The present paper addresses the approximate analytical solution of the nonlinear Riccati differential equations using the Multistage homotopy asymptotic method which is used in …
Building a secure routing protocol in WSN is not trivial process. Thee are two main types of security attacks against WSNs: active and passive. WSN as a new category of computer …
Y Li, G Ge - Multimedia Tools and Applications, 2019 - Springer
Cryptographic hash functions can map data of arbitrary size to data of fixed size (hash values), which can be used in a wide range of multimedia applications for communication …