Fortuitous 发表于 2025-3-28 17:53:23
http://reply.papertrans.cn/83/8235/823417/823417_41.png食料 发表于 2025-3-28 19:20:49
Imperceptible Image Indexing Using Digital Watermarkingtermarking is less sensitive to HVS (Human Visual System). Edge detectors are used to estimate regions in the image where intensity changes rapidly. Modifications to such pixel will not attract the attention of human eyes. Watermark is thus integrated imperceptibly into the digital images. The propoSoliloquy 发表于 2025-3-29 01:12:47
A New Deterministic Algorithm for Testing Primality Based on a New Property of Prime Numbersyields all of the prime numbers and no composites. Due to this uncertainty surrounding the theory of prime numbers, popular algorithms proposed in literature till date, rely heavily on probabilistic methods to determine primality. The paper proposes a new theory on the nature of prime numbers. In pa紧张过度 发表于 2025-3-29 06:46:46
Multilingual Speaker Identification with the Constraint of Limited Data Using Multitaper MFCCultitaper Mel-frequency cepstral coefficient (multitaper MFCC) features for Multilingual speaker identification with the constraint of limited data. The speaker identification study is conducted using 30 speakers of our own database. Sine-weighted cepstrum estimator (SWCE) taper MFCC features are ex注射器 发表于 2025-3-29 10:15:18
Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Usination of simultaneous/concurrent multiple groups in the Secure Group Communication model with overlapping memberships. Designing a secure key management scheme with efficient rekeying process in this scenario is a challenging task. We design an efficient secure group key management scheme for simultcartilage 发表于 2025-3-29 15:26:31
http://reply.papertrans.cn/83/8235/823417/823417_46.pngGILD 发表于 2025-3-29 18:07:41
Simulation and Evaluation of Different Mobility Models in Ad-Hoc Sensor Network over DSR Protocol Usis used for evaluation of wireless networks. WSN is Multi-hop Self-configuring and consists of sensor nodes. The movements of nodes are like the patterns which can be classified into different mobility models and each of them have been characterized by its own distinctive features and also plays an蛙鸣声 发表于 2025-3-29 21:11:29
Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functionsguarding against attempts to establish fraudulent multiple identities or prevent identity fraud. The greatest advantage that the biometric data of an individual remains constant acts as its biggest liability. Once the attacker gets biometric password of an individual then security of his data becomeGOUGE 发表于 2025-3-30 03:08:08
http://reply.papertrans.cn/83/8235/823417/823417_49.pngprosperity 发表于 2025-3-30 05:09:05
A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacksthis context, smart card industries try to overcome the anomaly by implementing various countermeasures. In this paper we discuss and present a powerful attack based on the vulnerability of the linker which could change the correct byte code into malicious one. During the attack, the linker interpre