找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Advanced Computing and Systems for Security; Volume 1 Rituparna Chaki,Agostino Cortesi,Nabendu Chaki Book 2016 Springer India 2016 Biometri

[复制链接]
楼主: Lincoln
发表于 2025-3-28 17:17:42 | 显示全部楼层
https://doi.org/10.1007/978-3-642-38070-9 redundancy and a huge amount of energy drainage within the network. Use of a head node for a cluster can be a better solution. The proposed algorithm creates several clusters, selects a cluster head, aggregates the data, and sends that to base station through other cluster heads. Simulation result
发表于 2025-3-28 21:38:57 | 显示全部楼层
发表于 2025-3-29 00:03:07 | 显示全部楼层
发表于 2025-3-29 06:11:27 | 显示全部楼层
In-Memory Data Management Researchamework is proposed here to ensure availability of health-care resource to valid end users. This service is capable to reduce time complexity, bandwidth cost, and to increase accuracy and attack resistance capacity. Theoretical analysis shows its efficiency.
发表于 2025-3-29 10:55:07 | 显示全部楼层
https://doi.org/10.1007/978-3-642-38070-9uckoo Search optimization. The developed technique has been applied on the real-world microarray dataset of Lung Adenocarcinoma for detection of genes which may be directly responsible for the cause of Lung Adenocarcinoma.
发表于 2025-3-29 15:07:36 | 显示全部楼层
https://doi.org/10.1007/978-3-642-38070-9y individual service providers as well as by a third party identity provider. The proposed two-factor authentication protocols uses password as the first factor and a Smart card or Mobile Phone as the second factor. The protocols are resistant to various known security attacks.
发表于 2025-3-29 18:14:00 | 显示全部楼层
In-Memory Data Management Research is distance vector protocol in nature. We have compared its lifetime with some other Fermat point based protocols and studied the effect of aggregation factor on cumulative delay for packet forwarding. Moreover, effect of increased transmission radius on the lifetime of the proposed protocol too was studied.
发表于 2025-3-29 22:11:42 | 显示全部楼层
Book 2016Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volume
发表于 2025-3-30 02:22:37 | 显示全部楼层
2194-5357 cations to provide design, analysis, and model for key areas.The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India
发表于 2025-3-30 04:56:08 | 显示全部楼层
Christian Groß,Björn Richerzhagen,Max Lehnf a users’ data protection, an encryption of keystrokes was implemented. A new method of a computer user profiling based on encrypted keystrokes is introduced. Additionally, an attempt to an intrusion detection based on the .-NN classifier is performed.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-28 09:01
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表