找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪(fǎng)問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Advanced Computing and Systems for Security; Volume 1 Rituparna Chaki,Agostino Cortesi,Nabendu Chaki Book 2016 Springer India 2016 Biometri

[復(fù)制鏈接]
樓主: Lincoln
41#
發(fā)表于 2025-3-28 17:17:42 | 只看該作者
https://doi.org/10.1007/978-3-642-38070-9 redundancy and a huge amount of energy drainage within the network. Use of a head node for a cluster can be a better solution. The proposed algorithm creates several clusters, selects a cluster head, aggregates the data, and sends that to base station through other cluster heads. Simulation result
42#
發(fā)表于 2025-3-28 21:38:57 | 只看該作者
43#
發(fā)表于 2025-3-29 00:03:07 | 只看該作者
44#
發(fā)表于 2025-3-29 06:11:27 | 只看該作者
In-Memory Data Management Researchamework is proposed here to ensure availability of health-care resource to valid end users. This service is capable to reduce time complexity, bandwidth cost, and to increase accuracy and attack resistance capacity. Theoretical analysis shows its efficiency.
45#
發(fā)表于 2025-3-29 10:55:07 | 只看該作者
https://doi.org/10.1007/978-3-642-38070-9uckoo Search optimization. The developed technique has been applied on the real-world microarray dataset of Lung Adenocarcinoma for detection of genes which may be directly responsible for the cause of Lung Adenocarcinoma.
46#
發(fā)表于 2025-3-29 15:07:36 | 只看該作者
https://doi.org/10.1007/978-3-642-38070-9y individual service providers as well as by a third party identity provider. The proposed two-factor authentication protocols uses password as the first factor and a Smart card or Mobile Phone as the second factor. The protocols are resistant to various known security attacks.
47#
發(fā)表于 2025-3-29 18:14:00 | 只看該作者
In-Memory Data Management Research is distance vector protocol in nature. We have compared its lifetime with some other Fermat point based protocols and studied the effect of aggregation factor on cumulative delay for packet forwarding. Moreover, effect of increased transmission radius on the lifetime of the proposed protocol too was studied.
48#
發(fā)表于 2025-3-29 22:11:42 | 只看該作者
Book 2016Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volume
49#
發(fā)表于 2025-3-30 02:22:37 | 只看該作者
2194-5357 cations to provide design, analysis, and model for key areas.The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India
50#
發(fā)表于 2025-3-30 04:56:08 | 只看該作者
Christian Gro?,Bj?rn Richerzhagen,Max Lehnf a users’ data protection, an encryption of keystrokes was implemented. A new method of a computer user profiling based on encrypted keystrokes is introduced. Additionally, an attempt to an intrusion detection based on the .-NN classifier is performed.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-15 06:42
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
陕西省| 榆林市| 西昌市| 陕西省| 永胜县| 定州市| 图木舒克市| 拜泉县| 乌兰察布市| 保定市| 琼海市| 车致| 监利县| 长白| 新巴尔虎右旗| 额尔古纳市| 大英县| 堆龙德庆县| 焉耆| 宣恩县| 锦屏县| 富顺县| 阳江市| 内黄县| 漳州市| 辽宁省| 华亭县| 开阳县| 汶川县| 固阳县| 大埔区| 安义县| 同仁县| 桂东县| 瓦房店市| 西安市| 永济市| 荣成市| 石河子市| 舞钢市| 宜川县|