Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard
M Karpovsky, KJ Kulikowski… - … on Dependable Systems …, 2004 - ieeexplore.ieee.org
We present a method of protecting a hardware implementation of the advanced encryption
standard (AES) against a side-channel attack known as differential fault analysis attack. The …
standard (AES) against a side-channel attack known as differential fault analysis attack. The …
Multiobjective optimization in cloud brokering systems for connected Internet of Things
Currently, over nine billion things are connected in the Internet of Things (IoT). This number
is expected to exceed 20 billion in the near future, and the number of things is quickly …
is expected to exceed 20 billion in the near future, and the number of things is quickly …
[HTML][HTML] Genetic algorithm based node deployment in hybrid wireless sensor networks
In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the
random deployment of stationary nodes may cause coverage holes in the sensing field …
random deployment of stationary nodes may cause coverage holes in the sensing field …
Optimizing the ultra-dense 5G base stations in urban outdoor areas: Coupling GIS and heuristic optimization
Due to the high propagation loss and blockage-sensitive characteristics of millimeter waves
(mmWaves), constructing fifth-generation (5G) cellular networks involves deploying ultra …
(mmWaves), constructing fifth-generation (5G) cellular networks involves deploying ultra …
RETRACTED ARTICLE: Grid quorum-based spatial coverage for IoT smart agriculture monitoring using enhanced multi-verse optimizer
M Abdel-Basset, LA Shawky, K Eldrandaly - Neural Computing and …, 2020 - Springer
Wireless sensor networks (WSN) are the backbone in various modern Internet of Things
(IoT) smart applications ranging from automated control, surveillance, forest fire detection …
(IoT) smart applications ranging from automated control, surveillance, forest fire detection …
Connectivity and coverage constrained wireless sensor nodes deployment using steepest descent and genetic algorithms
M Sheikh-Hosseini, SRS Hashemi - Expert Systems with Applications, 2022 - Elsevier
Connectivity and different coverage types including target, area, and barrier coverages are
among the most critical challenges of wireless sensor networks (WSN). This paper …
among the most critical challenges of wireless sensor networks (WSN). This paper …
A new approach for prediction of lung carcinoma using back propagation neural network with decision tree classifiers
CH Hsu, G Manogaran… - 2018 IEEE 8th …, 2018 - ieeexplore.ieee.org
In this paper an investigation was made to examine the lung tumour expectation utilizing
classification algorithms, for example, Back Propagation Neural Network and Decision Tree …
classification algorithms, for example, Back Propagation Neural Network and Decision Tree …
Genetic algorithm–based sensor deployment with area priority
We are introducing a new design goal called area priority to determine optimal sensor node
distribution. The environment in which the wireless sensor network (WSN) will be placed is …
distribution. The environment in which the wireless sensor network (WSN) will be placed is …
Optimization of sensor deployment using multi-objective evolutionary algorithms
Many designs of wireless sensor network applications require the determination of the
optimal locations of sensor nodes to be placed in a sensor field. Coverage enables us to …
optimal locations of sensor nodes to be placed in a sensor field. Coverage enables us to …
[PDF][PDF] Kablosuz sensör ağlar ve uygulamaları
TE Kalaycı - Akademik Bilişim Konferansı, Şanlıurfa, 2009 - ab.org.tr.inetd.org.tr
Wireless sensor network is a popular technology which has a wide application area.
Wireless sensor networks can be used to interactively collect data from environment …
Wireless sensor networks can be used to interactively collect data from environment …