Zobrazeno 1 - 10
of 235
pro vyhledávání: '"secure data transmission"'
Publikováno v:
Naučno-tehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki, Vol 24, Iss 3, Pp 456-463 (2024)
The primary idea of this paper is the implementation of the Optimal Key-Tuned Rivest Shamir Adelman technique, a dual authentication approach for effective data sharing in the cloud within hospital data management. The system begins with user regis
Externí odkaz:
https://doaj.org/article/150cd980a7c94f14a7041dd51b72552a
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-16 (2024)
Abstract One of the biggest problems with Internet of Things (IoT) applications in the real world is ensuring data integrity. This problem becomes increasingly significant as IoT expands quickly across a variety of industries. This study presents a b
Externí odkaz:
https://doaj.org/article/fee9acc6488e4de5bfaf743bfe7c6cbe
Autor:
Bhanu Priyanka Valluri, Nitin Sharma
Publikováno v:
Measurement: Sensors, Vol 33, Iss , Pp 101150- (2024)
Wireless Sensor Networks (WSNs) are networks of low-power, low-cost devices that may gather data for many applications. These networks rely heavily on Medium Access Control (MAC) features for administration due to the critical roles of energy and sec
Externí odkaz:
https://doaj.org/article/257a8cff5b024040805e437c8d9fa438
Publikováno v:
IEEE Access, Vol 12, Pp 98480-98491 (2024)
The discrete Charlier moment transform, while extensively utilized in image processing, is inherently lossy and non-integer reversible, making it unsuitable for lossless image applications. To address this, we propose the Integer Reversible Charlier
Externí odkaz:
https://doaj.org/article/38da22d6c24841339c9b1d1d6119407e
Autor:
Marwa Qaraqe, Almiqdad Elzein, Emrah Basaran, Yin Yang, Elizabeth B. Varghese, Wisam Costandi, Jack Rizk, Nasim Alam
Publikováno v:
IEEE Access, Vol 12, Pp 26474-26491 (2024)
Crowd behavior recognition plays a critical role in various domains, including public safety, event management, and urban planning. Understanding crowd dynamics and detecting behaviors based on violence levels are crucial for preventing incidents and
Externí odkaz:
https://doaj.org/article/b79f65ba586d4c9782855cf33dff9f41
Publikováno v:
Energy Reports, Vol 9, Iss , Pp 2494-2505 (2023)
Green information technology (Green TI/GC) is provided by green computing, one of the emerging computing technologies in field of computer science engineering and technology. The main objectives of green computing are raising energy efficiency and lo
Externí odkaz:
https://doaj.org/article/e8580cde53184f55aca4524018e74f3b
Publikováno v:
Engineering Science and Technology, an International Journal, Vol 52, Iss , Pp 101676- (2024)
A new mmWave transmitter architecture with multibeam-based segmented beamforming arrays (SBAs) for high-efficiency and secure communication is proposed. Unlike convetional communication architecture, which transmits a high-order QAM signal through a
Externí odkaz:
https://doaj.org/article/95164839494642abbe8e86952ca5bd56
Publikováno v:
Cryptography, Vol 8, Iss 3, p 27 (2024)
Cryptographic key generation and data encryption and decryption using wearable biometric technologies is an emerging research area with significant potential for authentication and communication security. The research area is rapidly developing, and
Externí odkaz:
https://doaj.org/article/666e3f4ad947401d9053da5ad6d4f6f8
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.