Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Dheer Dhwaj Barak"'
Publikováno v:
Wireless Communications and Mobile Computing. 2022:1-7
One of the main problems of networked control systems is that signal transmission delay is inevitable due to long distance transmission. This will affect the performance of the system, such as stability range, adjustment time, and rise time, and in s
Autor:
Deepak Kumar Goyal, Bharat Kumar Aggarwal, Bijender Bansal, Dheer Dhwaj Barak, Pankaj Gupta, Ankur Gupta
Publikováno v:
Materials Today: Proceedings. 56:3312-3316
In the issue of cyber security, block-chain, which is best known for crypto currencies, is providing an interesting answer. Block-chain has excellent safeguards against information manipulation. It supports securing access to Internet of Things (IOT)
Autor:
Bharat Kumar Aggarwal, Ankur Gupta, Deepak Goyal, Pankaj Gupta, Bijender Bansal, Dheer Dhwaj Barak
Publikováno v:
Expert Clouds and Applications ISBN: 9789811924996
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e880bf09555163dd14011304723b5051
https://doi.org/10.1007/978-981-19-2500-9_24
https://doi.org/10.1007/978-981-19-2500-9_24
Publikováno v:
Mathematical Problems in Engineering.
The modern-day influx of vehicular traffic along with rapid expansion of roadways has made the selection of the best driver based on driving best practices an imperative, thus optimizing cost and ensuring safe arrival at the destination. A key factor
Autor:
Bharat Kumar Aggarwal, Bijender Bansal, Pankaj Gupta, Dheer Dhwaj Barak, Deepak Kumar Goyal, Ankur Gupta
Publikováno v:
Materials Today: Proceedings.
The hashing is done by the block-chain technology during block creation. There are many hashing algorithms available, including SHA128, SHA256, SHA512, and MD5. It has been noticed that SHA256 is often utilized in block-chain. When selecting an effec
Publikováno v:
2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT).
Security is an essential service for wired and wireless network communication. This work concerned with a particularly sever security attack that affects the ad hoc networks routing protocols, called "wormhole attack". There are many solutions to det