找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Advanced Computing and Systems for Security; Volume 1 Rituparna Chaki,Agostino Cortesi,Nabendu Chaki Book 2016 Springer India 2016 Biometri

[復(fù)制鏈接]
樓主: Lincoln
41#
發(fā)表于 2025-3-28 17:17:42 | 只看該作者
https://doi.org/10.1007/978-3-642-38070-9 redundancy and a huge amount of energy drainage within the network. Use of a head node for a cluster can be a better solution. The proposed algorithm creates several clusters, selects a cluster head, aggregates the data, and sends that to base station through other cluster heads. Simulation result
42#
發(fā)表于 2025-3-28 21:38:57 | 只看該作者
43#
發(fā)表于 2025-3-29 00:03:07 | 只看該作者
44#
發(fā)表于 2025-3-29 06:11:27 | 只看該作者
In-Memory Data Management Researchamework is proposed here to ensure availability of health-care resource to valid end users. This service is capable to reduce time complexity, bandwidth cost, and to increase accuracy and attack resistance capacity. Theoretical analysis shows its efficiency.
45#
發(fā)表于 2025-3-29 10:55:07 | 只看該作者
https://doi.org/10.1007/978-3-642-38070-9uckoo Search optimization. The developed technique has been applied on the real-world microarray dataset of Lung Adenocarcinoma for detection of genes which may be directly responsible for the cause of Lung Adenocarcinoma.
46#
發(fā)表于 2025-3-29 15:07:36 | 只看該作者
https://doi.org/10.1007/978-3-642-38070-9y individual service providers as well as by a third party identity provider. The proposed two-factor authentication protocols uses password as the first factor and a Smart card or Mobile Phone as the second factor. The protocols are resistant to various known security attacks.
47#
發(fā)表于 2025-3-29 18:14:00 | 只看該作者
In-Memory Data Management Research is distance vector protocol in nature. We have compared its lifetime with some other Fermat point based protocols and studied the effect of aggregation factor on cumulative delay for packet forwarding. Moreover, effect of increased transmission radius on the lifetime of the proposed protocol too was studied.
48#
發(fā)表于 2025-3-29 22:11:42 | 只看該作者
Book 2016Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volume
49#
發(fā)表于 2025-3-30 02:22:37 | 只看該作者
2194-5357 cations to provide design, analysis, and model for key areas.The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India
50#
發(fā)表于 2025-3-30 04:56:08 | 只看該作者
Christian Gro?,Bj?rn Richerzhagen,Max Lehnf a users’ data protection, an encryption of keystrokes was implemented. A new method of a computer user profiling based on encrypted keystrokes is introduced. Additionally, an attempt to an intrusion detection based on the .-NN classifier is performed.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-15 11:33
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
松滋市| 浪卡子县| 岳普湖县| 积石山| 渝北区| 福泉市| 栾川县| 准格尔旗| 福鼎市| 武清区| 新安县| 杂多县| 宜宾县| 漳平市| 内丘县| 镇平县| 鸡泽县| 潮安县| 梓潼县| 门头沟区| 日照市| 延川县| 江都市| 渭南市| 松溪县| 冷水江市| 游戏| 孝感市| 华宁县| 逊克县| 扶风县| 博客| 辽阳市| 桃源县| 和田市| 东宁县| 额济纳旗| 余江县| 修文县| 周至县| 老河口市|