastructure. Because the terminals are mobile, the routes change dynamically, so routing algorithms are very important for operation of MANETs. In this paper, we investigate the performance of Optimized Link StateFAR 发表于 2025-3-24 22:06:48
Multi-Flow Traffic Investigation of AODV Considering Routing Control Packetss market. The interest on Mobile Ad hoc Networks (MANETs) is also increasing due to their potential use in several fields such as collaborative computing and multimedia communications. Thus, there is an increasing need to minimize the overhead introduced by routing protocols in the network. In thisPalpate 发表于 2025-3-25 00:35:55
http://reply.papertrans.cn/47/4657/465652/465652_20.png