Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Intelligence and electronic warfare: Challenges and future trends
the subjective evaluation of electronic intelligence and warfare has been adopted as
quantitive analysis by many organizational bodies to assess defense systems capabilities …
quantitive analysis by many organizational bodies to assess defense systems capabilities …
A proposed ANFIS evaluator for RSA cryptosystem used in cloud networking
The security aspect is considered as the most important challenge in communication and
computer networks. Therefore the “security level evaluation” of cryptosystem, is very …
computer networks. Therefore the “security level evaluation” of cryptosystem, is very …
Cryptosystem security evaluation based on diagonal game and information theory
security evaluation of cryptosystem is a critical topic in cryptology. It is used to differentiate
among cryptosystems' security. The aim of this paper is to produce a new model for security …
among cryptosystems' security. The aim of this paper is to produce a new model for security …
Security evaluation of cryptosystems used in cloud networks
Cloud networking is the next generation architecture of IT. Clouds are very complex
architectures. They have a replicated thousands of times, and common functional units and …
architectures. They have a replicated thousands of times, and common functional units and …
Digital Filter Performance Based on Squared Error
AT Alsahlanee - 2021 International Conference on Advanced …, 2021 - ieeexplore.ieee.org
A digital filter with infinite impulse response (IIR) was designed using the hybrid optimization
methodology. The algorithm used is a dynamic-static topology of particle swarm optimization …
methodology. The algorithm used is a dynamic-static topology of particle swarm optimization …
Security of Cloud Networks–Status, Challenges and Future Trends
SB Sadkhan - 2022 8th International Engineering Conference …, 2022 - ieeexplore.ieee.org
Cloud based Network allows the sharing of resources which includes network, applications,
software program and storage via internet. Cloud end-users can rent more than one …
software program and storage via internet. Cloud end-users can rent more than one …
Game Theory Role in Wireless Network Security–Status, Challenges and Future trends
SB Sadkhan, M Ayad - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
As the Internet grows omnipresent in the lives of these people, people rely largely on the
Internet for appropriate communication and quick access to information. The network has …
Internet for appropriate communication and quick access to information. The network has …
A support system for autistic children using Internet of Things technology
NM Abdullah, AF AL-Allaf - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Children with Autism Spectrum Disorder (ASD) usually have difficulties expressing or
controlling emotions, and they suffer from impaired eye contact and communication with …
controlling emotions, and they suffer from impaired eye contact and communication with …
The role of quantum and post-quantum techniques in wireless network security-status, challenges and future trends
SB Sadkhan, R Abbas - 2021 4th International Iraqi Conference …, 2021 - ieeexplore.ieee.org
One of the most essential ways of communication is the wireless network. As a result,
ensuring the security of information transmitted across wireless networks is a critical …
ensuring the security of information transmitted across wireless networks is a critical …
Computations on Cipher Speech for Secure Biometrics
A Dinesh, KE Bijoy - Procedia Computer Science, 2016 - Elsevier
Abstract Signal Processing in Encrypted Domain (SPED) is a blending of signal processing
and cryptography. SPED is a magnificent tool for processing encrypted data. It provides …
and cryptography. SPED is a magnificent tool for processing encrypted data. It provides …