弹药 发表于 2025-3-26 23:01:48

Symmetric Key Based Authentication Mechanism for Secure Communication in MANETsd by anyone who comes in the radio range of the communicating devices, nodes are physically vulnerable, less-efficient (processing power, memory) communicating devices, the absence of central authority, free from the constraint of topological structure of network, etc. In last decade, applications o

一小块 发表于 2025-3-27 04:07:49

http://reply.papertrans.cn/47/4694/469399/469399_32.png

慢跑鞋 发表于 2025-3-27 06:29:12

http://reply.papertrans.cn/47/4694/469399/469399_33.png

needle 发表于 2025-3-27 11:14:41

http://reply.papertrans.cn/47/4694/469399/469399_34.png

裹住 发表于 2025-3-27 13:50:05

Sensing–Actuation as a Service in Cloud Centric Internet of ThingsAaaSDM) framework consisting of sensing, actuating, and computing with open issues and future directions for the researchers in this field. This paper has used the standard UML notations to represent our proposed model for Cloud centric Internet of Things.

极微小 发表于 2025-3-27 17:48:13

Soil Monitoring, Fertigation, and Irrigation System Using IoT for Agricultural Applicationemperature and humidity of the surroundings, these sensors sense the change in temperature and humidity and give an interrupt signal to ARM 7 Processor, thereby initiating the irrigation. All this functioning will be updated to the user by e-mail sent by the system PC through IoT.

Scintillations 发表于 2025-3-28 01:36:44

http://reply.papertrans.cn/47/4694/469399/469399_37.png

NEXUS 发表于 2025-3-28 02:35:58

Image Analysis for the Detection and Diagnosis of Hepatocellular Carcinoma from Abdominal CT Images tissues. Different textures features have been extracted from the Region of Interest (ROI) identified by an expert radiologist and are applied as an input to the classifiers for training and testing. The support vector machine (SVM) and naïve Bayes’ classifier are supervised learning techniques. Th

提名的名单 发表于 2025-3-28 06:54:15

http://reply.papertrans.cn/47/4694/469399/469399_39.png

供过于求 发表于 2025-3-28 12:13:42

Digital Forensic Enabled Image Authentication Using Least Significant Bit (LSB) with Tamper Localiza to embed a secret image (gray scale) inside a corner image. Experimental results show an improvement in peak signal-to-noise ratio (PSNR) values of the proposed technique over the other techniques available, such as hash-based LSB(2-3-3) image steganography in spatial domain. This paper proposes an
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Intelligent Communication and Computational Technologies; Proceedings of Inter Yu-Chen Hu,Shailesh Tiwari,Munesh C. Trivedi Conference proc