找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Advanced Computing and Systems for Security; Volume 1 Rituparna Chaki,Agostino Cortesi,Nabendu Chaki Book 2016 Springer India 2016 Biometri

[復(fù)制鏈接]
樓主: Lincoln
41#
發(fā)表于 2025-3-28 17:17:42 | 只看該作者
https://doi.org/10.1007/978-3-642-38070-9 redundancy and a huge amount of energy drainage within the network. Use of a head node for a cluster can be a better solution. The proposed algorithm creates several clusters, selects a cluster head, aggregates the data, and sends that to base station through other cluster heads. Simulation result
42#
發(fā)表于 2025-3-28 21:38:57 | 只看該作者
43#
發(fā)表于 2025-3-29 00:03:07 | 只看該作者
44#
發(fā)表于 2025-3-29 06:11:27 | 只看該作者
In-Memory Data Management Researchamework is proposed here to ensure availability of health-care resource to valid end users. This service is capable to reduce time complexity, bandwidth cost, and to increase accuracy and attack resistance capacity. Theoretical analysis shows its efficiency.
45#
發(fā)表于 2025-3-29 10:55:07 | 只看該作者
https://doi.org/10.1007/978-3-642-38070-9uckoo Search optimization. The developed technique has been applied on the real-world microarray dataset of Lung Adenocarcinoma for detection of genes which may be directly responsible for the cause of Lung Adenocarcinoma.
46#
發(fā)表于 2025-3-29 15:07:36 | 只看該作者
https://doi.org/10.1007/978-3-642-38070-9y individual service providers as well as by a third party identity provider. The proposed two-factor authentication protocols uses password as the first factor and a Smart card or Mobile Phone as the second factor. The protocols are resistant to various known security attacks.
47#
發(fā)表于 2025-3-29 18:14:00 | 只看該作者
In-Memory Data Management Research is distance vector protocol in nature. We have compared its lifetime with some other Fermat point based protocols and studied the effect of aggregation factor on cumulative delay for packet forwarding. Moreover, effect of increased transmission radius on the lifetime of the proposed protocol too was studied.
48#
發(fā)表于 2025-3-29 22:11:42 | 只看該作者
Book 2016Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volume
49#
發(fā)表于 2025-3-30 02:22:37 | 只看該作者
2194-5357 cations to provide design, analysis, and model for key areas.The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India
50#
發(fā)表于 2025-3-30 04:56:08 | 只看該作者
Christian Gro?,Bj?rn Richerzhagen,Max Lehnf a users’ data protection, an encryption of keystrokes was implemented. A new method of a computer user profiling based on encrypted keystrokes is introduced. Additionally, an attempt to an intrusion detection based on the .-NN classifier is performed.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-15 11:33
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
临海市| 大悟县| 永济市| 皮山县| 西丰县| 山阳县| 惠水县| 博罗县| 兴化市| 清丰县| 大新县| 会理县| 广南县| 合作市| 雷波县| 鱼台县| 陆河县| 舟山市| 镇坪县| 义马市| 山丹县| 蓬安县| 新巴尔虎右旗| 汝阳县| 东海县| 镇巴县| 嘉兴市| 聂拉木县| 济阳县| 青海省| 商水县| 行唐县| 开平市| 张家川| 泗水县| 治县。| 湘阴县| 安龙县| 峨边| 周口市| 孟州市|