找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Data, Engineering and Applications; Volume 2 Rajesh Kumar Shukla,Jitendra Agrawal,Geetam Singh Book 2019 Springer Nature Singapore Pte Ltd

[复制链接]
楼主: 夹子
发表于 2025-3-25 04:19:51 | 显示全部楼层
发表于 2025-3-25 09:27:52 | 显示全部楼层
Authentication Process Using Secure Sum for a New Node in Mobile Ad Hoc NetworkThe paper proposes an algorithm Algo_Authenticate_Node for authentication of a new node using the concept of the secured sum. It provides initial-level security. An algorithm is developed for short-span mobile ad hoc network.
发表于 2025-3-25 15:09:33 | 显示全部楼层
发表于 2025-3-25 17:49:16 | 显示全部楼层
发表于 2025-3-25 20:08:29 | 显示全部楼层
Design and Development of a Cloud-Based Electronic Medical Records (EMR) Systemechnology. The implementation requirement includes the use of client-side tools and server-side scripting languages, as well as a hosting platform. The client-side tools include HTML, CSS, Javascript, and jquery. PHP was used as the server-side scripting while MySQL served as the database. The appli
发表于 2025-3-26 02:42:35 | 显示全部楼层
Energy-Aware Prediction-Based Load Balancing Approach with VM Migration for the Cloud Environmentid these unnecessary migrations, our approach uses a prediction approach which predicts the load on the PM before triggering the migrations. CloudSim simulator was used to develop a cloud environment. Experiment results depict that proposed approach consumes less amount of energy and less number of
发表于 2025-3-26 05:55:35 | 显示全部楼层
An Energy-Efficient Intrusion Detection System for MANETer consumption. In order to overcome all these disadvantages of the proposed, Cluster-based game theory for IDS has been proposed that integrates the Game theory and K-means. In the proposed methodology, game theory is used to calculate reliability score, where K-means provide scope of reliability s
发表于 2025-3-26 10:57:24 | 显示全部楼层
DDoS Attack Mitigation Using Random and Flow-Based Schemef DoS and DDoS attacks and the techniques used for the prevention, detection, and trace back of such attacks. The next section gives a brief description of the existing methods used for mitigation of such attacks. The third section provides a detailed understanding of the algorithm we are using with
发表于 2025-3-26 13:42:36 | 显示全部楼层
发表于 2025-3-26 17:29:29 | 显示全部楼层
Image Forgery Detection: Survey and Future Directionsnipulation tools are becoming more and more sophisticated. The main purpose of this paper is to review the various existing methods developed for detecting the image forgery. A categorization of various forgery detection techniques has been presented in the paper.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-11 01:18
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表