Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Talha Naqash"'
Publikováno v:
International Journal of Parallel Programming. 50:89-114
Internet users and internet services are increasing day by day, which increases the internet traffic from zeta-bytes to petabytes with ultra-high-speed. Different types of architecture are implemented to handle high-speed data traffic. The two layers
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9789811640155
Lecture Notes in Networks and Systems
Lecture Notes in Networks and Systems
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::74fb133d2ba39334fdb5ac0538983cf1
https://doi.org/10.1007/978-981-16-4016-2_27
https://doi.org/10.1007/978-981-16-4016-2_27
Publikováno v:
Proceedings of International Conference on Artificial Life and Robotics. 24:687-692
Autor:
Talha Naqash
Publikováno v:
2020 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET).
Publikováno v:
CCWC
To keep the privacy confidential now a day; two techniques are used to encrypt the image the 1st one is that encrypts the image through cryptography algorithms key. The other one involves the concealing algorithm program to keep the pictures confiden
Publikováno v:
UEMCON
Different methodologies had been used in recent years to get out of these security issues using distributed database and distributed architecture. Encryption and decryption are the main techniques while there way of implementation is different. But o
Publikováno v:
2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
In the field of biometrics, the iris detection has huge value, due to long-lifetime stability and reliability. Therefore, we can identify the person with the iris pattern. It is more reliable than other biometrics. In this paper, we will introduce an
Publikováno v:
ICKII
It is certain that the future of the network will be the mobile utter. Google‘s Android platform is a widely forecast open source operating system for mobile phones. This article is about Android‘s security model and seeks to reveal the complexit
Publikováno v:
2018 IEEE International Conference on Applied System Invention (ICASI).
Android mobile operating system, Google developed, Linux Kernel based with basic motive to serve for devices with touchscreen like tablets and smartphones. Due to weak OS security it is vulnerable to various security attacks therefor to restrict acce
Autor:
Talha Naqash, Osama Sohail
Publikováno v:
2018 IEEE International Conference on Applied System Invention (ICASI).
Computer Science as a field is making a vast progress around the future in cloud computing. As smartphones are necessary and as per the statistics there is a new technology added every 7 minutes. The ambiguities in the third party encounter many issu