|
Issue |
Title |
|
Vol 13, No 4: August 2023 |
Seawater salinity modelling based on electromagnetic wave characterization |
Abstract
PDF
|
Imadeldin Elsayed Elmutasim, Izzeldin Ibrahim Mohamed, Khalid Hamid Bilal |
|
Vol 13, No 6: December 2023 |
Secrecy performance analysis on spatial modeling of wireless communications with unmanned aerial vehicle and ground devices |
Abstract
PDF
|
Cuu Ho Van, Hong-Nhu Nguyen, Si-Phu Le, Miroslav Voznak |
|
Vol 14, No 6: December 2024 |
Sectoral vulnerabilities and adaptations to climate change: insights from a systematic literature review |
Abstract
PDF
|
Prihandoko Prihandoko, Agus Perdana Windarto, Musli Yanto, Muhammad Habib Yuhandri |
|
Vol 9, No 4: August 2019 |
Secure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hoc |
Abstract
PDF
|
santosh sahu, Sanjeev Sharma |
|
Vol 13, No 3: June 2023 |
Secure authentication and data aggregation scheme for routing packets in wireless sensor network |
Abstract
PDF
|
Rudramurthy Veeregowdanadoddi Chandraiah, Aparna Ramalingappa |
|
Vol 14, No 4: August 2024 |
Secure aware software development life cycle on medical datasets by using firefly optimization and machine learning techniques |
Abstract
PDF
|
Ooruchintala Obulesu, Sajja Suneel, Sudhakar Jangili, Sukanya Ledalla, Ballepu Swetha, Subba Reddy Borra |
|
Vol 13, No 2: April 2023 |
Secure cluster-based routing using multi objective-trust centric artificial algae algorithm for wireless sensor network |
Abstract
PDF
|
Divyashree Habbanakuppe Balachandra, Puttamadappa Chaluve Gowda, Nandini Prasad Kanakapura Shivaprasad |
|
Vol 9, No 6: December 2019 |
Secure data aggregation in IoT using Efficient-CSDA |
Abstract
PDF
|
Swathi S, Yogish H K |
|
Vol 14, No 6: December 2024 |
Secure data transmission in power systems using blockchain technology |
Abstract
PDF
|
Anand Srivatsa, Ananthapadmanabha Thammaiah, Likith Kumar MV, Rajeshwari D, Suma AP |
|
Vol 6, No 3: June 2016 |
Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things |
Abstract
PDF
|
Sumanth Koppula, Jayabhaskar Muthukuru |
|
Vol 6, No 4: August 2016 |
Secure Multicast Routing Protocol in Manets Using Efficient ECGDH Algorithm |
Abstract
PDF
|
Gopi Arepalli, Suresh Babu Erukula |
|
Vol 8, No 6: December 2018 |
Secure Privacy Implications for Clients and End-users through Key Assortment Crypto Techniques Implicated Algorithm |
Abstract
PDF
|
Ramesh D, Rama B |
|
Vol 15, No 1: February 2025 |
Secured and cloud-based electronic health records by homomorphic encryption algorithm |
Abstract
PDF
|
Bala Annapurna, Gaddam Geetha, Priyanka Madhiraju, Subbarayan Kalaiselvi, Mishmala Sushith, Rathinasabapathy Ramadevi, Pramod Pandey |
|
Vol 13, No 5: October 2023 |
Secured authentication of radio-frequency identification system using PRESENT block cipher |
Abstract
PDF
|
Bharathi Ramachandra, Smitha Elsa Peter |
|
Vol 11, No 1: February 2021 |
Secured node detection technique based on artificial neural network for wireless sensor network |
Abstract
PDF
|
Bassam Hasan, Sameer Alani, Mohammed Ayad Saad |
|
5146 - 5160 of 6007 Items |
<< < 339 340 341 342 343 344 345 346 347 348 > >> |