注意力集中 发表于 2025-3-26 21:37:15

Next Generation of Internet of Things978-981-16-0666-3Series ISSN 2367-3370 Series E-ISSN 2367-3389

daredevil 发表于 2025-3-27 01:28:30

http://reply.papertrans.cn/67/6663/666247/666247_32.png

Free-Radical 发表于 2025-3-27 05:42:32

http://reply.papertrans.cn/67/6663/666247/666247_33.png

大炮 发表于 2025-3-27 11:06:39

http://reply.papertrans.cn/67/6663/666247/666247_34.png

sphincter 发表于 2025-3-27 14:22:32

Gaming: Around the World Geography,iption of gaming around the world. It contains history of gaming and its growth till now. This research paper is for new generation who wants to dive in the gaming industry.  The Gaming industry has made huge profit since last three years. It attracts the youngsters from new upcoming products.

SLING 发表于 2025-3-27 20:42:19

http://reply.papertrans.cn/67/6663/666247/666247_36.png

MAUVE 发表于 2025-3-27 22:41:16

Conference proceedings 2021ent of Computer Science and Engineering, School of Engineering, GIET University, Gunupur, Odisha, India, during 5–6 February 2021. The book covers topics such as IoT network design and architecture, IoT network virtualization, IoT sensors, privacy and security for IoT, SMART environment, social netw

破译密码 发表于 2025-3-28 05:38:19

Change Point Detection Technique for Weather Forecasting Using Bi-LSTM and 1D-CNN Algorithm,ether an artificial neural network has a good potential for forecasting weather conditions in addition of large datasets, due to its applicability in a number of fields. It is a benefit to have meteorological data available from through online outlets.

我吃花盘旋 发表于 2025-3-28 06:14:49

Attacking the Application of Three-Pass Protocol in Hill-Cipher,on the encryption algorithm, three-pass protocol on Hill-Cipher, is introduced. This attack depends only on the ciphertext which makes us break this system by analyzing the encryption and decryption process.

躺下残杀 发表于 2025-3-28 12:50:29

Secure Data Sharing Based on Linear Congruetial Method in Cloud Computing, load on the central management and offers encryption and decryption for the files shared by the users. The suggested system consists of three fundamental entities: cloud service (CS), certificate authority (CA), and users, where CA is the trusted entity to generate keys and distribute them on other entities and to encrypt and decrypt files.
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Next Generation of Internet of Things; Proceedings of ICNGI Raghvendra Kumar,Brojo Kishore Mishra,Prasant Kuma Conference proceedings 2021