Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An image encryption scheme based on DNA computing and multiple chaotic systems
A number of techniques for securing plaintext, images and video frames have been
developed in cryptography using jointly DNA computing and Chaos Theory. With the …
developed in cryptography using jointly DNA computing and Chaos Theory. With the …
Optimal multiple key‐based homomorphic encryption with deep neural networks to secure medical data transmission and diagnosis
Medical database classification problems can be considered as complex optimization
problems to assure the diagnosis support precisely. In healthcare, several computer …
problems to assure the diagnosis support precisely. In healthcare, several computer …
Bipolar fully recurrent deep structured neural learning based attack detection for securing industrial sensor networks
Attack detection is a significant problem to be resolved to attain security in industrial sensor
network. Few research works have been designed for performing attack discovery process …
network. Few research works have been designed for performing attack discovery process …
Cryptosystem design based on Hermitian curves for IoT security
The ultimate goal of modern cryptography is to protect the information resource and make it
absolutely unbreakable and beyond compromise. However, throughout the history of …
absolutely unbreakable and beyond compromise. However, throughout the history of …
An intelligent approach of intrusion detection in mobile crowd sourcing systems in the context of IoT based SMART city
The recent era of pervasive computing has evolved with various applications and has
ground-breaking realities in mobile crowdsourcing (MCS). Multiple attempts have been …
ground-breaking realities in mobile crowdsourcing (MCS). Multiple attempts have been …
A deception model robust to eavesdrop** over communication for social network systems
Communication security deals with attributes such as confidentiality, integrity, and
availability. The current strategies used to achieve covertness of communication employs …
availability. The current strategies used to achieve covertness of communication employs …
BECS-II: an updated bio-inspired electrocommunication system for small underwater robots
Some weakly electric fish can use electric signals to interact and communicate with each
other in dark and complex underwater environments where traditional underwater …
other in dark and complex underwater environments where traditional underwater …
[PDF][PDF] The Impact of Part-Time and Full-Time Work on Employees' Efficiency the Importance of Flexible Work Arrangements.
Flexible work arrangements are now becoming truly normal, aiming to enhance workers'
quality of life. Currently, various businesses and organizations are adopting this contracting …
quality of life. Currently, various businesses and organizations are adopting this contracting …
SRAKN: Secure roaming authentication and key negotiation protocol for space information network
J Guo, Y Du, Z Sun, R Wu, X Wu, L Zhang… - Computer …, 2023 - Elsevier
Abstract Nowadays, the Space Information Network (SIN) with global signal coverage, large
capacity, bandwidth-on-demand flexibility, and multiple services has attracted more and …
capacity, bandwidth-on-demand flexibility, and multiple services has attracted more and …
Performance analysis of high throughput map decoder for turbo codes and self concatenated convolutional codes
The effect of parallelism on Bit Error Rate (BER) performance of Turbo Code (TC) and Self
Concatenated Convolutional Code (SECCC) with different levels of parallelism and frame …
Concatenated Convolutional Code (SECCC) with different levels of parallelism and frame …