找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Smart and Sustainable Technologies: Rural and Tribal Development Using IoT and Cloud Computing; Proceedings of ICSST Srikanta Patnaik,Roume

[复制链接]
楼主: Hemochromatosis
发表于 2025-3-28 18:01:31 | 显示全部楼层
Security Attacks and Its Countermeasures in RPLovide the security in LLN. In this paper, we discussed about functioning of RPL and about various RPL attacks that compromised security in LLNs. The review was also conducted on various countermeasures to mitigate the attacks in order to improvise the performance of RPL.
发表于 2025-3-28 19:28:58 | 显示全部楼层
AI-Powered Smart Routersgration, we assign control to each connection to the AI-router for an IP hop-by-hop, giving more route path choices. The ununified/hybridized AI model involves distributed route management, using AI to provide successful centralized tunnelling of routing state and distributed control for path ingress and egress.
发表于 2025-3-28 23:46:22 | 显示全部楼层
Design and Analysis of 2nd-Order Bandpass Filters Using SIW and Microstrip Patch Transitions with St 2, respectively. The maximum insertion loss (IL) is 0.22 Db using the SIW, technique. Group delay (GD), phase delay (PD), impedance bandwidth (IBW), scattering parameters, and return loss are verified. A comparison analysis is presented showing the designs are suitable candidates for Ku-band X-band applications.
发表于 2025-3-29 04:46:34 | 显示全部楼层
Conference proceedings 2022le Technologies (ICSST 2021), organized by Department of ECE, GIET University, Gunupur, Rayagada, Odisha, India, during December 16–18, 2021. The proceedings of the conference have a special focus on the developments of local tribe and rural people using smart and sustainable technologies. It is an
发表于 2025-3-29 09:26:46 | 显示全部楼层
发表于 2025-3-29 11:51:10 | 显示全部楼层
Determining the Number of Bit Encryption That Is Optimum for Image Steganography in 8 Bit Images Ratio) of retrieved secret and cover image with respect to its original secret and original cover image. As a result, this paper explains 4-bit encryption is best for the purpose of steganography as PSNR of retrieved images (cover and secret both) is highest here.
发表于 2025-3-29 17:26:40 | 显示全部楼层
2662-6829 reference resource for researchers and practitioners in acad.This book presents a collection of peer-reviewed best selected research papers presented at the First International Conference on Smart and Sustainable Technologies (ICSST 2021), organized by Department of ECE, GIET University, Gunupur, Ra
发表于 2025-3-29 20:56:05 | 显示全部楼层
Big Data: A Boon to Fight Against Cancer Using Map Reduce Frameworkare is giving solutions for improving patient care and generating value. Cancer is the second main reason for death in the world. The battle against cancer has made a big task. The aim of big data analytics is to connect present people databases and collect complete data of every single patient suff
发表于 2025-3-30 01:23:08 | 显示全部楼层
Security Attacks and Its Countermeasures in RPLe smart homes, smart cities, smart agriculture, etc. Most of these devices are deployed in distributed way wirelessly. Communication plays a prominent role in IoT, where the communicating devices need to be secured. The standardized protocol that best suits Low power Lossy Networks (LLN) networks is
发表于 2025-3-30 04:55:02 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-26 06:12
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表